Sample records for security screening applications

  1. Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors.

    PubMed

    Song, Cen; Zhuang, Jun

    2018-01-01

    In security check systems, tighter screening processes increase the security level, but also cause more congestion, which could cause longer wait times. Having to deal with more congestion in lines could also cause issues for the screeners. The Transportation Security Administration (TSA) Precheck Program was introduced to create fast lanes in airports with the goal of expediting passengers who the TSA does not deem to be threats. In this lane, the TSA allows passengers to enjoy fewer restrictions in order to speed up the screening time. Motivated by the TSA Precheck Program, we study parallel queueing imperfect screening systems, where the potential normal and adversary participants/applicants decide whether to apply to the Precheck Program or not. The approved participants would be assigned to a faster screening channel based on a screening policy determined by an approver, who balances the concerns of safety of the passengers and congestion of the lines. There exist three types of optimal normal applicant's application strategy, which depend on whether the marginal payoff is negative or positive, or whether the marginal benefit equals the marginal cost. An adversary applicant would not apply when the screening policy is sufficiently large or the number of utilized benefits is sufficiently small. The basic model is extended by considering (1) applicants' parameters to follow different distributions and (2) applicants to have risk levels, where the approver determines the threshold value needed to qualify for Precheck. This article integrates game theory and queueing theory to study the optimal screening policy and provides some insights to imperfect parallel queueing screening systems. © 2017 Society for Risk Analysis.

  2. 49 CFR 1522.101 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program § 1522.101 Applicability. This subpart governs the use of TSA-approved validation firms and validators to...

  3. 49 CFR 1546.207 - Screening of individuals and property.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... TSA is conducting screening using TSA employees or when using companies under contract with TSA. (c... 49 Transportation 9 2010-10-01 2010-10-01 false Screening of individuals and property. 1546.207... SECURITY Operations § 1546.207 Screening of individuals and property. (a) Applicability of this section...

  4. 49 CFR 1522.109 - TSA review and approval.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program... that the applicant is qualified to be a validation firm. (b) Notice.—(1) Approval. If an application is...

  5. ICRP Publication 125: Radiological Protection in Security Screening.

    PubMed

    Cool, D A; Lazo, E; Tattersall, P; Simeonov, G; Niu, S

    2014-07-01

    The use of technologies to provide security screening for individuals and objects has been increasing rapidly, in keeping with the significant increase in security concerns worldwide. Within the spectrum of technologies, the use of ionizing radiation to provide backscatter and transmission screening capabilities has also increased. The Commission has previously made a number of statements related to the general topic of deliberate exposures of individuals in non-medical settings. This report provides advice on how the radiological protection principles recommended by the Commission should be applied within the context of security screening. More specifically, the principles of justification, optimisation of protection, and dose limitation for planned exposure situations are directly applicable to the use of ionising radiation in security screening. In addition, several specific topics are considered in this report, including the situation in which individuals may be exposed because they are concealed (‘stowaways’) in a cargo container or conveyance that may be subject to screening. The Commission continues to recommend that careful justification of screening should be considered before decisions are made to employ the technology. If a decision is made that its use is justified, the framework for protection as a planned exposure situation should be employed, including optimization of protection with the use of dose constraints and the appropriate provisions for authorisation and inspection.

  6. Security. Review Software for Advanced CHOICE. CHOICE (Challenging Options in Career Education).

    ERIC Educational Resources Information Center

    Pitts, Ilse M.; And Others

    CHOICE Security is an Apple computer game activity designed to help secondary migrant students memorize their social security numbers and reinforce job and role information presented in "Career Notes, First Applications." The learner may choose from four time options and whether to have the social security number visible on the screen or…

  7. 76 FR 51847 - Air Cargo Screening

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-18

    ...This rule amends two provisions of the Air Cargo Screening Interim Final Rule (IFR) issued on September 16, 2009, and responds to public comments on the IFR. The IFR codified a statutory requirement of the Implementing Recommendations of the 9/11 Commission Act of 2007 that the Transportation Security Administration (TSA) establish a system to screen 100 percent of cargo transported on passenger aircraft not later than August 3, 2010. It established the Certified Cargo Screening Program, in which TSA certifies shippers, indirect air carriers, and other entities as Certified Cargo Screening Facilities (CCSFs) to screen cargo prior to transport on passenger aircraft. Under the IFR, each CCSF applicant had to successfully undergo an assessment of their facility by a TSA-approved validation firm or by TSA. In response to public comment, this Final Rule removes all validation firm and validator provisions, so that TSA will continue to conduct assessments of the applicant's facility to determine if certification is appropriate. The IFR also required that if an aircraft operator or foreign air carrier screens cargo off an airport, it must do so as a CCSF. The Final Rule deletes this requirement, as aircraft operators are already screening cargo on airport under a TSA-approved security program, and do not need a separate certification to screen cargo off airport. This rule also proposes a fee range for the processing of Security Threat Assessments, and seeks comment on the proposed fee range and the methodology used to develop the fee. TSA will announce the final fee in a future Federal Register notice.

  8. 77 FR 25187 - Extension of Agency Information Collection Activity Under OMB Review: Certified Cargo Screening...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-27

    ...This notice announces that the Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), Office of Management and Budget (OMB) control number 1652-0053, abstracted below to OMB for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of the following collection of information on February 24, 2012, 77 FR 11146, and TSA received no comments. The collections include: (1) Applications from entities that wish to become Certified Cargo Screening Facilities (CCSFs); (2) personal information to allow TSA to conduct security threat assessments on key individuals employed by the CCSFs; (3) implementation of a standard security program or submission of a proposed modified security program; (4) information on the amount of cargo screened; (5) recordkeeping requirements for CCSFs, and any other requests for information relating to cargo screening required to meet the Implementing Recommendations of the 9/11 Commission Act of 2007 (9/ 11 Act) and the Aviation and Transportation Security Act (ATSA) mandates. TSA is seeking the renewal of the ICR for the continuation of the program in order to secure passenger aircraft transporting cargo as required in the 9/11 Act.

  9. Fast Computation and Assessment Methods in Power System Analysis

    NASA Astrophysics Data System (ADS)

    Nagata, Masaki

    Power system analysis is essential for efficient and reliable power system operation and control. Recently, online security assessment system has become of importance, as more efficient use of power networks is eagerly required. In this article, fast power system analysis techniques such as contingency screening, parallel processing and intelligent systems application are briefly surveyed from the view point of their application to online dynamic security assessment.

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    McMakin, Douglas L.; Sheen, David M.; Hall, Thomas E.

    Pacific Northwest National Laboratory researchers have been at the forefront of developing innovative screening systems to enhance security and a novel imaging system to provide custom-fit clothing using holographic radar imaging techniques. First-of-a-kind cylindrical holographic imaging systems have been developed to screen people at security checkpoints for the detection of concealed, body worn, non-metallic threats such as plastic and liquid explosives, knifes and contraband. Another embodiment of this technology is capable of obtaining full sized body measurements in near real time without the person under surveillance removing their outer garments. Radar signals readily penetrate clothing and reflect off the watermore » in skin. This full body measurement system is commercially available for best fitting ready to wear clothing, which was the first “biometric” application for this technology. One compelling feature of this technology for security biometric applications is that it can see effectively through disguises, appliances and body hair.« less

  11. Network-based reading system for lung cancer screening CT

    NASA Astrophysics Data System (ADS)

    Fujino, Yuichi; Fujimura, Kaori; Nomura, Shin-ichiro; Kawashima, Harumi; Tsuchikawa, Megumu; Matsumoto, Toru; Nagao, Kei-ichi; Uruma, Takahiro; Yamamoto, Shinji; Takizawa, Hotaka; Kuroda, Chikazumi; Nakayama, Tomio

    2006-03-01

    This research aims to support chest computed tomography (CT) medical checkups to decrease the death rate by lung cancer. We have developed a remote cooperative reading system for lung cancer screening over the Internet, a secure transmission function, and a cooperative reading environment. It is called the Network-based Reading System. A telemedicine system involves many issues, such as network costs and data security if we use it over the Internet, which is an open network. In Japan, broadband access is widespread and its cost is the lowest in the world. We developed our system considering human machine interface and security. It consists of data entry terminals, a database server, a computer aided diagnosis (CAD) system, and some reading terminals. It uses a secure Digital Imaging and Communication in Medicine (DICOM) encrypting method and Public Key Infrastructure (PKI) based secure DICOM image data distribution. We carried out an experimental trial over the Japan Gigabit Network (JGN), which is the testbed for the Japanese next-generation network, and conducted verification experiments of secure screening image distribution, some kinds of data addition, and remote cooperative reading. We found that network bandwidth of about 1.5 Mbps enabled distribution of screening images and cooperative reading and that the encryption and image distribution methods we proposed were applicable to the encryption and distribution of general DICOM images via the Internet.

  12. 20 CFR 418.3210 - What is a prescribed application for a subsidy?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false What is a prescribed application for a subsidy? 418.3210 Section 418.3210 Employees' Benefits SOCIAL SECURITY ADMINISTRATION MEDICARE SUBSIDIES... prescribed application may include a printed form, an application our employees complete on computer screens...

  13. 20 CFR 418.3210 - What is a prescribed application for a subsidy?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What is a prescribed application for a subsidy? 418.3210 Section 418.3210 Employees' Benefits SOCIAL SECURITY ADMINISTRATION MEDICARE SUBSIDIES... prescribed application may include a printed form, an application our employees complete on computer screens...

  14. 20 CFR 418.3210 - What is a prescribed application for a subsidy?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false What is a prescribed application for a subsidy? 418.3210 Section 418.3210 Employees' Benefits SOCIAL SECURITY ADMINISTRATION MEDICARE SUBSIDIES... prescribed application may include a printed form, an application our employees complete on computer screens...

  15. 20 CFR 418.3210 - What is a prescribed application for a subsidy?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false What is a prescribed application for a subsidy? 418.3210 Section 418.3210 Employees' Benefits SOCIAL SECURITY ADMINISTRATION MEDICARE SUBSIDIES... prescribed application may include a printed form, an application our employees complete on computer screens...

  16. 20 CFR 418.3210 - What is a prescribed application for a subsidy?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false What is a prescribed application for a subsidy? 418.3210 Section 418.3210 Employees' Benefits SOCIAL SECURITY ADMINISTRATION MEDICARE SUBSIDIES... prescribed application may include a printed form, an application our employees complete on computer screens...

  17. 77 FR 11146 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Certified...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), OMB control number 1652-0053, abstracted below that we will submit to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. The collections include: (1) Applications from entities that wish to become Certified Cargo Screening Facilities (CCSF); (2) personal information to allow TSA to conduct security threat assessments on key individuals employed by the CCSFs; (3) acceptance of a standard security program or submission of a proposed modified security program; (4) information on the amount of cargo screened; and (5) recordkeeping requirements for CCSFs. TSA is seeking the renewal of the ICR for the continuation of the program in order to secure passenger aircraft carrying cargo.

  18. Enhanced Images for Checked and Carry-on Baggage and Cargo Screening

    NASA Technical Reports Server (NTRS)

    Woodell, Glenn; Rahman, Zia-ur; Jobson, Daniel J.; Hines, Glenn

    2004-01-01

    The current X-ray systems used by airport security personnel for the detection of contraband, and objects such as knives and guns that can impact the security of a flight, have limited effect because of the limited display quality of the X-ray images. Since the displayed images do not possess optimal contrast and sharpness, it is possible for the security personnel to miss potentially hazardous objects. This problem is also common to other disciplines such as medical Xrays, and can be mitigated, to a large extent, by the use of state-of-the-art image processing techniques to enhance the contrast and sharpness of the displayed image. The NASA Langley Research Center's Visual Information Processing Group has developed an image enhancement technology that has direct applications to this problem of inadequate display quality. Airport security X-ray imaging systems would benefit considerably by using this novel technology, making the task of the personnel who have to interpret the X-ray images considerably easier, faster, and more reliable. This improvement would translate into more accurate screening as well as minimizing the screening time delays to airline passengers. This technology, Retinex, has been optimized for consumer applications but has been applied to medical X-rays on a very preliminary basis. The resultant technology could be incorporated into a new breed of commercial x-ray imaging systems which would be transparent to the screener yet allow them to see subtle detail much more easily, reducing the amount of time needed for screening while greatly increasing the effectiveness of contraband detection and thus public safety.

  19. Enhanced Images for Checked and Carry-on Baggage and Cargo Screening

    NASA Technical Reports Server (NTRS)

    Woodell, Glen; Rahman, Zia-ur; Jobson, Daniel J.; Hines, Glenn

    2004-01-01

    The current X-ray systems used by airport security personnel for the detection of contraband, and objects such as knives and guns that can impact the security of a flight, have limited effect because of the limited display quality of the X-ray images. Since the displayed images do not possess optimal contrast and sharpness, it is possible for the security personnel to miss potentially hazardous objects. This problem is also common to other disciplines such as medical X-rays, and can be mitigated, to a large extent, by the use of state-of-the-art image processing techniques to enhance the contrast and sharpness of the displayed image. The NASA Langley Research Centers Visual Information Processing Group has developed an image enhancement technology that has direct applications to this problem of inadequate display quality. Airport security X-ray imaging systems would benefit considerably by using this novel technology, making the task of the personnel who have to interpret the X-ray images considerably easier, faster, and more reliable. This improvement would translate into more accurate screening as well as minimizing the screening time delays to airline passengers. This technology, Retinex, has been optimized for consumer applications but has been applied to medical X-rays on a very preliminary basis. The resultant technology could be incorporated into a new breed of commercial x-ray imaging systems which would be transparent to the screener yet allow them to see subtle detail much more easily, reducing the amount of time needed for screening while greatly increasing the effectiveness of contraband detection and thus public safety.

  20. 24 CFR 901.45 - Indicator #8, security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... of crime to local law enforcement agencies, the adoption and implementation of tough applicant screening and resident eviction policies and procedures, and, as applicable, PHA performance under any HUD... policies and the PHA has implemented procedures and can document that it (1) tracks crime and crime-related...

  1. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE... the screening threshold quantity by security issue. (a) General. In calculating whether a facility...

  2. Applications of superconducting bolometers in security imaging

    NASA Astrophysics Data System (ADS)

    Luukanen, A.; Leivo, M. M.; Rautiainen, A.; Grönholm, M.; Toivanen, H.; Grönberg, L.; Helistö, P.; Mäyrä, A.; Aikio, M.; Grossman, E. N.

    2012-12-01

    Millimeter-wave (MMW) imaging systems are currently undergoing deployment World-wide for airport security screening applications. Security screening through MMW imaging is facilitated by the relatively good transmission of these wavelengths through common clothing materials. Given the long wavelength of operation (frequencies between 20 GHz to ~ 100 GHz, corresponding to wavelengths between 1.5 cm and 3 mm), existing systems are suited for close-range imaging only due to substantial diffraction effects associated with practical aperture diameters. The present and arising security challenges call for systems that are capable of imaging concealed threat items at stand-off ranges beyond 5 meters at near video frame rates, requiring substantial increase in operating frequency in order to achieve useful spatial resolution. The construction of such imaging systems operating at several hundred GHz has been hindered by the lack of submm-wave low-noise amplifiers. In this paper we summarize our efforts in developing a submm-wave video camera which utilizes cryogenic antenna-coupled microbolometers as detectors. Whilst superconducting detectors impose the use of a cryogenic system, we argue that the resulting back-end complexity increase is a favorable trade-off compared to complex and expensive room temperature submm-wave LNAs both in performance and system cost.

  3. 75 FR 9915 - Extension of Agency Information Collection Activity Under OMB Review: Certified Cargo Screening...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-04

    ...This notice announces that the Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), OMB control number 1652-0053, abstracted below to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of the following collection of information on November 16, 2009, 74 FR 58967. TSA has received no comments. The collections include: (1) Applications from entities that wish to become Certified Cargo Screening Facilities (CCSF) or operate as a TSA-approved validation firm; (2) personal information to allow TSA to conduct security threat assessments on key individuals employed by the CCSFs and validation firms; (3) implementation of a standard security program or submission of a proposed modified security program; (4) information on the amount of cargo screened; (5) recordkeeping requirements for CCSFs and validation firms; and (6) submission of validation reports to TSA. TSA is seeking the renewal of the ICR for the continuation of the program in order to secure passenger aircraft carrying cargo by the deadlines set out in the Implementing Recommendations of the 9/11 Commission Act of 2007.

  4. Chemical Sniffing Instrumentation for Security Applications.

    PubMed

    Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; Marshall, Alan; Verbeck, Guido F

    2016-07-27

    Border control for homeland security faces major challenges worldwide due to chemical threats from national and/or international terrorism as well as organized crime. A wide range of technologies and systems with threat detection and monitoring capabilities has emerged to identify the chemical footprint associated with these illegal activities. This review paper investigates artificial sniffing technologies used as chemical sensors for point-of-use chemical analysis, especially during border security applications. This article presents an overview of (a) the existing available technologies reported in the scientific literature for threat screening, (b) commercially available, portable (hand-held and stand-off) chemical detection systems, and (c) their underlying functional and operational principles. Emphasis is given to technologies that have been developed for in-field security operations, but laboratory developed techniques are also summarized as emerging technologies. The chemical analytes of interest in this review are (a) volatile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and terrorist events), (b) chemical "signatures" associated with human presence, and (c) threat compounds (drugs, explosives, and chemical warfare agents).

  5. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  6. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  7. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  8. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  9. Analyzing the cost of screening selectee and non-selectee baggage.

    PubMed

    Virta, Julie L; Jacobson, Sheldon H; Kobza, John E

    2003-10-01

    Determining how to effectively operate security devices is as important to overall system performance as developing more sensitive security devices. In light of recent federal mandates for 100% screening of all checked baggage, this research studies the trade-offs between screening only selectee checked baggage and screening both selectee and non-selectee checked baggage for a single baggage screening security device deployed at an airport. This trade-off is represented using a cost model that incorporates the cost of the baggage screening security device, the volume of checked baggage processed through the device, and the outcomes that occur when the device is used. The cost model captures the cost of deploying, maintaining, and operating a single baggage screening security device over a one-year period. The study concludes that as excess baggage screening capacity is used to screen non-selectee checked bags, the expected annual cost increases, the expected annual cost per checked bag screened decreases, and the expected annual cost per expected number of threats detected in the checked bags screened increases. These results indicate that the marginal increase in security per dollar spent is significantly lower when non-selectee checked bags are screened than when only selectee checked bags are screened.

  10. 49 CFR 1549.101 - Acceptance, screening, and transfer of cargo.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO SCREENING PROGRAM Operations § 1549.101 Acceptance, screening, and transfer of cargo. (a) Preventing or... facilities, equipment, and procedures described in its security program to prevent or deter the carriage...

  11. 75 FR 63191 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Certified...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-14

    ...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), OMB control number 1652-0053, abstracted below that we will submit to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. The collections include: (1) Applications from entities that wish to become Certified Cargo Screening Facilities (CCSF) or operate as a TSA- approved validation firm; (2) personal information to allow TSA to conduct security threat assessments on key individuals employed by the CCSFs and validation firms; (3) implementation of a standard security program or submission of a proposed modified security program; (4) information on the amount of cargo screened; (5) recordkeeping requirements for CCSFs and validation firms; and (6) submission of validation reports to TSA. TSA is seeking the renewal of the ICR for the continuation of the program in order to secure passenger aircraft carrying cargo by the deadlines set out in the Implementing Recommendations of the 9/11 Commission Act of 2007.

  12. AVIATION SECURITY: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies

    DTIC Science & Technology

    1999-02-01

    Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies DISTRIBUTION STATEMENT A Approved for...local law enforcement support relating to air carrier and airport security measures. The funding of the security operations is divided among FAA, the...generally agreed with the current division of airport security responsibilities. These officials stated that the continuity of screening would be

  13. Products for Security Screening of People

    MedlinePlus

    ... for Non-Medical Radiation Applications, administered by the Health Physics Society (HPS), published the current version of the ... took place during the October 1, 2003 meeting. Health Risks from Exposure ... Applied Physics Laboratory, Assessment for TSA, October 2009 and revised ...

  14. 14 CFR 382.55 - May carriers impose security screening procedures for passengers with disabilities that go beyond...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Accessibility of Airport Facilities § 382.55 May carriers impose security screening procedures for passengers..., including those with disabilities, are subject to TSA security screening requirements at U.S. airports. In addition, passengers at foreign airports, including those with disabilities, may be subject to security...

  15. 14 CFR 382.55 - May carriers impose security screening procedures for passengers with disabilities that go beyond...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Accessibility of Airport Facilities § 382.55 May carriers impose security screening procedures for passengers..., including those with disabilities, are subject to TSA security screening requirements at U.S. airports. In addition, passengers at foreign airports, including those with disabilities, may be subject to security...

  16. 14 CFR 382.55 - May carriers impose security screening procedures for passengers with disabilities that go beyond...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Accessibility of Airport Facilities § 382.55 May carriers impose security screening procedures for passengers..., including those with disabilities, are subject to TSA security screening requirements at U.S. airports. In addition, passengers at foreign airports, including those with disabilities, may be subject to security...

  17. 49 CFR 1548.21 - Screening of cargo.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.21 Screening of cargo. An IAC may only screen cargo for transport on a passenger aircraft under §§ 1544.205 and 1546.205...

  18. Review of Private Sector Personnel Screening Practices

    DTIC Science & Technology

    2000-10-01

    private sector investigative sources or methods would be useful to the DoD for conducting national security background investigations. The federal government by and large examines more sources and conducts more thorough investigations than industry. In general, private employers (1) have less access to information about applicants...outsource many elements of background checks. It is recommended that the DoD periodically evaluate private sector screening programs and data sources in order to monitor

  19. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...

  20. Novel data visualizations of X-ray data for aviation security applications using the Open Threat Assessment Platform (OTAP)

    NASA Astrophysics Data System (ADS)

    Gittinger, Jaxon M.; Jimenez, Edward S.; Holswade, Erica A.; Nunna, Rahul S.

    2017-02-01

    This work will demonstrate the implementation of a traditional and non-traditional visualization of x-ray images for aviation security applications that will be feasible with open system architecture initiatives such as the Open Threat Assessment Platform (OTAP). Anomalies of interest to aviation security are fluid, where characteristic signals of anomalies of interest can evolve rapidly. OTAP is a limited scope open architecture baggage screening prototype that intends to allow 3rd-party vendors to develop and easily implement, integrate, and deploy detection algorithms and specialized hardware on a field deployable screening technology [13]. In this study, stereoscopic images were created using an unmodified, field-deployed system and rendered on the Oculus Rift, a commercial virtual reality video gaming headset. The example described in this work is not dependent on the Oculus Rift, and is possible using any comparable hardware configuration capable of rendering stereoscopic images. The depth information provided from viewing the images will aid in the detection of characteristic signals from anomalies of interest. If successful, OTAP has the potential to allow for aviation security to become more fluid in its adaptation to the evolution of anomalies of interest. This work demonstrates one example that is easily implemented using the OTAP platform, that could lead to the future generation of ATR algorithms and data visualization approaches.

  1. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... with security-related duties. (a) Security threat assessments. Each certified cargo screening facility... certified cargo screening facility complete a security threat assessment or comparable security threat... acuity, physical coordination, and motor skills to the extent required to effectively operate cargo...

  2. Can laptops be left inside passenger bags if motion imaging is used in X-ray security screening?

    PubMed

    Mendes, Marcia; Schwaninger, Adrian; Michel, Stefan

    2013-01-01

    This paper describes a study where a new X-ray machine for security screening featuring motion imaging (i.e., 5 views of a bag are shown as an image sequence) was evaluated and compared to single view imaging available on conventional X-ray screening systems. More specifically, it was investigated whether with this new technology X-ray screening of passenger bags could be enhanced to such an extent that laptops could be left inside passenger bags, without causing a significant impairment in threat detection performance. An X-ray image interpretation test was created in four different versions, manipulating the factors packing condition (laptop and bag separate vs. laptop in bag) and display condition (single vs. motion imaging). There was a highly significant and large main effect of packing condition. When laptops and bags were screened separately, threat item detection was substantially higher. For display condition, a medium effect was observed. Detection could be slightly enhanced through the application of motion imaging. There was no interaction between display and packing condition, implying that the high negative effect of leaving laptops in passenger bags could not be fully compensated by motion imaging. Additional analyses were carried out to examine effects depending on different threat categories (guns, improvised explosive devices, knives, others), the placement of the threat items (in bag vs. in laptop) and viewpoint (easy vs. difficult view). In summary, although motion imaging provides an enhancement, it is not strong enough to allow leaving laptops in bags for security screening.

  3. Can laptops be left inside passenger bags if motion imaging is used in X-ray security screening?

    PubMed Central

    Mendes, Marcia; Schwaninger, Adrian; Michel, Stefan

    2013-01-01

    This paper describes a study where a new X-ray machine for security screening featuring motion imaging (i.e., 5 views of a bag are shown as an image sequence) was evaluated and compared to single view imaging available on conventional X-ray screening systems. More specifically, it was investigated whether with this new technology X-ray screening of passenger bags could be enhanced to such an extent that laptops could be left inside passenger bags, without causing a significant impairment in threat detection performance. An X-ray image interpretation test was created in four different versions, manipulating the factors packing condition (laptop and bag separate vs. laptop in bag) and display condition (single vs. motion imaging). There was a highly significant and large main effect of packing condition. When laptops and bags were screened separately, threat item detection was substantially higher. For display condition, a medium effect was observed. Detection could be slightly enhanced through the application of motion imaging. There was no interaction between display and packing condition, implying that the high negative effect of leaving laptops in passenger bags could not be fully compensated by motion imaging. Additional analyses were carried out to examine effects depending on different threat categories (guns, improvised explosive devices, knives, others), the placement of the threat items (in bag vs. in laptop) and viewpoint (easy vs. difficult view). In summary, although motion imaging provides an enhancement, it is not strong enough to allow leaving laptops in bags for security screening. PMID:24151457

  4. Extended sources near-field processing of experimental aperture synthesis data and application of the Gerchberg method for enhancing radiometric three-dimensional millimetre-wave images in security screening portals

    NASA Astrophysics Data System (ADS)

    Salmon, Neil A.

    2017-10-01

    Aperture synthesis for passive millimetre wave imaging provides a means to screen people for concealed threats in the extreme near-field configuration of a portal, a regime where the imager to subject distance is of the order of both the required depth-of-field and the field-of-view. Due to optical aberrations, focal plane array imagers cannot deliver the large depth-of-fields and field-of-views required in this regime. Active sensors on the other hand can deliver these but face challenges of illumination, speckle and multi-path issues when imaging canyon regions of the body. Fortunately an aperture synthesis passive millimetre wave imaging system can deliver large depth-of-fields and field-of-views, whilst having no speckle effects, as the radiometric emission from the human body is spatially incoherent. Furthermore, as in portal security screening scenarios the aperture synthesis imaging technique delivers a half-wavelength spatial resolution, it can effectively screen the whole of the human body. Some recent measurements are presented that demonstrate the three-dimensional imaging capability of extended sources using a 22 GHz aperture synthesis system. A comparison is made between imagery generated via the analytic Fourier transform and a gridding fast Fourier transform method. The analytic Fourier transform enables aliasing in the imagery to be more clearly identified. Some initial results are also presented of how the Gerchberg technique, an image enhancement algorithm used in radio astronomy, is adapted for three-dimensional imaging in security screening. This technique is shown to be able to improve the quality of imagery, without adding extra receivers to the imager. The requirements of a walk through security screening system for use at entrances to airport departure lounges are discussed, concluding that these can be met by an aperture synthesis imager.

  5. From sniffer dogs to emerging sniffer devices for airport security: an opportunity to rethink privacy implications?

    PubMed

    Bonfanti, Matteo E

    2014-09-01

    Dogs are known for their incredible ability to detect odours, extracting them from a "complex" environment and recognising them. This makes sniffer dogs precious assets in a broad variety of security applications. However, their use is subject to some intrinsic restrictions. Dogs can only be trained to a limited set of applications, get tired after a relatively short period, and thus require a high turnover. This has sparked a drive over the past decade to develop artificial sniffer devices-generally known as "chemical sniffers" or "electronic noses"-able to complement and possibly replace dogs for some security applications. Such devices have been already deployed, or are intended to be deployed, at borders, airports and other critical installation security checkpoints. Similarly to dogs, they are adopted for detecting residual traces that indicate either the presence of, or recent contact with, substances like drugs and explosives. It goes without saying that, as with sniffer dogs, the use of artificial sniffer devices raises many sensitive issues. Adopting an ethical and legal perspective, the present paper discusses the privacy and data protection implications of the possible deployment of a hand-held body scanning sniffer for screening passengers at EU airport security checkpoints.

  6. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McDonald, K; Curran, B

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less

  7. Options for Synthetic DNA Order Screening, Revisited.

    PubMed

    DiEuliis, Diane; Carter, Sarah R; Gronvall, Gigi Kwik

    2017-01-01

    Gene synthesis providers affiliated with the International Gene Synthesis Consortium (IGSC) voluntarily screen double-stranded DNA (dsDNA) synthesis orders over 200 bp to check for matches to regulated pathogens and to screen customers. Questions have been raised, however, about the continuing feasibility and effectiveness of screening. There are technical challenges (e.g., oligonucleotides and tracts of DNA less than 200 bp are not screened) and corporate challenges (e.g., the costs of screening are high, but other costs are dropping, so screening is an increasing portion of operating costs). In this article, we describe tangible actions that should be taken to (i) preserve the effectiveness of DNA order screening as a security tool and (ii) develop additional mechanisms to increase the safety and security of DNA synthesis technologies. Screening is not a perfect solution to DNA synthesis security challenges, but we believe it is still a valuable addition to security, and it can remain effective for some time.

  8. Aerial secure display by use of polarization-processing display with retarder film and retro-reflector

    NASA Astrophysics Data System (ADS)

    Ito, Shusei; Uchida, Keitaro; Mizushina, Haruki; Suyama, Shiro; Yamamoto, Hirotsugu

    2017-02-01

    Security is one of the big issues in automated teller machine (ATM). In ATM, two types of security have to be maintained. One is to secure displayed information. The other is to secure screen contamination. This paper gives a solution for these two security issues. In order to secure information against peeping at the screen, we utilize visual cryptography for displayed information and limit the viewing zone. Furthermore, an aerial information screen with aerial imaging by retro-reflection, named AIRR enables users to avoid direct touch on the information screen. The purpose of this paper is to propose an aerial secure display technique that ensures security of displayed information as well as security against contamination problem on screen touch. We have developed a polarization-processing display that is composed of a backlight, a polarizer, a background LCD panel, a gap, a half-wave retarder, and a foreground LCD panel. Polarization angle is rotated with the LCD panels. We have constructed a polarization encryption code set. Size of displayed images are designed to limit the viewing position. Furthermore, this polarization-processing display has been introduced into our aerial imaging optics, which employs a reflective polarizer and a retro-reflector covered with a quarter-wave retarder. Polarization-modulated light forms the real image over the reflective polarizer. We have successfully formed aerial information screen that shows the secret image with a limited viewing position. This is the first realization of aerial secure display by use of polarization-processing display with retarder-film and retro-reflector.

  9. Study terrestrial applications of solar cell powered systems

    NASA Technical Reports Server (NTRS)

    Ravin, J. W.

    1973-01-01

    Terrestrial applications of solar cells and design systems are considered for those applications that show the most promise for becoming practical and accepted by users within the next five years. The study includes the definition, categorization, evaluation and screening of the most attractive potential terrestrial applications for solar cells. Potential markets are initially grouped and categorized in a general sense and are weighted in priority by their business volume, present and future. From a categorized list including marine, transportation, security, communication, meteorological and others, 66 potential solar cell applications have been cataloged. A methodology was formulated to include the criteria for evaluation and screening. The evaluation process covers all parts and components of the complete system required for each application and gives consideration to all factors, such as engineering, economic, production, marketing and other factors that may have an influence on the acceptance of the system.

  10. 49 CFR 1546.207 - Screening of individuals and property.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER.... As required in its security program, each foreign air carrier must ensure that all individuals or... TSA is conducting screening using TSA employees or when using companies under contract with TSA. (c...

  11. 49 CFR 1546.207 - Screening of individuals and property.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER.... As required in its security program, each foreign air carrier must ensure that all individuals or... TSA is conducting screening using TSA employees or when using companies under contract with TSA. (c...

  12. 49 CFR 1546.207 - Screening of individuals and property.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER.... As required in its security program, each foreign air carrier must ensure that all individuals or... TSA is conducting screening using TSA employees or when using companies under contract with TSA. (c...

  13. 49 CFR 1546.207 - Screening of individuals and property.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR CARRIER.... As required in its security program, each foreign air carrier must ensure that all individuals or... TSA is conducting screening using TSA employees or when using companies under contract with TSA. (c...

  14. 49 CFR 1549.109 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... SCREENING PROGRAM Operations § 1549.109 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify certified cargo screening facilities of security concerns. (b) When TSA...

  15. Large-screen display industry: market and technology trends for direct view and projection displays

    NASA Astrophysics Data System (ADS)

    Castellano, Joseph A.; Mentley, David E.

    1996-03-01

    Large screen information displays are defined as dynamic electronic displays that can be viewed by more than one person and are at least 2-feet wide. These large area displays for public viewing provide convenience, entertainment, security, and efficiency to the viewers. There are numerous uses for large screen information displays including those in advertising, transportation, traffic control, conference room presentations, computer aided design, banking, and military command/control. A noticeable characteristic of the large screen display market is the interchangeability of display types. For any given application, the user can usually choose from at least three alternative technologies, and sometimes from many more. Some display types have features that make them suitable for specific applications due to temperature, brightness, power consumption, or other such characteristic. The overall worldwide unit consumption of large screen information displays of all types and for all applications (excluding consumer TV) will increase from 401,109 units in 1995 to 655,797 units in 2002. On a unit consumption basis, applications in business and education represent the largest share of unit consumption over this time period; in 1995, this application represented 69.7% of the total. The market (value of shipments) will grow from DOL3.1 billion in 1995 to DOL3.9 billion in 2002. The market will be dominated by front LCD projectors and LCD overhead projector plates.

  16. Information barrier technology applied to less restrictive environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacArthur, D. W.; Langner, D. C.; Hypes, P. A.

