NASA Astrophysics Data System (ADS)
Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.
2018-05-01
This paper presents statistical results and their consolidation, which were received in the study into security of various web-application against cross-site request forgery attacks. Some of the results were received in the study carried out within the framework of certification for compliance with information security requirements. The paper provides the results of consolidating information about the attack and protection measures, which are currently used by the developers of web-applications. It specifies results of the study, which demonstrate various distribution types: distribution of identified vulnerabilities as per the developer type (Russian and foreign), distribution of the security measures used in web-applications, distribution of the identified vulnerabilities as per the programming languages, data on the number of security measures that are used in the studied web-applications. The results of the study show that in most cases the developers of web-applications do not pay due attention to protection against cross-site request forgery attacks. The authors give recommendations to the developers that are planning to undergo a certification process for their software applications.
Efficient Web Vulnerability Detection Tool for Sleeping Giant-Cross Site Request Forgery
NASA Astrophysics Data System (ADS)
Parimala, G.; Sangeetha, M.; AndalPriyadharsini, R.
2018-04-01
Now day’s web applications are very high in the rate of usage due to their user friendly environment and getting any information via internet but these web applications are affected by lot of threats. CSRF attack is one of the serious threats to web applications which is based on the vulnerabilities present in the normal web request and response of HTTP protocol. It is hard to detect but hence still it is present in most of the existing web applications. In CSRF attack, without user knowledge the unwanted actions on a reliable websites are forced to happen. So it is placed in OWASP’s top 10 Web Application attacks list. My proposed work is to do a real time scan of CSRF vulnerability attack in given URL of the web applications as well as local host address for any organization using python language. Client side detection of CSRF is depended on Form count which is presented in that given web site.
Ultrabroadband photonic internet: safety aspects
NASA Astrophysics Data System (ADS)
Kalicki, Arkadiusz; Romaniuk, Ryszard
2008-11-01
Web applications became most popular medium in the Internet. Popularity, easiness of web application frameworks together with careless development results in high number of vulnerabilities and attacks. There are several types of attacks possible because of improper input validation. SQL injection is ability to execute arbitrary SQL queries in a database through an existing application. Cross-site scripting is the vulnerability which allows malicious web users to inject code into the web pages viewed by other users. Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into loading a page that contains malicious request. Web spam in blogs. There are several techniques to mitigate attacks. Most important are web application strong design, correct input validation, defined data types for each field and parameterized statements in SQL queries. Server hardening with firewall, modern security policies systems and safe web framework interpreter configuration are essential. It is advised to keep proper security level on client side, keep updated software and install personal web firewalls or IDS/IPS systems. Good habits are logging out from services just after finishing work and using even separate web browser for most important sites, like e-banking.
Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement
NASA Astrophysics Data System (ADS)
Wang, Tian-Yin; Wei, Zong-Li
2016-02-01
In a recent paper, Yang et al. (Quant. Inf. Process. 13(9), 2007-2016, 2014) analyzed the security of one-time proxy signature scheme Wang and Wei (Quant. Inf. Process. 11(2), 455-463, 2012) and pointed out that it cannot satisfy the security requirements of unforgeability and undeniability because an eavesdropper Eve can forge a valid proxy signature on a message chosen by herself. However, we find that the so-called proxy message-signature pair forged by Eve is issued by the proxy signer in fact, and anybody can obtain it as a requester, which means that the forgery attack is not considered as a successful attack. Therefore, the conclusion that this scheme cannot satisfy the security requirements of proxy signature against forging and denying is not appropriate in this sense. Finally, we study the reason for the misunderstanding and clarify the security requirements for proxy signatures.
Savari, Maryam; Abdul Wahab, Ainuddin Wahid; Anuar, Nor Badrul
2016-09-01
Audio forgery is any act of tampering, illegal copy and fake quality in the audio in a criminal way. In the last decade, there has been increasing attention to the audio forgery detection due to a significant increase in the number of forge in different type of audio. There are a number of methods for forgery detection, which electric network frequency (ENF) is one of the powerful methods in this area for forgery detection in terms of accuracy. In spite of suitable accuracy of ENF in a majority of plug-in powered devices, the weak accuracy of ENF in audio forgery detection for battery-powered devices, especially in laptop and mobile phone, can be consider as one of the main obstacles of the ENF. To solve the ENF problem in terms of accuracy in battery-powered devices, a combination method of ENF and phase feature is proposed. From experiment conducted, ENF alone give 50% and 60% accuracy for forgery detection in mobile phone and laptop respectively, while the proposed method shows 88% and 92% accuracy respectively, for forgery detection in battery-powered devices. The results lead to higher accuracy for forgery detection with the combination of ENF and phase feature. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Detection of Copy-Rotate-Move Forgery Using Zernike Moments
NASA Astrophysics Data System (ADS)
Ryu, Seung-Jin; Lee, Min-Jeong; Lee, Heung-Kyu
As forgeries have become popular, the importance of forgery detection is much increased. Copy-move forgery, one of the most commonly used methods, copies a part of the image and pastes it into another part of the the image. In this paper, we propose a detection method of copy-move forgery that localizes duplicated regions using Zernike moments. Since the magnitude of Zernike moments is algebraically invariant against rotation, the proposed method can detect a forged region even though it is rotated. Our scheme is also resilient to the intentional distortions such as additive white Gaussian noise, JPEG compression, and blurring. Experimental results demonstrate that the proposed scheme is appropriate to identify the forged region by copy-rotate-move forgery.
Prescription opioid forgery: reporting to law enforcement and protection of medical information.
Singh, Naileshni; Fishman, Scott; Rich, Ben; Orlowski, Anna
2013-06-01
To review confidentiality requirements of prescribers who become aware of a forged prescription. A case is reviewed in which a prescriber believes that a prescription has been forged. The literature and law related to prescription forgery and confidentiality are reviewed. Although prescription forgery is a crime, the prescriber's responsibility for reporting to law enforcement is not clear under current state and federal law. Federal laws and regulations, including the Health Insurance Portability and Accountability Act (HIPAA), do not permit prescribers in all circumstances to disclose prescription fraud to law enforcement. Under common circumstances, HIPAA may prohibit prescribers from reporting prescription forgery to law enforcement. However, collaborating with a dispensing pharmacist may offer a lawful pathway to reporting prescription forgery. State legislature may consider laws that clarify the reporting responsibilities of prescribers in cases of prescription forgery. Wiley Periodicals, Inc.
Passive detection of copy-move forgery in digital images: state-of-the-art.
Al-Qershi, Osamah M; Khoo, Bee Ee
2013-09-10
Currently, digital images and videos have high importance because they have become the main carriers of information. However, the relative ease of tampering with images and videos makes their authenticity untrustful. Digital image forensics addresses the problem of the authentication of images or their origins. One main branch of image forensics is passive image forgery detection. Images could be forged using different techniques, and the most common forgery is the copy-move, in which a region of an image is duplicated and placed elsewhere in the same image. Active techniques, such as watermarking, have been proposed to solve the image authenticity problem, but those techniques have limitations because they require human intervention or specially equipped cameras. To overcome these limitations, several passive authentication methods have been proposed. In contrast to active methods, passive methods do not require any previous information about the image, and they take advantage of specific detectable changes that forgeries can bring into the image. In this paper, we describe the current state-of-the-art of passive copy-move forgery detection methods. The key current issues in developing a robust copy-move forgery detector are then identified, and the trends of tackling those issues are addressed. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Le Chanu, Patrick
1998-05-01
There is a law in my country, France, which is supposed to deal with forgeries in several fields including the arts. It is called the 'Erreur sur la substance' Error on substance. It means that after an object was sold, if the former owner or buyer can prove that he or she was not aware of the substance of the object, meaning in this particular case its authenticity or lack of authenticity, the sale can be cancelled. We should keep in mind this theme of what makes up the substance of a work of art when we study forgeries. The making of forgeries is probably as old, if not as art itself, at least as old as the art market. Making forgeries is a response to the demand of the market, in close connection with art historical activity. The critics and the art historians inside and outside museums contribute to the fame of artists, which stimulates the art market, the rise inspires the demand for more works, thus the making of copies and of forgeries. Before presenting a few studies made in our laboratory, I would like to make a short survey of the examination and analysis methods we use that particularly help us in the detection of forgeries of old masters paintings. The Research Laboratory of French Museums (LRMF) generally makes a distinction between two main categories of working methods: The first one, Examination, concerns mostly photographic and imaging techniques. The second one, Analysis, is a structural study for which the goal is the identification of the constitutive materials of a work of art and how they were used.
ERIC Educational Resources Information Center
Winks, Robin W.