    2004-01-01

    The information barrier is an important part of any system that allows inspector verification of declared classified materials. In this context, the information barrier must protect classified information while allowing the inspectors to reach correct and independent conclusions concerning the veracity of the declaration. Although other applications may not involve national security, information barrier techniques can still be used to protect information considered sensitive by individuals, commercial entities, or national organizations. Other potential areas of application include homeland security and airport screening, personal information disclosed by modern scanning techniques, nuclear information not considered classified but still sensitive, and industrial secretmore » information that could be compromised during 3rd party acceptance testing. Modern personnel screening devices are limited more by their potential for release of personal information than by technology. Screening systems that could be used in airports and other sensitive areas are often not utilized because the same system that can show the details of weapons carried on a person's body can also reveal potentially embarrassing and sensitive details of the body itself. Much other nuclear information, as well as industrially secret information, while not actually classified, is not appropriate for widespread dissemination. In both cases an inspector may need to verify elements of the manufacturer's or owner's claims, but at the same time not disclose sensitive information to either the inspector or the general public. Thus, information barrier technology, although originally developed for protection of nuclear weapons information, is also directly usable in a number of counter-terrorism and nonproliferation applications. Although these applications may not (or may) require the same level of rigor as the original application to classified items, many of the same techniques can be used in protecting this non-classified, but still sensitive, information.« less

  17. Effect of total shoulder replacements on airport security screening in the post-9/11 era.

    PubMed

    Dines, Joshua S; Elkousy, Hussein; Edwards, T Bradley; Gartsman, Gary M; Dines, David M

    2007-01-01

    There are few reports in the literature on the effect of orthopaedic implants on airport security devices and none on shoulder arthroplasty implants after September 11, 2001. Since 9/11, airport security screening devices have become more sensitive in response to the increasing threat of terrorism. Often, patients with joint implants activate the metal detectors and are subsequently subjected to more intensive screening. We assess the effects of shoulder joint implants on different airport security devices and what effect the results had on passenger travel. In this study, 154 patients who had previously undergone shoulder replacement responded to a questionnaire regarding their travel experiences after 9/11. Of these, 85 had flown during the time period studied (47 men and 38 women; mean age, 67.8 years); 79 had traveled domestically (mean, 7 flights), and 22 had taken international flights (mean, 6.1 flights). The questionnaire addressed each patient's height/weight, the number of flight segments flown (domestic and international), the number of times that a patient activated the doorway alarm/wand alarm, and the effect of a card stating that the patient had joint replacement (when applicable). On average, patients with shoulder replacement traveling domestically activated the security gate 52% of the time. The average for international travel was 42%. Of the patients who flew both domestically and internationally, there was a high correlation of activation (R = 0.54). Twenty-six patients had multiple joint implants (mean, 2.8). Multiple joint implants caused increased alarm activation (P < .001). All patients reported that their travel was delayed during the instances of security activation. There was no statistically significant effect of body mass index, height, weight, age, or sex on security device activation. Of the patients, 71% were told by their doctor that the shoulder replacement may activate security devices. Of these, 46 were given a card by their doctor indicating the presence of a total joint implant. In only 30% of the security encounters of these patients did the card expedite the screening process. This is the largest study on the effects of joint implants, and shoulder implants in particular, on airport security devices and the only one that has analyzed the data of post-9/11 travel. Patients traveling after total shoulder replacement are often delayed and subjected to more rigorous screening when traveling, especially in the post-9/11 environment. Doctors often warn their patients of potential problems and may try to avert this by giving them cards documenting the presence of a joint implant. The acceptance of these cards is sporadic. This study raises the importance of notifying patients of potential security delays, especially those with multiple joint implants, as they may directly affect travel plans. In addition, these patients may benefit from the establishment of an international joint registry.

  18. Aviation Security: Vulnerabilities in, and Alternatives for, Preboard Screening Security Operations

    DTIC Science & Technology

    2001-09-25

    establishing the certification program. This regulation is particularly significant because it is to include requirements mandated by the Airport Security Improvement...Assessment of Airport Security Screener Performance and Retention, Sept. 15, 2000. Page 8 GAO-01-1171T Criteria for Assessing Shifting responsibility for...airline and airport security officials to assess each option for reassigning screening responsibility against the key criteria- Specifically, we asked

  19. Review of the Literature Related to Screening Airline Passenger Baggage.

    DTIC Science & Technology

    1994-10-01

    11 billion passengers and their carry-on items have passed through airport security checkpoints. According to the Federal Aviation Administration...Aviation Security establishes security requirements, inspects airline and airport security operations, and issues civil penalties for noncompliance with...operations areas and provide law enforcement support for the screening system and overall airport security requirements (FAA, 1991). The FAA’s role in aviation

  20. Developing a Value of Information (VoI) Enabled System from Collection to Analysis

    DTIC Science & Technology

    2016-11-01

    Information, Android, smartphone , information dissemination, visual analytic 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...List of Figures Fig. 1 Spot report main screen .........................................................................2 Fig. 2 Smartphone app...included the creation of 2 Android smartphone applications (apps) and the enhancement of an existing tool (Contour). Prior work with Android

  1. 76 FR 4709 - Extension of Agency Information Collection Activity Under OMB Review: Certified Cargo Screening...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-26

    ... period soliciting comments, of the following collection of information on October 14, 2010, 75 FR 63191. TSA has received no comments. The collections include: (1) Applications from entities that wish to... CCSFs and validation firms; (3) implementation of a standard security program or submission of a...

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    The system is developed to collect, process, store and present the information provided by the radio frequency identification (RFID) devices. The system contains three parts, the application software, the database and the web page. The application software manages multiple RFID devices, such as readers and portals, simultaneously. It communicates with the devices through application programming interface (API) provided by the device vendor. The application software converts data collected by the RFID readers and portals to readable information. It is capable of encrypting data using 256 bits advanced encryption standard (AES). The application software has a graphical user interface (GUI). Themore » GUI mimics the configurations of the nucler material storage sites or transport vehicles. The GUI gives the user and system administrator an intuitive way to read the information and/or configure the devices. The application software is capable of sending the information to a remote, dedicated and secured web and database server. Two captured screen samples, one for storage and transport, are attached. The database is constructed to handle a large number of RFID tag readers and portals. A SQL server is employed for this purpose. An XML script is used to update the database once the information is sent from the application software. The design of the web page imitates the design of the application software. The web page retrieves data from the database and presents it in different panels. The user needs a user name combined with a password to access the web page. The web page is capable of sending e-mail and text messages based on preset criteria, such as when alarm thresholds are excceeded. A captured screen sample is attached. The application software is designed to be installed on a local computer. The local computer is directly connected to the RFID devices and can be controlled locally or remotely. There are multiple local computers managing different sites or transport vehicles. The control from remote sites and information transmitted to a central database server is through secured internet. The information stored in the central databaser server is shown on the web page. The users can view the web page on the internet. A dedicated and secured web and database server (https) is used to provide information security.« less

  3. Application of laser-wakefield-based x-ray source to global food security issues

    NASA Astrophysics Data System (ADS)

    Kieffer, J. C.; Fourmaux, S.; Hallin, E.; Arnison, P.; Brereton, N.; Pitre, F.; Dixon, M.; Tran, N.

    2017-05-01

    We present the development of a high throughput phase contrast screening system based on LWFA Xray sources for plant imaging. We upgraded the INRS laser-betatron beam line and we illustrate its imaging potential through the innovative development of new tools for addressing issues relevant to global food security. This initiative, led by the Global Institute of Food Security (GIFS) at the U of Saskatchewan, aims to elucidate that part of the function that maps environmental inputs onto specific plant phenotypes. The prospect of correlating phenotypic expression with adaptation to environmental stresses will provide researchers with a new tool to assess breeding programs for crops meant to thrive under the climate extremes.

  4. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... cargo enters an airport Security Identification Display Area or is transferred to another TSA-regulated... program accepts the cargo until the cargo— (A) Enters an airport Security Identification Display Area; (B... 49 Transportation 9 2012-10-01 2012-10-01 false Access to cargo and cargo screening: Security...

  5. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... cargo enters an airport Security Identification Display Area or is transferred to another TSA-regulated... program accepts the cargo until the cargo— (A) Enters an airport Security Identification Display Area; (B... 49 Transportation 9 2014-10-01 2014-10-01 false Access to cargo and cargo screening: Security...

  6. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... cargo enters an airport Security Identification Display Area or is transferred to another TSA-regulated... program accepts the cargo until the cargo— (A) Enters an airport Security Identification Display Area; (B... 49 Transportation 9 2013-10-01 2013-10-01 false Access to cargo and cargo screening: Security...

  7. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... cargo enters an airport Security Identification Display Area or is transferred to another TSA-regulated... program accepts the cargo until the cargo— (A) Enters an airport Security Identification Display Area; (B... 49 Transportation 9 2011-10-01 2011-10-01 false Access to cargo and cargo screening: Security...

  8. Application of Energy Function as a Measure of Error in the Numerical Solution for Online Transient Stability Assessment

    NASA Astrophysics Data System (ADS)

    Sarojkumar, K.; Krishna, S.

    2016-08-01

    Online dynamic security assessment (DSA) is a computationally intensive task. In order to reduce the amount of computation, screening of contingencies is performed. Screening involves analyzing the contingencies with the system described by a simpler model so that computation requirement is reduced. Screening identifies those contingencies which are sure to not cause instability and hence can be eliminated from further scrutiny. The numerical method and the step size used for screening should be chosen with a compromise between speed and accuracy. This paper proposes use of energy function as a measure of error in the numerical solution used for screening contingencies. The proposed measure of error can be used to determine the most accurate numerical method satisfying the time constraint of online DSA. Case studies on 17 generator system are reported.

  9. First imagery generated by near-field real-time aperture synthesis passive millimetre wave imagers at 94 GHz and 183 GHz

    NASA Astrophysics Data System (ADS)

    Salmon, Neil A.; Mason, Ian; Wilkinson, Peter; Taylor, Chris; Scicluna, Peter

    2010-10-01

    The first passive millimetre wave (PMMW) imagery is presented from two proof-of-concept aperture synthesis demonstrators, developed to investigate the use of aperture synthesis for personnel security screening and all weather flying at 94 GHz, and satellite based earth observation at 183 GHz [1]. Emission from point noise sources and discharge tubes are used to examine the coherence on system baselines and to measure the point spread functions, making comparisons with theory. Image quality is examined using near field aperture synthesis and G-matrix calibration imaging algorithms. The radiometric sensitivity is measured using the emission from absorbers at elevated temperatures acting as extended sources and compared with theory. Capabilities of the latest Field Programmable Gate Arrays (FPGA) technologies for aperture synthesis PMMW imaging in all-weather and security screening applications are examined.

  10. 76 FR 79190 - Agency Information Collection Activities; Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-21

    ... heightened security screening. As a result, we encourage you to submit your comments online, or to send them... Total hours Applications to the Commission 75 2 hours 150 Misc. and fraud-related consumer complaints 262,000 6.1min 26,724 (phone). Misc. and fraud-related consumer complaints 281,000 5 min 23,323...

  11. On determining specifications and selections of alternative technologies for airport checked-baggage security screening.

    PubMed

    Feng, Qianmei

    2007-10-01

    Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.

  12. 49 CFR 1544.228 - Access to cargo and cargo screening: Security threat assessments for cargo personnel in the...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... threat assessments for cargo personnel in the United States. 1544.228 Section 1544.228 Transportation... COMMERCIAL OPERATORS Operations § 1544.228 Access to cargo and cargo screening: Security threat assessments... paragraph (b) of this section— (1) Each individual must successfully complete a security threat assessment...

  13. Required Security Screenings for Researchers: A Policy Analysis and Commentary

    ERIC Educational Resources Information Center

    Zucker, Andrew A.

    2011-01-01

    After the attacks of 9/11/2001 the federal government implemented new policies intended to protect people and institutions in the United States. A surprising policy requires education researchers conducting research under contract to the U.S. Department of Education (ED) to obtain security clearances, sometimes known as security screenings.…

  14. Regulatory cross-cutting topics for fuel cycle facilities.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Denman, Matthew R.; Brown, Jason; Goldmann, Andrew Scott

    This report overviews crosscutting regulatory topics for nuclear fuel cycle facilities for use in the Fuel Cycle Research & Development Nuclear Fuel Cycle Evaluation and Screening study. In particular, the regulatory infrastructure and analysis capability is assessed for the following topical areas: Fire Regulations (i.e., how applicable are current Nuclear Regulatory Commission (NRC) and/or International Atomic Energy Agency (IAEA) fire regulations to advance fuel cycle facilities) Consequence Assessment (i.e., how applicable are current radionuclide transportation tools to support risk-informed regulations and Level 2 and/or 3 PRA) While not addressed in detail, the following regulatory topic is also discussed: Integrated Security,more » Safeguard and Safety Requirement (i.e., how applicable are current Nuclear Regulatory Commission (NRC) regulations to future fuel cycle facilities which will likely be required to balance the sometimes conflicting Material Accountability, Security, and Safety requirements.)« less

  15. Magnetic induction tomography of objects for security applications

    NASA Astrophysics Data System (ADS)

    Ward, Rob; Joseph, Max; Langley, Abbi; Taylor, Stuart; Watson, Joe C.

    2017-10-01

    A coil array imaging system has been further developed from previous investigations, focusing on designing its application for fast screening of small bags or parcels, with a view to the production of a compact instrument for security applications. In addition to reducing image acquisition times, work was directed toward exploring potential cost effective manufacturing routes. Based on magnetic induction tomography and eddy-current principles, the instrument captured images of conductive targets using a lock-in amplifier, individually multiplexing signals between a primary driver coil and a 20 by 21 imaging array of secondary passive coils constructed using a reproducible multiple tile design. The design was based on additive manufacturing techniques and provided 2 orthogonal imaging planes with an ability to reconstruct images in less than 10 seconds. An assessment of one of the imaging planes is presented. This technique potentially provides a cost effective threat evaluation technique that may compliment conventional radiographic approaches.

  16. TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks

    NASA Astrophysics Data System (ADS)

    Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree

    2014-06-01

    The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.

  17. Halftoning Algorithms and Systems.

    DTIC Science & Technology

    1996-08-01

    TERMS 15. NUMBER IF PAGESi. Halftoning algorithms; error diffusions ; color printing; topographic maps 16. PRICE CODE 17. SECURITY CLASSIFICATION 18...graylevels for each screen level. In the case of error diffusion algorithms, the calibration procedure using the new centering concept manifests itself as a...Novel Centering Concept for Overlapping Correction Paper / Transparency (Patent Applied 5/94)I * Applications To Error Diffusion * To Dithering (IS&T

  18. Professional's Attitudes Do Not Influence Screening and Brief Interventions Rates for Hazardous and Harmful Drinkers: Results from ODHIN Study.

    PubMed

    Bendtsen, Preben; Anderson, Peter; Wojnar, Marcin; Newbury-Birch, Dorothy; Müssener, Ulrika; Colom, Joan; Karlsson, Nadine; Brzózka, Krzysztof; Spak, Fredrik; Deluca, Paolo; Drummond, Colin; Kaner, Eileen; Kłoda, Karolina; Mierzecki, Artur; Okulicz-Kozaryn, Katarzyna; Parkinson, Kathryn; Reynolds, Jillian; Ronda, Gaby; Segura, Lidia; Palacio, Jorge; Baena, Begoña; Slodownik, Luiza; van Steenkiste, Ben; Wolstenholme, Amy; Wallace, Paul; Keurhorst, Myrna N; Laurant, Miranda G H; Gual, Antoni

    2015-07-01

    To determine the relation between existing levels of alcohol screening and brief intervention rates in five European jurisdictions and role security and therapeutic commitment by the participating primary healthcare professionals. Health care professionals consisting of, 409 GPs, 282 nurses and 55 other staff including psychologists, social workers and nurse aids from 120 primary health care centres participated in a cross-sectional 4-week survey. The participants registered all screening and brief intervention activities as part of their normal routine. The participants also completed the Shortened Alcohol and Alcohol Problems Perception Questionnaire (SAAPPQ), which measure role security and therapeutic commitment. The only significant but small relationship was found between role security and screening rate in a multilevel logistic regression analysis adjusted for occupation of the provider, number of eligible patients and the random effects of jurisdictions and primary health care units (PHCU). No significant relationship was found between role security and brief intervention rate nor between therapeutic commitment and screening rate/brief intervention rate. The proportion of patients screened varied across jurisdictions between 2 and 10%. The findings show that the studied factors (role security and therapeutic commitment) are not of great importance for alcohol screening and BI rates. Given the fact that screening and brief intervention implementation rate has not changed much in the last decade in spite of increased policy emphasis, training initiatives and more research being published, this raises a question about what else is needed to enhance implementation. © The Author 2015. Medical Council on Alcohol and Oxford University Press. All rights reserved.

  19. Humans Are Still the Critical Factor in Aviation Security.

    PubMed

    Krüger, Jenny Kathinka; Suchan, Boris

    2015-10-01

    In Germany, the German Federal Police assess the performance of aviation security screeners on a regular basis. These so-called "reality tests" are unannounced examinations which aim to investigate whether airport screeners can detect forbidden items in hand luggage or attached to the body. Recent alarming results of such inspections showed clearly that the overall detection rate is in need of improvement. To achieve this, it is important to identify specific factors that influence general screening performance. This especially includes basic cognitive functions like visual screening, alertness, and divided attention, which have come more and more into focus in current fundamental research projects. This brief commentary points out critical factors, contributes background conditions in aviation security screening, and shows possible approaches for enhancement and optimization. Finally, the human aspect is discussed as not only being the weakest factor in security screening, but also one of major importance.

  20. Working alone or in the presence of others: exploring social facilitation in baggage X-ray security screening tasks.

    PubMed

    Yu, Rui-feng; Wu, Xin

    2015-01-01

    This study investigated whether the mere presence of a human audience would evoke a social facilitation effect in baggage X-ray security screening tasks. A 2 (target presence: present vs. absent) ×  2 (task complexity: simple vs. complex) ×  2 (social presence: alone vs. human audience) within-subject experiment simulating a real baggage screening task was conducted. This experiment included 20 male participants. The participants' search performance in this task was recorded. The results showed that the presence of a human audience speeded up responses in simple tasks and slowed down responses in complex tasks. However, the social facilitation effect produced by the presence of a human audience had no effect on response accuracy. These findings suggested that the complexity of screening tasks should be considered when designing work organisation modes for security screening tasks. Practitioner summary: This study investigated whether the presence of a human audience could evoke a social facilitation effect in baggage X-ray security screening tasks. An experimental simulation was conducted. The results showed that the presence of a human audience facilitated the search performance of simple tasks and inhibited the performance of complex tasks.

  1. Negligent hiring liability--a primer for healthcare administrators.

    PubMed

    Bates, Norman D

    2008-01-01

    Healthcare institutions are particularly vulnerable to negligent hiring liability which holds employers responsible for their employees' improper conduct. Several methods are simple and inexpensive yet many employers neglect to employ them effectively, the author, an attorney and security management consultant, points out. In this article, he spells out what can be done to screen applicants to avoid and/or better defend against negligent hiring lawsuits.

  2. Scoring life insurance applicants' laboratory results, blood pressure and build to predict all-cause mortality risk.

    PubMed

    Fulks, Michael; Stout, Robert L; Dolan, Vera F

    2012-01-01

    Evaluate the degree of medium to longer term mortality prediction possible from a scoring system covering all laboratory testing used for life insurance applicants, as well as blood pressure and build measurements. Using the results of testing for life insurance applicants who reported a Social Security number in conjunction with the Social Security Death Master File, the mortality associated with each test result was defined by age and sex. The individual mortality scores for each test were combined for each individual and a composite mortality risk score was developed. This score was then tested against the insurance applicant dataset to evaluate its ability to discriminate risk across age and sex. The composite risk score was highly predictive of all-cause mortality risk in a linear manner from the best to worst quintile of scores in a nearly identical fashion for each sex and decade of age. Laboratory studies, blood pressure and build from life insurance applicants can be used to create scoring that predicts all-cause mortality across age and sex. Such an approach may hold promise for preventative health screening as well.

  3. An automated approach for tone mapping operator parameter adjustment in security applications

    NASA Astrophysics Data System (ADS)

    Krasula, LukáÅ.¡; Narwaria, Manish; Le Callet, Patrick

    2014-05-01

    High Dynamic Range (HDR) imaging has been gaining popularity in recent years. Different from the traditional low dynamic range (LDR), HDR content tends to be visually more appealing and realistic as it can represent the dynamic range of the visual stimuli present in the real world. As a result, more scene details can be faithfully reproduced. As a direct consequence, the visual quality tends to improve. HDR can be also directly exploited for new applications such as video surveillance and other security tasks. Since more scene details are available in HDR, it can help in identifying/tracking visual information which otherwise might be difficult with typical LDR content due to factors such as lack/excess of illumination, extreme contrast in the scene, etc. On the other hand, with HDR, there might be issues related to increased privacy intrusion. To display the HDR content on the regular screen, tone-mapping operators (TMO) are used. In this paper, we present the universal method for TMO parameters tuning, in order to maintain as many details as possible, which is desirable in security applications. The method's performance is verified on several TMOs by comparing the outcomes from tone-mapping with default and optimized parameters. The results suggest that the proposed approach preserves more information which could be of advantage for security surveillance but, on the other hand, makes us consider possible increase in privacy intrusion.

  4. Aviation Security: Background and Policy Options for Screening and Securing Air Cargo

    DTIC Science & Technology

    2008-02-25

    today, employees with unescorted access privileges to security identification display areas ( SIDAs ) may access secured areas and aircraft without...where all-cargo aircraft are loaded and unloaded, as security identification display areas ( SIDAs ). This effectively elevates the required security

  5. Terahertz endoscopic imaging for colorectal cancer detection: Current status and future perspectives

    PubMed Central

    Doradla, Pallavi; Joseph, Cecil; Giles, Robert H

    2017-01-01

    Terahertz (THz) imaging is progressing as a robust platform for myriad applications in the field of security, health, and material science. The THz regime, which comprises wavelengths spanning from microns to millimeters, is non-ionizing and has very low photon energy: Making it inherently safe for biological imaging. Colorectal cancer is one of the most common causes of death in the world, while the conventional screening and standard of care yet relies exclusively on the physician’s experience. Researchers have been working on the development of a flexible THz endoscope, as a potential tool to aid in colorectal cancer screening. This involves building a single-channel THz endoscope, and profiling the THz response from colorectal tissue, and demonstrating endogenous contrast levels between normal and diseased tissue when imaging in reflection modality. The current level of contrast provided by the prototype THz endoscopic system represents a significant step towards clinical endoscopic application of THz technology for in-vivo colorectal cancer screening. The aim of this paper is to provide a short review of the recent advances in THz endoscopic technology and cancer imaging. In particular, the potential of single-channel THz endoscopic imaging for colonic cancer screening will be highlighted. PMID:28874955

  6. Instrumentation for Linear and Nonlinear Optical Device Characterization

    DTIC Science & Technology

    2018-01-31

    1998. 4. TITLE. Enter title and subtitle with volume number and part number, if applicable. On classified documents, enter the title classification...with security classification regulations, e.g. U, C, S, etc. If this form contains classified information, stamp classification level on the top...hundreds of picoseconds. Figure 3 illustrates example data taken from the oscilloscope. 0 5 10 15 Time (ns) 20 25 30 Figure 3. (a) A screen shot

  7. Through-barrier detection of explosive components for security screening applications

    NASA Astrophysics Data System (ADS)

    Lee, Linda; Frisby, Alex; Mansson, Ralph; Hopkins, Rebecca J.

    2011-11-01

    The detection of materials through containers is a vital capability for security screening applications at high risk locations, such as airports and checkpoints. Current detection procedures require suspect containers to be opened and the contents sampled, which is laborious and potentially hazardous to the operator. The capability to detect through-barrier would overcome these issues. Spatially Offset Raman Spectroscopy (SORS) is an innovative spectroscopic technique that avoids fluorescence and Raman scatter from containers, which can mask the Raman signature from the sample. This novel approach enables noninvasive detection of hazardous and benign materials through a wider range of container materials than is possible using conventional Raman spectroscopy. SORS spectra were acquired from explosive compounds and benign materials within a range of coloured glass and plastic containers. The SORS spectra were compared to the reference Raman signatures of the materials studied. Two data analysis methods were then applied to the resultant data to investigate the ability of SORS to detect the target materials through the barriers tested. Furthermore, the potential for reduction of sample fluorescence was investigated by using longer excitation wavelength (1064 nm) than is typically used in commercially available Raman instruments that use silicon detector technology. For some fluorescent samples, Raman spectral features that were masked by fluorescence at 785 nm were revealed at 1064 nm.

  8. Reconfigurable metasurface aperture for security screening and microwave imaging

    NASA Astrophysics Data System (ADS)

    Sleasman, Timothy; Imani, Mohammadreza F.; Boyarsky, Michael; Pulido-Mancera, Laura; Reynolds, Matthew S.; Smith, David R.

    2017-05-01

    Microwave imaging systems have seen growing interest in recent decades for applications ranging from security screening to space/earth observation. However, hardware architectures commonly used for this purpose have not seen drastic changes. With the advent of metamaterials a wealth of opportunities have emerged for honing metasurface apertures for microwave imaging systems. Recent thrusts have introduced dynamic reconfigurability directly into the aperture layer, providing powerful capabilities from a physical layer with considerable simplicity. The waveforms generated from such dynamic metasurfaces make them suitable for application in synthetic aperture radar (SAR) and, more generally, computational imaging. In this paper, we investigate a dynamic metasurface aperture capable of performing microwave imaging in the K-band (17.5-26.5 GHz). The proposed aperture is planar and promises an inexpensive fabrication process via printed circuit board techniques. These traits are further augmented by the tunability of dynamic metasurfaces, which provides the dexterity necessary to generate field patterns ranging from a sequence of steered beams to a series of uncorrelated radiation patterns. Imaging is experimentally demonstrated with a voltage-tunable metasurface aperture. We also demonstrate the aperture's utility in real-time measurements and perform volumetric SAR imaging. The capabilities of a prototype are detailed and the future prospects of general dynamic metasurface apertures are discussed.

  9. Investigation of radio astronomy image processing techniques for use in the passive millimetre-wave security screening environment

    NASA Astrophysics Data System (ADS)

    Taylor, Christopher T.; Hutchinson, Simon; Salmon, Neil A.; Wilkinson, Peter N.; Cameron, Colin D.

    2014-06-01

    Image processing techniques can be used to improve the cost-effectiveness of future interferometric Passive MilliMetre Wave (PMMW) imagers. The implementation of such techniques will allow for a reduction in the number of collecting elements whilst ensuring adequate image fidelity is maintained. Various techniques have been developed by the radio astronomy community to enhance the imaging capability of sparse interferometric arrays. The most prominent are Multi- Frequency Synthesis (MFS) and non-linear deconvolution algorithms, such as the Maximum Entropy Method (MEM) and variations of the CLEAN algorithm. This investigation focuses on the implementation of these methods in the defacto standard for radio astronomy image processing, the Common Astronomy Software Applications (CASA) package, building upon the discussion presented in Taylor et al., SPIE 8362-0F. We describe the image conversion process into a CASA suitable format, followed by a series of simulations that exploit the highlighted deconvolution and MFS algorithms assuming far-field imagery. The primary target application used for this investigation is an outdoor security scanner for soft-sided Heavy Goods Vehicles. A quantitative analysis of the effectiveness of the aforementioned image processing techniques is presented, with thoughts on the potential cost-savings such an approach could yield. Consideration is also given to how the implementation of these techniques in CASA might be adapted to operate in a near-field target environment. This may enable a much wider usability by the imaging community outside of radio astronomy and thus would be directly relevant to portal screening security systems in the microwave and millimetre wave bands.

  10. High-throughput spectrometer designs in a compact form-factor: principles and applications

    NASA Astrophysics Data System (ADS)

    Norton, S. M.

    2013-05-01

    Many compact, portable Raman spectrometers have entered the market in the past few years with applications in narcotics and hazardous material identification, as well as verification applications in pharmaceuticals and security screening. Often, the required compact form-factor has forced designers to sacrifice throughput and sensitivity for portability and low-cost. We will show that a volume phase holographic (VPH)-based spectrometer design can achieve superior throughput and thus sensitivity over conventional Czerny-Turner reflective designs. We will look in depth at the factors influencing throughput and sensitivity and illustrate specific VPH-based spectrometer examples that highlight these design principles.

  11. 77 FR 16846 - Published Privacy Impact Assessments on the Web

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-22

    ... Security Advanced Research Projects Agency (HSARPA), S&T Directorate seeks to develop physiological and behavioral screening technologies that will enable security officials to test the effectiveness of current... FAST research is adding a new type of research, the Passive Methods for Precision Behavioral Screening...

  12. Aviation security : preliminary observations on TSA's progress and challenges in meeting the statutory mandate for screening air cargo on passenger aircraft.

    DOT National Transportation Integrated Search

    2009-03-01

    The Implementing : Recommendations of the 9/11 : Commission Act of 2007 mandates : the Department of Homeland : Security (DHS) to establish a : system to physically screen 50 : percent of cargo transported on : passenger aircraft by February : 2009 a...

  13. Screen-printed nanoparticles as anti-counterfeiting tags

    NASA Astrophysics Data System (ADS)

    Campos-Cuerva, Carlos; Zieba, Maciej; Sebastian, Victor; Martínez, Gema; Sese, Javier; Irusta, Silvia; Contamina, Vicente; Arruebo, Manuel; Santamaria, Jesus

    2016-03-01

    Metallic nanoparticles with different physical properties have been screen printed as authentication tags on different types of paper. Gold and silver nanoparticles show unique optical signatures, including sharp emission bandwidths and long lifetimes of the printed label, even under accelerated weathering conditions. Magnetic nanoparticles show distinct physical signals that depend on the size of the nanoparticle itself. They were also screen printed on different substrates and their magnetic signals read out using a magnetic pattern recognition sensor and a vibrating sample magnetometer. The novelty of our work lies in the demonstration that the combination of nanomaterials with optical and magnetic properties on the same printed support is possible, and the resulting combined signals can be used to obtain a user-configurable label, providing a high degree of security in anti-counterfeiting applications using simple commercially-available sensors.

  14. Screen-printed nanoparticles as anti-counterfeiting tags.

    PubMed

    Campos-Cuerva, Carlos; Zieba, Maciej; Sebastian, Victor; Martínez, Gema; Sese, Javier; Irusta, Silvia; Contamina, Vicente; Arruebo, Manuel; Santamaria, Jesus

    2016-03-04

    Metallic nanoparticles with different physical properties have been screen printed as authentication tags on different types of paper. Gold and silver nanoparticles show unique optical signatures, including sharp emission bandwidths and long lifetimes of the printed label, even under accelerated weathering conditions. Magnetic nanoparticles show distinct physical signals that depend on the size of the nanoparticle itself. They were also screen printed on different substrates and their magnetic signals read out using a magnetic pattern recognition sensor and a vibrating sample magnetometer. The novelty of our work lies in the demonstration that the combination of nanomaterials with optical and magnetic properties on the same printed support is possible, and the resulting combined signals can be used to obtain a user-configurable label, providing a high degree of security in anti-counterfeiting applications using simple commercially-available sensors.

  15. FlySec: a risk-based airport security management system based on security as a service concept

    NASA Astrophysics Data System (ADS)

    Kyriazanos, Dimitris M.; Segou, Olga E.; Zalonis, Andreas; Thomopoulos, Stelios C. A.

    2016-05-01

    Complementing the ACI/IATA efforts, the FLYSEC European H2020 Research and Innovation project (http://www.fly-sec.eu/) aims to develop and demonstrate an innovative, integrated and end-to-end airport security process for passengers, enabling a guided and streamlined procedure from the landside to airside and into the boarding gates, and offering for an operationally validated innovative concept for end-to-end aviation security. FLYSEC ambition turns through a well-structured work plan into: (i) innovative processes facilitating risk-based screening; (ii) deployment and integration of new technologies and repurposing existing solutions towards a risk-based Security paradigm shift; (iii) improvement of passenger facilitation and customer service, bringing security as a real service in the airport of tomorrow;(iv) achievement of measurable throughput improvement and a whole new level of Quality of Service; and (v) validation of the results through advanced "in-vitro" simulation and "in-vivo" pilots. On the technical side, FLYSEC achieves its ambitious goals by integrating new technologies on video surveillance, intelligent remote image processing and biometrics combined with big data analysis, open-source intelligence and crowdsourcing. Repurposing existing technologies is also in the FLYSEC objectives, such as mobile application technologies for improved passenger experience and positive boarding applications (i.e. services to facilitate boarding and landside/airside way finding) as well as RFID for carry-on luggage tracking and quick unattended luggage handling. In this paper, the authors will describe the risk based airport security management system which powers FLYSEC intelligence and serves as the backend on top of which FLYSEC's front end technologies reside for security services management, behaviour and risk analysis.

  16. Intelligent Facial Recognition Systems: Technology advancements for security applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g.,more » fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.« less

  17. Heart block

    MedlinePlus

    ... a pacemaker. DO NOT go through the usual security station at an airport, courthouse, or other place that requires people to walk through a security screening. Tell the security personnel you have a ...

  18. 49 CFR 1549.3 - TSA inspection authority.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) Oversee the implementation, and ensure the adequacy, of security measures at airports and other... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO SCREENING PROGRAM General § 1549.3...

  19. 49 CFR 1549.3 - TSA inspection authority.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) Oversee the implementation, and ensure the adequacy, of security measures at airports and other... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO SCREENING PROGRAM General § 1549.3...

  20. 49 CFR 1549.3 - TSA inspection authority.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) Oversee the implementation, and ensure the adequacy, of security measures at airports and other... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO SCREENING PROGRAM General § 1549.3...

  1. 49 CFR 1549.3 - TSA inspection authority.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) Oversee the implementation, and ensure the adequacy, of security measures at airports and other... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO SCREENING PROGRAM General § 1549.3...

  2. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... screening technologies that the facility is authorized to use. These include: (i) The ability to operate x-ray equipment and to distinguish on the x-ray monitor the appropriate imaging standard specified in the certified cargo screening facility security program. Wherever the x-ray system displays colors...

  3. 14 CFR 382.55 - May carriers impose security screening procedures for passengers with disabilities that go beyond...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false May carriers impose security screening...? 382.55 Section 382.55 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION PROCEEDINGS) SPECIAL REGULATIONS NONDISCRIMINATION ON THE BASIS OF DISABILITY IN AIR TRAVEL...

  4. 14 CFR 382.55 - May carriers impose security screening procedures for passengers with disabilities that go beyond...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false May carriers impose security screening...? 382.55 Section 382.55 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION (AVIATION PROCEEDINGS) SPECIAL REGULATIONS NONDISCRIMINATION ON THE BASIS OF DISABILITY IN AIR TRAVEL...

  5. Radiation Detection for Homeland Security Applications

    NASA Astrophysics Data System (ADS)

    Ely, James

    2008-05-01

    In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will be reviewed. Opportunities for further research and development to improve the current equipment and methodologies for radiation detection for the important task of homeland security will be the final topic to be discussed.

  6. 6 CFR 27.255 - Recordkeeping requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... audit required under § 27.225(e)) or Security Vulnerability Assessment, a record of the audit, including... retain records of submitted Top-Screens, Security Vulnerability Assessments, Site Security Plans, and all...

  7. Concept of Operations for the Next Generation Air Transportation System. Version 3.2

    DTIC Science & Technology

    2011-01-01

    Airside. Security Identification Display Area/Airport ( SIDA ) operations area, terminal perimeter, terminal airspace (security) • Landside. Terminal...Definition RTSS Remote Terminal Security Screening SAA Special Activity Airspace SIDA Security Identification Display Area SM Separation Management

  8. Web Extensible Display Manager

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Slominski, Ryan; Larrieu, Theodore L.