1995-01-01
Discusses the historical validity of "The Hitler Diaries" and other historical forgeries. Maintains that forgeries and other hoaxes will continue to be part of human history. Questions why many people seem to need "historical revelations." (CFR)
Offline Signature Verification Using the Discrete Radon Transform and a Hidden Markov Model
NASA Astrophysics Data System (ADS)
Coetzer, J.; Herbst, B. M.; du Preez, J. A.
2004-12-01
We developed a system that automatically authenticates offline handwritten signatures using the discrete Radon transform (DRT) and a hidden Markov model (HMM). Given the robustness of our algorithm and the fact that only global features are considered, satisfactory results are obtained. Using a database of 924 signatures from 22 writers, our system achieves an equal error rate (EER) of 18% when only high-quality forgeries (skilled forgeries) are considered and an EER of 4.5% in the case of only casual forgeries. These signatures were originally captured offline. Using another database of 4800 signatures from 51 writers, our system achieves an EER of 12.2% when only skilled forgeries are considered. These signatures were originally captured online and then digitally converted into static signature images. These results compare well with the results of other algorithms that consider only global features.
Detection of inter-frame forgeries in digital videos.
K, Sitara; Mehtre, B M
2018-05-26
Videos are acceptable as evidence in the court of law, provided its authenticity and integrity are scientifically validated. Videos recorded by surveillance systems are susceptible to malicious alterations of visual content by perpetrators locally or remotely. Such malicious alterations of video contents (called video forgeries) are categorized into inter-frame and intra-frame forgeries. In this paper, we propose inter-frame forgery detection techniques using tamper traces from spatio-temporal and compressed domains. Pristine videos containing frames that are recorded during sudden camera zooming event, may get wrongly classified as tampered videos leading to an increase in false positives. To address this issue, we propose a method for zooming detection and it is incorporated in video tampering detection. Frame shuffling detection, which was not explored so far is also addressed in our work. Our method is capable of differentiating various inter-frame tamper events and its localization in the temporal domain. The proposed system is tested on 23,586 videos of which 2346 are pristine and rest of them are candidates of inter-frame forged videos. Experimental results show that we have successfully detected frame shuffling with encouraging accuracy rates. We have achieved improved accuracy on forgery detection in frame insertion, frame deletion and frame duplication. Copyright © 2018. Published by Elsevier B.V.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buchholz, B A
Radiocarbon dating can be used to determine the age of objects that contain components that were once alive. In the case of human remains, a radiocarbon date can distinguish between a crime scene and an archeological site. Documents, museum artifacts and art objects can be dated to determine if their age is correct for the historical context. A radiocarbon date does not confirm authenticity, but it can help identify a forgery.
Two-stage Keypoint Detection Scheme for Region Duplication Forgery Detection in Digital Images.
Emam, Mahmoud; Han, Qi; Zhang, Hongli
2018-01-01
In digital image forensics, copy-move or region duplication forgery detection became a vital research topic recently. Most of the existing keypoint-based forgery detection methods fail to detect the forgery in the smooth regions, rather than its sensitivity to geometric changes. To solve these problems and detect points which cover all the regions, we proposed two steps for keypoint detection. First, we employed the scale-invariant feature operator to detect the spatially distributed keypoints from the textured regions. Second, the keypoints from the missing regions are detected using Harris corner detector with nonmaximal suppression to evenly distribute the detected keypoints. To improve the matching performance, local feature points are described using Multi-support Region Order-based Gradient Histogram descriptor. Based on precision-recall rates and commonly tested dataset, comprehensive performance evaluation is performed. The results demonstrated that the proposed scheme has better detection and robustness against some geometric transformation attacks compared with state-of-the-art methods. © 2017 American Academy of Forensic Sciences.
Forgeries and Art Evaluation: An Argument for Dualism in Aesthetics
ERIC Educational Resources Information Center
Kulka, Tomas
2005-01-01
Can there be an aesthetic difference between an original painting and its forgery if they are visually indistinguishable? Answers of different philosophers are critically examined with the conclusion that none of them is satisfactory. Although their "solutions" stem from different views of the nature of art, they have one thing in common: They all…
Copy-move forgery detection utilizing Fourier-Mellin transform log-polar features
NASA Astrophysics Data System (ADS)
Dixit, Rahul; Naskar, Ruchira
2018-03-01
In this work, we address the problem of region duplication or copy-move forgery detection in digital images, along with detection of geometric transforms (rotation and rescale) and postprocessing-based attacks (noise, blur, and brightness adjustment). Detection of region duplication, following conventional techniques, becomes more challenging when an intelligent adversary brings about such additional transforms on the duplicated regions. In this work, we utilize Fourier-Mellin transform with log-polar mapping and a color-based segmentation technique using K-means clustering, which help us to achieve invariance to all the above forms of attacks in copy-move forgery detection of digital images. Our experimental results prove the efficiency of the proposed method and its superiority to the current state of the art.
Detecting Copy Move Forgery In Digital Images
NASA Astrophysics Data System (ADS)
Gupta, Ashima; Saxena, Nisheeth; Vasistha, S. K.
2012-03-01
In today's world several image manipulation software's are available. Manipulation of digital images has become a serious problem nowadays. There are many areas like medical imaging, digital forensics, journalism, scientific publications, etc, where image forgery can be done very easily. To determine whether a digital image is original or doctored is a big challenge. To find the marks of tampering in a digital image is a challenging task. The detection methods can be very useful in image forensics which can be used as a proof for the authenticity of a digital image. In this paper we propose the method to detect region duplication forgery by dividing the image into overlapping block and then perform searching to find out the duplicated region in the image.
Detecting Image Splicing Using Merged Features in Chroma Space
Liu, Guangjie; Dai, Yuewei
2014-01-01
Image splicing is an image editing method to copy a part of an image and paste it onto another image, and it is commonly followed by postprocessing such as local/global blurring, compression, and resizing. To detect this kind of forgery, the image rich models, a feature set successfully used in the steganalysis is evaluated on the splicing image dataset at first, and the dominant submodel is selected as the first kind of feature. The selected feature and the DCT Markov features are used together to detect splicing forgery in the chroma channel, which is convinced effective in splicing detection. The experimental results indicate that the proposed method can detect splicing forgeries with lower error rate compared to the previous literature. PMID:24574877
Detecting image splicing using merged features in chroma space.
Xu, Bo; Liu, Guangjie; Dai, Yuewei
2014-01-01
Image splicing is an image editing method to copy a part of an image and paste it onto another image, and it is commonly followed by postprocessing such as local/global blurring, compression, and resizing. To detect this kind of forgery, the image rich models, a feature set successfully used in the steganalysis is evaluated on the splicing image dataset at first, and the dominant submodel is selected as the first kind of feature. The selected feature and the DCT Markov features are used together to detect splicing forgery in the chroma channel, which is convinced effective in splicing detection. The experimental results indicate that the proposed method can detect splicing forgeries with lower error rate compared to the previous literature.
Random Visitor: Defense against Identity Attacks in P2P Networks
NASA Astrophysics Data System (ADS)
Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun
Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.
An effective detection algorithm for region duplication forgery in digital images
NASA Astrophysics Data System (ADS)
Yavuz, Fatih; Bal, Abdullah; Cukur, Huseyin
2016-04-01
Powerful image editing tools are very common and easy to use these days. This situation may cause some forgeries by adding or removing some information on the digital images. In order to detect these types of forgeries such as region duplication, we present an effective algorithm based on fixed-size block computation and discrete wavelet transform (DWT). In this approach, the original image is divided into fixed-size blocks, and then wavelet transform is applied for dimension reduction. Each block is processed by Fourier Transform and represented by circle regions. Four features are extracted from each block. Finally, the feature vectors are lexicographically sorted, and duplicated image blocks are detected according to comparison metric results. The experimental results show that the proposed algorithm presents computational efficiency due to fixed-size circle block architecture.
Mediterranean Security Into the Coming Millennium
1999-01-01
forgery was the widespread forgery of the Deutschmark, the reference currency in the area, in order to finance the costs of the wars of Yugoslavia’ s...Basque Land and Freedom) FAZ Frankfurter Allgemeine Zeitung FT Financial Times FSU Former Soviet Union GIA Groupe Islamique Anne (Algeria, Armed...and inter-state conflict as well as terrorism start the vicious circles of drugs and displaced persons trafficking in order to finance arms transfers
A sparse representation-based approach for copy-move image forgery detection in smooth regions
NASA Astrophysics Data System (ADS)
Abdessamad, Jalila; ElAdel, Asma; Zaied, Mourad
2017-03-01
Copy-move image forgery is the act of cloning a restricted region in the image and pasting it once or multiple times within that same image. This procedure intends to cover a certain feature, probably a person or an object, in the processed image or emphasize it through duplication. Consequences of this malicious operation can be unexpectedly harmful. Hence, the present paper proposes a new approach that automatically detects Copy-move Forgery (CMF). In particular, this work broaches a widely common open issue in CMF research literature that is detecting CMF within smooth areas. Indeed, the proposed approach represents the image blocks as a sparse linear combination of pre-learned bases (a mixture of texture and color-wise small patches) which allows a robust description of smooth patches. The reported experimental results demonstrate the effectiveness of the proposed approach in identifying the forged regions in CM attacks.