    Jefferson Lab's Web Extensible Display Manager (WEDM) allows staff to access EDM control system screens from a web browser in remote offices and from mobile devices. Native browser technologies are leveraged to avoid installing and managing software on remote clients such as browser plugins, tunnel applications, or an EDM environment. Since standard network ports are used firewall exceptions are minimized. To avoid security concerns from remote users modifying a control system, WEDM exposes read-only access and basic web authentication can be used to further restrict access. Updates of monitored EPICS channels are delivered via a Web Socket using a webmore » gateway. The software translates EDM description files (denoted with the edl suffix) to HTML with Scalable Vector Graphics (SVG) following the EDM's edl file vector drawing rules to create faithful screen renderings. The WEDM server parses edl files and creates the HTML equivalent in real-time allowing existing screens to work without modification. Alternatively, the familiar drag and drop EDM screen creation tool can be used to create optimized screens sized specifically for smart phones and then rendered by WEDM.« less

  9. Adaptation of existing infrared technologies to unanticipated applications

    NASA Astrophysics Data System (ADS)

    Peng, Philip

    2005-01-01

    Radiation thermometry is just but one of many applications, both potential and realized, of infrared technology. During the SARS (Severe Acute Respiratory Syndromes) global crisis in 2003, the technology was utilized as a preliminary screening method for infected persons as a defense against a major outbreak, as the primary symptom of this disease is elevated body temperature. ATC timely developed a product designed specifically for mass volume crowd screening of febrile individuals. For this application, the machine must register temperature of subjects rapidly and efficiently, with a certain degree of accuracy, and function for extended periods of time. The equipment must be safe to use, easily deployed, and function with minimum maintenance needed. The ATIR-303 model satisfies all of the above and other pre-requisite conditions amicably. Studies on the correlation between the maximum temperature registered among individual's facial features, as measured under the conditions of usage, and the core temperature of individuals were performed. The results demonstrated that ATIR-303 is very suitable for this application. Other applications of the infrared technology in various areas, like medical diagnosis, non-destructive testing, security, search and rescue, and others, are also interest areas of ATC. The progress ATC has achieved in these areas is presented also.

  10. Specific-Token Effects in Screening Tasks: Possible Implications for Aviation Security

    ERIC Educational Resources Information Center

    Smith, J. David; Redford, Joshua S.; Washburn, David A.; Taglialatela, Lauren A.

    2005-01-01

    Screeners at airport security checkpoints perform an important categorization task in which they search for threat items in complex x-ray images. But little is known about how the processes of categorization stand up to visual complexity. The authors filled this research gap with screening tasks in which participants searched for members of target…

  11. Accurate decisions in an uncertain world: collective cognition increases true positives while decreasing false positives.

    PubMed

    Wolf, Max; Kurvers, Ralf H J M; Ward, Ashley J W; Krause, Stefan; Krause, Jens

    2013-04-07

    In a wide range of contexts, including predator avoidance, medical decision-making and security screening, decision accuracy is fundamentally constrained by the trade-off between true and false positives. Increased true positives are possible only at the cost of increased false positives; conversely, decreased false positives are associated with decreased true positives. We use an integrated theoretical and experimental approach to show that a group of decision-makers can overcome this basic limitation. Using a mathematical model, we show that a simple quorum decision rule enables individuals in groups to simultaneously increase true positives and decrease false positives. The results from a predator-detection experiment that we performed with humans are in line with these predictions: (i) after observing the choices of the other group members, individuals both increase true positives and decrease false positives, (ii) this effect gets stronger as group size increases, (iii) individuals use a quorum threshold set between the average true- and false-positive rates of the other group members, and (iv) individuals adjust their quorum adaptively to the performance of the group. Our results have broad implications for our understanding of the ecology and evolution of group-living animals and lend themselves for applications in the human domain such as the design of improved screening methods in medical, forensic, security and business applications.

  12. Accurate decisions in an uncertain world: collective cognition increases true positives while decreasing false positives

    PubMed Central

    Wolf, Max; Kurvers, Ralf H. J. M.; Ward, Ashley J. W.; Krause, Stefan; Krause, Jens

    2013-01-01

    In a wide range of contexts, including predator avoidance, medical decision-making and security screening, decision accuracy is fundamentally constrained by the trade-off between true and false positives. Increased true positives are possible only at the cost of increased false positives; conversely, decreased false positives are associated with decreased true positives. We use an integrated theoretical and experimental approach to show that a group of decision-makers can overcome this basic limitation. Using a mathematical model, we show that a simple quorum decision rule enables individuals in groups to simultaneously increase true positives and decrease false positives. The results from a predator-detection experiment that we performed with humans are in line with these predictions: (i) after observing the choices of the other group members, individuals both increase true positives and decrease false positives, (ii) this effect gets stronger as group size increases, (iii) individuals use a quorum threshold set between the average true- and false-positive rates of the other group members, and (iv) individuals adjust their quorum adaptively to the performance of the group. Our results have broad implications for our understanding of the ecology and evolution of group-living animals and lend themselves for applications in the human domain such as the design of improved screening methods in medical, forensic, security and business applications. PMID:23407830

  13. AVIATION SECURITY: Transportation Security Administration Faces Immediate and Long-Term Challenges

    DTIC Science & Technology

    2002-07-25

    circumvent airport security , and provide whistleblower protection for air carrier and airport security workers. (See app. III for a summary of pending...GAO-01-1171T. Washington, D.C.: September 25, 2001. Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening...125. Washington, D.C.: March 16, 2000. Aviation Security: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify

  14. Identifying changing aviation threat environments within an adaptive Homeland Security Advisory System.

    PubMed

    Lee, Adrian J; Jacobson, Sheldon H

    2012-02-01

    A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.

  15. The performance of spatially offset Raman spectroscopy for liquid explosive detection

    NASA Astrophysics Data System (ADS)

    Loeffen, Paul W.; Maskall, Guy; Bonthron, Stuart; Bloomfield, Matthew; Tombling, Craig; Matousek, Pavel

    2016-10-01

    Aviation security requirements adopted in 2014 require liquids to be screened at most airports throughout Europe, North America and Australia. Cobalt's unique Spatially Offset Raman Spectroscopy (SORS™) technology has proven extremely effective at screening liquids, aerosols and gels (LAGS) with extremely low false alarm rates. SORS is compatible with a wide range of containers, including coloured, opaque or clear plastics, glass and paper, as well as duty-free bottles in STEBs (secure tamper-evident bags). Our award-winning Insight range has been specially developed for table-top screening at security checkpoints. Insight systems use our patented SORS technology for rapid and accurate chemical analysis of substances in unopened non-metallic containers. Insight100M™ and the latest member of the range - Insight200M™ - also screen metallic containers. Our unique systems screen liquids, aerosols and gels with the highest detection capability and lowest false alarm rates of any ECAC-approved scanner, with several hundred units already in use at airports including eight of the top ten European hubs. This paper presents an analysis of real performance data for these systems.

  16. Dynamic security contingency screening and ranking using neural networks.

    PubMed

    Mansour, Y; Vaahedi, E; El-Sharkawi, M A

    1997-01-01

    This paper summarizes BC Hydro's experience in applying neural networks to dynamic security contingency screening and ranking. The idea is to use the information on the prevailing operating condition and directly provide contingency screening and ranking using a trained neural network. To train the two neural networks for the large scale systems of BC Hydro and Hydro Quebec, in total 1691 detailed transient stability simulation were conducted, 1158 for BC Hydro system and 533 for the Hydro Quebec system. The simulation program was equipped with the energy margin calculation module (second kick) to measure the energy margin in each run. The first set of results showed poor performance for the neural networks in assessing the dynamic security. However a number of corrective measures improved the results significantly. These corrective measures included: 1) the effectiveness of output; 2) the number of outputs; 3) the type of features (static versus dynamic); 4) the number of features; 5) system partitioning; and 6) the ratio of training samples to features. The final results obtained using the large scale systems of BC Hydro and Hydro Quebec demonstrates a good potential for neural network in dynamic security assessment contingency screening and ranking.

  17. A mass spectrometer based explosives trace detector

    NASA Astrophysics Data System (ADS)

    Vilkov, Andrey; Jorabchi, Kaveh; Hanold, Karl; Syage, Jack A.

    2011-05-01

    In this paper we describe the application of mass spectrometry (MS) to the detection of trace explosives. We begin by reviewing the issue of explosives trace detection (ETD) and describe the method of mass spectrometry (MS) as an alternative to existing technologies. Effective security screening devices must be accurate (high detection and low false positive rate), fast and cost effective (upfront and operating costs). Ion mobility spectrometry (IMS) is the most commonly deployed method for ETD devices. Its advantages are compact size and relatively low price. For applications requiring a handheld detector, IMS is an excellent choice. For applications that are more stationary (e.g., checkpoint and alternatives to IMS are available. MS is recognized for its superior performance with regard to sensitivity and specificity, which translate to lower false negative and false positive rates. In almost all applications outside of security where accurate chemical analysis is needed, MS is usually the method of choice and is often referred to as the gold standard for chemical analysis. There are many review articles and proceedings that describe detection technologies for explosives. 1,2,3,4 Here we compare MS and IMS and identify the strengths and weaknesses of each method. - Mass spectrometry (MS): MS offers high levels of sensitivity and specificity compared to other technologies for chemical detection. Its traditional disadvantages have been high cost and complexity. Over the last few years, however, the economics have greatly improved and MS is now capable of routine and automated operation. Here we compare MS and IMS and identify the strengths and weaknesses of each method. - Ion mobility spectrometry (IMS): 5 MS-ETD Screening System IMS is similar in concept to MS except that the ions are dispersed by gas-phase viscosity and not by molecular weight. The main advantage of IMS is that it does not use a vacuum system, which greatly reduces the size, cost, and complexity relative to MS. However, the trade-off is that the measurement accuracy is considerably less than MS. This is especially true for complex samples or when screening for a large number of target compounds simultaneously.

  18. Dual-surface dielectric depth detector for holographic millimeter-wave security scanners

    NASA Astrophysics Data System (ADS)

    McMakin, Douglas L.; Keller, Paul E.; Sheen, David M.; Hall, Thomas E.

    2009-05-01

    The Transportation Security Administration (TSA) is presently deploying millimeter-wave whole body scanners at over 20 airports in the United States. Threats that may be concealed on a person are displayed to the security operator of this scanner. "Passenger privacy is ensured through the anonymity of the image. The officer attending the passenger cannot view the image, and the officer viewing the image is remotely located and cannot see the passenger. Additionally, the image cannot be stored, transmitted or printed and is deleted immediately after being viewed. Finally, the facial area of the image has been blurred to further ensure privacy." Pacific Northwest National Laboratory (PNNL) originated research into this novel security technology which has been independently commercialized by L-3 Communications, SafeView, Inc. PNNL continues to perform fundamental research into improved software techniques which are applicable to the field of holographic security screening technology. This includes performing significant research to remove human features from the imagery. Both physical and software imaging techniques have been employed. The physical imaging techniques include polarization diversity illumination and reception, dual frequency implementation, and high frequency imaging at 100 GHz. This paper will focus on a software privacy technique using a dual surface dielectric depth detector method.

  19. Aviation security : vulnerabilities still exist in the aviation security system

    DOT National Transportation Integrated Search

    2000-04-06

    The testimony today discusses the Federal Aviation Administration's (FAA) efforts to implement and improve security in two key areas: air traffic control computer systems and airport passenger screening checkpoints. Computer systems-and the informati...

  20. Aviation security : weaknesses in airport security and options for assigning screening responsibilities

    DOT National Transportation Integrated Search

    2001-09-21

    This is the statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues before the Subcommittee on Aviation, Committee on Transportation and Infrastructure, House of Representatives regarding aviation safety and security. The statemen...

  1. Unclonable Security Codes Designed from Multicolor Luminescent Lanthanide-Doped Y2O3 Nanorods for Anticounterfeiting.

    PubMed

    Kumar, Pawan; Nagpal, Kanika; Gupta, Bipin Kumar

    2017-04-26

    The duplicity of important documents has emerged as a serious problem worldwide. Therefore, many efforts have been devoted to developing easy and fast anticounterfeiting techniques with multicolor emission. Herein, we report the synthesis of multicolor luminescent lanthanide-doped Y 2 O 3 nanorods by hydrothermal method and their usability in designing of unclonable security codes for anticounterfeiting applications. The spectroscopic features of nanorods are probed by photoluminescence spectroscopy. The Y 2 O 3 :Eu 3+ , Y 2 O 3 :Tb 3+ , and Y 2 O 3 :Ce 3+ nanorods emit hypersensitive red (at 611 nm), strong green (at 541 nm), and bright blue (at 438 nm) emissions at 254, 305, and 381 nm, respectively. The SEM and TEM/HRTEM results reveal that these nanorods have diameter and length in the range of 80-120 nm and ∼2-5 μm, respectively. The two-dimensional spatially resolved photoluminescence intensity distribution in nanorods is also investigated by using confocal photoluminescence microscopic technique. Further, highly luminescent unclonable security codes are printed by a simple screen printing technique using luminescent ink fabricated from admixing of lanthanide doped multicolor nanorods in PVC medium. The prospective use of these multicolor luminescent nanorods provide a new opportunity for easily printable, highly stable, and unclonable multicolor luminescent security codes for anti-counterfeiting applications.

  2. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-09

    ... transportation systems to ensure freedom of movement for people and commerce. To achieve this mission, TSA is... security screening and identity verification of individuals, including identification media and identifying... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  3. 49 CFR 1544.221 - Carriage of prisoners under the control of armed law enforcement officers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.221 Carriage... custody of an armed law enforcement officer aboard an aircraft for which screening is required unless, in...

  4. Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening Responsibilities

    DTIC Science & Technology

    2001-09-21

    actually occurred or which of the weaknesses in the nations aviation security apparatus contributed to the horrendous events of last week, it is...clear that serious weaknesses exist in our aviation security system and that their impact can be far more devastating than previously imagined.

  5. The relevance of unrelated costs internal and external to the healthcare sector to the outcome of a cost-comparison analysis of secondary prevention: the case of general colorectal cancer screening in the German population.

    PubMed

    Tscheulin, Dieter K; Drevs, Florian

    2010-04-01

    The potential of secondary prevention measures, such as cancer screening, to produce cost savings in the healthcare sector is a controversial issue in healthcare economics. Potential savings are calculated by comparing treatment costs with the cost of a prevention program. When survivors' subsequent unrelated health care costs are included in the calculation, however, the overall cost of disease prevention rises. What have not been studied to date are the secondary effects of fatal disease prevention measures on social security systems. From the perspective of a policy maker responsible for a social security system budget, it is not only future healthcare costs that are relevant for budgeting, but also changes in the contributions to, and expenditures from, statutory pension insurance and health insurance systems. An examination of the effect of longer life expectancies on these insurance systems can be justified by the fact that European social security systems are regulated by the state, and there is no clear separation between the financing of individual insurance systems due to cross-subsidisation. This paper looks at how the results of cost-comparison analyses vary depending on the inclusion or exclusion of future healthcare and non-healthcare costs, using the example of colorectal cancer screening in the German general population. In contrast to previous studies, not only are future unrelated medical costs considered, but also the effects on the social security system. If a German colorectal cancer screening program were implemented, and unrelated future medical care were excluded from the cost-benefit analysis, savings of up to 548 million euros per year would be expected. The screening program would, at the same time, generate costs in the healthcare sector as well as in the social security system of 2,037 million euros per year. Because the amount of future contributions and expenditures in the social security system depends on the age and gender of the recipients of the screening program (i.e. survivors of a typically fatal condition), the impact of age and gender on the results of a cost-comparison analysis of colorectal cancer screening are presented and discussed. Our study shows that colorectal cancer screening generates individual cost savings in the social security system up to a life expectancy of 60 years. Beyond that age, the balance between a recipient's social security contributions and insurance system expenditure is negative. The paper clarifies the relevance of healthcare costs not related to the prevented disease to the economic evaluation of prevention programs, particularly in the case of fatal diseases such as colorectal cancer. The results of the study imply that, from an economic perspective, the participation of at-risk individuals in disease prevention programs should be promoted.

  6. A Methodology for Dynamic Security Risk Quantification and Optimal Resource Allocation of Security Assets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brigantic, Robert T.; Betzsold, Nick J.; Bakker, Craig KR

    In this presentation we overview a methodology for dynamic security risk quantification and optimal resource allocation of security assets for high profile venues. This methodology is especially applicable to venues that require security screening operations such as mass transit (e.g., train or airport terminals), critical infrastructure protection (e.g., government buildings), and largescale public events (e.g., concerts or professional sports). The method starts by decomposing the three core components of risk -- threat, vulnerability, and consequence -- into their various subcomponents. For instance, vulnerability can be decomposed into availability, accessibility, organic security, and target hardness and each of these can bemore » evaluated against the potential threats of interest for the given venue. Once evaluated, these subcomponents are rolled back up to compute the specific value for the vulnerability core risk component. Likewise, the same is done for consequence and threat, and then risk is computed as the product of these three components. A key aspect of our methodology is dynamically quantifying risk. That is, we incorporate the ability to uniquely allow the subcomponents and core components, and in turn, risk, to be quantified as a continuous function of time throughout the day, week, month, or year as appropriate.« less

  7. A Low-Cost and Secure Solution for e-Commerce

    NASA Astrophysics Data System (ADS)

    Pasquet, Marc; Vacquez, Delphine; Rosenberger, Christophe

    We present in this paper a new architecture for remote banking and e-commerce applications. The proposed solution is designed to be low cost and provides some good guarantees of security for a client and his bank issuer. Indeed, the main problem for an issuer is to identify and authenticate one client (a cardholder) using his personal computer through the web when this client wants to access to remote banking services or when he wants to pay on a e-commerce site equipped with 3D-secure payment solution. The proposed solution described in this paper is MasterCard Chip Authentication Program compliant and was experimented in the project called SOPAS. The main contribution of this system consists in the use of a smartcard with a I2C bus that pilots a terminal only equipped with a screen and a keyboard. During the use of services, the user types his PIN code on the keyboard and all the security part of the transaction is performed by the chip of the smartcard. None information of security stays on the personal computer and a dynamic token created by the card is sent to the bank and verified by the front end. We present first the defined methodology and we analyze the main security aspects of the proposed solution.

  8. 49 CFR 1544.203 - Acceptance and screening of checked baggage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Acceptance and screening of checked baggage. 1544... SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.203 Acceptance and screening of checked... its authorized aircraft operator representative. (c) Screening of checked baggage. Except as provided...

  9. Strategy to Enhance International Supply Chain Security

    DTIC Science & Technology

    2007-07-01

    airports as part of the effort to secure air passenger travel . The security assessment crew traveling by air, land or sea cannot be considered only a... travel security issue. The assessment of a container ship’s crew or of a driver moving a truck into the secure area of a port are also supply chain...threats through its traveler screening and worker credentialing programs. The strategy to secure the supply chain reflects the larger security

  10. 76 FR 53080 - Air Cargo Screening; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-25

    ..., 1540- 11, 1544-10, 1546-6, 1548-6, 1549-1] RIN 1652-AA64 Air Cargo Screening; Correction AGENCY... Transportation Security Administration (TSA) is correcting the Air Cargo Screening final rule published in the Federal Register on August 18, 2011. The final rule amended two provisions of the Air Cargo Screening...

  11. 49 CFR 1546.201 - Acceptance and screening of individuals and accessible property.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Acceptance and screening of individuals and... FOREIGN AIR CARRIER SECURITY Operations § 1546.201 Acceptance and screening of individuals and accessible... or accessible property before boarding an aircraft or entering a sterile area. (b) Screening of...

  12. Advanced Millimeter-Wave Imaging Enhances Security Screening

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheen, David M.; Bernacki, Bruce E.; McMakin, Douglas L.

    2012-01-12

    Millimeter-wave imaging is rapidly gaining acceptance for passenger screening at airports and other secured facilities. This paper details a number of techniques developed over the last several years including novel image reconstruction and display techniques, polarimetric imaging techniques, array switching schemes, as well as high frequency high bandwidth techniques. Implementation of some of these methods will increase the cost and complexity of the mm-wave security portal imaging systems. RF photonic methods may provide new solutions to the design and development of the sequentially switched linear mm-wave arrays that are the key element in the mm-wave portal imaging systems.

  13. 76 FR 72433 - Revision of Agency Information Collection Activity Under OMB Review: Secure Flight Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ...] Revision of Agency Information Collection Activity Under OMB Review: Secure Flight Program AGENCY... operators and foreign air carriers submit to Secure Flight for the purposes of watch list matching... screening checkpoint which airport operators will submit to Secure Flight, and a survey of certain general...

  14. Magnetic Imaging: a New Tool for UK National Nuclear Security

    NASA Astrophysics Data System (ADS)

    Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.

  15. Magnetic Imaging: a New Tool for UK National Nuclear Security

    PubMed Central

    Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-01

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications. PMID:25608957

  16. Magnetic imaging: a new tool for UK national nuclear security.

    PubMed

    Darrer, Brendan J; Watson, Joe C; Bartlett, Paul; Renzoni, Ferruccio

    2015-01-22

    Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.

  17. Detection of weapons of mass destruction

    NASA Astrophysics Data System (ADS)

    Bjorkholm, Paul J.

    2003-07-01

    High Energy X-ray cargo screening is a mature technology that has proven its value in the detection of contraband material hidden within cargo including fully loaded sea containers. To date high energy screening has been largely applied to manifest verification and to drug detection. However, the dramatic change in world terrorism has altered the application. Now it is essential that weapons of mass destruction (WMD"s) be interdicted with incredibly high accuracy. The implication of a missed detection has gone from loss of revenue or the lowering of the street price of drugs to potentially stopping, at least for some significant time, most world commerce. Screening containers with high energy x-rays (~250+ mm of steel penetration) is capable of detecting all nuclear threats at a fraction of the strategically important mass. The screening operation can be automated so that no human decisions are required with very low false alarms. Finally, the goal of 100% inspection of cargo inbound to the United States from the twenty largest international ports is an achievable goal with hardware costs in the area of that already spent on airport security.

  18. Strategy to Enhance International Supply Chain Security

    DTIC Science & Technology

    2007-07-01

    as part of the effort to secure air passenger travel . The security assessment crew traveling by air, land or sea cannot be considered only a travel ...threats through its traveler screening and worker credentialing programs. The strategy to secure the supply chain reflects the larger security strategy of...living or traveling abroad. • Assisting U.S. businesses in the international marketplace. • Coordinating and providing support for international

  19. Enhanced optical security by using information carrier digital screening

    NASA Astrophysics Data System (ADS)

    Koltai, Ferenc; Adam, Bence

    2004-06-01

    Jura has developed different security features based on Information Carrier Digital Screening. Substance of such features is that a non-visible secondary image is encoded in a visible primary image. The encoded image will be visible only by using a decoding device. One of such developments is JURA's Invisible Personal Information (IPI) is widely used in high security documents, where personal data of the document holder are encoded in the screen of the document holder's photography and they can be decoded by using an optical decoding device. In order to make document verification fully automated, enhance security and eliminate human factors, digital version of IPI, the D-IPI was developed. A special 2D-barcode structure was designed, which contains sufficient quantity of encoded digital information and can be embedded into the photo. Other part of Digital-IPI is the reading software, that is able to retrieve the encoded information with high reliability. The reading software developed with a specific 2D structure is providing the possibility of a forensic analysis. Such analysis will discover all kind of manipulations -- globally, if the photography was simply changed and selectively, if only part of the photography was manipulated. Digital IPI is a good example how benefits of digital technology can be exploited by using optical security and how technology for optical security can be converted into digital technology. The D-IPI process is compatible with all current personalization printers and materials (polycarbonate, PVC, security papers, Teslin-foils, etc.) and can provide any document with enhanced security and tamper-resistance.

  20. Technologies to counter aviation security threats

    NASA Astrophysics Data System (ADS)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  1. Aviation Security: Biometric Technology and Risk Based Security Aviation Passenger Screening Program

    DTIC Science & Technology

    2012-12-01

    distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words ) Since 9/11, the Transportation Security Administration (TSA...Council POE Point Of Entry RBS Risk-Based Security SENTRI Secure Electronic Network for Travelers Rapid Inspection SFPD Secure Flight Passenger...Committee on Biometrics provides the origins of biometrics; the term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure

  2. Screening for Offenders with an Intellectual Disability: The Validity of the Learning Disability Screening Questionnaire

    ERIC Educational Resources Information Center

    McKenzie, Karen; Michie, Amanda; Murray, Aja; Hales, Charlene

    2012-01-01

    The study assessed the validity of an intellectual disability screening tool, the Learning Disability Screening Questionnaire (LDSQ), in three forensic settings: a community intellectual disability forensic service; a forensic in-patient secure unit and a prison, using data for 94 individuals. A significant positive relationship was found between…

  3. Inhibition of Retinoblastoma Protein Inactivation

    DTIC Science & Technology

    2017-11-01

    SUBJECT TERMS cell cycle, Retinoblastoma protein, E2F transcription factor, high throughput screen, drug discovery, x-ray crystallography 16. SECURITY...screening by x-ray crystallography . 2.0 KEYWORDS Retinoblastoma (Rb) pathway, E2F transcription factor, cancer, cell-cycle inhibition, activation...modulation, inhibition, high throughput screening, fragment-based screening, x-ray crystallography . 3.0 ACCOMPLISHMENTS Summary: We

  4. 49 CFR 1546.203 - Acceptance and screening of checked baggage.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... foreign air carrier must refuse to transport any individual's checked baggage or property if the...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FOREIGN AIR... deterring the carriage of any explosive or incendiary. Each foreign air carrier must use the procedures...

  5. Sensitive Security Information (SSI) and Transportation Security: Background and Controversies

    DTIC Science & Technology

    2004-02-05

    with airport security procedures, employee accountability, passenger screening, and airport secrecy agreements. In January 2003, the Dallas/Fort... Airport Security Flaws Bring Criticism,” Los Angeles Times, July 2, 2002, p. A8. 16 Charles Piller and Ricardo Alonso-Zaldivar, “A Suspect Computer...Secrecy in Airport Security Contract Criticized,” Des Moines Register, Sept. 27, 2003, p. 1A; James Andrews, “Here in Tristate, Security’s Tighter

  6. An Analysis of Federal Airport and Air Carrier Employee Access Control, Screening. and Training Regulations

    DTIC Science & Technology

    1998-03-01

    traveling public, air carriers, and persons employed by or conducting business at public airports. 14. SUBJECT TERMS Airport Security , Federal...26 4. Sterile Area 28 5. Exclusive Area 28 E. SECURITY ALERT LEVELS 29 F. AIRPORT SECURITY TOOLS 30 1. Electronic Detection System 31 a... Security Coordinator ASP Airport Security Program BIS Biometrie Identification System CCTV Closed Circuit Television CJIS Criminal Justice Information

  7. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1985-04-12

    other crimes against civil aviation prevented or deterred by airline and airport security procedures cannot be determined with certainty. However...were prevented from doing so by airline and airport security measures. As noted elsewhere in this report, 1,632 firearms were detected at screening...enforcement sQp:)t’ for airline and airport security measures. Finally, with the inc.asoDr of security costs in airline ticket prices, the passengers

  8. A review of automated image understanding within 3D baggage computed tomography security screening.

    PubMed

    Mouton, Andre; Breckon, Toby P

    2015-01-01

    Baggage inspection is the principal safeguard against the transportation of prohibited and potentially dangerous materials at airport security checkpoints. Although traditionally performed by 2D X-ray based scanning, increasingly stringent security regulations have led to a growing demand for more advanced imaging technologies. The role of X-ray Computed Tomography is thus rapidly expanding beyond the traditional materials-based detection of explosives. The development of computer vision and image processing techniques for the automated understanding of 3D baggage-CT imagery is however, complicated by poor image resolutions, image clutter and high levels of noise and artefacts. We discuss the recent and most pertinent advancements and identify topics for future research within the challenging domain of automated image understanding for baggage security screening CT.

  9. Towards practical implementation of biophotonics-based solutions for cost-effective monitoring of food quality control (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Meglinski, Igor; Popov, Alexey; Bykov, Alexander

    2017-03-01

    Biophotonics-based diagnostic and imaging modalities have been widely used in various applications associated with the non-invasive imaging of the internal structure of a range biological media from a range of cells cultures to biological tissues. With the fast growing interest in food securities there remains strong demand to apply reliable and cost effective biophotonics-based technologies for rapid screening of freshness, internal defects and quality of major agricultural products. In current presentation the results of application of optical coherence tomography (OCT) and encapsulated optical bio-sensors for quantitative assessment of freshness of agricultural products, such as meat and sea foods, are presented, and their further perspectives are discussed.

  10. Terahertz Scattering

    NASA Astrophysics Data System (ADS)

    Zurk, L. M.; Schecklman, S.

    Terahertz (THz) Time Domain Spectroscopy (TDS) measurements have the unique ability to detect both the amplitude and phase of the electric field, simultaneously. This eliminates complications introduced by Kramers-Kronig relations typically used in near-infrared spectroscopy. Many materials of interest contain resonant features in their refractive indices in the far-infrared (THz) spectrum, while their packaging materials are generally transparent. Thus, an important application for THz TDS is the ability to see inside packaging materials and detect the material features of their contents. Such applications are promising for security screening (concealed drugs, explosives, etc.) in post offices and airports as well as for non-destructive evaluation (NDE) of products on an assembly line or tissue damage due to burns or cancer [1-6].

  11. The Essentials of Safety and Security Management.

    ERIC Educational Resources Information Center

    Jones, Lance D.

    2003-01-01

    Presents a road map for colleges and universities to follow when establishing an in-house protective services department, focusing on: the leadership and command structure, screening and hiring of security officers, training of campus security personnel, documentation of officers' actions, policies and procedures (particularly regarding the use of…

  12. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1984-10-11

    deterred by airline and airport security procedures cannot be determined with certainty. However, the number of firearms detected at passenger screening... airport security measures continue to provide increased safety and protection to air travelers, aircraft crewmembers, air carrier aircraft, and air

  13. 49 CFR 1544.409 - Integrity of screener tests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... screening location, TSA may authorize an employee of one or more of the aircraft operators or foreign air..., screener, screener-in-charge, checkpoint security supervisor, or other screening supervisor. The employee... AND COMMERCIAL OPERATORS Screener Qualifications When the Aircraft Operator Performs Screening § 1544...

  14. XRIndex: a brief screening tool for individual differences in security threat detection in x-ray images

    PubMed Central

    Rusconi, Elena; Ferri, Francesca; Viding, Essi; Mitchener-Nissen, Timothy

    2015-01-01

    X-ray imaging is a cost-effective technique at security checkpoints that typically require the presence of human operators. We have previously shown that self-reported attention to detail can predict threat detection performance with small-vehicle x-ray images (Rusconi et al., 2012). Here, we provide evidence for the generality of such a link by having a large sample of naïve participants screen more typical dual-energy x-ray images of hand luggage. The results show that the Attention to Detail score from the autism-spectrum quotient (AQ) questionnaire (Baron-Cohen et al., 2001) is a linear predictor of threat detection accuracy. We then develop and fine-tune a novel self-report scale for security screening: the XRIndex, which improves on the Attention to Detail scale for predictive power and opacity to interpretation. The XRIndex is not redundant with any of the Big Five personality traits. We validate the XRIndex against security x-ray images with an independent sample of untrained participants and suggest that the XRIndex may be a useful aid for the identification of suitable candidates for professional security training with a focus on x-ray threat detection. Further studies are needed to determine whether this can also apply to trained professionals. PMID:26321935

  15. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1977-10-31

    searches. Perhaps the best evidence of the effectiveness of airline and airport security measures is the number of hijackings and related crimes...revision of the regulation that established basic airport security requirements is currently underway. One of the more significant revisions under study... airport security procedures cannot be determined with certainty. Nowever, the number of firearms detected at passenger screening points under suspicious

  16. Inhibition of Retinoblastoma Protein Inactivation

    DTIC Science & Technology

    2016-09-01

    Retinoblastoma protein, E2F transcription factor, high throughput screen, drug discovery, x-ray crystallography 16. SECURITY CLASSIFICATION OF: 17...developed a method to perform fragment based screening by x-ray crystallography . 2.0 KEYWORDS Retinoblastoma (Rb) pathway, E2F transcription factor...cancer, cell-cycle inhibition, activation, modulation, inhibition, high throughput screening, fragment-based screening, x-ray crystallography

  17. 46 CFR 30.10-25 - Flame screen-TB/ALL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Flame screen-TB/ALL. 30.10-25 Section 30.10-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS GENERAL PROVISIONS Definitions § 30.10-25 Flame screen—TB/ALL. The term flame screen means a fitted single screen of corrosion-resistant wire of...

  18. 46 CFR 30.10-25 - Flame screen-TB/ALL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 1 2014-10-01 2014-10-01 false Flame screen-TB/ALL. 30.10-25 Section 30.10-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS GENERAL PROVISIONS Definitions § 30.10-25 Flame screen—TB/ALL. The term flame screen means a fitted single screen of corrosion-resistant wire of...

  19. 46 CFR 30.10-25 - Flame screen-TB/ALL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Flame screen-TB/ALL. 30.10-25 Section 30.10-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS GENERAL PROVISIONS Definitions § 30.10-25 Flame screen—TB/ALL. The term flame screen means a fitted single screen of corrosion-resistant wire of...

  20. Cobalt Chrome Spinal Constructs Trigger Airport Security Screening in 24% of Pediatric Patients.

    PubMed

    Woon, Regina P; Andras, Lindsay M; Barrett, Kody K; Skaggs, David L

    2015-03-01

    Retrospective study. To determine whether pediatric patients undergo additional airport security screening after posterior spinal fusion. Airport security has expanded to include body scanners as well as traditional metal detectors. Families frequently ask whether spinal implants will trigger airport security, but there is limited information on modern implants and screening methods. The researchers conducted a survey of 50 pediatric patients after posterior spinal fusion from 2004 to 2013. Inclusion criteria were posterior instrumentation, pedicle screws for at least 80% of anchors, and at least 1 trip through an American airport after surgery. Charts and radiographs were reviewed for metal type, number of levels fused, number of anchors, and rod diameter. A total of 16% of patients (8 of 50) were detected by body scan or metal detector and all had cobalt chrome (CoCr) rods. No patients with stainless-steel (SS) rods were detected. The CoCr rods triggered additional screening in 24% of children (8 of 33), compared with none of 17 with SS rods (p = .03). For patients with CoCr rods, the detection rate was 18% (5 of 28) by metal detector and 17% (3 of 18) by body scanner. For patients with CoCr rods, there was no significant difference between detection rates and levels fused (p = .30), number of anchors (p = .15), or rod diameter (p = .17). In this series, CoCr constructs were more likely to incur additional airport security compared with more traditional SS constructs. Copyright © 2015 Scoliosis Research Society. Published by Elsevier Inc. All rights reserved.

  1. HOMELAND SECURITY: Challenges and Strategies in Addressing Short- and Long-Term National Needs

    DTIC Science & Technology

    2001-11-07

    air travel has already prompted attention to chronic problems with airport security that we and others have been pointing to for years. Moreover, the...capital for certain areas such as intelligence, public health and airport security will also be necessary as well to foster and maintain the skill...Weaknesses in Airport Security and Options for Assigning Screening Responsibilities, (GAO-01-1165T, Sept. 21, 2001). Aviation Security: Terrorist Acts

  2. Detection of orthopaedic foot and ankle implants by security screening devices.

    PubMed

    Bluman, Eric M; Tankson, Cedric; Myerson, Mark S; Jeng, Clifford L

    2006-12-01

    A common question asked by patients contemplating foot and ankle surgery is whether the implants used will set off security screening devices in airports and elsewhere. Detectability of specific implants may require the orthopaedic surgeon to provide attestation regarding their presence in patients undergoing implantation of these devices. Only two studies have been published since security measures became more stringent in the post-9/11 era. None of these studies specifically focused on the large numbers of orthopaedic foot and ankle implants in use today. This study establishes empiric data on the detectability by security screening devices of some currently used foot and ankle implants. A list of foot and ankle procedures was compiled, including procedures frequently used by general orthopaedists as well as those usually performed only by foot and ankle specialists. Implants tested included those used for open reduction and internal fixation, joint fusion, joint arthroplasty, osteotomies, arthroreisis, and internal bone stimulation. A test subject walked through a gate-type security device and was subsequently screened using a wand-type detection device while wearing each construct grouping. The screening was repeated with the implants placed within uncooked steak to simulate subcutaneous and submuscular implantation. None of the implants were detected by the gate-type security device. Specific implants that triggered the wand-type detection device regardless of coverage with the meat were total ankle prostheses, implantable bone stimulators, large metatarsophalangeal hemiarthroplasty, large arthroreisis plugs, medial distal tibial locking construct, supramalleolar osteotomy fixation, stainless steel bimalleolar ankle fracture fixation, calcaneal fracture plate and screw constructs, large fragment blade plate constructs, intramedullary tibiotalocalcaneal fusion constructs, and screw fixation for calcaneal osteotomies, ankle arthrodeses, triple arthrodeses, and stainless steel first metatarsophalangeal joint arthrodeses. The placement of implants in meat prevented the detectability of only the stainless steel Jones fracture implant (stainless steel 6.5-mm cannulated screw) and the stainless steel midfoot fusion construct (four stainless steel 4.0-mm cannulated screws). These data may help the orthopaedic surgeon in counseling patients as to the detectability of some orthopaedic foot and ankle implants in use today. Specific constructs for which documentation may need to be provided to the patient are identified. As security standards evolve and the environments in which they are practiced change, empiric testing of many of these devices may need to be repeated.

  3. Valuing Equal Protection in Aviation Security Screening.

    PubMed

    Nguyen, Kenneth D; Rosoff, Heather; John, Richard S

    2017-12-01

    The growing number of anti-terrorism policies has elevated public concerns about discrimination. Within the context of airport security screening, the current study examines how American travelers value the principle of equal protection by quantifying the "equity premium" that they are willing to sacrifice to avoid screening procedures that result in differential treatments. In addition, we applied the notion of procedural justice to explore the effect of alternative selective screening procedures on the value of equal protection. Two-hundred and twenty-two respondents were randomly assigned to one of three selective screening procedures: (1) randomly, (2) using behavioral indicators, or (3) based on demographic characteristics. They were asked to choose between airlines using either an equal or a discriminatory screening procedure. While the former requires all passengers to be screened in the same manner, the latter mandates all passengers undergo a quick primary screening and, in addition, some passengers are selected for a secondary screening based on a predetermined selection criterion. Equity premiums were quantified in terms of monetary cost, wait time, convenience, and safety compromise. Results show that equity premiums varied greatly across respondents, with many indicating little willingness to sacrifice to avoid inequitable screening, and a smaller minority willing to sacrifice anything to avoid the discriminatory screening. The selective screening manipulation was effective in that equity premiums were greater under selection by demographic characteristics compared to the other two procedures. © 2017 Society for Risk Analysis.

  4. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1981-04-15

    on item were processed through the screening system daily. The airline and airport security measures developed continue to provide increased safety...United States or Puerto Rico. None of these 16 hijackings resulted from insufficient airport security measures or a breakdown in the FAA-approved airport ... airport security programs is conducted at the Transportation Safety Institute in Oklahoma City, Oklahoma. The course provides in-depth coverage of civil

  5. Applications for radio-frequency identification technology in the perioperative setting.

    PubMed

    Zhao, Tiyu; Zhang, Xiaoxiang; Zeng, Lili; Xia, Shuyan; Hinton, Antentor Othrell; Li, Xiuyun

    2014-06-01

    We implemented a two-year project to develop a security-gated management system for the perioperative setting using radio-frequency identification (RFID) technology to enhance the management efficiency of the OR. We installed RFID readers beside the entrances to the OR and changing areas to receive and process signals from the RFID tags that we sewed into surgical scrub attire and shoes. The system also required integrating automatic access control panels, computerized lockers, light-emitting diode (LED) information screens, wireless networks, and an information system. By doing this, we are able to control the flow of personnel and materials more effectively, reduce OR costs, optimize the registration and attire-changing process for personnel, and improve management efficiency. We also anticipate this system will improve patient safety by reducing the risk of surgical site infection. Application of security-gated management systems is an important and effective way to help ensure a clean, convenient, and safe management process to manage costs in the perioperative area and promote patient safety. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  6. 49 CFR 1546.409 - Integrity of screener tests.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... security supervisor, or other screening supervisor. The employee must be familiar with the procedures for... Qualifications When the Foreign Air Carrier Conducts Screening § 1546.409 Integrity of screener tests. (a... than one foreign air carrier or foreign air carrier uses a screening location, TSA may authorize an...

  7. High resolution, wide field of view, real time 340GHz 3D imaging radar for security screening

    NASA Astrophysics Data System (ADS)

    Robertson, Duncan A.; Macfarlane, David G.; Hunter, Robert I.; Cassidy, Scott L.; Llombart, Nuria; Gandini, Erio; Bryllert, Tomas; Ferndahl, Mattias; Lindström, Hannu; Tenhunen, Jussi; Vasama, Hannu; Huopana, Jouni; Selkälä, Timo; Vuotikka, Antti-Jussi

    2017-05-01

    The EU FP7 project CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) is developing a demonstrator system for next generation airport security screening which will combine passive and active submillimeter wave imaging sensors. We report on the development of the 340 GHz 3D imaging radar which achieves high volumetric resolution over a wide field of view with high dynamic range and a high frame rate. A sparse array of 16 radar transceivers is coupled with high speed mechanical beam scanning to achieve a field of view of 1 x 1 x 1 m3 and a 10 Hz frame rate.

  8. Information Security in the 1990s: Keeping the Locks on.

    ERIC Educational Resources Information Center

    Kovac, Ron J.

    1999-01-01

    As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…

  9. Benefit adequacy among elderly Social Security retired-worker beneficiaries and the SSI federal benefit rate.

    PubMed

    Rupp, Kalman; Strand, Alexander; Davies, Paul; Sears, Jim

    2007-01-01

    Both target effectiveness and administrative simplicity are desirable properties in the design of minimum benefit packages for public retirement programs. The federal benefit rate (FBR) of the Supplemental Security Income (SSI) program has been proposed by some analysts as a potentially attractive basis of establishing a new minimum benefit for Social Security on both of these grounds. This type of proposal is related to a broader array of minimum benefit proposals that would establish a Social Security benefit floor based on the poverty rate. In contrast to Social Security, the SSI program is means tested, including both an income and asset screen and also a categorical eligibility screen (the requirement to qualify as aged or disabled). The SSI FBR provides an inflation-adjusted, guaranteed income floor for aged and disabled people with low assets. The FBR has been perceived by proponents as a minimal measure of Social Security benefit adequacy because it represents a subpoverty income level for a family of one or two depending on marital status. For this same reason it has been seen as a target-effective tool of designing a minimum Social Security benefit. An FBR-based minimum benefit has also been viewed as administratively simple to implement; the benefit can be calculated from Social Security administrative records using a completely automated electronic process. Therefore-in contrast to the SSI program itself-an FBR-based minimum benefit would incur virtually no ongoing administrative costs, would not require a separate application for a means-tested program, and would avoid the perception of welfare stigma. While these ideas have been discussed in the literature and among policymakers in the United States over the years, and similar proposals have been considered or implemented in several foreign countries, there have been no previous analyses measuring the size of the potentially affected beneficiary population. Nor has there been any systematic assessment of the FBR as a measure of benefit adequacy or the tradeoffs between potential target effectiveness and administrative simplicity. Based on a series of simulations, we assess the FBR as a potential foundation for minimum Social Security benefits and we examine the tradeoffs between administrative simplicity and target effectiveness using microdata from the 1996 panel of the Survey of Income and Program Participation (SIPP). Our empirical analysis is limited to Social Security retired-worker beneficiaries aged 65 or older. We start with the assessment of the FBR as a measure of benefit adequacy. We are particularly concerned about two types of error: (1) incorrectly identifying some Social Security beneficiaries as "economically vulnerable," and (2) incorrectly identifying others as "not economically vulnerable." Operationally we measure economic vulnerability by two alternative standards. One of our measures considers beneficiaries with family income below the official poverty threshold as vulnerable. Our second measure is more restrictive; it uses a family income threshold equal to 75 percent of the official poverty threshold. We find that a substantial minority of retired workers have Social Security benefits below the FBR. The results also show that the FBR-based measure of Social Security benefit adequacy is very imprecise in terms of identifying economically vulnerable people. We estimate that the vast majority of beneficiaries with Social Security benefits below the FBR are not economically vulnerable. Conversely, an FBR-level Social Security benefit threshold fails to identify some beneficiaries who are economically vulnerable. Thus an FBR-level minimum benefit would be poorly targeted in terms of both types of errors we are concerned about. An FBR-level minimum benefit would provide minimum Social Security benefits to many people who are clearly not poor. Conversely, an FBR-level minimum benefit would not provide any income relief to some who are poor. The administrative simplicity behind these screening errors also results in additional program cost that may be perceived as substantial. We estimate that an FBR-level minimum benefit would increase aggregate program cost for retired workers aged 65 or older by roughly 2 percent. There are two fundamental reasons for these findings. First, the concept of an FBR-level minimum benefit looks at the individual or married couple in artificial isolation; however, the family is the main consumption unit in our society. The income of an unmarried partner or family members other than a married spouse is ignored. Second, individuals and couples may also have income from sources other than Social Security or SSI, which is also ignored by a simple FBR-based minimum benefit concept. The substantial empirical magnitude of measurement error arising from these conceptual simplifications naturally leads to the assessment of the tradeoff between target effectiveness and administrative simplicity. To facilitate this analysis, we simulate the potential effect of alternative screening methods designed to increase target effectiveness; while reducing program cost, such alternatives also may increase administrative complexity. For example, considering the combined Social Security benefit of a married couple (rather than looking at the husband and wife in isolation) might substantially increase target effectiveness with a relatively small increase in administrative complexity. Adding a family income screen might increase administrative complexity to a greater degree, but also would increase target effectiveness dramatically. The results also suggest that at some point adding new screens-such as a comprehensive asset test-may drastically increase administrative complexity with diminishing returns in terms of increased target effectiveness and reduced program cost. Whether a broad-based minimum benefit concept that is not tied to previous work experience is perceived by policymakers as desirable or not may depend on several factors not addressed in this article. However, to the extent that this type of minimum benefit design is regarded as potentially desirable, the tradeoffs between administrative simplicity and target effectiveness need to be considered.

  10. Regulation of X-Ray Security Scanners in Michigan.

    PubMed

    Parry, Donald E

    2016-02-01

    In January of 2013 the Transportation Security Administration (TSA) ordered the removal of x-ray security scanners from airports by June of 2013. Since that time several of these scanners have been purchased at a reduced cost by various state and county governments for use in screening individuals entering or leaving their facilities. To address this issue the Radiation Safety Section of the State of Michigan drafted a set of registration conditions for facilities to follow when using these security scanners. Inspection procedures and measurement protocols were developed to estimate the dose to screened individuals. Inspections were performed on nine of the 16 registered backscatter scanners in the state and the one transmission scanner. The average estimated effective dose to screened individuals was ∼11 nSv for a two view scan from a backscatter system. The effective dose was 0.446 μSv, 0.330 μSv, and 0.150 μSv for a transmission system operated in the high, medium, and low dose modes, respectively. The limit suggested in the new registration condition is 0.25 μSv for a general use system and 10 μSv for a limited use system.

  11. Computer-aided diagnosis workstation and teleradiology network system for chest diagnosis using the web medical image conference system with a new information security solution

    NASA Astrophysics Data System (ADS)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaro; Moriyama, Noriyuki

    2010-03-01

    Diagnostic MDCT imaging requires a considerable number of images to be read. Moreover, the doctor who diagnoses a medical image is insufficient in Japan. Because of such a background, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis. We also have developed the teleradiology network system by using web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. Our teleradiology network system can perform Web medical image conference in the medical institutions of a remote place using the web medical image conference system. We completed the basic proof experiment of the web medical image conference system with information security solution. We can share the screen of web medical image conference system from two or more web conference terminals at the same time. An opinion can be exchanged mutually by using a camera and a microphone that are connected with the workstation that builds in some diagnostic assistance methods. Biometric face authentication used on site of teleradiology makes "Encryption of file" and "Success in login" effective. Our Privacy and information security technology of information security solution ensures compliance with Japanese regulations. As a result, patients' private information is protected. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new teleradiology network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis workstation and our teleradiology network system can increase diagnostic speed, diagnostic accuracy and security improvement of medical information.

  12. Concept of Operations for the Next Generation Air Transportation System, Version 2.0

    DTIC Science & Technology

    2007-06-13

    SIDA )/airport operations area (AOA), [R-110] terminal perimeter, terminal airspace (security) • Landside. Terminal public and commercial roadways and...Required Surveillance Performance RTSS Remote Terminal Security Screening SAA Special Activity Airspace SIDA Security Identification Display Area SM...impede airside operations? R-110 Research 6.4.2/C. 4.4.1 Airside: Security Identification Display Area ( SIDA )/AOA R&D needed to develop and

  13. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1975-10-06

    Results of the passenger screening procedures continue to reflect the success and effec- tiveness of airline and airport security programs. During the...airline and airport security programs. While it is impossible to estimate accurately just how many hijackings and related crimes were prevented, the...attempts might have occurred during 1974 and as many as 25 during the first 6 months of 1975, if current airline and airport security programs had not

  14. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection. Data Available through the TSDC: Maintained by the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) in partnership with the U.S. Department of Transportation (DOT), the TSDC houses data from travel surveys and studies conducted using global positioning system (GPS) devices. It featuresmore » millions of data points - second-by-second GPS readings, vehicle characteristics (if applicable), and demographics - for all modes of travel. NREL screens the initial data for quality control, translates each data set into a consistent format, and interprets the data for spatial analysis. NREL's processing routines add information on vehicle fuel economy and road grades and join data points to the road network.« less

  15. High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states

    NASA Astrophysics Data System (ADS)

    Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo

    2017-12-01

    This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.

  16. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... of Investigation (FBI)/Terrorist Screening Center (TSC) is providing a near real time, synchronized... appropriate clearances or permissions. Retention and disposal: The WLS will maintain a near real time mirror... difficulties they experienced during their travel screening at transportation hubs such as airports and train...

  17. 76 FR 39315 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-06

    ... Terrorist Screening Database System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed... Use of the Terrorist Screening Database System of Records'' and this proposed rulemaking. In this... Use of the Terrorist Screening Database (TSDB) System of Records.'' DHS is maintaining a mirror copy...

  18. Advances in chemical sensing technologies for VOCs in breath for security/threat assessment, illicit drug detection, and human trafficking activity.

    PubMed

    Giannoukos, S; Agapiou, A; Taylor, S

    2018-01-17

    On-site chemical sensing of compounds associated with security and terrorist attacks is of worldwide interest. Other related bio-monitoring topics include identification of individuals posing a threat from illicit drugs, explosive manufacturing, as well as searching for victims of human trafficking and collapsed buildings. The current status of field analytical technologies is directed towards the detection and identification of vapours and volatile organic compounds (VOCs). Some VOCs are associated with exhaled breath, where research is moving from individual breath testing (volatilome) to cell breath (microbiome) and most recently to crowd breath metabolites (exposome). In this paper, an overview of field-deployable chemical screening technologies (both stand-alone and those with portable characteristics) is given with application to early detection and monitoring of human exposome in security operations. On-site systems employed in exhaled breath analysis, i.e. mass spectrometry (MS), optical spectroscopy and chemical sensors are reviewed. Categories of VOCs of interest include (a) VOCs in human breath associated with exposure to threat compounds, and (b) VOCs characteristic of, and associated with, human body odour (e.g. breath, sweat). The latter are relevant to human trafficking scenarios. New technological approaches in miniaturised detection and screening systems are also presented (e.g. non-scanning digital light processing linear ion trap MS (DLP-LIT-MS), nanoparticles, mid-infrared photo-acoustic spectroscopy and hyphenated technologies). Finally, the outlook for rapid and precise, real-time field detection of threat traces in exhaled breath is revealed and discussed.

  19. Motion effects in multistatic millimeter-wave imaging systems

    NASA Astrophysics Data System (ADS)

    Schiessl, Andreas; Ahmed, Sherif Sayed; Schmidt, Lorenz-Peter

    2013-10-01

    At airport security checkpoints, authorities are demanding improved personnel screening devices for increased security. Active mm-wave imaging systems deliver the high quality images needed for reliable automatic detection of hidden threats. As mm-wave imaging systems assume static scenarios, motion effects caused by movement of persons during the screening procedure can degrade image quality, so very short measurement time is required. Multistatic imaging array designs and fully electronic scanning in combination with digital beamforming offer short measurement time together with high resolution and high image dynamic range, which are critical parameters for imaging systems used for passenger screening. In this paper, operational principles of such systems are explained, and the performance of the imaging systems with respect to motion within the scenarios is demonstrated using mm-wave images of different test objects and standing as well as moving persons. Electronic microwave imaging systems using multistatic sparse arrays are suitable for next generation screening systems, which will support on the move screening of passengers.

  20. Rapid, sensitive and reproducible method for point-of-collection screening of liquid milk for adulterants using a portable Raman spectrometer with novel optimized sample well

    NASA Astrophysics Data System (ADS)

    Nieuwoudt, Michel K.; Holroyd, Steve E.; McGoverin, Cushla M.; Simpson, M. Cather; Williams, David E.

    2017-02-01

    Point-of-care diagnostics are of interest in the medical, security and food industry, the latter particularly for screening food adulterated for economic gain. Milk adulteration continues to be a major problem worldwide and different methods to detect fraudulent additives have been investigated for over a century. Laboratory based methods are limited in their application to point-of-collection diagnosis and also require expensive instrumentation, chemicals and skilled technicians. This has encouraged exploration of spectroscopic methods as more rapid and inexpensive alternatives. Raman spectroscopy has excellent potential for screening of milk because of the rich complexity inherent in its signals. The rapid advances in photonic technologies and fabrication methods are enabling increasingly sensitive portable mini-Raman systems to be placed on the market that are both affordable and feasible for both point-of-care and point-of-collection applications. We have developed a powerful spectroscopic method for rapidly screening liquid milk for sucrose and four nitrogen-rich adulterants (dicyandiamide (DCD), ammonium sulphate, melamine, urea), using a combined system: a small, portable Raman spectrometer with focusing fibre optic probe and optimized reflective focusing wells, simply fabricated in aluminium. The reliable sample presentation of this system enabled high reproducibility of 8% RSD (residual standard deviation) within four minutes. Limit of detection intervals for PLS calibrations ranged between 140 - 520 ppm for the four N-rich compounds and between 0.7 - 3.6 % for sucrose. The portability of the system and reliability and reproducibility of this technique opens opportunities for general, reagentless adulteration screening of biological fluids as well as milk, at point-of-collection.

  1. To amend title 49, United States Code, to direct the Secretary of Homeland Security to carry out a program to ensure fair treatment in the security screening of individuals with metal implants traveling in air transportation.

    THOMAS, 111th Congress

    Rep. Oberstar, James L. [D-MN-8

    2009-05-07

    House - 05/26/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Nonimmigrant Overstays: Brief Synthesis of the Issue

    DTIC Science & Technology

    2010-01-15

    finger biometric system for immigration identification17 to the major identity management and screening... finger scans and digital photographs) to check identity. Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security ...further provides: “A determination by the Secretary of Homeland Security that an alien who applied for authorization to travel to the United States

  3. DNA synthesis security.

    PubMed

    Nouri, Ali; Chyba, Christopher F

    2012-01-01

    It is generally assumed that genetic engineering advances will, inevitably, facilitate the misapplication of biotechnology toward the production of biological weapons. Unexpectedly, however, some of these very advances in the areas of DNA synthesis and sequencing may enable the implementation of automated and nonintrusive safeguards to avert the illicit applications of biotechnology. In the case of DNA synthesis, automated DNA screening tools could be built into DNA synthesizers in order to block the synthesis of hazardous agents. In addition, a comprehensive safety and security regime for dual-use genetic engineering research could include nonintrusive monitoring of DNA sequencing. This is increasingly feasible as laboratories outsource this service to just a few centralized sequencing factories. The adoption of automated, nonintrusive monitoring and surveillance of the DNA synthesis and sequencing pipelines may avert many risks associated with dual-use biotechnology. Here, we describe the historical background and current challenges associated with dual-use biotechnologies and propose strategies to address these challenges.

  4. Application research of rail transit safety protection based on laser detection

    NASA Astrophysics Data System (ADS)

    Wang, Zhifei

    2016-10-01

    Platform screen door can not only prevent the passengers fell or jumped the track danger, to passengers bring comfortable waiting environment, but also has the function of environmental protection and energy saving. But platform screen door and train the full-length gap region is insecure in the system design of a hidden, such as passengers for some reason (grab the train) in the interstitial region retention, is sandwiched between the intercity safety door and the door, and such as the region lacks security detection and alarm system, once the passengers in the gap region retention (caught), bring more serious threat to the safety of passengers and traffic safety. This paper from the point of view of the design presents the physical, infrared, laser three safety protection device setting schemes. Domestic intelligence of between rail transit shield door and train security clearance processing used is screen door system standard configuration, the obstacle detection function for avoid passengers stranded in the clearance has strong prevention function. Laser detection research and development projects can access to prevent shield door and train gap clamp safety measures. Rail safety protection method are studied applying laser detection technique. According to the laser reflection equation of foreign body, the characteristics of laser detection of foreign bodies are given in theory. By using statistical analysis method, the workflow of laser detection system is established. On this basis, protection methods is proposed. Finally the simulation and test results show that the laser detection technology in the rail traffic safety protection reliability and stability, And the future laser detection technology in is discussed the development of rail transit.

  5. An aviation security (AVSEC) screening demonstrator for the detection of non-metallic threats at 28-33 GHz

    NASA Astrophysics Data System (ADS)

    Salmon, Neil A.; Bowring, Nick; Hutchinson, Simon; Southgate, Matthew; O'Reilly, Dean

    2013-10-01

    The unique selling proposition of millimetre wave technology for security screening is that it provides a stand-off or portal scenario sensing capability for non-metallic threats. The capabilities to detect some non-metallic threats are investigated in this paper, whilst recommissioning the AVSEC portal screening system at the Manchester Metropolitan University. The AVSEC system is a large aperture (1.6 m) portal screening imager which uses spatially incoherent illumination at 28-33 GHz from mode scrambling cavities to illuminate the subject. The imaging capability is critically analysed in terms of this illumination. A novel technique for the measurement of reflectance, refractive index and extinction coefficient is investigated and this then use to characterise the signatures of nitromethane, hexane, methanol, bees wax and baking flour. Millimetre wave images are shown how these liquids in polycarbonate bottles and the other materials appear against the human body.

  6. Invited Review Article: Current State of Research on Biological Effects of Terahertz Radiation

    NASA Astrophysics Data System (ADS)

    Wilmink, Gerald J.; Grundt, Jessica E.

    2011-10-01

    Terahertz (THz) imaging and sensing technologies are increasingly being used in a host of medical, military, and security applications. For example, THz systems are now being tested at international airports for security screening purposes, at major medical centers for cancer and burn diagnosis, and at border patrol checkpoints for identification of concealed explosives, drugs, and weapons. Recent advances in THz applications have stimulated renewed interest regarding the biological effects associated with this frequency range. Biological effects studies are a valuable type of basic science research because they serve to enhance our fundamental understanding of the mechanisms that govern THz interactions with biological systems. Such studies are also important because they often times lay the foundation for the development of future applications. In addition, from a practical standpoint, THz biological effects research is also necessary for accurate health hazard evaluation, the development of empirically-based safety standards, and for the safe use of THz systems. Given the importance and timeliness of THz bioeffects data, the purpose of this review is twofold. First, to provide readers with a common reference, which contains the necessary background concepts in biophysics and THz technology, that are required to both conduct and evaluate THz biological research. Second, to provide a critical review of the scientific literature.

  7. Aviation security : vulnerabilities in, and alternatives for, pre-board screening security operations

    DOT National Transportation Integrated Search

    2001-09-25

    This is the statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues before the Committee on Governmental Affairs and Its Subcommittee on Oversight of Governmental Management, Restructuring and the District of Columbia, U.S. Senate...

  8. 78 FR 16694 - Chemical Security Assessment Tool (CSAT)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... information provided. Comments that include trade secrets, confidential commercial or financial information... secrets, confidential commercial or financial information, CVI, SSI, or PCII should be appropriately... Department make the instruments (e.g., Top-Screen, Security Vulnerability Assessment [SVA]/ Alternative...

  9. Aviation security : vulnerabilities in, and alternatives for, preboard screening security operations

    DOT National Transportation Integrated Search

    2001-09-25

    This is the statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues before the Committee on Governmental Affairs and Its Subcommittee on Oversight of Governmental Management, Restructuring and the District of Columbia, U.S. Senate...

  10. Rapid Parallel Screening for Strain Optimization

    DTIC Science & Technology

    2013-08-16

    fermentation yields of industrially relevant biological compounds. Screening of the desired chemicals was completed previously. Microbes that can...reporter, and, 2) a yeast TAR cloning shuttle vector for transferring catabolic clusters to E. coli. 15. SUBJECT TERMS NA 16. SECURITY CLASSIFICATION OF... fermentation yields of industrially relevant biological compounds. Screening of the desired chemicals was completed previously. Microbes that can utilize

  11. Rapid Parallel Screening for Strain Optimization

    DTIC Science & Technology

    2013-05-16

    fermentation yields of industrially relevant biological compounds. Screening of the desired chemicals was completed previously. Microbes that can...reporter, and, 2) a yeast TAR cloning shuttle vector for transferring catabolic clusters to E. coli. 15. SUBJECT TERMS NA 16. SECURITY CLASSIFICATION OF... fermentation yields of industrially relevant biological compounds. Screening of the desired chemicals was completed previously. Microbes that can utilize

  12. 46 CFR 36.20-1 - Flame screens-TB/ALL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Flame screens-TB/ALL. 36.20-1 Section 36.20-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS ELEVATED TEMPERATURE CARGOES Vents and Ventilation § 36.20-1 Flame screens—TB/ALL. (a) Flame screens may be omitted in the vent lines on cargo tanks...

  13. 41 CFR 102-36.120 - What are our responsibilities in authorizing a non-federal individual to screen excess personal...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... responsibilities in authorizing a non-federal individual to screen excess personal property? 102-36.120 Section 102... responsibilities in authorizing a non-federal individual to screen excess personal property? You must do the... such as driver's license or social security numbers. (c) Retrieve any expired or invalid screener's...

  14. 46 CFR 36.20-1 - Flame screens-TB/ALL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Flame screens-TB/ALL. 36.20-1 Section 36.20-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS ELEVATED TEMPERATURE CARGOES Vents and Ventilation § 36.20-1 Flame screens—TB/ALL. (a) Flame screens may be omitted in the vent lines on cargo tanks...

  15. 46 CFR 36.20-1 - Flame screens-TB/ALL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 1 2014-10-01 2014-10-01 false Flame screens-TB/ALL. 36.20-1 Section 36.20-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS ELEVATED TEMPERATURE CARGOES Vents and Ventilation § 36.20-1 Flame screens—TB/ALL. (a) Flame screens may be omitted in the vent lines on cargo tanks...

  16. 46 CFR 36.20-1 - Flame screens-TB/ALL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Flame screens-TB/ALL. 36.20-1 Section 36.20-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS ELEVATED TEMPERATURE CARGOES Vents and Ventilation § 36.20-1 Flame screens—TB/ALL. (a) Flame screens may be omitted in the vent lines on cargo tanks...

  17. 46 CFR 36.20-1 - Flame screens-TB/ALL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Flame screens-TB/ALL. 36.20-1 Section 36.20-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS ELEVATED TEMPERATURE CARGOES Vents and Ventilation § 36.20-1 Flame screens—TB/ALL. (a) Flame screens may be omitted in the vent lines on cargo tanks...

  18. Terrorist Watchlist Checks and Air Passenger Prescreening

    DTIC Science & Technology

    2009-12-30

    U.S. port of entry or at airport security checkpoints prior U.S. air carrier flights. For these purposes, CBP administers the Automated Targeting...Passenger Screening at Airport Security Checkpoints ................................. 14 9/11 Commission Recommendations and CAPPS II...individuals at either international ports of entries upon arrival at a U.S. port of entry or at airport security checkpoints prior U.S. air carrier

  19. Infectious disease protection for healthcare security officers.

    PubMed

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  20. 49 CFR 1522.127 - Assessment report.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program...) The assessment report must include the following information, in addition to any other information...

  1. 33 CFR 104.210 - Company Security Officer (CSO).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... operational limitations; (vi) Methods of conducting audits, inspection and control and monitoring techniques... threats and patterns; (ix) Recognition and detection of dangerous substances and devices; (x) Recognition...) Techniques used to circumvent security measures; (xii) Methods of physical screening and non-intrusive...

  2. 33 CFR 104.210 - Company Security Officer (CSO).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... operational limitations; (vi) Methods of conducting audits, inspection and control and monitoring techniques... threats and patterns; (ix) Recognition and detection of dangerous substances and devices; (x) Recognition...) Techniques used to circumvent security measures; (xii) Methods of physical screening and non-intrusive...

  3. 33 CFR 104.210 - Company Security Officer (CSO).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... operational limitations; (vi) Methods of conducting audits, inspection and control and monitoring techniques... threats and patterns; (ix) Recognition and detection of dangerous substances and devices; (x) Recognition...) Techniques used to circumvent security measures; (xii) Methods of physical screening and non-intrusive...

  4. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1986-05-30

    and airport security measures in effect. Section V of this report provides a smry of firearms which were detected at screening points under suspicious...with the Secretary of State concerning threats, and (3) the inclusion of a sumnmary on foreign airport security in the Semiannual Report to Congress on...International Civil Aviation Organization (ICAO) to embark inediately upon an intensified program aimed at responding to the need for enhanced airport security . As

  5. Transportation Security Administration in Defense of the National Aviation Infrastructure

    DTIC Science & Technology

    2009-02-12

    evidence suggests a hole exists within our airport security process. That hole may be caused by an over-reliance on technology and a blatant disregard of...environment enables BDOs to operate with increased effectiveness.11 Technology. Three major tools sit at the airport security technology forefront...Through Covert Testing of TSA’s Passenger Screening Process, GAO‐08‐48T, 15 Nov 07, 2. 16 Orlando News, “TSA Workers Skipping Orlando Airport Security Causes

  6. Fast and flexible selection with a single switch.

    PubMed

    Broderick, Tamara; MacKay, David J C

    2009-10-22

    Selection methods that require only a single-switch input, such as a button click or blink, are potentially useful for individuals with motor impairments, mobile technology users, and individuals wishing to transmit information securely. We present a single-switch selection method, "Nomon," that is general and efficient. Existing single-switch selection methods require selectable options to be arranged in ways that limit potential applications. By contrast, traditional operating systems, web browsers, and free-form applications (such as drawing) place options at arbitrary points on the screen. Nomon, however, has the flexibility to select any point on a screen. Nomon adapts automatically to an individual's clicking ability; it allows a person who clicks precisely to make a selection quickly and allows a person who clicks imprecisely more time to make a selection without error. Nomon reaps gains in information rate by allowing the specification of beliefs (priors) about option selection probabilities and by avoiding tree-based selection schemes in favor of direct (posterior) inference. We have developed both a Nomon-based writing application and a drawing application. To evaluate Nomon's performance, we compared the writing application with a popular existing method for single-switch writing (row-column scanning). Novice users wrote 35% faster with the Nomon interface than with the scanning interface. An experienced user (author TB, with 10 hours practice) wrote at speeds of 9.3 words per minute with Nomon, using 1.2 clicks per character and making no errors in the final text.

  7. Calibration methods for explosives detectors

    NASA Astrophysics Data System (ADS)

    MacDonald, Stephen J.; Rounbehler, David P.

    1992-05-01

    Airport security has become an important concern to cultures in every corner of the world. Presently, efforts to improve airport security have brought additional technological solutions, in the form of advanced instrumentation for the detection of explosives, into use at airport terminals in many countries. This new generation of explosives detectors is often used to augment existing security measures and provide a more encompassing screening capability for airline passengers. This paper describes two calibration procedures used for the Thermedics' EGIS explosives detectors. The systems were designed to screen people, electronic components, luggage, automobiles, and other objects for the presence of concealed explosives. The detectors have the ability to detect a wide range of explosives in both the vapor state or as surface adsorbed solids, therefore, calibrations were designed to challenge the system with explosives in each form.

  8. Open-area concealed-weapon detection system

    NASA Astrophysics Data System (ADS)

    Pati, P.; Mather, P.

    2011-06-01

    Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.

  9. Safeguarding Databases Basic Concepts Revisited.

    ERIC Educational Resources Information Center

    Cardinali, Richard

    1995-01-01

    Discusses issues of database security and integrity, including computer crime and vandalism, human error, computer viruses, employee and user access, and personnel policies. Suggests some precautions to minimize system vulnerability such as careful personnel screening, audit systems, passwords, and building and software security systems. (JKP)

  10. Border and Transportation Security: Overview of Congressional Issues

    DTIC Science & Technology

    2004-12-17

    railways, airways, and waterways. While in the immediate aftermath of 9/11 efforts primarily concentrated on an expanded federal role in aviation ... security (in particular on the heightened screening of passengers and baggage), increasingly attention is being turned towards other modes of transportation.

  11. 49 CFR 1522.119 - Training.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program § 1522.119 Training. (a) Initial training. The validation firm must ensure that its validators and...

  12. X-ray diffraction imaging with the Multiple Inverse Fan Beam topology: principles, performance and potential for security screening.