Anti-forensics of chromatic aberration
NASA Astrophysics Data System (ADS)
Mayer, Owen; Stamm, Matthew C.
2015-03-01
Over the past decade, a number of information forensic techniques have been developed to identify digital image manipulation and falsification. Recent research has shown, however, that an intelligent forger can use anti-forensic countermeasures to disguise their forgeries. In this paper, an anti-forensic technique is proposed to falsify the lateral chromatic aberration present in a digital image. Lateral chromatic aberration corresponds to the relative contraction or expansion between an image's color channels that occurs due to a lens's inability to focus all wavelengths of light on the same point. Previous work has used localized inconsistencies in an image's chromatic aberration to expose cut-and-paste image forgeries. The anti-forensic technique presented in this paper operates by estimating the expected lateral chromatic aberration at an image location, then removing deviations from this estimate caused by tampering or falsification. Experimental results are presented that demonstrate that our anti-forensic technique can be used to effectively disguise evidence of an image forgery.
Forgery Detection and Value Identification of Euro Banknotes
Bruna, Arcangelo; Farinella, Giovanni Maria; Guarnera, Giuseppe Claudio; Battiato, Sebastiano
2013-01-01
This paper describes both hardware and software components to detect counterfeits of Euro banknotes. The proposed system is also able to recognize the banknote values. Differently than other state-of-the-art methods, the proposed approach makes use of banknote images acquired with a near infrared camera to perform recognition and authentication. This allows one to build a system that can effectively deal with real forgeries, which are usually not detectable with visible light. The hardware does not use any mechanical parts, so the overall system is low-cost. The proposed solution is reliable for ambient light and banknote positioning. Users should simply lean the banknote to be analyzed on a flat glass, and the system detects forgery, as well as recognizes the banknote value. The effectiveness of the proposed solution has been properly tested on a dataset composed by genuine and fake Euro banknotes provided by Italy's central bank. PMID:23429514
Detection and localization of copy-paste forgeries in digital videos.
Singh, Raahat Devender; Aggarwal, Naveen
2017-12-01
Amidst the continual march of technology, we find ourselves relying on digital videos to proffer visual evidence in several highly sensitive areas such as journalism, politics, civil and criminal litigation, and military and intelligence operations. However, despite being an indispensable source of information with high evidentiary value, digital videos are also extremely vulnerable to conscious manipulations. Therefore, in a situation where dependence on video evidence is unavoidable, it becomes crucial to authenticate the contents of this evidence before accepting them as an accurate depiction of reality. Digital videos can suffer from several kinds of manipulations, but perhaps, one of the most consequential forgeries is copy-paste forgery, which involves insertion/removal of objects into/from video frames. Copy-paste forgeries alter the information presented by the video scene, which has a direct effect on our basic understanding of what that scene represents, and so, from a forensic standpoint, the challenge of detecting such forgeries is especially significant. In this paper, we propose a sensor pattern noise based copy-paste detection scheme, which is an improved and forensically stronger version of an existing noise-residue based technique. We also study a demosaicing artifact based image forensic scheme to estimate the extent of its viability in the domain of video forensics. Furthermore, we suggest a simplistic clustering technique for the detection of copy-paste forgeries, and determine if it possess the capabilities desired of a viable and efficacious video forensic scheme. Finally, we validate these schemes on a set of realistically tampered MJPEG, MPEG-2, MPEG-4, and H.264/AVC encoded videos in a diverse experimental set-up by varying the strength of post-production re-compressions and transcodings, bitrates, and sizes of the tampered regions. Such an experimental set-up is representative of a neutral testing platform and simulates a real-world forgery scenario where the forensic investigator has no control over any of the variable parameters of the tampering process. When tested in such an experimental set-up, the four forensic schemes achieved varying levels of detection accuracies and exhibited different scopes of applicabilities. For videos compressed using QFs in the range 70-100, the existing noise residue based technique generated average detection accuracy in the range 64.5%-82.0%, while the proposed sensor pattern noise based scheme generated average accuracy in the range 89.9%-98.7%. For the aforementioned range of QFs, average accuracy rates achieved by the suggested clustering technique and the demosaicing artifact based approach were in the range 79.1%-90.1% and 83.2%-93.3%, respectively. Copyright © 2017 Elsevier B.V. All rights reserved.