    PubMed

    Harding, G; Fleckenstein, H; Kosciesza, D; Olesinski, S; Strecker, H; Theedt, T; Zienert, G

    2012-07-01

    The steadily increasing number of explosive threat classes, including home-made explosives (HMEs), liquids, amorphous and gels (LAGs), is forcing up the false-alarm rates of security screening equipment. This development can best be countered by increasing the number of features available for classification. X-ray diffraction intrinsically offers multiple features for both solid and LAGs explosive detection, and is thus becoming increasingly important for false-alarm and cost reduction in both carry-on and checked baggage security screening. Following a brief introduction to X-ray diffraction imaging (XDI), which synthesizes in a single modality the image-forming and material-analysis capabilities of X-rays, the Multiple Inverse Fan Beam (MIFB) XDI topology is described. Physical relationships obtaining in such MIFB XDI components as the radiation source, collimators and room-temperature detectors are presented with experimental performances that have been achieved. Representative X-ray diffraction profiles of threat substances measured with a laboratory MIFB XDI system are displayed. The performance of Next-Generation (MIFB) XDI relative to that of the 2nd Generation XRD 3500TM screener (Morpho Detection Germany GmbH) is assessed. The potential of MIFB XDI, both for reducing the exorbitant cost of false alarms in hold baggage screening (HBS), as well as for combining "in situ" liquid and solid explosive detection in carry-on luggage screening is outlined. Copyright © 2011 Elsevier Ltd. All rights reserved.

  13. Indirect X-ray Detectors Based on Inkjet-Printed Photodetectors with a Screen-Printed Scintillator Layer.

    PubMed

    Oliveira, Juliana; Correia, Vitor; Sowade, Enrico; Etxebarria, Ikerne; Rodriguez, Raul D; Mitra, Kalyan Y; Baumann, Reinhard R; Lanceros-Mendez, Senentxu

    2018-04-18

    Organic photodetectors (PDs) based on printing technologies will allow to expand the current field of PD applications toward large-area and flexible applications in areas such as medical imaging, security, and quality control, among others. Inkjet printing is a powerful digital tool for the deposition of smart and functional materials on various substrates, allowing the development of electronic devices such as PDs on various substrates. In this work, inkjet-printed PD arrays, based on the organic thin-film transistor architecture, have been developed and applied for the indirect detection of X-ray radiation using a scintillator ink as an X-ray absorber. The >90% increase of the photocurrent of the PDs under X-ray radiation, from about 53 nA without the scintillator film to about 102 nA with the scintillator located on top of the PD, proves the suitability of the developed printed device for X-ray detection applications.

  14. Transforming Security Screening With Biometrics

    DTIC Science & Technology

    2003-04-09

    prompted the Defense Advanced Research Projects Agency to experiment with facial recognition technology for identification of known terrorists. While DoD...screening of individuals. Facial recognition technology has been tested to some degree for accessing highly sensitive military areas, but not for...the military can implement facial recognition to screen personnel requesting access to bases and stations, DoD is not likely to use biometrics to

  15. National Security Science and Technology Initiative: Air Cargo Screening, Final Report for CRADA Number NFE-07-01081

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bingham, Philip; Bush, John; Bowerman, Biays

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security’s Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with fourmore » of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009.« less

  16. The global security perspective on the effects of executive cognitive function on complex behavioral screening intervention and HIV/AIDS.

    PubMed

    Kim, Suk-Hee

    2010-11-01

    The purpose of this quantitative study is to understand the global security perspective on the effects of executive cognitive function (ECF) on Complex Behavioral Screening Intervention and HIV/AIDS. The HIV/AIDS pandemic is as much a social, political, economic, and cultural problem as a biomedical one. HIV/AIDS is associated centrally with the collapse not just of communities and families but potentially of states, with some of the largest public health interventions ever and enormous questions about governance, a huge population of orphans, and deep questions about intergenerational relations and cultural transmission. This study also is to develop a screening instrument that improves quality of life for individuals with executive cognitive impairments and behavior problems in our communities and the global society.

  17. Multifunctional optical security features based on bacteriorhodopsin

    NASA Astrophysics Data System (ADS)

    Hampp, Norbert A.; Neebe, Martin; Juchem, Thorsten; Wolperdinger, Markus; Geiger, Markus; Schmuck, Arno

    2004-06-01

    Bacteriorhodopsin (BR), a photochromic retinal protein, has been developed into a new materials platform for applications in anti-counterfeiting. The combination of three different properties of the material on its molecular level, a light-inducible color change, photochemical data storage and traceability of the protein due to molecular marker sequences make this protein a promising material for security applications. The crystalline structure of the biopigment combines these properties with high stability. As BR is a biological material specialized knowledge for modification, cost- effective production and suitable processing of the material is required. Photochromic BR-based inks have been developed for screen printing, pad printing and ink jet printing. These prints show a high photochromic sensitivity towards variation of illumination. For this reason it is not possible to reproduce the dynamic color by photocopying. In addition to such visual inspection the printed symbols offer the possibility for digital write-once-read-many (WORM) data storage. Photochemical recording is accomplished by a two-photon process. Recording densities in a range from 106 bit/cm2 to 108 bit/cm2 have been achieved. Data structures are stored in a polarization sensitive mode which allows an easy and efficient data encryption.

  18. Optimizing Security of Cloud Computing within the DoD

    DTIC Science & Technology

    2010-12-01

    information security governance and risk management; application security; cryptography; security architecture and design; operations security; business ...governance and risk management; application security; cryptography; security architecture and design; operations security; business continuity...20 7. Operational Security (OPSEC).........................................................20 8. Business Continuity Planning (BCP) and Disaster

  19. 49 CFR 1522.113 - Withdrawal of approval.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program... TSA-approved validation firm if the validation firm ceases to meet the standards for approval, fails...

  20. 49 CFR 1522.123 - Conduct of assessments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program... immediately to TSA. (d) No authorization to take remedial or disciplinary action. Neither the validation firm...

  1. Security training with interactive laser-video-disk technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest thatmore » detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life.« less

  2. Detection of total hip prostheses at airport security checkpoints: how has heightened security affected patients?

    PubMed

    Johnson, Aaron J; Naziri, Qais; Hooper, Hasan A; Mont, Michael A

    2012-04-04

    The sensitivity of airport security screening measures has increased substantially during the past decade, but few reports have examined how this affects patients who have undergone hip arthroplasty. The purpose of this study was to determine the experiences of patients who had hip prostheses and who passed through airport security screenings. A consecutive series of 250 patients who presented to the office of a high-volume surgeon were asked whether they had had a hip prosthesis for at least one year and, if so, whether they had flown on a commercial airline within the past year. Patients who responded affirmatively to both questions were asked to complete a written survey that included questions about which joint(s) had been replaced, the number of encounters with airport security, the frequency and location of metal detector activation, any additional screening procedures that were utilized, whether security officials requested documentation regarding the prosthesis, the degree of inconvenience, and other relevant information. Of the 143 patients with hip replacements who traveled by air, 120 (84%) reported triggering the alarm and required wanding with a handheld detector. Twenty-five of these patients reported subsequently having to undergo further inspection, including additional wanding, being patted down, and in two cases having to undress in a private room to show the incision. Ninety-nine (69%) of the 143 patients reported that the prosthetic joint caused an inconvenience while traveling. This study provides interesting and critical information that allows physicians to understand the real-world implications of implanted orthopaedic devices for patients who are traveling where there has been heightened security since September 11, 2001. Patients should be counseled that they should expect delays and be prepared for such inconveniences, but that these are often only momentary. This information could relieve some anxiety and concerns that patients may have prior to traveling.

  3. X-ray imaging for security applications

    NASA Astrophysics Data System (ADS)

    Evans, J. Paul

    2004-01-01

    The X-ray screening of luggage by aviation security personnel may be badly hindered by the lack of visual cues to depth in an image that has been produced by transmitted radiation. Two-dimensional "shadowgraphs" with "organic" and "metallic" objects encoded using two different colors (usually orange and blue) are still in common use. In the context of luggage screening there are no reliable cues to depth present in individual shadowgraph X-ray images. Therefore, the screener is required to convert the 'zero depth resolution' shadowgraph into a three-dimensional mental picture to be able to interpret the relative spatial relationship of the objects under inspection. Consequently, additional cognitive processing is required e.g. integration, inference and memory. However, these processes can lead to serious misinterpretations of the actual physical structure being examined. This paper describes the development of a stereoscopic imaging technique enabling the screener to utilise binocular stereopsis and kinetic depth to enhance their interpretation of the actual nature of the objects under examination. Further work has led to the development of a technique to combine parallax data (to calculate the thickness of a target material) with the results of a basis material subtraction technique to approximate the target's effective atomic number and density. This has been achieved in preliminary experiments with a novel spatially interleaved dual-energy sensor which reduces the number of scintillation elements required by 50% in comparison to conventional sensor configurations.

  4. Screening for Food Insecurity in Pediatric Clinical Settings: Opportunities and Barriers.

    PubMed

    Barnidge, Ellen; LaBarge, Gene; Krupsky, Kathryn; Arthur, Joshua

    2017-02-01

    Food insecurity is a serious health concern among children in the United States with 15.3 million children living in food insecure households. The American Academy of Pediatrics recommends that pediatricians screen for food insecurity at health maintenance visits as identifying children at risk is a crucial step in the amelioration of food insecurity. Two surveys were administered in a Midwest pediatric clinic. A cross-sectional survey was electronically distributed to pediatric providers to assess perceptions of food insecurity among patients, provider readiness to conduct food security screenings, and barriers to conducting those screenings. A cross-sectional caregiver survey was administered to assess demographics, household food security status, participation in nutrition assistance programs, and barriers to getting enough food to eat. Descriptive statistics and odds ratios were calculated. Eighty-eight percent of physicians believe that food insecurity is a challenge for some of their patients. Only 15 % of providers reported screening for food insecurity, while 80 % were willing to screen. Physicians were most concerned with knowing how to handle a positive screen. Among caregivers, 57 % screened positive for food insecurity. Those experiencing food insecurity were more likely to be non-white, participate in SNAP and to feel discomfort towards the idea of talking to a doctor or nurse about food needs. Caregivers reporting food insecurity were significantly less likely to have a personal vehicle. Effective food insecurity screening requires addressing caregiver and health provider barriers in order to increase the likelihood of identifying households most at risk.

  5. Detecting objects in radiographs for homeland security

    NASA Astrophysics Data System (ADS)

    Prasad, Lakshman; Snyder, Hans

    2005-05-01

    We present a general scheme for segmenting a radiographic image into polygons that correspond to visual features. This decomposition provides a vectorized representation that is a high-level description of the image. The polygons correspond to objects or object parts present in the image. This characterization of radiographs allows the direct application of several shape recognition algorithms to identify objects. In this paper we describe the use of constrained Delaunay triangulations as a uniform foundational tool to achieve multiple visual tasks, namely image segmentation, shape decomposition, and parts-based shape matching. Shape decomposition yields parts that serve as tokens representing local shape characteristics. Parts-based shape matching enables the recognition of objects in the presence of occlusions, which commonly occur in radiographs. The polygonal representation of image features affords the efficient design and application of sophisticated geometric filtering methods to detect large-scale structural properties of objects in images. Finally, the representation of radiographs via polygons results in significant reduction of image file sizes and permits the scalable graphical representation of images, along with annotations of detected objects, in the SVG (scalable vector graphics) format that is proposed by the world wide web consortium (W3C). This is a textual representation that can be compressed and encrypted for efficient and secure transmission of information over wireless channels and on the Internet. In particular, our methods described here provide an algorithmic framework for developing image analysis tools for screening cargo at ports of entry for homeland security.

  6. Efficient Fingercode Classification

    NASA Astrophysics Data System (ADS)

    Sun, Hong-Wei; Law, Kwok-Yan; Gollmann, Dieter; Chung, Siu-Leung; Li, Jian-Bin; Sun, Jia-Guang

    In this paper, we present an efficient fingerprint classification algorithm which is an essential component in many critical security application systems e. g. systems in the e-government and e-finance domains. Fingerprint identification is one of the most important security requirements in homeland security systems such as personnel screening and anti-money laundering. The problem of fingerprint identification involves searching (matching) the fingerprint of a person against each of the fingerprints of all registered persons. To enhance performance and reliability, a common approach is to reduce the search space by firstly classifying the fingerprints and then performing the search in the respective class. Jain et al. proposed a fingerprint classification algorithm based on a two-stage classifier, which uses a K-nearest neighbor classifier in its first stage. The fingerprint classification algorithm is based on the fingercode representation which is an encoding of fingerprints that has been demonstrated to be an effective fingerprint biometric scheme because of its ability to capture both local and global details in a fingerprint image. We enhance this approach by improving the efficiency of the K-nearest neighbor classifier for fingercode-based fingerprint classification. Our research firstly investigates the various fast search algorithms in vector quantization (VQ) and the potential application in fingerprint classification, and then proposes two efficient algorithms based on the pyramid-based search algorithms in VQ. Experimental results on DB1 of FVC 2004 demonstrate that our algorithms can outperform the full search algorithm and the original pyramid-based search algorithms in terms of computational efficiency without sacrificing accuracy.

  7. Doing Our Homework: A Pre-Employment Screening Checklist for Better Head Start Hiring.

    ERIC Educational Resources Information Center

    McSherry, Jim; Caruso, Karen; Cagnetta, Mary

    1999-01-01

    Provides a checklist for screening potential Head Start employees. Components include checks for criminal record, credit history, motor vehicle records, social security number tracing, previous address research, education verification, work and personal reference interview, and professional license verification. (KB)

  8. Identifying Breast Tumor Suppressors Using in Vitro and in Vivo RNAi Screens

    DTIC Science & Technology

    2011-10-01

    vivo RNA interference screen, breast cancer , tumor suppressor, leukemia inhibitory factor receptor (LIFR) 16. SECURITY CLASSIFICATION OF: 17...The identification of these genes will improve the understanding of the causes of breast cancer , which may lead to therapeutic advancements for... breast cancer prevention and treatment. BODY Objective 1: Identification of breast tumor suppressors using in vitro and in vivo RNAi screens

  9. Methodology to Improve Aviation Security With Terrorist Using Aircraft as a Weapon

    DTIC Science & Technology

    2013-09-01

    STATEMENT Approval for public release;distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words ) The aviation industry... Electronic Baggage Screening Program EDS Explosive Detection System EMMI Energy, Matter, Material wealth, and Information ETD Explosives Trace...12 All checked baggage in the United States has been subjected to 100% screening since December 2003 under TSA’s Electronic Baggage Screening

  10. Simulation Learning PC Screen-Based vs. High Fidelity

    DTIC Science & Technology

    2011-08-01

    D., Burgess, L., Berg, B . and Connolly, K . (2009). Teaching mass casualty triage skills using iterative multimanikin simulations. Prehospital...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U b . ABSTRACT U...learning PC screen-based vs. high fidelity – progress chart Attachment B . Approved Protocol - Simulation Learning: PC-Screen Based (PCSB) versus High

  11. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    PubMed

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  12. Ad-Hoc Networks and the Mobile Application Security System (MASS)

    DTIC Science & Technology

    2006-01-01

    solution to this problem that addresses critical aspects of security in ad-hoc mobile application networks. This approach involves preventing unauthorized...modification of a mobile application , both by other applications and by hosts, and ensuring that mobile code is authentic and authorized. These...capabilities constitute the Mobile Application Security System (MASS). The MASS applies effective, robust security to mobile application -based systems

  13. Ship Effect Measurements With Fiber Optic Neutron Detector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    King, Kenneth L.; Dean, Rashe A.; Akbar, Shahzad

    2010-08-10

    The main objectives of this research project was to assemble, operate, test and characterize an innovatively designed scintillating fiber optic neutron radiation detector manufactured by Innovative American Technology with possible application to the Department of Homeland Security screening for potential radiological and nuclear threats at US borders (Kouzes 2004). One goal of this project was to make measurements of the neutron ship effect for several materials. The Virginia State University DOE FaST/NSF summer student-faculty team made measurements with the fiber optic radiation detector at PNNL above ground to characterize the ship effect from cosmic neutrons, and underground to characterize themore » muon contribution.« less

  14. An evaluation of authentication methods for smartphone based on users’ preferences

    NASA Astrophysics Data System (ADS)

    Sari, P. K.; Ratnasari, G. S.; Prasetio, A.

    2016-04-01

    This study discusses about smartphone screen lock preferences using some types of authentication methods. The purpose is to determine the user behaviours based on the perceived security and convenience, as well as the preferences for different types of authentication methods. Variables used are the considerations for locking the screens and the types of authentication methods. The population consists of the smartphone users with the total samples of 400 respondents within a nonprobability sampling method. Data analysis method used is the descriptive analysis. The results showed that the convenience factor is still the major consideration for locking the smartphone screens. Majority of the users chose the pattern unlock as the most convenient method to use. Meanwhile, fingerprint unlock becomes the most secure method in the users’ perceptions and as the method chosen to be used in the future.

  15. A bill to require security screening of passengers at airports to be carried out by private screening companies, and for other purposes.

    THOMAS, 112th Congress

    Sen. Paul, Rand [R-KY

    2012-06-14

    Senate - 06/14/2012 Read twice and referred to the Committee on Commerce, Science, and Transportation. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. 29 CFR 9.12 - Contractor requirements and prerogatives.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... utilize employment screening processes (i.e., drug tests, background checks, security clearance checks, and similar pre-employment screening mechanisms) only when such processes are provided for by the... example, if the contractor holds a meeting for a group of employees on the predecessor contract in order...

  17. 29 CFR 9.12 - Contractor requirements and prerogatives.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... utilize employment screening processes (i.e., drug tests, background checks, security clearance checks, and similar pre-employment screening mechanisms) only when such processes are provided for by the... example, if the contractor holds a meeting for a group of employees on the predecessor contract in order...

  18. 29 CFR 9.12 - Contractor requirements and prerogatives.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... utilize employment screening processes (i.e., drug tests, background checks, security clearance checks, and similar pre-employment screening mechanisms) only when such processes are provided for by the... example, if the contractor holds a meeting for a group of employees on the predecessor contract in order...

  19. 75 FR 1552 - Chemical Facility Anti-Terrorism Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-12

    ... Protection Agency RMP--Risk Management Program SSP--Site Security Plan STQ--Screening Threshold Quantity SVA... Protection Agency (EPA) under the Clean Air Act's Risk Management Program (RMP) for counting-- or excluding... Safety, Information, Site Security and Fuels Regulatory Relief Act, Public Law 106-40. Cf. 72 FR 65410...

  20. 76 FR 34616 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/National...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... questions please contact: Emily Andrew (703-235-2182), Privacy Officer, National Protection and Programs... U.S.C. 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate... Screening Database (TSDB). The TSDB is the Federal government's consolidated and integrated terrorist...

  1. Detection of Total Knee Arthroplasties at Airport Security Checkpoints: How Do Updated Security Measures Affect Patients?

    PubMed

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Goljan, Peter; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2017-07-01

    Airport security measures continue to be updated with the incorporation of the new body scanners and automatic target recognition software. The purpose of this study was analyze the incidence of: (1) triggering the security alarm; (2) extra security searches; (3) perceived inconvenience; and (4) presence of other surgical hardware in those who underwent total knee arthroplasty (TKA) and passed through airport security. A questionnaire was given to 125 consecutive patients with a TKA. Those who passed through airport security after January 2014 were considered for inclusion. A questionnaire was administered that addressed the number of encounters with airport security, metal detector activation, additional screening procedures, and perceived inconvenience. Out of the 125 patients, 53 met inclusion criteria. Out of the 53 patients, 20 (38%) reported that their prosthesis triggered a metal detector. Out of the 20 patients, 8 (40%) who reported triggering of metal detectors also reported the presence of surgical hardware elsewhere in the body. Eighteen of the 53 patients (34%) believed having a TKA was inconvenient for airplane travel. Compared with the historical cohort, alarms were triggered in 70 of 97 patients ( p  = 0.0001) and 50 of 97 reported inconvenience when traveling ( n  = 50 of 97 patients; p  = 0.04). The incidences of those who underwent TKA triggering alarms and perceiving inconvenience when passing through airport security have decreased from previously published studies. This is most likely due to the recent updates and modifications to screening. As these security measures are modified and implant designs continue to evolve, this is an area of investigation that should continue. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  2. Security issues in healthcare applications using wireless medical sensor networks: a survey.

    PubMed

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  3. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    PubMed Central

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458

  4. Implementation of a food insecurity screening and referral program in student-run free clinics in San Diego, California.

    PubMed

    Smith, Sunny; Malinak, David; Chang, Jinnie; Perez, Maria; Perez, Sandra; Settlecowski, Erica; Rodriggs, Timothy; Hsu, Ming; Abrew, Alexandra; Aedo, Sofia

    2017-03-01

    Food insecurity is associated with many poor health outcomes yet is not routinely addressed in clinical settings. The purpose of this study was to implement a food insecurity screening and referral program in Student-run Free Clinics (SRFC) and to document the prevalence of food insecurity screening in this low-income patient population. All patients seen in three SRFC sites affiliated with one institution in San Diego, California were screened for food insecurity using the 6-item United States Department of Agriculture (USDA) Food Security Survey between January and July 2015 and referred to appropriate resources. The percentage of patients who were food insecure was calculated. The screening rate was 92.5% (430/463 patients), 74.0% (318/430) were food insecure, including 30.7% (132/430) with very low food security. A food insecurity registry and referral tracking system revealed that by January 2016, 201 participants were receiving monthly boxes of food onsite, 66 used an off-site food pantry, and 64 were enrolled in the Supplemental Nutrition Assistance Program (SNAP). It is possible to implement a food insecurity screening and referral program into SRFCs. The prevalence of food insecurity in this population was remarkably high yet remained largely unknown until this program was implemented. Other health care settings, particularly those with underserved patient populations, should consider implementing food insecurity screening and referral programs.

  5. 17 CFR 242.609 - Registration of securities information processors: form of application and amendments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... information processors: form of application and amendments. 242.609 Section 242.609 Commodity and Securities....609 Registration of securities information processors: form of application and amendments. (a) An application for the registration of a securities information processor shall be filed on Form SIP (§ 249.1001...

  6. 17 CFR 242.609 - Registration of securities information processors: form of application and amendments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... information processors: form of application and amendments. 242.609 Section 242.609 Commodity and Securities....609 Registration of securities information processors: form of application and amendments. (a) An application for the registration of a securities information processor shall be filed on Form SIP (§ 249.1001...

  7. A Mobile Health Data Collection System for Remote Areas to Monitor Women Participating in a Cervical Cancer Screening Campaign.

    PubMed

    Quercia, Kelly; Tran, Phuong Lien; Jinoro, Jéromine; Herniainasolo, Joséa Lea; Viviano, Manuela; Vassilakos, Pierre; Benski, Caroline; Petignat, Patrick

    2018-04-01

    Barriers to efficient cervical cancer screening in low- and medium-income countries include the lack of systematic monitoring of the participants' data. The aim of this study was to assess the feasibility of a mobile health (m-Health) data collection system to facilitate monitoring of women participating to cervical cancer screening campaign. Women aged 30-65 years, participating in a cervical cancer screening campaign in Ambanja, Madagascar, were invited to participate in the study. Cervical Cancer Prevention System, an m-Health application, allows the registration of clinical data, while women are undergoing cervical cancer screening. All data registered in the smartphone were transmitted onto a secure, Web-based platform through the use of an Internet connection. Healthcare providers had access to the central database and could use it for the follow-up visits. Quality of data was assessed by computing the percentage of key data missing. A total of 151 women were recruited in the study. Mean age of participants was 41.8 years. The percentage of missing data for the key variables was less than 0.02%, corresponding to one woman's medical history data, which was not sent to the central database. Technical problems, including transmission of photos, human papillomavirus test results, and pelvic examination data, have subsequently been solved through a system update. The quality of the data was satisfactory and allowed monitoring of cervical cancer screening data of participants. Larger studies evaluating the efficacy of the system for the women's follow-up are needed in order to confirm its efficiency on a long-term scale.

  8. 76 FR 47648 - Proposed Collection; Comment Request for Form 8850

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-05

    ... 8850, Pre-Screening Notice and Certification Request for the Work Opportunity and Welfare-to-Work...: Pre-Screening Notice and Certification Request for the Work Opportunity and Welfare-to-Work Credits... request to a state employment security agency to certify an employee as a member of a targeted group for...

  9. 76 FR 8758 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-002...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ... screen activity in the National Emergency Management Information System for both call-related customer... desktop screen as they perform work in National Emergency Management Information System (NEMIS); (3) Avaya...), Enterprise Performance Information Management Section, Federal Emergency Management Agency, Texas National...

  10. 77 FR 65395 - Air Cargo Advance Screening (ACAS) Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Air Cargo Advance Screening (ACAS) Pilot Program Correction In notice document 2012-26031 appearing on pages 65006-65009 in the issue of October 24, 2012 make the following correction: On page 65007, in the first column, under the...

  11. 49 CFR 1515.9 - Appeal of security threat assessment based on other analyses.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., foreign air carriers, indirect air carriers (IACs), certified cargo screening facilities, or validation...'s reply and any accompanying information, and any other materials or information available to him or... operators, foreign air carriers, IACs, certified cargo screening facilities, or validation firms. [72 FR...

  12. Can donated media placements reach intended audiences?

    PubMed

    Cooper, Crystale Purvis; Gelb, Cynthia A; Chu, Jennifer; Polonec, Lindsey

    2013-09-01

    Donated media placements for public service announcements (PSAs) can be difficult to secure, and may not always reach intended audiences. Strategies used by the Centers for Disease Control and Prevention's (CDC) Screen for Life: National Colorectal Cancer Action Campaign (SFL) to obtain donated media placements include producing a diverse mix of high-quality PSAs, co-branding with state and tribal health agencies, securing celebrity involvement, monitoring media trends to identify new distribution opportunities, and strategically timing the release of PSAs. To investigate open-ended recall of PSAs promoting colorectal cancer screening, CDC conducted 12 focus groups in three U.S. cities with men and women either nearing age 50 years, when screening is recommended to begin, or aged 50-75 years who were not in compliance with screening guidelines. In most focus groups, multiple participants recalled exposure to PSAs promoting colorectal cancer screening, and most of these individuals reported having seen SFL PSAs on television, in transit stations, or on the sides of public buses. Some participants reported exposure to SFL PSAs without prompting from the moderator, as they explained how they learned about the disease. Several participants reported learning key campaign messages from PSAs, including that colorectal cancer screening should begin at age 50 years and screening can find polyps so they can be removed before becoming cancerous. Donated media placements can reach and educate mass audiences, including millions of U.S. adults who have not been screened appropriately for colorectal cancer.

  13. 17 CFR 200.602 - Application.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Application. 200.602 Section 200.602 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT... Programs or Activities Conducted by the Securities and Exchange Commission § 200.602 Application. This...

  14. 17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... registration as a securities information processor or to amend such an application or registration. 249.1001..., SECURITIES EXCHANGE ACT OF 1934 Form for Registration of, and Reporting by Securities Information Processors § 249.1001 Form SIP, for application for registration as a securities information processor or to amend...

  15. 17 CFR 249.1001 - Form SIP, for application for registration as a securities information processor or to amend such...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... registration as a securities information processor or to amend such an application or registration. 249.1001..., SECURITIES EXCHANGE ACT OF 1934 Form for Registration of, and Reporting by Securities Information Processors § 249.1001 Form SIP, for application for registration as a securities information processor or to amend...

  16. Tutorial: Terahertz beamforming, from concepts to realizations

    NASA Astrophysics Data System (ADS)

    Headland, Daniel; Monnai, Yasuaki; Abbott, Derek; Fumeaux, Christophe; Withayachumnankul, Withawat

    2018-05-01

    The terahertz range possesses significant untapped potential for applications including high-volume wireless communications, noninvasive medical imaging, sensing, and safe security screening. However, due to the unique characteristics and constraints of terahertz waves, the vast majority of these applications are entirely dependent upon the availability of beam control techniques. Thus, the development of advanced terahertz-range beam control techniques yields a range of useful and unparalleled applications. This article provides an overview and tutorial on terahertz beam control. The underlying principles of wavefront engineering include array antenna theory and diffraction optics, which are drawn from the neighboring microwave and optical regimes, respectively. As both principles are applicable across the electromagnetic spectrum, they are reconciled in this overview. This provides a useful foundation for investigations into beam control in the terahertz range, which lies between microwaves and infrared light. Thereafter, noteworthy experimental demonstrations of beam control in the terahertz range are discussed, and these include geometric optics, phased array devices, leaky-wave antennas, reflectarrays, and transmitarrays. These techniques are compared and contrasted for their suitability in applications of terahertz waves.

  17. Accounting for the Process of Disablement and Longitudinal Outcomes Among the Near Elderly and Elderly.

    PubMed

    Rupp, Kalman; Dushi, Irena

    2017-01-01

    Using a new disability measure applicable to both the near elderly and elderly population, we track respondents aged 51-61 in 1992 from the Health and Retirement Study and account for their status over 20 years. We demonstrate that to screen in as disabled and to screen out as nondisabled require different analytic strategies and use multiple indicators to establish three groups: disabled, nondisabled, and a residual category with ambiguous status. We use work-disability and Supplemental Security Income/Disability Insurance (SSI/DI) receipt for testing distributional outcomes and assessing face validity of our disability measure. Selective attrition due to death and institutionalization is substantial over 20 years. Persistent disability is the dominant adverse outcome of initial disability shock. Overtime exits due to death become progressively more important; 44% disabled at baseline are dead by Wave 11 compared to 21% for nondisabled. Disability status at baseline is associated with financial insecurity persisting to Wave 11 among survivors.

  18. Comparison of extraction buffers for the detection of fumonisin B(1) in corn by immunoassay and high-performance liquid chromatography.

    PubMed

    Kulisek, E S; Hazebroek, J P

    2000-01-01

    The Associatian of Official Analytical Chemists approved method for quantification of fumonisin B(1) (FB(1)) in corn meal or corn-based food products includes extraction into methanol (MeOH)/water (3:1, v/v). Disposal of the extraction medium can pose safety and environmental problems. To secure a rapid and inexpensive screen for FB(1) contamination, a sensitive competitive ELISA using a rabbit polyclonal antibody was developed. This assay was used in a comparative study measuring the extraction efficiency of FB(1) in aqueous or organic solvent buffers using 16 field corn samples. An aqueous phosphate buffer was found to be suitable for extracting FB(1), thus eliminating the need for organic solvents. HPLC and ELISA determinations compared well in fortified samples at known concentrations between 1 and 50 microg/mL of extract. Overestimation at levels >50 microg/mL were common. The characteristics and application of the ELISA for screening purposes are discussed.

  19. 17 CFR 201.193 - Applications by barred individuals for consent to associate.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Applications by barred individuals for consent to associate. 201.193 Section 201.193 Commodity and Securities Exchanges SECURITIES... securities dealers, government securities brokers, government securities dealers, investment advisers...

  20. 76 FR 57043 - Andrew N. Finkel; Analysis of Proposed Consent Order to Aid Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-15

    ... personal information, like anyone's Social Security number, date of birth, driver's license number or other... heightened security screening. As a result, we encourage you to submit your comments online. To make sure... respondent developed and sold in Google's Android Marketplace. Respondent claimed that Acne Pwner effectively...

  1. 78 FR 75350 - Goldenshores Technologies, LLC and Erik M. Geidl; Analysis of Proposed Consent Order To Aid...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-11

    ... that your comment does not include any sensitive personal information, like anyone's Social Security... heightened security screening. As a result, we encourage you to submit your comments online. To make sure... Flashlight App'') to consumers for use on their Android mobile devices. The Brightest Flashlight App...

  2. Posture and performance: sitting vs. standing for security screening.

    PubMed

    Drury, C G; Hsiao, Y L; Joseph, C; Joshi, S; Lapp, J; Pennathur, P R

    2008-03-01

    A classification of the literature on the effects of workplace posture on performance of different mental tasks showed few consistent patterns. A parallel classification of the complementary effect of performance on postural variables gave similar results. Because of a lack of data for signal detection tasks, an experiment was performed using 12 experienced security operators performing an X-ray baggage-screening task with three different workplace arrangements. The current workplace, sitting on a high chair viewing a screen placed on top of the X-ray machine, was compared to a standing workplace and a conventional desk-sitting workplace. No performance effects of workplace posture were found, although the experiment was able to measure performance effects of learning and body part discomfort effects of workplace posture. There are implications for the classification of posture and performance and for the justification of ergonomics improvements based on performance increases.

  3. 49 CFR 1572.9 - Applicant information required for HME security threat assessment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... threat assessment. 1572.9 Section 1572.9 Transportation Other Regulations Relating to Transportation... TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.9 Applicant information required for HME security threat assessment. An applicant must supply the information...

  4. Development and Application of Skill Standards for Security Practitioners

    DTIC Science & Technology

    2006-07-01

    Development and Application of Skill Standards for Security Practitioners Henry K. Simpson Northrop Grumman Technical Services Lynn F. Fischer...and Application of Skill Standards for Security Practitioners Henry K. Simpson, Northrop Grumman Technical Services Lynn F. Fischer, Defense...described in the present report was driven by a JSTC tasking to develop skill standards for security practitioners in seven different security

  5. Implementing a High-Assurance Smart-Card OS

    NASA Astrophysics Data System (ADS)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  6. A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications

    NASA Astrophysics Data System (ADS)

    Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald

    Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.

  7. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    DTIC Science & Technology

    2012-01-01

    Martin B. Zimmerman, “Market Incentives for Safe Commercial Airline Operation,” American Economic Review, Vol. 78, No. 5, 1988, pp. 913–935. Bosch...Modeling,” in Stuart Johnson, Martin C. Libicki, and Gregory F. Treverton, eds., New Challenges, New Tools for Defense Decisionmaking, Santa Monica, Calif...677–725. Persico, Nicola, and Petra E. Todd, “Passenger Profiling, Imperfect Screening, and Airport Security,” American Economic Review, Vol. 95

  8. Risk factors and visual fatigue of baggage X-ray security screeners: a structural equation modelling analysis.

    PubMed

    Yu, Rui-Feng; Yang, Lin-Dong; Wu, Xin

    2017-05-01

    This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue using structural equation modelling approach. Two hundred and five X-ray security screeners participated in a questionnaire survey. The result showed that satisfaction with the VDT's physical features and the work environment conditions were negatively correlated with the intensity of visual fatigue, whereas job stress and job burnout had direct positive influences. The path coefficient between the image quality of VDT and visual fatigue was not significant. The total effects of job burnout, job stress, the VDT's physical features and the work environment conditions on visual fatigue were 0.471, 0.469, -0.268 and -0.251 respectively. These findings indicated that both extrinsic factors relating to VDT and workplace environment and psychological factors including job burnout and job stress should be considered in the workplace design and work organisation of security screening tasks to reduce screeners' visual fatigue. Practitioner Summary: This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue. The findings were of great importance to the workplace design and the work organisation of security screening tasks to reduce screeners' visual fatigue.

  9. 20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 4 2012-04-01 2012-04-01 false Application for security deposit...' COMPENSATION ACT AND RELATED STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.203 Application for security deposit determination; information to be submitted; other...

  10. 20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 3 2011-04-01 2011-04-01 false Application for security deposit...' COMPENSATION ACT AND RELATED STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.203 Application for security deposit determination; information to be submitted; other...

  11. Conservation science in a terrorist age: the impact of airport security screening on the viability and DNA integrity of frozen felid spermatozoa.

    PubMed

    Gloor, Kayleen T; Winget, Doug; Swanson, William F

    2006-09-01

    In response to growing terrorism concerns, the Transportation Security Administration now requires that all checked baggage at U.S. airports be scanned through a cabinet x-ray system, which may increase risk of radiation damage to transported biologic samples and other sensitive genetic material. The objective of this study was to investigate the effect of these new airport security regulations on the viability and DNA integrity of frozen felid spermatozoa. Semen was collected from two domestic cats (Felis silvestris catus) and one fishing cat (Prionailurus viverrinus), cryopreserved in plastic freezing straws, and transferred into liquid nitrogen dry shippers for security screening. Treatment groups included frozen samples from each male scanned once or three times using a Transportation Security Administration-operated cabinet x-ray system, in addition to non-scanned samples (i.e., negative control) and samples previously scanned three times and exposed to five additional high-intensity x-ray bursts (i.e., positive control). Dosimeters placed in empty dry shippers were used to quantify radiation exposure. Following treatment, straws were thawed and spermatozoa analyzed for post-thaw motility (percentage motile and rate of progressive movement), acrosome status, and DNA integrity using single-cell gel electrophoresis (i.e., the comet assay). Dosimeter measurements determined that each airport screening procedure produced approximately 16 mrem of radiation exposure. Our results indicated that all levels of radiation exposure adversely affected (P < 0.05) post-thaw sperm motility, but the percentage of acrosome-intact spermatozoa did not differ (P > 0.05) among treatment groups. Results also showed that the amount of double-stranded DNA damage was greater (P < 0.05) in sperm samples from both cat species scanned three times compared to samples scanned once or negative controls. Findings suggest that new airport security measures may cause radiation-induced damage to frozen spermatozoa and other valuable biologic samples transported on passenger aircraft and that alternative modes of sample transportation should be used whenever possible.

  12. Press touch code: A finger press based screen size independent authentication scheme for smart devices.

    PubMed

    Ranak, M S A Noman; Azad, Saiful; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z

    2017-01-01

    Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.

  13. Press touch code: A finger press based screen size independent authentication scheme for smart devices

    PubMed Central

    Ranak, M. S. A. Noman; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z.

    2017-01-01

    Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)—a.k.a., Force Touch in Apple’s MacBook, Apple Watch, ZTE’s Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on—is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme. PMID:29084262

  14. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...

  15. 20 CFR 703.203 - Application for security deposit determination; information to be submitted; other requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Application for security deposit... AND RELATED STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.203 Application for security deposit determination; information to be submitted; other requirements. (a) Each...

  16. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...

  17. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...

  18. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...

  19. 20 CFR 422.501 - Applications and other forms used in Social Security Administration programs.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Applications and other forms used in Social Security Administration programs. 422.501 Section 422.501 Employees' Benefits SOCIAL SECURITY... used in Social Security Administration programs. This subpart lists the applications and some of the...

  20. 17 CFR 249.1 - Form 1, for application for, and amendments to applications for, registration as a national...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form 1, for application for, and amendments to applications for, registration as a national securities exchange or exemption from registration pursuant to Section 5 of the Exchange Act. 249.1 Section 249.1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ...

  1. 17 CFR 249.1 - Form 1, for application for, and amendments to applications for, registration as a national...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form 1, for application for, and amendments to applications for, registration as a national securities exchange or exemption from registration pursuant to Section 5 of the Exchange Act. 249.1 Section 249.1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ...

  2. 17 CFR 249.1 - Form 1, for application for, and amendments to applications for, registration as a national...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 1, for application for, and amendments to applications for, registration as a national securities exchange or exemption from registration pursuant to Section 5 of the Exchange Act. 249.1 Section 249.1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ...

  3. 17 CFR 249.1 - Form 1, for application for, and amendments to applications for, registration as a national...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form 1, for application for, and amendments to applications for, registration as a national securities exchange or exemption from registration pursuant to Section 5 of the Exchange Act. 249.1 Section 249.1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ...

  4. 17 CFR 249.1 - Form 1, for application for, and amendments to applications for, registration as a national...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form 1, for application for, and amendments to applications for, registration as a national securities exchange or exemption from registration pursuant to Section 5 of the Exchange Act. 249.1 Section 249.1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ...

  5. [General practitioners' commitment to treating excessive alcohol consumption: A question of role security in treating affected patients?].

    PubMed

    Fankhänel, Thomas; Rascher, Anja; Thiel, Carolin; Schulz, Katrin; Klement, Andreas

    2016-01-01

    Only a few general practitioners (GPs) are committed to screen their patients for alcohol consumption and, in case of excessive alcohol consumption conduct by a brief intervention according to WHO recommendations. Apart from inadequate compensation and work load, another barrier identified by the GPs was their uncertainty about how to deal with affected patients. Most German universities presently spend no more than 90minutes lecture time on addiction medicine teaching. Our research aims to investigate the question whether medical studies and advanced medical education increases the role security of medical students and physicians and their commitment to implementing alcohol screening and brief intervention. Moreover, we will explore whether lack of therapeutic commitment can be related to lack of role security. Questionnaires were administered to pre-clinical and clinical medical students as well as senior house officers. Role security and therapeutic commitment of students and senior house officers were assessed using the Alcohol and Alcohol Problems Questionnaire (SAAPPQ) subscales "Role Security" and "Therapeutic Commitment". Analysis was based on 367 questionnaires. As expected, senior house officers reported more Role Security than clinical medical students who showed a higher level of Role Security than pre-clinical medical students. No differences could be found for Therapeutic Commitment. An association between Role Security and Therapeutic Commitment was only revealed for clinical medical students. Medical studies and advanced medical education can increase students' and senior house officers' Role Security to treat patients with excessive alcohol consumption, but not Therapeutic Commitment. Moreover, no association between Role Security and Therapeutic Commitment could be found for senior house officers. Hence, it may be assumed that educational activities aiming to increase Role Security do not promote the development of motivational aspects such as Therapeutic Commitment to the management of patients with excessive alcohol intake. Copyright © 2016. Published by Elsevier GmbH.

  6. SERENITY Aware System Development Process

    NASA Astrophysics Data System (ADS)

    Serrano, Daniel; Maña, Antonio; Llarena, Rafael; Crespo, Beatriz Gallego-Nicasio; Li, Keqin

    Traditionally, security patterns have successfully been used to describe security and dependability. In the SERENITY Project the notion of security and dependability (S&D) pattern has been extended to exact specifications of re-usable security mechanisms for Ambient Intelligence (AmI) systems. These S&D Patterns include information on the security properties satisfied by the solution and on the context conditions to be fulfilled. This chapter presents the development of applications supported by SERENITY. In the context of SERENITY we refer to these applications as Serenity-aware applications. Firstly, this chapter presents the Serenity-aware application design using S&D Artefacts. Secondly, it proposes a Java Application Programming Interface (API) to be used in the application development. And, finally, it introduces the development of an example Serenity-aware application.

  7. Computer-aided diagnosis workstation and network system for chest diagnosis based on multislice CT images

    NASA Astrophysics Data System (ADS)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Moriyama, Noriyuki; Ohmatsu, Hironobu; Masuda, Hideo; Machida, Suguru

    2008-03-01

    Mass screening based on multi-helical CT images requires a considerable number of images to be read. It is this time-consuming step that makes the use of helical CT for mass screening impractical at present. To overcome this problem, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis likelihood by using helical CT scanner for the lung cancer mass screening. The function to observe suspicious shadow in detail are provided in computer-aided diagnosis workstation with these screening algorithms. We also have developed the telemedicine network by using Web medical image conference system with the security improvement of images transmission, Biometric fingerprint authentication system and Biometric face authentication system. Biometric face authentication used on site of telemedicine makes "Encryption of file" and Success in login" effective. As a result, patients' private information is protected. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new telemedicine network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis workstation and our telemedicine network system can increase diagnostic speed, diagnostic accuracy and security improvement of medical information.

  8. Effect of Diet on Gulf War Illness: A Pilot Study

    DTIC Science & Technology

    2017-10-01

    illness while on the study. We screened our first participant in September 2016. Overall we have screened 18 and enrolled 14 Gulf War Veterans so...16. SECURITY CLASSIFICATION OF: 17. LIMITATION 18 . 19a. NAME OF RESPONSIBLE PERSON U OF ABSTRACT NUMBER USAMRMC OF PAGES a. REPORT b. ABSTRACT c...healthy. Body: During the last on year the following goals were accomplished:  We have screened 18 Gulf War Veterans and have enrolled 14

  9. Password Complexity Recommendations: xezandpAxat8Um or P4$$w0rd!!!!

    DTIC Science & Technology

    2014-10-01

    have we seen the computer screen with fast- scrolling characters, with good answers being indicated one by one? This is not a MasterMind game ! Password...security/2013/ 05/how-crackers-make-minced- meat -out-of-your-passwords (Access Date: 2014-04-02). 18 DRDC-RDDC-2014-R27 DOCUMENT CONTROL DATA (Security

  10. 75 FR 63192 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Air Cargo...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-14

    ... programs, security threat assessments (STA), known shipper data via the Known Shipper Management System... baggage, and other articles, that will be carried aboard a passenger aircraft; and (2) to establish a system to screen, inspect, report, or otherwise ensure the security of all cargo that is to be...

  11. Counterintelligence Screening Needed lo Reduce Security Threat That Unscreened Local National Linguists Pose to U.S. Forces (REDACTED)

    DTIC Science & Technology

    2012-12-07

    Commander, U.S. Forces- Afghanistan -- - ·--·- --· I A., B. l., and B.2. FOR OFFICl/rlJ BSE O:PflrlI ii F0R 0FFiCM-L HSE 0Nhi’ Table of...Our Response 13 Appendices A. Scope and Methodology 15 Use of Computer Processed Data 16 Prior Coverage 16 1 F0R 0FFiCIA±i HSE 0Nl-J’l F61t...security screening process for escorted entry while on U.S. Forces’ installations in Afghanistan. FOR 0ff’ICikb HSE 0"Pfb Y 5 F6:K 6FFl€1A:b ffl

  12. Colorectal Cancer Screening in Asia.

    PubMed

    Chiu, Han-Mo; Hsu, Wen-Feng; Chang, Li-Chun; Wu, Ming-Hsiang

    2017-08-10

    Colorectal cancer (CRC) is increasing in Asia, especially in regions with higher levels of economic development. Several Asian countries have launched population CRC screening programs to combat this devastating disease because previous studies have demonstrated that either fecal occult blood test or lower gastrointestinal endoscopy can effectively reduce CRC mortality. Screening includes engaging the population, testing, administering a confirmation examination, and treating screening-detected neoplasms; thus, monitoring the whole process using measurable indicators over time is of utmost importance. Only when the quality of every step is secured can the effectiveness of CRC screening be maximized. Screening and verification examination rates remain low in Asian countries, and important infrastructure, including cancer or death registry systems, colonoscopy capacity, and reasonable subsidization for screening, is lacking or insufficient. Future research should identify potential local barriers to screening. Good communication and dialog among screening organizers, clinicians, professional societies, and public health workers are indispensible for successful screening programs.

  13. 49 CFR 1542.1 - Applicability of this part.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...

  14. 49 CFR 1542.1 - Applicability of this part.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...

  15. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  16. 49 CFR 1542.1 - Applicability of this part.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...

  17. 49 CFR 1542.1 - Applicability of this part.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...

  18. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  19. 49 CFR 1542.1 - Applicability of this part.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY General § 1542.1 Applicability of this part. This part describes aviation security rules governing: (a) The operation of airports.... (c) Each airport operator that receives a Security Directive or Information Circular and each person...

  20. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  1. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  2. Quartz-Crystal Microbalance (QCM) for Public Health: An Overview of Its Applications.

    PubMed

    Bragazzi, Nicola Luigi; Amicizia, Daniela; Panatto, Donatella; Tramalloni, Daniela; Valle, Ivana; Gasparini, Roberto

    2015-01-01

    Nanobiotechnologies, from the convergence of nanotechnology and molecular biology and postgenomics medicine, play a major role in the field of public health. This overview summarizes the potentiality of piezoelectric sensors, and in particular, of quartz-crystal microbalance (QCM), a physical nanogram-sensitive device. QCM enables the rapid, real time, on-site detection of pathogens with an enormous burden in public health, such as influenza and other respiratory viruses, hepatitis B virus (HBV), and drug-resistant bacteria, among others. Further, it allows to detect food allergens, food-borne pathogens, such as Escherichia coli and Salmonella typhimurium, and food chemical contaminants, as well as water-borne microorganisms and environmental contaminants. Moreover, QCM holds promises in early cancer detection and screening of new antiblastic drugs. Applications for monitoring biohazards, for assuring homeland security, and preventing bioterrorism are also discussed. © 2015 Elsevier Inc. All rights reserved.

  3. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  4. 17 CFR 229.1122 - (Item 1122) Compliance with applicable servicing criteria.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1122) Compliance with applicable servicing criteria. 229.1122 Section 229.1122 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES...

  5. 17 CFR 229.1122 - (Item 1122) Compliance with applicable servicing criteria.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 1122) Compliance with applicable servicing criteria. 229.1122 Section 229.1122 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES...

  6. Cost-Effectiveness of Blood Donation Screening for Trypanosoma cruzi in Mexico.

    PubMed

    Sánchez-González, Gilberto; Figueroa-Lara, Alejandro; Elizondo-Cano, Miguel; Wilson, Leslie; Novelo-Garza, Barbara; Valiente-Banuet, Leopoldo; Ramsey, Janine M

    2016-03-01

    An estimated 2 million inhabitants are infected with Chagas disease in Mexico, with highest prevalence coinciding with highest demographic density in the southern half of the country. After vector-borne transmission, Trypanosoma cruzi is principally transmitted to humans via blood transfusion. Despite initiation of serological screening of blood donations or donors for T. cruzi since 1990 in most Latin American countries, Mexico only finally included mandatory serological screening nationwide in official Norms in 2012. Most recent regulatory changes and segmented blood services in Mexico may affect compliance of mandatory screening guidelines. The objective of this study was to calculate the incremental cost-effectiveness ratio for total compliance of current guidelines from both Mexican primary healthcare and regular salaried worker health service institutions: the Secretary of Health and the Mexican Institute for Social Security. We developed a bi-modular model to analyze compliance using a decision tree for the most common screening algorithms for each health institution, and a Markov transition model for the natural history of illness and care. The incremental cost effectiveness ratio based on life-years gained is US$ 383 for the Secretary of Health, while the cost for an additional life-year gained is US$ 463 for the Social Security Institute. The results of the present study suggest that due to incomplete compliance of Mexico's national legislation during 2013 and 2014, the MoH has failed to confirm 15,162 T. cruzi infections, has not prevented 2,347 avoidable infections, and has lost 333,483 life-years. Although there is a vast difference in T. cruzi prevalence between Bolivia and Mexico, Bolivia established mandatory blood screening for T.cruzi in 1996 and until 2002 detected and discarded 11,489 T. cruzi -infected blood units and prevented 2,879 potential infections with their transfusion blood screening program. In the first two years of Mexico's mandated program, the two primary institutions failed to prevent due to incomplete compliance more potential infections than those gained from the first five years of Bolivia's program. Full regulatory compliance should be clearly understood as mandatory for the sake of blood security, and its monitoring and analysis in Mexico should be part of the health authority's responsibility.

  7. Designing a Machinery Control System (MCS) Security Testbed

    DTIC Science & Technology

    2014-09-01

    IO LAB” button and verify the display looks as follows: 95 Figure F22 . “Ready State” (and start state)of the DIOL as displayed at the HMI...After verification that the HMI screen looks like Figure F22 , click on the “Back to Home Screen” button and return to the HMI “Home” screen as seen

  8. 78 FR 33262 - Energy Efficiency Program for Commercial and Industrial Equipment: Public Meeting and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-04

    ... security screening procedures. If a foreign national wishes to participate in the public meeting, please..., Microsoft Word, PDF, or ASCII file format, and avoid the use of special characters or any form of encryption... that comments sent by mail are often delayed and may be damaged by mail screening processes.) Hand...

  9. Effects of Ionizing Radiation and Restraint Stress on Activity, Avoidance Conditioning, and Stomach Ulcers in Albino Rats.

    DTIC Science & Technology

    1984-03-01

    surrounded the rat. The ends of the screen wire tube were twisted and secured with galvanized wire. Care was taken to wrap the screen wire tight so that...function. In N. R. DiLuzio and R. Paoletti (eds.). The reticuloendothelial system and atherosclerosis : Advances in experimental medicine and biology, pp

  10. 20 CFR 404.611 - How do I file an application for Social Security benefits?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false How do I file an application for Social Security benefits? 404.611 Section 404.611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD... § 404.611 How do I file an application for Social Security benefits? (a) General rule. You must apply...

  11. 20 CFR 404.611 - How do I file an application for Social Security benefits?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false How do I file an application for Social Security benefits? 404.611 Section 404.611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD... § 404.611 How do I file an application for Social Security benefits? (a) General rule. You must apply...

  12. 20 CFR 404.611 - How do I file an application for Social Security benefits?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false How do I file an application for Social Security benefits? 404.611 Section 404.611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD... § 404.611 How do I file an application for Social Security benefits? (a) General rule. You must apply...

  13. 20 CFR 404.611 - How do I file an application for Social Security benefits?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false How do I file an application for Social Security benefits? 404.611 Section 404.611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD... § 404.611 How do I file an application for Social Security benefits? (a) General rule. You must apply...

  14. 20 CFR 404.611 - How do I file an application for Social Security benefits?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How do I file an application for Social Security benefits? 404.611 Section 404.611 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD... § 404.611 How do I file an application for Social Security benefits? (a) General rule. You must apply...

  15. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  16. Assessment of risks of EMI for personal medical electronic devices (PMEDs) from emissions of millimeter-wave security screening systems

    NASA Astrophysics Data System (ADS)

    Witters, Donald; Bassen, Howard; Guag, Joshua; Addissie, Bisrat; LaSorte, Nickolas; Rafai, Hazem

    2013-06-01

    This paper describes research and testing of a representative group of high priority body worn and implantable personal medical electronic devices (PMEDs) for exposure to millimeter wave (MMW) advanced imaging technology (AIT) security systems used at airports. The sample PMEDs included in this study were implantable cardiac pacemakers, ICDs, neurostimulators and insulin pumps. These PMEDs are designed and tested for susceptibility to electromagnetic interference (EMI) under the present standards for medical device electromagnetic compatibility (EMC). However, the present standards for medical equipment do not address exposure to the much higher frequency fields that are emitted by MMW security systems. Initial AIT emissions measurements were performed to assess the PMED and passenger exposures. Testing protocols were developed and testing methods were tailored to the type of PMED. In addition, a novel exposure simulation system was developed to allow controlled EMC testing without the need of the MMW AIT system. Methodology, test results, and analysis are presented, along with an assessment of the human exposure and risks for PMED users. The results on this study reveal no effects on the medical devices from the exposure to the MMW security system. Furthermore, the human exposure measurements and analysis showed levels well below applicable standard, and the risks for PMED users and others we assessed to be very low. These findings apply to the types of PMEDs used in the study though these findings might suggest that the risks for other, similar PMEDs would likely be similar.

  17. [Establishment and application effect of fall prevention and control information system in elderly community].

    PubMed

    Zhao, Ting; Pi, Hong-Ying; Ku, Hong-An; Pan, Li; Gong, Zhu-Yun

    2018-02-08

    To investigate establishing, applying and evaluating the fall prevention and control information system in elderly community. Relying on internet technology and informatization means, the fall comprehensive prevention and control strategy of elderly was guided into online from offline. The fall prevention and control information system which was a collection of risk assessment, remote education and feedback was established. One hundred and twenty-six elderly (over 60 years old) in community were screened in this study and 84 high-risk elders who were involved in the remote continuous comprehensive intervention were screened out. Intervening measures included distributing propaganda album, making mission slides and video used to play with the interpretation remotely. Then fall related situation before and after intervention was analyzed and the effectiveness of system evaluated. After remote intervention, the fall incidence of high-risk group decreased from 21.43% to 4.76%( P <0.01). The body balance and gait stability improved clearly( P <0. 01). The rate of taking proper prevention and control behavior significantly improved( P <0.01). They believed in themselves not to fall down with more confidence when taking complex behaviors( P <0.01). The security of environment at home significantly enhanced( P <0. 01). Fall prevention and control information system in elderly community was innovative and convenient. The system could roundly assess the status related to fall and accurately screen out high-risk group. The system could implement the remote continuous comprehensive intervention so that the incident of fall was decrease. In conclusion, the system is stable and effective, can be further popularization and application as a successful pilot.

  18. 6 CFR 11.1 - General application.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false General application. 11.1 Section 11.1 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.1 General application. (a) Application of Debt Collection Standards. The provisions of 31 CFR parts 285, 900-904, as amended by the...

  19. 76 FR 8755 - Privacy Act of 1974; Department of Homeland Security/ALL-032 Official Passport Application and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ... 1974; Department of Homeland Security/ALL--032 Official Passport Application and Maintenance Records.../ ALL--032 Official Passport Application and Maintenance Records System of Records.'' This system of... passport application or maintenance record on Department of Homeland Security employees and former...

  20. 6 CFR 25.9 - Procedures for certification of approved products for Homeland Security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Procedures for certification of approved products for Homeland Security. (a) Application Procedure. An applicant seeking a Certification of anti-terrorism Technology as an Approved Product for Homeland Security... application for renewal must be made using the “Application for Certification of an Approved Product for...

  1. Restricted access processor - An application of computer security technology

    NASA Technical Reports Server (NTRS)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  2. Smart Cards and remote entrusting

    NASA Astrophysics Data System (ADS)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  3. Los Alamos Team Demonstrates Bottle Scanner Technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Espy, Michelle; Schultz, Larry

    2014-05-06

    Los Alamos scientists are demonstrating a Nuclear Magnetic Resonance Imaging (NMR) technology that may provide a breakthrough for screening liquids at airport security. By adding low-power X-ray data to the NMR mix, scientists believe they have unlocked a new detection technology. Funded in part by the Department of Homeland Security's Science and Technology Directorate, the new technology is called MagRay.

  4. Los Alamos Team Demonstrates Bottle Scanner Technology

    ScienceCinema

    Espy, Michelle; Schultz, Larry

    2018-02-13

    Los Alamos scientists are demonstrating a Nuclear Magnetic Resonance Imaging (NMR) technology that may provide a breakthrough for screening liquids at airport security. By adding low-power X-ray data to the NMR mix, scientists believe they have unlocked a new detection technology. Funded in part by the Department of Homeland Security's Science and Technology Directorate, the new technology is called MagRay.

  5. Analyzing commercial flight crewmember perceptions' regarding airline security effectiveness, morale, and professionalism

    NASA Astrophysics Data System (ADS)

    Belanger, James Durham

    Since the formation of the Transportation Security Administration (TSA) following the September 11, 2001 terrorist's attacks few studies involving commercial flight crewmember perceptions' of the organization's efficacy have been conducted, nor has there been any research into the effects on crewmember morale and professionalism resulting from their interactions with the TSA. This researcher surveyed 624 flight crewmembers, using a multiple-choice instrument to ascertain both their perceptions of TSA effectiveness involving an array of security issues, in addition to how crewmember interactions with the TSA may have affected their morale and professionalism. A 2-sample t-test measured the difference in the means of pilots and flight attendants regarding the study's scope, as did 2-way ANOVA and Tukey HSD comparisons, which factored in gender. The study found that crewmembers indicated some confidence in the areas of passenger and baggage screening and the Armed Pilot Program, with less confidence regarding ancillary personnel screening, airport perimeter security, and in both crewmember anti-terrorist training and human error issues. Statistical testing indicated varying differences in sample means concerning all study related issues. Finally, crewmembers indicated some effects on morale and professionalism, with a majority indicating a negative effect on both.

  6. EASI-IMS an expedite and secure technique to screen for 25I-NBOH in blotter papers.

    PubMed

    de Morais, Damila Rodrigues; Barbosa, Ingrid Lopes; Cunha, Kelly Francisco; Tripodi, Guilherme Lucas; Angolini, Célio Fernando Figueiredo; Franco, Marcos Fernando; de Aquino, Elvis Medeiros; Eberlin, Marcos Nogueira; Costa, Jose Luiz

    2017-10-01

    The increasing number of new psychoactive substances (NPS) and their quick worldwide spreading, often only slightly modified in the form of new derivatives and analogues, have brought the need for fast, wide-ranging, and unequivocal identification methods in clinical and forensic investigations. Because it usually provides secure results, gas chromatography coupled to mass spectrometry (GC-MS) has been routinely employed as the standard technique for the detection of NPS in blotter papers. For 25I-NBOH (N-(2-hydroxybenzyl)-2-(4-iodo-2,5-dimethoxyphenyl)ethan-1-aminium), however, GC-MS analysis of an blotter paper extract leads to incorrect results. In this work, we investigated whether easy ambient sonic-spray mass spectrometry imaging (EASI-IMS), and ambient ionization MS method can be applied directly to the surface of the sample requiring therefore no extraction or sample preparations, would serve as an efficient, sensitive, and secure alternative for 25I-NBOH screening. Copyright © 2017 John Wiley & Sons, Ltd.

  7. Development of x-ray imaging technique for liquid screening at airport

    NASA Astrophysics Data System (ADS)

    Sulaiman, Nurhani binti; Srisatit, Somyot

    2016-01-01

    X-ray imaging technology is a viable option to recognize flammable liquids for the purposes of aviation security. In this study, an X-ray imaging technology was developed whereby, the image viewing system was built with the use of a digital camera coupled with a gadolinium oxysulfide (GOS) fluorescent screen. The camera was equipped with a software for remote control setting of the camera via a USB cable which allows the images to be captured. The image was analysed to determine the average grey level using a software designed by Microsoft Visual Basic 6.0. The data was obtained for various densities of liquid thickness of 4.5 cm, 6.0 cm and 7.5 cm respectively for X-ray energies ranging from 70 to 200 kVp. In order to verify the reliability of the constructed calibration data, the system was tested with a few types of unknown liquids. The developed system could be conveniently employed for security screening in order to discriminate between a threat and an innocuous liquid.

  8. Screening for personality disorder in incarcerated adolescent boys: preliminary validation of an adolescent version of the standardised assessment of personality - abbreviated scale (SAPAS-AV).

    PubMed

    Kongerslev, Mickey; Moran, Paul; Bo, Sune; Simonsen, Erik

    2012-07-30

    Personality disorder (PD) is associated with significant functional impairment and an elevated risk of violent and suicidal behaviour. The prevalence of PD in populations of young offenders is likely to be high. However, because the assessment of PD is time-consuming, it is not routinely assessed in this population. A brief screen for the identification of young people who might warrant further detailed assessment of PD could be particularly valuable for clinicians and researchers working in juvenile justice settings. We adapted a rapid screen for the identification of PD in adults (Standardised Assessment of Personality - Abbreviated Scale; SAPAS) for use with adolescents and then carried out a study of the reliability and validity of the adapted instrument in a sample of 80 adolescent boys in secure institutions. Participants were administered the screen and shortly after an established diagnostic interview for DSM-IV PDs. Nine days later the screen was readministered. A score of 3 or more on the screening interview correctly identified the presence of DSM-IV PD in 86% of participants, yielding a sensitivity and specificity of 0.87 and 0.86 respectively. Internal consistency was modest but comparable to the original instrument. 9-days test-retest reliability for the total score was excellent. Convergent validity correlations with the total number of PD criteria were large. This study provides preliminary evidence of the validity, reliability, and usefulness of the screen in secure institutions for adolescent male offenders. It can be used in juvenile offender institutions with limited resources, as a brief, acceptable, staff-administered routine screen to identify individuals in need of further assessment of PD or by researchers conducting epidemiological surveys.

  9. Screening for personality disorder in incarcerated adolescent boys: preliminary validation of an adolescent version of the standardised assessment of personality – abbreviated scale (SAPAS-AV)

    PubMed Central

    2012-01-01

    Background Personality disorder (PD) is associated with significant functional impairment and an elevated risk of violent and suicidal behaviour. The prevalence of PD in populations of young offenders is likely to be high. However, because the assessment of PD is time-consuming, it is not routinely assessed in this population. A brief screen for the identification of young people who might warrant further detailed assessment of PD could be particularly valuable for clinicians and researchers working in juvenile justice settings. Method We adapted a rapid screen for the identification of PD in adults (Standardised Assessment of Personality – Abbreviated Scale; SAPAS) for use with adolescents and then carried out a study of the reliability and validity of the adapted instrument in a sample of 80 adolescent boys in secure institutions. Participants were administered the screen and shortly after an established diagnostic interview for DSM-IV PDs. Nine days later the screen was readministered. Results A score of 3 or more on the screening interview correctly identified the presence of DSM-IV PD in 86% of participants, yielding a sensitivity and specificity of 0.87 and 0.86 respectively. Internal consistency was modest but comparable to the original instrument. 9-days test-retest reliability for the total score was excellent. Convergent validity correlations with the total number of PD criteria were large. Conclusion This study provides preliminary evidence of the validity, reliability, and usefulness of the screen in secure institutions for adolescent male offenders. It can be used in juvenile offender institutions with limited resources, as a brief, acceptable, staff-administered routine screen to identify individuals in need of further assessment of PD or by researchers conducting epidemiological surveys. PMID:22846474

  10. Computer-aided diagnosis workstation and telemedicine network system for chest diagnosis based on multislice CT images

    NASA Astrophysics Data System (ADS)

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kakinuma, Ryutaru; Moriyama, Noriyuki

    2009-02-01

    Mass screening based on multi-helical CT images requires a considerable number of images to be read. It is this time-consuming step that makes the use of helical CT for mass screening impractical at present. Moreover, the doctor who diagnoses a medical image is insufficient in Japan. To overcome these problems, we have provided diagnostic assistance methods to medical screening specialists by developing a lung cancer screening algorithm that automatically detects suspected lung cancers in helical CT images, a coronary artery calcification screening algorithm that automatically detects suspected coronary artery calcification and a vertebra body analysis algorithm for quantitative evaluation of osteoporosis likelihood by using helical CT scanner for the lung cancer mass screening. The functions to observe suspicious shadow in detail are provided in computer-aided diagnosis workstation with these screening algorithms. We also have developed the telemedicine network by using Web medical image conference system with the security improvement of images transmission, Biometric fingerprint authentication system and Biometric face authentication system. Biometric face authentication used on site of telemedicine makes "Encryption of file" and "Success in login" effective. As a result, patients' private information is protected. We can share the screen of Web medical image conference system from two or more web conference terminals at the same time. An opinion can be exchanged mutually by using a camera and a microphone that are connected with workstation. Based on these diagnostic assistance methods, we have developed a new computer-aided workstation and a new telemedicine network that can display suspected lesions three-dimensionally in a short time. The results of this study indicate that our radiological information system without film by using computer-aided diagnosis workstation and our telemedicine network system can increase diagnostic speed, diagnostic accuracy and security improvement of medical information.

  11. Confirmatory Factor Analysis of the Psychopathy Checklist: Screening Version in Offenders With Axis I Disorders

    ERIC Educational Resources Information Center

    Hill, Christie D.; Neumann, Craig S.; Rogers, Richard

    2004-01-01

    One hundred forty-nine inpatients within a maximum security psychiatric facility were assessed with the Psychopathy Checklist: Screening Version (PCL:SV; S. D. Hart, D. N. Cox, & R. D. Hare, 1995). Within the total sample, 68% had a psychotic disorder and 30% met criteria for psychopathy. Using confirmatory factor analysis, the authors tested the…

  12. Screening for mental health needs of New Zealand youth in secure care facilities using the MAYSI-2.

    PubMed

    McArdle, Sean; Lambie, Ian

    2018-06-01

    Young people admitted to secure facilities generally have particularly high rates of mental, emotional and behavioural problems, but little is known about the mental health needs of this group in New Zealand. To describe prevalence of probable mental health disorder and related needs among young people in secure facilities in New Zealand. Massachusetts youth screening instrument - second version (MAYSI-2) data were obtained from the records of young people admitted to one secure care facility (n = 204) within a 12 month period. We used descriptive statistics to determine prevalence of problems overall and multivariate analysis of variance to compare MAYSI-2 scores between gender and ethnic groups. Nearly 80% of these young people scored above the 'caution' or 'warning' cut-off on the MAYSI-2, a substantially higher proportion than reported in studies in other countries. There was a tendency for girls and for Maori and Pacific Islander subgroups to have a higher rate of probable psychopathology. Young people in secure facilities in New Zealand have substantial service needs. Early intervention that engages them in services upon first contact with the youth justice system might help reduce this burden. Further validation of the MAYSI-2 in New Zealand may be warranted because of the unique ethnic make-up of these young offenders. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  13. 49 CFR 1522.107 - Application.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... security threat assessments. (8) A statement acknowledging that all personnel of the applicant who must successfully complete a security threat assessment under the requirements of this part must do so before the... the Security Coordinator successfully completes a security threat assessment, TSA will provide to the...

  14. The view from the trenches: part 2-technical considerations for EPR screening.

    PubMed

    Nicolalde, Roberto J; Gougelet, Robert M; Rea, Michael; Williams, Benjamin B; Dong, Ruhong; Kmiec, Maciej M; Lesniewski, Piotr N; Swartz, Harold M

    2010-02-01

    There is growing awareness of the need for methodologies that can be used retrospectively to provide the biodosimetry needed to carry out screening and triage immediately after an event in which large numbers of people have potentially received clinically significant doses of ionizing radiation. The general approach to developing such methodologies has been a technology centric one, often ignoring the system integrations considerations that are key to their effective use. In this study an integrative approach for the evaluation and development of a physical biodosimetry technology was applied based on in vivo electron paramagnetic resonance (EPR) dosimetry. The EPR measurements are based on physical changes in tissues whose magnitudes are not affected by the factors that can confound biologically-based assessments. In this study the use of a pilot simulation exercise to evaluate an experimental EPR system and gather stakeholders' feedback early on in the development process is described. The exercise involved: ten non-irradiated participants, representatives from a local fire department; Department of Homeland Security certified exercise evaluators, EPR experts, physicians; and a human factors engineer. Stakeholders were in agreement that the EPR technology in its current state of development could be deployed for the screening of mass casualties. Furthermore, stakeholders' recommendations will be prioritized and incorporated in future developments of the EPR technique. While the results of this exercise were aimed specifically at providing feedback for the development of EPR dosimetry for screening mass casualties, the methods and lessons learned are likely to be applicable to other biodosimetric methods.

  15. 5 CFR 844.201 - General requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... withdrawal of an application for social security disability benefits. (c) An agency may consider the... the Social Security Act; or (ii) An official statement from the Social Security Administration that... Social Security Act. (2) A disability retirement application under this part will be dismissed when OPM...