Unlinkable Serial Transactions: Protocols and Applications
1999-11-01
4) intends for the blind signature to be secure from “one-more” forgery attacks [Pointcheval and Stern 1996]. Such forgery enables the originator to...protocols we describe. The signature indicated by S in message 2 uses the vendor’s signature key for service S and is only used to sign blinded hashes. We...make use of blind signatures ; although, not surprisingly, their sys- tems are rather different from the ones given here [Fujioka et al. 1993; Cranor 1996
Optical measurements of paintings and the creation of an artwork database for authenticity
Hwang, Seonhee; Song, Hyerin; Cho, Soon-Woo; Kim, Chang Eun; Kim, Chang-Seok; Kim, Kyujung
2017-01-01
Paintings have high cultural and commercial value, so that needs to be preserved. Many techniques have been attempted to analyze properties of paintings, including X-ray analysis and optical coherence tomography (OCT) methods, and enable conservation of paintings from forgeries. In this paper, we suggest a simple and accurate optical analysis system to protect them from counterfeit which is comprised of fiber optics reflectance spectroscopy (FORS) and line laser-based topographic analysis. The system is designed to fully cover the whole area of paintings regardless of its size for the accurate analysis. For additional assessments, a line laser-based high resolved OCT was utilized. Some forgeries were created by the experts from the three different styles of genuine paintings for the experiments. After measuring surface properties of paintings, we could observe the results from the genuine works and the forgeries have the distinctive characteristics. The forgeries could be distinguished maximally 76.5% with obtained RGB spectra by FORS and 100% by topographic analysis. Through the several executions, the reliability of the system was confirmed. We could verify that the measurement system is worthwhile for the conservation of the valuable paintings. To store the surface information of the paintings in micron scale, we created a numerical database. Consequently, we secured the databases of three different famous Korean paintings for accurate authenticity. PMID:28151981
Optical measurements of paintings and the creation of an artwork database for authenticity.
Hwang, Seonhee; Song, Hyerin; Cho, Soon-Woo; Kim, Chang Eun; Kim, Chang-Seok; Kim, Kyujung
2017-01-01
Paintings have high cultural and commercial value, so that needs to be preserved. Many techniques have been attempted to analyze properties of paintings, including X-ray analysis and optical coherence tomography (OCT) methods, and enable conservation of paintings from forgeries. In this paper, we suggest a simple and accurate optical analysis system to protect them from counterfeit which is comprised of fiber optics reflectance spectroscopy (FORS) and line laser-based topographic analysis. The system is designed to fully cover the whole area of paintings regardless of its size for the accurate analysis. For additional assessments, a line laser-based high resolved OCT was utilized. Some forgeries were created by the experts from the three different styles of genuine paintings for the experiments. After measuring surface properties of paintings, we could observe the results from the genuine works and the forgeries have the distinctive characteristics. The forgeries could be distinguished maximally 76.5% with obtained RGB spectra by FORS and 100% by topographic analysis. Through the several executions, the reliability of the system was confirmed. We could verify that the measurement system is worthwhile for the conservation of the valuable paintings. To store the surface information of the paintings in micron scale, we created a numerical database. Consequently, we secured the databases of three different famous Korean paintings for accurate authenticity.
Passive forensics for copy-move image forgery using a method based on DCT and SVD.
Zhao, Jie; Guo, Jichang
2013-12-10
As powerful image editing tools are widely used, the demand for identifying the authenticity of an image is much increased. Copy-move forgery is one of the tampering techniques which are frequently used. Most existing techniques to expose this forgery need to improve the robustness for common post-processing operations and fail to precisely locate the tampering region especially when there are large similar or flat regions in the image. In this paper, a robust method based on DCT and SVD is proposed to detect this specific artifact. Firstly, the suspicious image is divided into fixed-size overlapping blocks and 2D-DCT is applied to each block, then the DCT coefficients are quantized by a quantization matrix to obtain a more robust representation of each block. Secondly, each quantized block is divided non-overlapping sub-blocks and SVD is applied to each sub-block, then features are extracted to reduce the dimension of each block using its largest singular value. Finally, the feature vectors are lexicographically sorted, and duplicated image blocks will be matched by predefined shift frequency threshold. Experiment results demonstrate that our proposed method can effectively detect multiple copy-move forgery and precisely locate the duplicated regions, even when an image was distorted by Gaussian blurring, AWGN, JPEG compression and their mixed operations. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Moini, Mehdi; Rollman, Christopher M
2017-10-03
Buyid silk forgery is one of the most famous silk forgeries in the world. In 1924-1925, excavation of the Bibi Shahrbanu site in Iran unearthed several silk textiles. The silks were thought to be of the Buyid period (934-1062 BCE) of the Persian Empire and have since been known as the "Buyid silks". In the 1930s, more silk appeared and was reported as being from the Buyid period as well. Controversy over the authenticity of these silks escalated after the purchase of the silks by museums throughout the world. Extensive investigations of several of these silks have been conducted over the years with respect to iconography, weaving patterns, dyes/mordant, style, and even radiocarbon dating. It was found that most of the silks are not from Buyid period. To test the authenticity of these silk fabrics, the recently developed silk dating technique using amino acid racemization (AAR) in conjunction with capillary electrophoresis mass spectrometry was applied to 13 Buyid silk specimens from the Textile Museum collections. Among these silk specimens, the AAR ratios of only one specimen were consistent with authentic silk fabrics collected from various museums. In addition, the aspartic acid racemization ratio of this specimen was also consistent with its 14 C dating. The other "Buyid silks" showed excessive levels of amino acid racemization not only for aspartic acid, but also for phenylalanine and tyrosine, inconsistent with racemization rates of these amino acids in authentic historical silk fabrics. Treatment of modern silk with a base at different pH and temperature reproduced the AAR pattern of the Buyid silks, implying that chemical treatment with a base at relatively high temperatures was perhaps the method used to artificially age these fabrics. The results imply that the racemization ratios of aspartic acid, phenylalanine, and tyrosine can be used as biomarkers for identification of naturally versus artificially aged silk.
Takalo, Jouni; Timonen, Jussi; Sampo, Jouni; Rantala, Maaria; Siltanen, Samuli; Lassas, Matti
2014-11-01
A novel method is presented for distinguishing postal stamp forgeries and counterfeit banknotes from genuine samples. The method is based on analyzing differences in paper fibre networks. The main tool is a curvelet-based algorithm for measuring overall fibre orientation distribution and quantifying anisotropy. Using a couple of more appropriate parameters makes it possible to distinguish forgeries from genuine originals as concentrated point clouds in two- or three-dimensional parameter space. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Color filter array pattern identification using variance of color difference image
NASA Astrophysics Data System (ADS)
Shin, Hyun Jun; Jeon, Jong Ju; Eom, Il Kyu
2017-07-01
A color filter array is placed on the image sensor of a digital camera to acquire color images. Each pixel uses only one color, since the image sensor can measure only one color per pixel. Therefore, empty pixels are filled using an interpolation process called demosaicing. The original and the interpolated pixels have different statistical characteristics. If the image is modified by manipulation or forgery, the color filter array pattern is altered. This pattern change can be a clue for image forgery detection. However, most forgery detection algorithms have the disadvantage of assuming the color filter array pattern. We present an identification method of the color filter array pattern. Initially, the local mean is eliminated to remove the background effect. Subsequently, the color difference block is constructed to emphasize the difference between the original pixel and the interpolated pixel. The variance measure of the color difference image is proposed as a means of estimating the color filter array configuration. The experimental results show that the proposed method is effective in identifying the color filter array pattern. Compared with conventional methods, our method provides superior performance.
Deep Learning-Based Data Forgery Detection in Automatic Generation Control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Fengli; Li, Qinghua
Automatic Generation Control (AGC) is a key control system in the power grid. It is used to calculate the Area Control Error (ACE) based on frequency and tie-line power flow between balancing areas, and then adjust power generation to maintain the power system frequency in an acceptable range. However, attackers might inject malicious frequency or tie-line power flow measurements to mislead AGC to do false generation correction which will harm the power grid operation. Such attacks are hard to be detected since they do not violate physical power system models. In this work, we propose algorithms based on Neural Networkmore » and Fourier Transform to detect data forgery attacks in AGC. Different from the few previous work that rely on accurate load prediction to detect data forgery, our solution only uses the ACE data already available in existing AGC systems. In particular, our solution learns the normal patterns of ACE time series and detects abnormal patterns caused by artificial attacks. Evaluations on the real ACE dataset show that our methods have high detection accuracy.« less
On the Design of Forgiving Biometric Security Systems
NASA Astrophysics Data System (ADS)
Phan, Raphael C.-W.; Whitley, John N.; Parish, David J.