  16. Internal Review of the Washington Navy Yard Shooting. A Report to the Secretary of Defense

    DTIC Science & Technology

    2013-11-20

    the following: • Biometrically enabled background security screening • Identification card security features • Identity -proofing and vetting...claimed identities vetted through mandatory databases such as NCIC and TSDB. This occurred in attempts to reduce access costs. OMB memorandum 05-24...other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for

  17. 12 CFR 19.121 - Application for exemption.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...

  18. 12 CFR 19.121 - Application for exemption.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...

  19. 12 CFR 19.121 - Application for exemption.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...

  20. 12 CFR 19.121 - Application for exemption.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...

  1. 12 CFR 19.121 - Application for exemption.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... application for an exemption order to the Securities and Corporate Practices Division, Office of the... the public interest or the protection of investors. The Securities and Corporate Practices Division... PROCEDURE Exemption Hearings Under Section 12(h) of the Securities Exchange Act of 1934 § 19.121 Application...

  2. Teaching Web Security Using Portable Virtual Labs

    ERIC Educational Resources Information Center

    Chen, Li-Chiou; Tao, Lixin

    2012-01-01

    We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…

  3. Through-barrier electromagnetic imaging with an atomic magnetometer.

    PubMed

    Deans, Cameron; Marmugi, Luca; Renzoni, Ferruccio

    2017-07-24

    We demonstrate the penetration of thick metallic and ferromagnetic barriers for imaging of conductive targets underneath. Our system is based on an 85 Rb radio-frequency atomic magnetometer operating in electromagnetic induction imaging modality in an unshielded environment. Detrimental effects, including unpredictable magnetic signatures from ferromagnetic screens and variations in the magnetic background, are automatically compensated by active compensation coils controlled by servo loops. We exploit the tunability and low-frequency sensitivity of the atomic magnetometer to directly image multiple conductive targets concealed by a 2.5 mm ferromagnetic steel shield and/or a 2.0 mm aluminium shield, in a single scan. The performance of the atomic magnetometer allows imaging without any prior knowledge of the barriers or the targets, and without the need of background subtraction. A dedicated edge detection algorithm allows automatic estimation of the targets' size within 3.3 mm and of their position within 2.4 mm. Our results prove the feasibility of a compact, sensitive and automated sensing platform for imaging of concealed objects in a range of applications, from security screening to search and rescue.

  4. Reliability Analysis of RSG-GAS Primary Cooling System to Support Aging Management Program

    NASA Astrophysics Data System (ADS)

    Deswandri; Subekti, M.; Sunaryo, Geni Rina

    2018-02-01

    Multipurpose Research Reactor G.A. Siwabessy (RSG-GAS) which has been operating since 1987 is one of the main facilities on supporting research, development and application of nuclear energy programs in BATAN. Until now, the RSG-GAS research reactor has been successfully operated safely and securely. However, because it has been operating for nearly 30 years, the structures, systems and components (SSCs) from the reactor would have started experiencing an aging phase. The process of aging certainly causes a decrease in reliability and safe performances of the reactor, therefore the aging management program is needed to resolve the issues. One of the programs in the aging management is to evaluate the safety and reliability of the system and also screening the critical components to be managed.One method that can be used for such purposes is the Fault Tree Analysis (FTA). In this papers FTA method is used to screening the critical components in the RSG-GAS Primary Cooling System. The evaluation results showed that the primary isolation valves are the basic events which are dominant against the system failure.

  5. Multimodal person authentication on a smartphone under realistic conditions

    NASA Astrophysics Data System (ADS)

    Morris, Andrew C.; Jassim, Sabah; Sellahewa, Harin; Allano, Lorene; Ehlers, Johan; Wu, Dalei; Koreman, Jacques; Garcia-Salicetti, Sonia; Ly-Van, Bao; Dorizzi, Bernadette

    2006-05-01

    Verification of a person's identity by the combination of more than one biometric trait strongly increases the robustness of person authentication in real applications. This is particularly the case in applications involving signals of degraded quality, as for person authentication on mobile platforms. The context of mobility generates degradations of input signals due to the variety of environments encountered (ambient noise, lighting variations, etc.), while the sensors' lower quality further contributes to decrease in system performance. Our aim in this work is to combine traits from the three biometric modalities of speech, face and handwritten signature in a concrete application, performing non intrusive biometric verification on a personal mobile device (smartphone/PDA). Most available biometric databases have been acquired in more or less controlled environments, which makes it difficult to predict performance in a real application. Our experiments are performed on a database acquired on a PDA as part of the SecurePhone project (IST-2002-506883 project "Secure Contracts Signed by Mobile Phone"). This database contains 60 virtual subjects balanced in gender and age. Virtual subjects are obtained by coupling audio-visual signals from real English speaking subjects with signatures from other subjects captured on the touch screen of the PDA. Video data for the PDA database was recorded in 2 recording sessions separated by at least one week. Each session comprises 4 acquisition conditions: 2 indoor and 2 outdoor recordings (with in each case, a good and a degraded quality recording). Handwritten signatures were captured in one session in realistic conditions. Different scenarios of matching between training and test conditions are tested to measure the resistance of various fusion systems to different types of variability and different amounts of enrolment data.

  6. Summary of ADTT Website Functionality and Features

    NASA Technical Reports Server (NTRS)

    Hawke, Veronica; Duong, Trang; Liang, Lawrence; Gage, Peter; Lawrence, Scott (Technical Monitor)

    2001-01-01

    This report summarizes development of the ADTT web-based design environment by the ELORET team in 2000. The Advanced Design Technology Testbed had been in development for several years, with demonstration applications restricted to aerodynamic analyses of subsonic aircraft. The key changes achieved this year were improvements in Web-based accessibility, evaluation of collaborative visualization, remote invocation of geometry updates and performance analysis, and application to aerospace system analysis. Significant effort was also devoted to post-processing of data, chiefly through comparison of similar data for alternative vehicle concepts. Such comparison is an essential requirement for designers to make informed choices between alternatives. The next section of this report provides more discussion of the goals for ADTT development. Section 3 provides screen shots from a sample session in the ADTT environment, including Login and navigation to the project of interest, data inspection, analysis execution and output evaluation. The following section provides discussion of implementation details and recommendations for future development of the software and information technologies that provide the key functionality of the ADTT system. Section 5 discusses the integration architecture for the system, which links machines running different operating systems and provides unified access to data stored in distributed locations. Security is a significant issue for this system, especially for remote access to NAS machines, so Section 6 discusses several architectural considerations with respect to security. Additional details of some aspects of ADTT development are included in Appendices.

  7. Development of a Secure Mobile GPS Tracking and Management System

    ERIC Educational Resources Information Center

    Liu, Anyi

    2012-01-01

    With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …

  8. 17 CFR 201.510 - Temporary cease-and-desist orders: Application process.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Temporary cease-and-desist orders: Application process. 201.510 Section 201.510 Commodity and Securities Exchanges SECURITIES AND... § 201.510 Temporary cease-and-desist orders: Application process. (a) Procedure. A request for entry of...

  9. 17 CFR 201.510 - Temporary cease-and-desist orders: Application process.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Temporary cease-and-desist orders: Application process. 201.510 Section 201.510 Commodity and Securities Exchanges SECURITIES AND... § 201.510 Temporary cease-and-desist orders: Application process. (a) Procedure. A request for entry of...

  10. 17 CFR 201.510 - Temporary cease-and-desist orders: Application process.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Temporary cease-and-desist orders: Application process. 201.510 Section 201.510 Commodity and Securities Exchanges SECURITIES AND... § 201.510 Temporary cease-and-desist orders: Application process. (a) Procedure. A request for entry of...

  11. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    NASA Astrophysics Data System (ADS)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  12. 17 CFR 240.6a-2 - Amendments to application.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Amendments to application. 240.6a-2 Section 240.6a-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...

  13. 17 CFR 240.6a-2 - Amendments to application.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Amendments to application. 240.6a-2 Section 240.6a-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...

  14. 17 CFR 240.6a-2 - Amendments to application.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Amendments to application. 240.6a-2 Section 240.6a-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...

  15. 77 FR 42017 - AmericaFirst Quantitative Trust and AmericaFirst Securities, Inc.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-17

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30134; 812-14005] AmericaFirst Quantitative Trust and AmericaFirst Securities, Inc.; Notice of Application July 10, 2012. AGENCY...: AmericaFirst Quantitative Trust (the ``AmericaFirst Trust'') and AmericaFirst Securities, Inc. (``AFSI...

  16. 49 CFR 1515.3 - Terms used in this part.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    .... Applicant means an individual who has applied for one of the security threat assessments identified in 49... for the security threat assessment but TSA later determined that the individual poses a security.... Security threat assessment means the threat assessment for which the applicant has applied, as described in...

  17. Multimedia Security System for Security and Medical Applications

    ERIC Educational Resources Information Center

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  18. 75 FR 2896 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Approving Proposed Rule Change Relating to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-19

    ... and Annual Fee Applicable to Derivative Securities Products January 12, 2010. On November 24, 2009... Services (``Fee Schedule'') to revise the listing and annual fees applicable to Derivative Securities... Schedule, the term ``Derivative Securities Products'' includes securities described in NYSE Arca Equities...

  19. The President Has No Clothes: The Case for Broader Application of Red Teaming within Homeland Security

    DTIC Science & Technology

    2010-06-01

    CLOTHES: THE CASE FOR BROADER APPLICATION OF RED TEAMING WITHIN HOMELAND SECURITY by A. Bentley Nettles June 2010 Thesis Advisor...Red Teaming Within Homeland Security 6. AUTHOR(S) A. Bentley Nettles 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES...APPLICATION OF RED TEAMING WITHIN HOMELAND SECURITY A. Bentley Nettles Colonel, United States Army B.A., Texas A&M University, 1985 J.D. South

  20. 17 CFR 249.1100 - Form MSD, application for registration as a municipal securities dealer pursuant to rule 15Ba2-1...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form MSD, application for... of Municipal Securities Dealers § 249.1100 Form MSD, application for registration as a municipal... Exchange Act of 1934 (the “Act”), or to amend such application. Note: Copies of Form MSD have been filed...

  1. Access to cancer screening for women with mobility disabilities.

    PubMed

    Angus, Jan; Seto, Lisa; Barry, Nancy; Cechetto, Naomi; Chandani, Samira; Devaney, Julie; Fernando, Sharmini; Muraca, Linda; Odette, Fran

    2012-03-01

    Women with mobility disabilities are less likely to access cancer screening, even when they have a primary care provider. The Gateways to Cancer Screening project was initiated to document the challenges for women with disabilities in their access and experiences of screening for breast, cervical and colorectal cancer. The study followed the tenets of participatory action research. Five peer-led focus groups were held with 24 women with mobility disabilities. Study participants identified multiple and interacting institutional barriers to cancer screening. Their discussions highlighted the complex work of (1) arranging and attending health-related appointments, (2) confronting normative assumptions about women's bodies and (3) securing reliable health care and information. These overlapping, mutually reinforcing issues interact to shape how women with disabilities access and experience cancer screening. We explore implications for redesign of cancer screening services and education of health providers, providing specific recommendations suggested by our participants and the findings.

  2. Cost-Effectiveness of Blood Donation Screening for Trypanosoma cruzi in Mexico

    PubMed Central

    Sánchez-González, Gilberto; Figueroa-Lara, Alejandro; Elizondo-Cano, Miguel; Wilson, Leslie; Novelo-Garza, Barbara; Valiente-Banuet, Leopoldo; Ramsey, Janine M.

    2016-01-01

    An estimated 2 million inhabitants are infected with Chagas disease in Mexico, with highest prevalence coinciding with highest demographic density in the southern half of the country. After vector-borne transmission, Trypanosoma cruzi is principally transmitted to humans via blood transfusion. Despite initiation of serological screening of blood donations or donors for T. cruzi since 1990 in most Latin American countries, Mexico only finally included mandatory serological screening nationwide in official Norms in 2012. Most recent regulatory changes and segmented blood services in Mexico may affect compliance of mandatory screening guidelines. The objective of this study was to calculate the incremental cost-effectiveness ratio for total compliance of current guidelines from both Mexican primary healthcare and regular salaried worker health service institutions: the Secretary of Health and the Mexican Institute for Social Security. We developed a bi-modular model to analyze compliance using a decision tree for the most common screening algorithms for each health institution, and a Markov transition model for the natural history of illness and care. The incremental cost effectiveness ratio based on life-years gained is US$ 383 for the Secretary of Health, while the cost for an additional life-year gained is US$ 463 for the Social Security Institute. The results of the present study suggest that due to incomplete compliance of Mexico’s national legislation during 2013 and 2014, the MoH has failed to confirm 15,162 T. cruzi infections, has not prevented 2,347 avoidable infections, and has lost 333,483 life-years. Although there is a vast difference in T. cruzi prevalence between Bolivia and Mexico, Bolivia established mandatory blood screening for T.cruzi in 1996 and until 2002 detected and discarded 11,489 T. cruzi -infected blood units and prevented 2,879 potential infections with their transfusion blood screening program. In the first two years of Mexico’s mandated program, the two primary institutions failed to prevent due to incomplete compliance more potential infections than those gained from the first five years of Bolivia’s program. Full regulatory compliance should be clearly understood as mandatory for the sake of blood security, and its monitoring and analysis in Mexico should be part of the health authority’s responsibility. PMID:27002523

  3. 12 CFR 350.12 - Disclosure required by applicable banking or securities law or regulations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Disclosure required by applicable banking or securities law or regulations. 350.12 Section 350.12 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION... STATE NONMEMBER BANKS § 350.12 Disclosure required by applicable banking or securities law or...

  4. Predicting Airport Screening Officers' Visual Search Competency With a Rapid Assessment.

    PubMed

    Mitroff, Stephen R; Ericson, Justin M; Sharpe, Benjamin

    2018-03-01

    Objective The study's objective was to assess a new personnel selection and assessment tool for aviation security screeners. A mobile app was modified to create a tool, and the question was whether it could predict professional screeners' on-job performance. Background A variety of professions (airport security, radiology, the military, etc.) rely on visual search performance-being able to detect targets. Given the importance of such professions, it is necessary to maximize performance, and one means to do so is to select individuals who excel at visual search. A critical question is whether it is possible to predict search competency within a professional search environment. Method Professional searchers from the USA Transportation Security Administration (TSA) completed a rapid assessment on a tablet-based X-ray simulator (XRAY Screener, derived from the mobile technology app Airport Scanner; Kedlin Company). The assessment contained 72 trials that were simulated X-ray images of bags. Participants searched for prohibited items and tapped on them with their finger. Results Performance on the assessment significantly related to on-job performance measures for the TSA officers such that those who were better XRAY Screener performers were both more accurate and faster at the actual airport checkpoint. Conclusion XRAY Screener successfully predicted on-job performance for professional aviation security officers. While questions remain about the underlying cognitive mechanisms, this quick assessment was found to significantly predict on-job success for a task that relies on visual search performance. Application It may be possible to quickly assess an individual's visual search competency, which could help organizations select new hires and assess their current workforce.

  5. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1982-10-26

    12 IX. CIVIL AVIATION SECURITY ACTIONS . . . . . . 14 X . MPIANCE M EN4FOW . ........ 20 X . U . . . . . ... . . . . .. . . . 21 EXHIBITS 1...Screening Results 10. Weapon Detection Devices 11. X -Ray Baggage Inspection Systems 12. Basic Policies 13. Regulatory Impact 14. FAA Sponsored Explosive...WERE APPROVED FOR MORE THAN 200 AIRPORTS. D . TESTING WAS BEGUN ON A NEW C MPUTER PROGRAM FOR HE X -RAY ABSORPTION SYSTEM DEVELOPED TO DTECT BMBS IN

  6. Guaranteeing Airport Physical Screening Standards Act

    THOMAS, 111th Congress

    Rep. Lowey, Nita M. [D-NY-18

    2010-07-30

    House - 08/26/2010 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Often Overlooked Obstacles of Office Landscaping

    ERIC Educational Resources Information Center

    Jenkins, William A.; Shoaf, Lawrence G.

    1973-01-01

    Discusses nine of the most serious limitations of the office landscape concept: status screens, noise level, privacy problem, hazard control, security, unjustifiable changes, thermal environment, storage, and future planning. (Author/MF)

  8. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    PubMed

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  9. 17 CFR 400.5 - Amendments to application for registration and to notice of status as a government securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Amendments to application for registration and to notice of status as a government securities broker or dealer. 400.5 Section 400.5 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 RULES OF GENERAL...

  10. 17 CFR 400.5 - Amendments to application for registration and to notice of status as a government securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Amendments to application for registration and to notice of status as a government securities broker or dealer. 400.5 Section 400.5 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 RULES OF GENERAL...

  11. 17 CFR 400.5 - Amendments to application for registration and to notice of status as a government securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Amendments to application for registration and to notice of status as a government securities broker or dealer. 400.5 Section 400.5 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 RULES OF GENERAL...

  12. 17 CFR 400.5 - Amendments to application for registration and to notice of status as a government securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Amendments to application for registration and to notice of status as a government securities broker or dealer. 400.5 Section 400.5 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 RULES OF GENERAL...

  13. 17 CFR 400.5 - Amendments to application for registration and to notice of status as a government securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Amendments to application for registration and to notice of status as a government securities broker or dealer. 400.5 Section 400.5 Commodity and Securities Exchanges DEPARTMENT OF THE TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 RULES OF GENERAL...

  14. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.

    PubMed

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-06-15

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  15. Advanced Millimeter-Wave Security Portal Imaging Techniques

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheen, David M.; Bernacki, Bruce E.; McMakin, Douglas L.

    2012-04-01

    Millimeter-wave imaging is rapidly gaining acceptance for passenger screening at airports and other secured facilities. This paper details a number of techniques developed over the last several years including novel image reconstruction and display techniques, polarimetric imaging techniques, array switching schemes, as well as high frequency high bandwidth techniques. Implementation of some of these methods will increase the cost and complexity of the mm-wave security portal imaging systems. RF photonic methods may provide new solutions to the design and development of the sequentially switched linear mm-wave arrays that are the key element in the mm-wave portal imaging systems.

  16. 48 CFR 339.7102 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability. Contracting Officers are responsible for ensuring that all information technology acquisitions comply with the Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...

  17. 48 CFR 339.7102 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Section 339.7102 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability... Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...

  18. 48 CFR 339.7102 - Applicability.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Section 339.7102 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability... Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...

  19. 48 CFR 339.7102 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Section 339.7102 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability... Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...

  20. 48 CFR 339.7102 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Section 339.7102 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability... Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...

  1. A Method of Signal Scrambling to Secure Data Storage for Healthcare Applications.

    PubMed

    Bao, Shu-Di; Chen, Meng; Yang, Guang-Zhong

    2017-11-01

    A body sensor network that consists of wearable and/or implantable biosensors has been an important front-end for collecting personal health records. It is expected that the full integration of outside-hospital personal health information and hospital electronic health records will further promote preventative health services as well as global health. However, the integration and sharing of health information is bound to bring with it security and privacy issues. With extensive development of healthcare applications, security and privacy issues are becoming increasingly important. This paper addresses the potential security risks of healthcare data in Internet-based applications and proposes a method of signal scrambling as an add-on security mechanism in the application layer for a variety of healthcare information, where a piece of tiny data is used to scramble healthcare records. The former is kept locally and the latter, along with security protection, is sent for cloud storage. The tiny data can be derived from a random number generator or even a piece of healthcare data, which makes the method more flexible. The computational complexity and security performance in terms of theoretical and experimental analysis has been investigated to demonstrate the efficiency and effectiveness of the proposed method. The proposed method is applicable to all kinds of data that require extra security protection within complex networks.

  2. Comparison of secure messaging application (WhatsApp) and standard telephone usage for consultations on Length of Stay in the ED. A prospective randomized controlled study.

    PubMed

    Gulacti, Umut; Lok, Ugur

    2017-07-19

    Consultation, the process of an Emergency Physician seeking an opinion from other specialties, occurs frequently in the Emergency Department (ED). The aim of this study was to determine the effect of secure messaging application (WhatsApp) usage for medical consultations on Emergency Department Length of Stay (ED LOS) and consult time. We conducted a prospective, randomized controlled trial in the ED using allocation concealment over three months. Consultations requested in the ED were allocated into two groups: consultations requested via the secure messaging application and consultations requested by telephone as verbal. A total of 439 consultations requested in the ED were assessed for eligibility and 345 were included in the final analysis: 173 consultations were conducted using secure messaging application and 172 consultations were conducted using standard telephone communications. The median ED LOS was 240 minutes (IQR:230-270, 95% CI:240 to 255.2) for patients in the secure messaging application group and 277 minutes (IQR:270-287.8, 95% CI:277 to 279) for patients in the telephone group. The median total ED LOS was significantly lower among consults conducted using Secure messaging application relative to consults conducted by telephone (median dif: -30, 95%CI:-37to-25, p<0.0001). The median consult time was 158 minutes (IQR:133 to 177.25, 95% CI:150 to 169) for patients in the Secure messaging application group and 170 minutes (IQR:165 to 188.5, 95% CI:170-171) for patients in the Telephone group (median dif: -12, 95%CI:-19 to-7,p<0.0001). Consultations completed without ED arrival was 61.8% in the secure messaging group and 33.1% in the Telephone group (dif: 28.7, 95% CI:48.3 to 66, p<0.001). Use of secure messaging application for consultations in the ED reduces the total ED LOS and consultation time. Consultation with secure messaging application eliminated more than half of in-person ED consultation visits.

  3. An E-Hospital Security Architecture

    NASA Astrophysics Data System (ADS)

    Tian, Fang; Adams, Carlisle

    In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.

  4. Applications of spatially offset Raman spectroscopy to defense and security

    NASA Astrophysics Data System (ADS)

    Guicheteau, Jason; Hopkins, Rebecca

    2016-05-01

    Spatially offset Raman spectroscopy (SORS) allows for sub-surface and through barrier detection and has applications in drug analysis, cancer detection, forensic science, as well as defense and security. This paper reviews previous efforts in SORS and other through barrier Raman techniques and presents a discussion on current research in defense and security applications.

  5. 20 CFR 217.7 - Claim filed with the Social Security Administration.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 1 2011-04-01 2011-04-01 false Claim filed with the Social Security... RETIREMENT ACT APPLICATION FOR ANNUITY OR LUMP SUM Applications § 217.7 Claim filed with the Social Security Administration. (a) Claim is for life benefits. An application for life benefits under title II of the Social...

  6. 20 CFR 217.7 - Claim filed with the Social Security Administration.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 1 2012-04-01 2012-04-01 false Claim filed with the Social Security... RETIREMENT ACT APPLICATION FOR ANNUITY OR LUMP SUM Applications § 217.7 Claim filed with the Social Security Administration. (a) Claim is for life benefits. An application for life benefits under title II of the Social...

  7. 20 CFR 217.7 - Claim filed with the Social Security Administration.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 1 2013-04-01 2012-04-01 true Claim filed with the Social Security... RETIREMENT ACT APPLICATION FOR ANNUITY OR LUMP SUM Applications § 217.7 Claim filed with the Social Security Administration. (a) Claim is for life benefits. An application for life benefits under title II of the Social...

  8. 20 CFR 217.7 - Claim filed with the Social Security Administration.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 1 2014-04-01 2012-04-01 true Claim filed with the Social Security... RETIREMENT ACT APPLICATION FOR ANNUITY OR LUMP SUM Applications § 217.7 Claim filed with the Social Security Administration. (a) Claim is for life benefits. An application for life benefits under title II of the Social...

  9. 20 CFR 217.7 - Claim filed with the Social Security Administration.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Claim filed with the Social Security... RETIREMENT ACT APPLICATION FOR ANNUITY OR LUMP SUM Applications § 217.7 Claim filed with the Social Security Administration. (a) Claim is for life benefits. An application for life benefits under title II of the Social...

  10. A Balanced Approach to Funding Homeland Security

    DTIC Science & Technology

    2014-12-01

    73 1. Informed Culture ...74 2. Reporting Culture ........................................................................75 3. Just Culture ... Cultural Resources Risk Management for Protection Programs and Activities Mass Care Services Screening, Search, and Detection Mass Search and

  11. 78 FR 50052 - Chief of Engineers Environmental Advisory Board; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-16

    ... environmentally sustainable manner. Discussions and presentations during this meeting will include flow management...., drivers license, state- issued photo ID, or passport), and pass through the security screening station...

  12. Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals

    NASA Astrophysics Data System (ADS)

    Fleischmann, Kenneth R.

    The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.

  13. 17 CFR 240.15Ba2-2 - Application for registration of non-bank municipal securities dealers whose business is...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Application for registration of non-bank municipal securities dealers whose business is exclusively intrastate. 240.15Ba2-2... registration of non-bank municipal securities dealers whose business is exclusively intrastate. (a) An...

  14. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...

  15. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...

  16. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) A cyber security plan in accordance with the criteria set forth in § 73.54 of this chapter; (iv) A... cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan, shall protect the plans and...

  17. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...

  18. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited volume...

  19. 17 CFR 240.6a-1 - Application for registration as a national securities exchange or exemption from registration...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited volume...

  20. A Component-Based Approach for Securing Indoor Home Care Applications

    PubMed Central

    Estévez, Elisabet

    2017-01-01

    eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history), any security threat would damage the public’s confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events) as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home. PMID:29278370

  1. A Component-Based Approach for Securing Indoor Home Care Applications.

    PubMed

    Agirre, Aitor; Armentia, Aintzane; Estévez, Elisabet; Marcos, Marga

    2017-12-26

    eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history), any security threat would damage the public's confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events) as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home.

  2. Development of x-ray imaging technique for liquid screening at airport

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sulaiman, Nurhani binti, E-mail: nhani.sulaiman@gmail.com; Srisatit, Somyot, E-mail: somyot.s@chula.ac.th

    2016-01-22

    X-ray imaging technology is a viable option to recognize flammable liquids for the purposes of aviation security. In this study, an X-ray imaging technology was developed whereby, the image viewing system was built with the use of a digital camera coupled with a gadolinium oxysulfide (GOS) fluorescent screen. The camera was equipped with a software for remote control setting of the camera via a USB cable which allows the images to be captured. The image was analysed to determine the average grey level using a software designed by Microsoft Visual Basic 6.0. The data was obtained for various densities ofmore » liquid thickness of 4.5 cm, 6.0 cm and 7.5 cm respectively for X-ray energies ranging from 70 to 200 kVp. In order to verify the reliability of the constructed calibration data, the system was tested with a few types of unknown liquids. The developed system could be conveniently employed for security screening in order to discriminate between a threat and an innocuous liquid.« less

  3. [Progresses in screening active compounds from herbal medicine by affinity chromatography].

    PubMed

    Feng, Ying-shu; Tong, Shan-shan; Xu, Xi-ming; Yu, Jiang-nan

    2015-03-01

    Affinity chromatography is a chromatographic method for separating molecules using the binding characteristics of the stationary phase with potential drug molecules. This method can be performed as a high throughput screening method and a chromatographic separation method to screen a variety of active drugs. This paper summarizes the history of affinity chromatography, screening technology of affinity chromatography, and application of affinity chromatography in screening bio-active compounds in herbal medicines, and then discusses its application prospects, in order to broaden applications of the affinity chromatography in drug screening.

  4. Development of mobile preventive notification system (PreNotiS)

    NASA Astrophysics Data System (ADS)

    Kumar, Abhinav; Akopian, David; Chen, Philip

    2009-02-01

    The tasks achievable by mobile handsets continuously exceed our imagination. Statistics show that the mobile phone sales are soaring, rising exponentially year after year with predictions being that they will rise to a billion units in 2009, with a large section of these being smartphones. Mobile service providers, mobile application developers and researchers have been working closely over the past decade to bring about revolutionary and hardware and software advancements in hand-sets such as embedded digital camera, large memory capacity, accelerometer, touch sensitive screens, GPS, Wi- Fi capabilities etc. as well as in the network infrastructure to support these features. Recently we presented a multi-platform, massive data collection system from distributive sources such as cell phone users1 called PreNotiS. This technology was intended to significantly simplify the response to the events and help e.g. special agencies to gather crucial information in time and respond as quickly as possible to prevent or contain potential emergency situations and act as a massive, centralized evidence collection mechanism that effectively exploits the advancements in mobile application development platforms and the existing network infrastructure to present an easy-touse, fast and effective tool to mobile phone users. We successfully demonstrated the functionality of the client-server application suite to post user information onto the server. This paper presents a new version of the system PreNotiS, with a revised client application and with all new server capabilities. PreNotiS still puts forth the idea of having a fast, efficient client-server based application suite for mobile phones which through a highly simplified user interface will collect security/calamity based information in a structured format from first responders and relay that structured information to a central server where this data is sorted into a database in a predefined manner. This information which includes selections, images and text will be instantly available to authorities and action forces through a secure web portal thus helping them to make decisions in a timely and prompt manner. All the cell phones have self-localizing capability according to FCC E9112 mandate, thus the communicated information can be further tagged automatically by location and time information at the server making all this information available through the secure web-portal.

  5. Technology Requirements and Selection for Securely Partitioning OBSW

    NASA Astrophysics Data System (ADS)

    Mendham, Peter; Windsor, James; Eckstein, Knut

    2010-08-01

    The Securely Partitioning Spacecraft Computing Resources project is a current ESA TRP activity investigating the application of secure time and space partitioning (TSP) technologies to enable multi-use missions from a single platform. Secure TSP technologies are used in a number of application areas outside the space domain and an opportunity exists to 'spin-in' a suitable solution. The selection of a technology for use within space the European space industry relies on an understanding of the requirements for the application of secure TSP, of which this paper presents a summary. Further, the paper outlines the selection process taken by the project and highlights promising solutions for use today.

  6. Application of the JDL data fusion process model for cyber security

    NASA Astrophysics Data System (ADS)

    Giacobe, Nicklaus A.

    2010-04-01

    A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.

  7. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSImore » addressed some of these issues to create a more manageable public key infrastructure.« less

  8. Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things

    PubMed Central

    Cha, Shi-Cho; Chen, Jyun-Fu

    2017-01-01

    Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim’s devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts. PMID:29036900

  9. Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things.

    PubMed

    Cha, Shi-Cho; Yeh, Kuo-Hui; Chen, Jyun-Fu

    2017-10-14

    Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim's devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts.

  10. Gone to Fiddler’s Green: Reconnaissance and Security for the Corps

    DTIC Science & Technology

    2011-05-01

    based reconnaissance and security organization. A U.S. corps in major combat operations must contend with an enemy’s armored advance guard or...screen, guard, and cover. Andrew D. Goldin, “ Ruminations on Modular Cavalry,” Armor Magazine, (September-October 2006): 14. 22 Goldin, “ Ruminations ...on Modular Cavalry,” 15. 23 Goldin, “ Ruminations on Modular Cavalry,” 16. 10 capabilities compared to modular force brigade combat teams in support

  11. The Use of Telemedicine and Mobile Technology to Promote Population Health and Population Management for Psychiatric Disorders.

    PubMed

    Turvey, Carolyn; Fortney, John

    2017-10-16

    This article discusses recent applications in telemedicine to promote the goals of population health and population management for people suffering psychiatric disorders. The use of telemedicine to promote collaborative care, self-monitoring and chronic disease management, and population screening has demonstrated broad applicability and effectiveness. Collaborative care using videoconferencing to facilitate mental health specialty consults has demonstrated effectiveness in the treatment of depression, PTSD, and also ADHD in pediatric populations. Mobile health is currently being harnessed to monitor patient symptom trajectories with the goal of using machine learning algorithms to predict illness relapse. Patient portals serve as a bridge between patients and providers. They provide an electronically secure shared space for providers and patients to collaborate and optimize care. To date, research has supported the effectiveness of telemedicine in promoting population health. Future endeavors should focus on developing the most effective clinical protocols for using these technologies to ensure long-term use and maximum effectiveness in reducing population burden of mental health.

  12. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...

  13. 17 CFR 200.551 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Applicability. 200.551 Section 200.551 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Protection of the Environment...

  14. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...

  15. Grid-enabled mammographic auditing and training system

    NASA Astrophysics Data System (ADS)

    Yap, M. H.; Gale, A. G.

    2008-03-01

    Effective use of new technologies to support healthcare initiatives is important and current research is moving towards implementing secure grid-enabled healthcare provision. In the UK, a large-scale collaborative research project (GIMI: Generic Infrastructures for Medical Informatics), which is concerned with the development of a secure IT infrastructure to support very widespread medical research across the country, is underway. In the UK, there are some 109 breast screening centers and a growing number of individuals (circa 650) nationally performing approximately 1.5 million screening examinations per year. At the same, there is a serious, and ongoing, national workforce issue in screening which has seen a loss of consultant mammographers and a growth in specially trained technologists and other non-radiologists. Thus there is a need to offer effective and efficient mammographic training so as to maintain high levels of screening skills. Consequently, a grid based system has been proposed which has the benefit of offering very large volumes of training cases that the mammographers can access anytime and anywhere. A database, spread geographically across three university systems, of screening cases is used as a test set of known cases. The GIMI mammography training system first audits these cases to ensure that they are appropriately described and annotated. Subsequently, the cases are utilized for training in a grid-based system which has been developed. This paper briefly reviews the background to the project and then details the ongoing research. In conclusion, we discuss the contributions, limitations, and future plans of such a grid based approach.

  16. Toward Synthesis, Analysis, and Certification of Security Protocols

    NASA Technical Reports Server (NTRS)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen: multiple tries with invalid passwords caused the expected error message (too many retries). but let the user nevertheless pass. Finally, security can be compromised by silly implementation bugs or design decisions. In a commercial VPN software, all calls to the encryption routines were incidentally replaced by stubs, probably during factory testing. The product worked nicely. and the error (an open VPN) would have gone undetected, if a team member had not inspected the low-level traffic out of curiosity. Also, the use secret proprietary encryption routines can backfire, because such algorithms often exhibit weaknesses which can be exploited easily (see e.g., DVD encoding). Summarizing, there is large number of possibilities to make errors which can compromise the security of a protocol. In today s world with short time-to-market and the use of security protocols in open and hostile networks for safety-critical applications (e.g., power or air-traffic control), such slips could lead to catastrophic situations. Thus, formal methods and automatic reasoning techniques should not be used just for the formal proof of absence of an attack, but they ought to be used to provide an end-to-end tool-supported framework for security software. With such an approach all required artifacts (code, documentation, test cases) , formal analyses, and reliable certification will be generated automatically, given a single, high level specification. By a combination of program synthesis, formal protocol analysis, certification; and proof-carrying code, this goal is within practical reach, since all the important technologies for such an approach actually exist and only need to be assembled in the right way.

  17. NASA guidelines for assuring the adequacy and appropriateness of security safeguards in sensitive applications

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1984-01-01

    The Office of Management and Budget (OMB) Circular A-71, transmittal Memorandum No. 1, requires that each agency establish a management control process to assure that appropriate administrative, physical and technical safeguards are incorporated into all new computer applications. In addition to security specifications, the management control process should assure that the safeguards are adequate for the application. The security activities that should be integral to the system development process are examined. The software quality assurance process to assure that adequate and appropriate controls are incorporated into sensitive applications is also examined. Security for software packages is also discussed.

  18. THE VIEW FROM THE TRENCHES: PART 2–TECHNICAL CONSIDERATIONS FOR EPR SCREENING

    PubMed Central

    Nicolalde, Roberto J.; Gougelet, Robert M.; Rea, Michael; Williams, Benjamin B.; Dong, Ruhong; Kmiec, Maciej M.; Lesniewski, Piotr N.; Swartz, Harold M.

    2014-01-01

    There is growing awareness of the need for methodologies that can be used retrospectively to provide the biodosimetry needed to carry out screening and triage immediately after an event in which large numbers of people have potentially received clinically significant doses of ionizing radiation. The general approach to developing such methodologies has been a technology centric one, often ignoring the system integrations considerations that are key to their effective use. In this study an integrative approach for the evaluation and development of a physical biodosimetry technology was applied based on in vivo electron paramagnetic resonance (EPR) dosimetry. The EPR measurements are based on physical changes in tissues whose magnitudes are not affected by the factors that can confound biologically-based assessments. In this study the use of a pilot simulation exercise to evaluate an experimental EPR system and gather stakeholders’ feedback early on in the development process is described. The exercise involved: ten non-irradiated participants, representatives from a local fire department; Department of Homeland Security certified exercise evaluators, EPR experts, physicians; and a human factors engineer. Stakeholders were in agreement that the EPR technology in its current state of development could be deployed for the screening of mass casualties. Furthermore, stakeholders’ recommendations will be prioritized and incorporated in future developments of the EPR technique. While the results of this exercise were aimed specifically at providing feedback for the development of EPR dosimetry for screening mass casualties, the methods and lessons learned are likely to be applicable to other biodosimetric methods. PMID:20065674

  19. Information Security Controls against Cross-Site Request Forgery Attacks on Software Applications of Automated Systems

    NASA Astrophysics Data System (ADS)

    Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.

    2018-05-01

    This paper presents statistical results and their consolidation, which were received in the study into security of various web-application against cross-site request forgery attacks. Some of the results were received in the study carried out within the framework of certification for compliance with information security requirements. The paper provides the results of consolidating information about the attack and protection measures, which are currently used by the developers of web-applications. It specifies results of the study, which demonstrate various distribution types: distribution of identified vulnerabilities as per the developer type (Russian and foreign), distribution of the security measures used in web-applications, distribution of the identified vulnerabilities as per the programming languages, data on the number of security measures that are used in the studied web-applications. The results of the study show that in most cases the developers of web-applications do not pay due attention to protection against cross-site request forgery attacks. The authors give recommendations to the developers that are planning to undergo a certification process for their software applications.

  20. 75 FR 38557 - Application Nos. and Proposed Exemptions; D-11489, Morgan Stanley & Co., Incorporated; L-11609...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ...; (b) The term ``Auction Rate Security'' or ``ARS'' means a security: (1) That is either a debt... Securities (ARS). The applicant describes ARS and the arrangement by which ARS are bought and sold as follows. ARS are securities (issued as debt or preferred stock) with an interest rate or dividend that is reset...

  1. ASPECT (Airborne Spectral Photometric Environmental Collection Technology) Fact Sheet

    EPA Pesticide Factsheets

    This multi-sensor screening tool provides infrared and photographic images with geospatial, chemical, and radiological data within minutes to support emergency responses, home-land security missions, environmental surveys, and climate monitoring missions.

  2. Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications

    NASA Astrophysics Data System (ADS)

    Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra

    The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.

  3. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    PubMed Central

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-01-01

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358

  4. Determinants of Breast and Cervical Cancer Screening Uptake Among Women in Turkey.

    PubMed

    Sözmen, Kaan; Unal, Belgin; Sakarya, Sibel; Dinc, Gonul; Yardim, Nazan; Keskinkilic, Bekir; Ergör, Gül

    2016-09-01

    The aim of the study was to assess the influence of sociodemographic characteristics on breast and cervical cancer screening among women 30 years and older in Turkey. We used data from the National Chronic Diseases and Risk Factors Survey conducted by the Ministry of Health in 2011. Multivariate logistic regression analysis was used to assess the association of sociodemographic factors, lifestyle variables, and cancer screening. Overall, 22.0% of women ever had a Pap smear test for cervical cancer screening and 19.0% ever had a mammography for breast cancer screening(n = 6846). Individuals with a university degree, social security, doing moderate physical activity, and consuming 5 portions of fruit or vegetable/day were more likely to receive Pap smear test and mammography. Residing in the eastern region and living in rural area was associated with lower likelihood of receiving both types of screening. © 2016 APJPH.

  5. One piece microwave container screens for electrodeless lamps

    DOEpatents

    Turner, Brian; Ury, Michael

    1998-01-01

    A microwave powered electrodeless lamp includes an improved screen unit having mesh and solid sections with an internal reflector to reflect light into a light-transmitting chamber defined in the lamp microwave cavity by the reflector and the mesh section. A discharge envelope of a bulb is disposed in the light-transmitting chamber. Light emitted from the envelope is prevented by the reflector from entering the cavity portion bounded by the solid section of the screen. Replacing mesh material by solid metal material as part of the screen unit significantly reduces leakage of microwave energy from the lamp. The solid section has multiple compliant fingers defined therein for engaging the periphery of a flange on the waveguide unit so that a hose clamp can easily secure the screen to the assembly. Screen units of this type having different mesh section configurations can be interchanged in the lamp assembly to produce different respective illumination patterns.

  6. Using intervention mapping for the development of a targeted secure web-based outreach strategy named SafeFriend, for Chlamydia trachomatis testing in young people at risk

    PubMed Central

    2013-01-01

    Background Many young people at high risk for Chlamydia trachomatis (Ct) are not reached by current sexual health care systems, such as general practitioners and public sexual health care centres (sexually transmitted infection clinics).Ct is the most frequently diagnosed bacterial sexually transmitted infection (STI) among sexually active people and in particular young heterosexuals. Innovative screening strategies are needed to interrupt the transmission of Ct among young people and connect the hidden cases to care. Methods Intervention Mapping (IM), a systematic approach to develop theory- and evidence-based interventions, was used to develop a strategy to target Ct testing towards young people who are currently hidden to care in The Netherlands. Both clinical users (i.e. sexual health care nurses) and public users (i.e., young people at risk for Ct) were closely involved in the IM process. A needs assessment study was carried out using semi-structured interviews among users (N = 21), a literature search and by taking lessons learned from existing screening programmes. Theoretical methods and practical applications to reach high risk young people and influence testing were selected and translated into specific programme components. Results The IM approach resulted in the development of a secure and web-based outreach Ct screening strategy, named SafeFriend. It is developed to target groups of high-risk young people who are currently hidden to care. Key methods include web-based Respondent Driven Sampling, starting from young Ct positive sexual health care centre clients, to reach and motivate peers (i.e., sex partners and friends) to get tested for Ct. Testing and the motivation of peers were proposed as the desired behavioural outcomes and the Precaution Adoption Process Model was chosen as theoretical framework. End users, i.e., young people and sexual health care nurses were interviewed and included in the development process to increase the success of implementation. Conclusions IM proved useful to develop an intervention for targeted Ct testing among young people. We believe this to be the first web-based outreach screening strategy which combines chain referral sampling with the delivery of targeted Ct testing to high risk young people within their sexual and social networks. PMID:24148656

  7. Using intervention mapping for the development of a targeted secure web-based outreach strategy named SafeFriend, for Chlamydia trachomatis testing in young people at risk.

    PubMed

    Theunissen, Kevin A T M; Hoebe, Christian J P A; Crutzen, Rik; Kara-Zaïtri, Chakib; de Vries, Nanne K; van Bergen, Jan E A M; van der Sande, Marianne A B; Dukers-Muijrers, Nicole H T M

    2013-10-22

    Many young people at high risk for Chlamydia trachomatis (Ct) are not reached by current sexual health care systems, such as general practitioners and public sexual health care centres (sexually transmitted infection clinics).Ct is the most frequently diagnosed bacterial sexually transmitted infection (STI) among sexually active people and in particular young heterosexuals. Innovative screening strategies are needed to interrupt the transmission of Ct among young people and connect the hidden cases to care. Intervention Mapping (IM), a systematic approach to develop theory- and evidence-based interventions, was used to develop a strategy to target Ct testing towards young people who are currently hidden to care in The Netherlands. Both clinical users (i.e. sexual health care nurses) and public users (i.e., young people at risk for Ct) were closely involved in the IM process. A needs assessment study was carried out using semi-structured interviews among users (N = 21), a literature search and by taking lessons learned from existing screening programmes. Theoretical methods and practical applications to reach high risk young people and influence testing were selected and translated into specific programme components. The IM approach resulted in the development of a secure and web-based outreach Ct screening strategy, named SafeFriend. It is developed to target groups of high-risk young people who are currently hidden to care. Key methods include web-based Respondent Driven Sampling, starting from young Ct positive sexual health care centre clients, to reach and motivate peers (i.e., sex partners and friends) to get tested for Ct. Testing and the motivation of peers were proposed as the desired behavioural outcomes and the Precaution Adoption Process Model was chosen as theoretical framework. End users, i.e., young people and sexual health care nurses were interviewed and included in the development process to increase the success of implementation. IM proved useful to develop an intervention for targeted Ct testing among young people. We believe this to be the first web-based outreach screening strategy which combines chain referral sampling with the delivery of targeted Ct testing to high risk young people within their sexual and social networks.

  8. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

    PubMed

    You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek

    2018-06-08

    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).

  9. A Test-Bed of Secure Mobile Cloud Computing for Military Applications

    DTIC Science & Technology

    2016-09-13

    searching databases. This kind of applications is a typical example of mobile cloud computing (MCC). MCC has lots of applications in the military...Release; Distribution Unlimited UU UU UU UU 13-09-2016 1-Aug-2014 31-Jul-2016 Final Report: A Test-bed of Secure Mobile Cloud Computing for Military...Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-2211 Test-bed, Mobile Cloud Computing , Security, Military Applications REPORT

  10. Security model for VM in cloud

    NASA Astrophysics Data System (ADS)

    Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.

    2013-03-01

    Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.

  11. Routing architecture and security for airborne networks

    NASA Astrophysics Data System (ADS)

    Deng, Hongmei; Xie, Peng; Li, Jason; Xu, Roger; Levy, Renato

    2009-05-01

    Airborne networks are envisioned to provide interconnectivity for terrestial and space networks by interconnecting highly mobile airborne platforms. A number of military applications are expected to be used by the operator, and all these applications require proper routing security support to establish correct route between communicating platforms in a timely manner. As airborne networks somewhat different from traditional wired and wireless networks (e.g., Internet, LAN, WLAN, MANET, etc), security aspects valid in these networks are not fully applicable to airborne networks. Designing an efficient security scheme to protect airborne networks is confronted with new requirements. In this paper, we first identify a candidate routing architecture, which works as an underlying structure for our proposed security scheme. And then we investigate the vulnerabilities and attack models against routing protocols in airborne networks. Based on these studies, we propose an integrated security solution to address routing security issues in airborne networks.

  12. 32 CFR 154.2 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... , Director of Central Intelligence Directive (DCID) 1/14 2 and regulations of the National Security Agency. 1... Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION General Provisions § 154.2 Applicability. (a) This part implements the...

  13. 76 FR 60100 - The Singapore Fund, Inc.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29817; 812-13944] The Singapore Fund, Inc.; Notice of Application September 22, 2011. AGENCY: Securities and Exchange Commission.... ADDRESSES: Secretary, Securities and Exchange Commission, 100 F Street, NE., Washington, DC 20549-1090...

  14. 17 CFR 200.111 - Prohibitions; application; definitions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Prohibitions; application; definitions. 200.111 Section 200.111 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...

  15. 17 CFR 200.111 - Prohibitions; application; definitions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Prohibitions; application; definitions. 200.111 Section 200.111 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...

  16. 17 CFR 200.111 - Prohibitions; application; definitions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Prohibitions; application; definitions. 200.111 Section 200.111 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...

  17. 17 CFR 200.111 - Prohibitions; application; definitions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Prohibitions; application; definitions. 200.111 Section 200.111 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...

  18. Plant photonics: application of optical coherence tomography to monitor defects and rots in onion

    NASA Astrophysics Data System (ADS)

    Meglinski, I. V.; Buranachai, C.; Terry, L. A.

    2010-04-01

    The incidence of physiological and/or pathological defects in many fresh produce types is still unacceptably high and accounts for a large proportion of waste. With increasing interest in food security their remains strong demand in developing reliable and cost effective technologies for non-destructive screening of internal defects and rots, these being deemed unacceptable by consumers. It is well recognized that the internal defects and structure of turbid scattering media can be effectively visualized by using optical coherence tomography (OCT). In the present study, the high spatial resolution and advantages of OCT have been demonstrated for imaging the skins and outer laminae (concentric tissue layers) of intact whole onion bulbs with a view to non-invasively visualizing potential incidence/severity of internal defects.

  19. Contraband detection using acoustic technology

    NASA Astrophysics Data System (ADS)

    George, Robert D.; Gauthier, Ronald D.; Denslow, Kayte D.; Cinson, Anthony M.; Diaz, Aaron A.; Griffin, Molly

    2008-03-01

    Maritime security personnel have a need for advanced technologies to address issues such as identification, confirmation or classification of substances and materials in sealed containers, both non-invasively and nondestructively in field and first response operations. Such substances include items such as hazardous/flammable liquids, drugs, contraband, and precursor chemicals used in the fabrication of illicit materials. Our initial efforts focused specifically on a commercial portable acoustic detector technology that was evaluated under operational conditions in a maritime environment. Technical/operational limitations were identified and enhancements were incorporated that would address these limitations. In this paper, application-specific improvements and performance testing/evaluation results will be described. Such enhancements will provide personnel/users of the detector a significantly more reliable method of screening materials for contraband items that might be hidden in cargo containers.

  20. Potential uses of a wireless network in physical security systems.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Witzke, Edward L.

    2010-07-01

    Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing physical security is first given. Next, numerous applications of a wireless network are brought forth. The technical issues that arise when using a wireless network to support these applications are then discussed. Finally, a summary is presented.

  1. Develop 3G Application with The J2ME SATSA API

    NASA Astrophysics Data System (ADS)

    JunWu, Xu; JunLing, Liang

    This paper describes research in the use of the Security and Trust Services API for J2ME (SATSA) to develop mobile applications. for 3G networks. SATSA defines a set of APIs that allows J2ME applications to communicate with and access functionality, secure storage and cryptographic operations provided by security elements such as smart cards and Wireless Identification Modules (WIM). A Java Card application could also work as an authentication module in a J2ME-based e-bank application. The e-bank application would allow its users to access their bank accounts using their cell phones.

  2. DoD Identity Matching Engine for Security and Analysis (IMESA) Access to Criminal Justice Information (CJI) and Terrorist Screening Databases (TSDB)

    DTIC Science & Technology

    2016-05-04

    IMESA) Access to Criminal Justice Information (CJI) and Terrorist Screening Databases (TSDB) References: See Enclosure 1 1. PURPOSE. In...CJI database mirror image files. (3) Memorandums of understanding with the FBI CJIS as the data broker for DoD organizations that need access ...not for access determinations. (3) Legal restrictions established by the Sex Offender Registration and Notification Act (SORNA) jurisdictions on

  3. Development of an Automated Modality-Independent Elastographic Image Analysis System for Tumor Screening

    DTIC Science & Technology

    2006-02-01

    further develop modality-independent elastography as a system that is able to reproducibly detect regions of increased stiffness within the breast based...tested on a tissue-like polymer phantom. elastography , breast cancer screening, image processing 16. SECURITY CLASSIFICATION OF: 17. LIMITATION...is a map of the breast (or other tissue of interest) that reflects material inhomogeneity, such as in the case of a tumor mass that disrupts the

  4. Test Operations Procedure (TOP) 03-2-827 Test Procedures for Video Target Scoring Using Calibration Lights

    DTIC Science & Technology

    2016-04-04

    Final 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Test Operations Procedure (TOP) 03-2-827 Test Procedures for Video Target Scoring Using...ABSTRACT This Test Operations Procedure (TOP) describes typical equipment and procedures to setup and operate a Video Target Scoring System (VTSS) to...lights. 15. SUBJECT TERMS Video Target Scoring System, VTSS, witness screens, camera, target screen, light pole 16. SECURITY

  5. LISA, the next generation: from a web-based application to a fat client.

    PubMed

    Pierlet, Noëlla; Aerts, Werner; Vanautgaerden, Mark; Van den Bosch, Bart; De Deurwaerder, André; Schils, Erik; Noppe, Thomas

    2008-01-01

    The LISA application, developed by the University Hospitals Leuven, permits referring physicians to consult the electronic medical records of their patients over the internet in a highly secure way. We decided to completely change the way we secured the application, discard the existing web application and build a completely new application, based on the in-house developed hospital information system, used in the University Hospitals Leuven. The result is a fat Java client, running on a Windows Terminal Server, secured by a commercial SSL-VPN solution.

  6. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or affiliated...). [33 FR 18995, Dec. 20, 1968] Editorial Note: For Federal Register citations affecting Form X-15AA-1...

  7. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or affiliated...). [33 FR 18995, Dec. 20, 1968] Editorial Note: For Federal Register citations affecting Form X-15AA-1...

  8. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or affiliated...). [33 FR 18995, Dec. 20, 1968] Editorial Note: For Federal Register citations affecting Form X-15AA-1...

  9. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or affiliated...). [33 FR 18995, Dec. 20, 1968] Editorial Note: For Federal Register citations affecting Form X-15AA-1...

  10. 17 CFR 249.801 - Form X-15AA-1, for application for registration as a national securities association or...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-15AA-1, for application....801 Form X-15AA-1, for application for registration as a national securities association or affiliated...). [33 FR 18995, Dec. 20, 1968] Editorial Note: For Federal Register citations affecting Form X-15AA-1...

  11. The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Turkanović, Muhamed; Hölbl, Marko

    2014-10-01

    Recently quantum computation and cryptography principles are exploited in the design of security systems for wireless sensor networks (WSNs), which are consequently named as quantum WSN. Quantum cryptography is presumably secure against any eavesdropper and thus labeled as providing unconditional security. This paper tries to analyze the aspect of the applicative use of quantum principles in WSN. The outcome of the analysis elaborates a summary about the inadequacy of applicative use of quantum cryptography in WSN and presents an overview of all possible applicative challenges and problems while designing quantum-based security systems for WSN. Since WSNs are highly complex frameworks, with many restrictions and constraints, every security system has to be fully compatible and worthwhile. The aim of the paper was to contribute a verdict about this topic, backed up by equitable facts.

  12. 20 CFR 416.325 - When an application is considered filed.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false When an application is considered filed. 416.325 Section 416.325 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.325 When an application is...

  13. 20 CFR 416.325 - When an application is considered filed.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false When an application is considered filed. 416.325 Section 416.325 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.325 When an application is...

  14. 20 CFR 416.325 - When an application is considered filed.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false When an application is considered filed. 416.325 Section 416.325 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.325 When an application is...

  15. 20 CFR 416.325 - When an application is considered filed.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When an application is considered filed. 416.325 Section 416.325 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.325 When an application is...

  16. 20 CFR 416.325 - When an application is considered filed.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false When an application is considered filed. 416.325 Section 416.325 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.325 When an application is...

  17. 20 CFR 416.315 - Who may sign an application.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Who may sign an application. 416.315 Section 416.315 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Applications § 416.315 Who may sign an application. We will...

  18. 17 CFR 41.43 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... such security future is a stock, the product of the daily settlement price of such security future as shown by any regularly published reporting or quotation service, and the applicable number of shares per... regulations applicable to financial relations between a security futures intermediary and a customer with...

  19. 49 CFR 1540.201 - Applicability and terms used in this subpart.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Applicability and terms used in this subpart. 1540.201 Section 1540.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION...

  20. 78 FR 26407 - Notice of an Application of W2007 Grace Acquisition I, Inc. Under Section 12(h) of the Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-06

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69477; File No. 81-939] Notice of an Application of W2007 Grace Acquisition I, Inc. Under Section 12(h) of the Securities Exchange Act of 1934 April 30, 2013. The Securities and Exchange Commission gives notice that W2007 Grace Acquisition I, Inc...

  1. Investigating existing medical CT segmentation techniques within automated baggage and package inspection

    NASA Astrophysics Data System (ADS)

    Megherbi, Najla; Breckon, Toby P.; Flitton, Greg T.

    2013-10-01

    3D Computed Tomography (CT) image segmentation is already well established tool in medical research and in routine daily clinical practice. However, such techniques have not been used in the context of 3D CT image segmentation for baggage and package security screening using CT imagery. CT systems are increasingly used in airports for security baggage examination. We propose in this contribution an investigation of the current 3D CT medical image segmentation methods for use in this new domain. Experimental results of 3D segmentation on real CT baggage security imagery using a range of techniques are presented and discussed.

  2. Understanding Motherhood and Mood - Baby Blues and Beyond

    MedlinePlus

    ... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... requires immediate help. Talk to a Health Care Professional Screening for depression during and after pregnancy should ...

  3. Aviation Security: A Case for Risk-Based Passenger Screening

    DTIC Science & Technology

    2011-12-01

    5 3. Threat Uncertainty ..............................................................................7 4. Increased Risk and Cost ...Airport Checkpoints .....................................131 ix 2. Technology Integration and Implementation Costs .....................131 3...Background Investigations and Sustaining Program Costs ........133 D. AREAS FOR FUTURE RESEARCH

  4. Legal issues of the electronic dental record: security and confidentiality.

    PubMed

    Szekely, D G; Milam, S; Khademi, J A

    1996-01-01

    Computer-based, electronic dental record keeping involves complex issues of patient privacy and the dental practitioner's ethical duty of confidentiality. Federal and state law is responding to the new legal issues presented by computer technology. Authenticating the electronic record in terms of ensuring its reliability and accuracy is essential in order to protect its admissibility as evidence in legal actions. Security systems must be carefully planned to limit access and provide for back-up and storage of dental records. Carefully planned security systems protect the patient from disclosure without the patient's consent and also protect the practitioner from the liability that would arise from such disclosure. Human errors account for the majority of data security problems. Personnel security is assured through pre-employment screening, employment contracts, policies, and staff education. Contracts for health information systems should include provisions for indemnification and ensure the confidentiality of the system by the vendor.

  5. 75 FR 9919 - Extension of Agency Information Collection Activity Under OMB Review: Air Cargo Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-04

    ...This notice announces that the Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), OMB control number 1652-0040, abstracted below to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of the following collection of information on November 16, 2009, 74 FR 58969. TSA has not received any comments. The collections of information that make up this ICR involve five broad categories affecting airports, passenger aircraft operators, foreign air carriers, indirect air carriers operating under a security program, and all-cargo carriers. These five categories are: security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), cargo screening reporting, and evidence of compliance recordkeeping.

  6. 76 FR 4362 - Extension of Agency Information Collection Activity Under OMB Review: Air Cargo Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-25

    ...This notice announces that the Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), OMB control number 1652-0040, abstracted below, to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. TSA published a Federal Register notice, with a 60-day comment period soliciting comments, of this collection of information on October 14, 2010, 75 FR 63192. TSA has not received any comments. The collections of information that make up this ICR involve five broad categories affecting airports, passenger aircraft operators, foreign air carriers, indirect air carriers operating under a security program, and all-cargo carriers. These five categories are: Security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), cargo screening reporting, and evidence of compliance recordkeeping.

  7. Securing electronic health records with novel mobile encryption schemes.

    PubMed

    Weerasinghe, Dasun; Elmufti, Kalid; Rajarajan, Muttukrishnan; Rakocevic, Veselin

    2007-01-01

    Mobile devices have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in healthcare applications the privacy and security of the transmitted information must be preserved. Therefore applications require a concrete security framework based on long-term security keys, such as the security key that can be found in a mobile Subscriber Identity Module (SIM). The wireless nature of communication links in mobile networks presents a major challenge in this respect. This paper presents a novel protocol that will send the information securely while including the access privileges to the authorized recipient.

  8. Big data, little security: Addressing security issues in your platform

    NASA Astrophysics Data System (ADS)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  9. 20 CFR 422.525 - Where applications and other forms are available.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... available. 422.525 Section 422.525 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... applications and related forms prescribed for use in the programs administered by the Social Security... described therein. All prescribed forms can be obtained upon request from any social security district...

  10. 20 CFR 422.525 - Where applications and other forms are available.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... available. 422.525 Section 422.525 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... applications and related forms prescribed for use in the programs administered by the Social Security... described therein. All prescribed forms can be obtained upon request from any social security district...

  11. 20 CFR 422.525 - Where applications and other forms are available.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... available. 422.525 Section 422.525 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... applications and related forms prescribed for use in the programs administered by the Social Security... described therein. All prescribed forms can be obtained upon request from any social security district...

  12. 20 CFR 422.525 - Where applications and other forms are available.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... available. 422.525 Section 422.525 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... applications and related forms prescribed for use in the programs administered by the Social Security... described therein. All prescribed forms can be obtained upon request from any social security district...

  13. 20 CFR 422.525 - Where applications and other forms are available.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... available. 422.525 Section 422.525 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND... applications and related forms prescribed for use in the programs administered by the Social Security... described therein. All prescribed forms can be obtained upon request from any social security district...

  14. 75 FR 66429 - Proposed Collection; Comment Request for Form 8946

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-28

    ... PTIN Supplemental Application For Foreign Persons Without a Social Security Number. DATES: Written... Supplemental Application For Foreign Persons Without a Social Security Number. OMB Number: 1545-2189. Form... have a social security number, which will be used to help establish their identity. However, paid...

  15. 76 FR 14099 - Withdrawal of the Notice of Proposed Exemption Involving Owens & Minor, Inc. (the Applicant...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-15

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration [Application Number D-11638.... Ivan L. Strasfeld, Director, Office of Exemption Determinations, Employee Benefits Security... Employee Retirement Income Security Act of 1974, as amended, and from certain taxes imposed by the Internal...

  16. 6 CFR 21.3 - Application.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Application. 21.3 Section 21.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE FROM THE DEPARTMENT OF...

  17. 6 CFR 21.3 - Application.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Application. 21.3 Section 21.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE FROM THE DEPARTMENT OF...

  18. 6 CFR 21.3 - Application.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Application. 21.3 Section 21.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE FROM THE DEPARTMENT OF...

  19. 6 CFR 21.3 - Application.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Application. 21.3 Section 21.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE FROM THE DEPARTMENT OF...

  20. 6 CFR 21.3 - Application.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Application. 21.3 Section 21.3 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE FROM THE DEPARTMENT OF...

  1. Multiple Object Based RFID System Using Security Level

    NASA Astrophysics Data System (ADS)

    Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha

    2007-12-01

    RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.

  2. 77 FR 11145 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Air Cargo...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), OMB control number 1652-0040, abstracted below that we will submit to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. This ICR involves five broad categories of affected populations: airports, passenger aircraft operators, foreign air carriers, indirect air carriers operating under a security program, and all-cargo carriers. The collections of information that make up this ICR are security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), Air Cargo Data Management System (ACDMS), Cargo Reporting Tool for cargo screening reporting, and evidence of compliance recordkeeping. TSA seeks continued OMB approval in order to secure passenger aircraft carrying cargo as authorized in the Aviation and Transportation Security Act.

  3. 77 FR 14839 - Harris & Harris Group, Inc.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-13

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29976; 812-13313] Harris & Harris Group, Inc.; Notice of Application March 7, 2012. AGENCY: Securities and Exchange Commission... from section 23(c) of the Act. SUMMARY OF THE APPLICATION: Harris & Harris Group, Inc. (``Applicant...

  4. A sensor monitoring system for telemedicine, safety and security applications

    NASA Astrophysics Data System (ADS)

    Vlissidis, Nikolaos; Leonidas, Filippos; Giovanis, Christos; Marinos, Dimitrios; Aidinis, Konstantinos; Vassilopoulos, Christos; Pagiatakis, Gerasimos; Schmitt, Nikolaus; Pistner, Thomas; Klaue, Jirka

    2017-02-01

    A sensor system capable of medical, safety and security monitoring in avionic and other environments (e.g. homes) is examined. For application inside an aircraft cabin, the system relies on an optical cellular network that connects each seat to a server and uses a set of database applications to process data related to passengers' health, safety and security status. Health monitoring typically encompasses electrocardiogram, pulse oximetry and blood pressure, body temperature and respiration rate while safety and security monitoring is related to the standard flight attendance duties, such as cabin preparation for take-off, landing, flight in regions of turbulence, etc. In contrast to previous related works, this article focuses on the system's modules (medical and safety sensors and associated hardware), the database applications used for the overall control of the monitoring function and the potential use of the system for security applications. Further tests involving medical, safety and security sensing performed in an real A340 mock-up set-up are also described and reference is made to the possible use of the sensing system in alternative environments and applications, such as health monitoring within other means of transport (e.g. trains or small passenger sea vessels) as well as for remotely located home users, over a wired Ethernet network or the Internet.

  5. 75 FR 66428 - Proposed Collection; Comment Request for Form 8945

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-28

    ... PTIN Supplemental Application For U.S. Citizens Without A Social Security Number Due To Conscientious... Supplemental Application For U.S. Citizens Without A Social Security Number Due To Conscientious Reasons. OMB... Identification Number (PTIN) will have a social security number, which will be used to help establish their...

  6. 8 CFR 1003.47 - Identity, law enforcement, or security investigations or examinations relating to applications...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Identity, law enforcement, or security investigations or examinations relating to applications for immigration relief, protection, or restriction on... Procedure § 1003.47 Identity, law enforcement, or security investigations or examinations relating to...

  7. 75 FR 34796 - Order Granting Application for Extension of a Temporary Conditional Exemption Pursuant to Section...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-18

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62280] Order Granting Application for Extension... International Securities Exchange, LLC Relating to the Ownership Interest of International Securities Exchange Holdings, Inc. in an Electronic Communications Network June 11, 2010. I. Introduction On December 22, 2008...

  8. 78 FR 17702 - Agency Information Collection Activities: Application for Action on an Approved Application or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-22

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services [OMB Control Number 1615... Department of Homeland Security (DHS), U.S. Citizenship and Immigration Services (USCIS) invites the general....S. Citizenship and Immigration Services, Department of Homeland Security. [FR Doc. 2013-06582 Filed...

  9. Architecture of security management unit for safe hosting of multiple agents

    NASA Astrophysics Data System (ADS)

    Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques

    1999-04-01

    In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.

  10. 20 CFR 416.355 - Withdrawal of an application.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Withdrawal of an application. 416.355 Section 416.355 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Filing of Applications Withdrawal of Application § 416.355 Withdrawal of an...

  11. Pacific Operational Science and Technology Conference

    DTIC Science & Technology

    2008-07-17

    AOR • Think long term-ten to fifty years • Technology assessment • Systems thinking and interaction • Capitalize on technology futures – Renewable ... Renewable energy • Improved mobility • Transportation security • National competitiveness 24 Managed by UT-Battelle for the Department of Energy...Started Cost Schedule Technical TTA CB-034 Tools and Protocols for Agro Screening Ag Screening Tools 500 4,138 3,500 2,500 2,525 3,163 N CB-011 CB-042 Ag

  12. Flight Plight: An Examination of Contemporary Humanitarian Immigration from Honduras, Cuba, and Syria to the United States with Considerations for National Security

    DTIC Science & Technology

    2016-03-01

    or position of the Department of Defense or the U.S. Government . IRB Protocol number ____N/A____. 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved...used by those who enter the country with minimal or delayed government screening and those who enter the country with no government screening...federal government that is designed to assist international populations with the greatest migratory need: forced migrants, refugees and asylum

  13. Do You Ignore Information Security in Your Journal Website?

    PubMed

    Dadkhah, Mehdi; Borchardt, Glenn; Lagzian, Mohammad

    2017-08-01

    Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites. As these websites are resources for knowledge, information security is primary for maintaining their integrity. In this opinion piece, we point out vulnerabilities in certain websites and introduce the potential for future threats. We intend to present how some journals are vulnerable and what will happen if a journal can be infected by attackers. This opinion is not a technical manual in information security, it is a short inspection that we did to improve the security of academic journals.

  14. 78 FR 4856 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-23

    ... screening passengers and property in calendar year 2000. DATES: Send your comments by February 22, 2013. A... those who are to respond, including using appropriate automated, electronic, mechanical, or other...

  15. 78 FR 61343 - Meeting of the National Commission on the Structure of the Air Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-03

    ... to the full Commission. Meeting Accessibility: The building is fully handicap accessible. Visitors must show a picture I.D. and complete a security screening. Public parking is available within walking...

  16. Radiation and Shipping Port Security | RadTown USA | US ...

    EPA Pesticide Factsheets

    2017-08-07

    Cargo comes into the U.S. from all over the world. Ports can ensure safety by: Screening cargo for radiation before it gets here. Safely handling any radioactive material that needs to pass through a port.

  17. Asymmetric optical image encryption using Kolmogorov phase screens and equal modulus decomposition

    NASA Astrophysics Data System (ADS)

    Kumar, Ravi; Bhaduri, Basanta; Quan, Chenggen

    2017-11-01

    An asymmetric technique for optical image encryption is proposed using Kolmogorov phase screens (KPSs) and equal modulus decomposition (EMD). The KPSs are generated using the power spectral density of Kolmogorov turbulence. The input image is first randomized and then Fresnel propagated with distance d. Further, the output in the Fresnel domain is modulated with a random phase mask, and the gyrator transform (GT) of the modulated image is obtained with an angle α. The EMD is operated on the GT spectrum to get the complex images, Z1 and Z2. Among these, Z2 is reserved as a private key for decryption and Z1 is propagated through a medium consisting of four KPSs, located at specified distances, to get the final encrypted image. The proposed technique provides a large set of security keys and is robust against various potential attacks. Numerical simulation results validate the effectiveness and security of the proposed technique.

  18. Extent and characteristics of woman batterers among federal inmates.

    PubMed

    White, Robert J; Gondolf, Edward W; Robertson, Donald U; Goodwin, Beverly J; Caraveo, L Eduardo

    2002-08-01

    Efforts to identify men who batter women in clinical settings have increased in recent years, but batterer research in United States federal prisons is lacking; low security federal prisons are logical places to consider batterer screening and treatment given the number of men, the domestic violence "risk markers" associated with these men and the likelihood they will be released and return to female partners. This study examined intake assessment data for 115 low security federal inmates. The inmates evidenced high levels of risk markers for woman battering, one in three (33%) acknowledged recent physical violence against women partners, 1 in 10 (13%) admitted severe violence, and the self-identified batterers showed more substance use and personality problems than other inmates. The findings suggest that batterer screening and treatment may be needed in federal prisons and that more research is warranted with a burgeoning male population that ultimately returns to society.

  19. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  20. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

Top