This work aims to highlight the fundamental issue surrounding biometric security systems: it’s all very nice until a biometric is forged, but what do we do after that? Granted, biometric systems are by physical nature supposedly much harder to forge than other factors of authentication since biometrics on a human body are by right unique to the particular human person. Yet it is also due to this physical nature that makes it much more catastrophic when a forgery does occur, because it implies that this uniqueness has been forged as well, threatening the human individuality; and since crime has by convention relied on identifying suspects by biometric characteristics, loss of this biometric uniqueness has devastating consequences on the freedom and basic human rights of the victimized individual. This uniqueness forgery implication also raises the motivation on the adversary to forge since a successful forgery leads to much more impersonation situations when biometric systems are used i.e. physical presence at crime scenes, identification and access to security systems and premises, access to financial accounts and hence the ability to use the victim’s finances. Depending on the gains, a desperate highly motivated adversary may even resort to directly obtaining the victim’s biometric parts by force e.g. severing the parts from the victim’s body; this poses a risk and threat not just to the individual’s uniqueness claim but also to personal safety and well being. One may then wonder if it is worth putting one’s assets, property and safety into the hands of biometrics based systems when the consequences of biometric forgery far outweigh the consequences of system compromises when no biometrics are used.
[A brief history of biographical Seishu Hanaoka].
Matsuki, Akitomo
2005-09-01
It was 1804 when Seishu Hanaoka (1760-1835), performed an excision of the breast cancer of a patient named Kan Aiya under general anesthesia by Mahutu-san. This is the first documented general anesthesia in the world. Numerous studies have been made about Seishu Hanaoka during the past 100 years and among them the monograph titled "Seishu Hanaoka and His Surgery" by Shuzo Kure published in 1923, had been thought to be nearly perfect and it had been thought that nothing had been left unsolved concerning the biography of Hanaoka. The present author made an exhaustive investigation of the monograph in terms of anesthesiology and found a serious forgery in the transcription of Hanaoka's "Nyugan chiken roku". The author also detected two forged photographs of the record in Kure's book. As Kure was a professor of psychiatry of the Tokyo Imperial University and a leading medical historian at that time, other investigators of Hanaoka followed him unquestioningly and they could not reveal Kure's forgery for 80 years since its publication. Because of Kure's forgery the biographical study of Hanaoka was retarded seriously and incorrect information about him has prevailed. The cause of the academic retardation is considered to have been mainly due to the lack of a bibliographical survey of original documents of Hanaoka by following investigators.
An Improved Arbitrated Quantum Scheme with Bell States
NASA Astrophysics Data System (ADS)
Zhang, Yingying; Zeng, Jiwen
2018-04-01
In 2014, Liu et al. (In. J. Thero. phys. 53(5); 1569-1579. 2014) proposed an arbitrated quantum signature scheme (Liu'14) with Bell states by utilizing a new quantum one-time pad algorithm. It claimed that it can resist the receiver's existential forgery attack and no party has chances to change the message and its signature without being discovered. Recently, Xu and Zou (In. J. Thero. phys. 55; 4142-4156. 2016) analyzed above scheme and demonstrated that it can't resist the signer's disavowal and the receiver's existential forgery. But, the authors didn't give a method to solve it. In this paper, we will give an improved arbitrated quantum signature scheme to make up the loopholes in Liu'14.
Age and gender-invariant features of handwritten signatures for verification systems
NASA Astrophysics Data System (ADS)
AbdAli, Sura; Putz-Leszczynska, Joanna
2014-11-01
Handwritten signature is one of the most natural biometrics, the study of human physiological and behavioral patterns. Behavioral biometrics includes signatures that may be different due to its owner gender or age because of intrinsic or extrinsic factors. This paper presents the results of the author's research on age and gender influence on verification factors. The experiments in this research were conducted using a database that contains signatures and their associated metadata. The used algorithm is based on the universal forgery feature idea, where the global classifier is able to classify a signature as a genuine one or, as a forgery, without the actual knowledge of the signature template and its owner. Additionally, the reduction of the dimensionality with the MRMR method is discussed.
Handwriting changes due to aging and Parkinson's syndrome.
Walton, J
1997-08-22
Wills signed by elderly people are often contested on the grounds the the signature is different from their earlier specimen signatures. Neurological disease, which can affect handwriting, is very common and progressive amongst elderly people. Handwriting change due to old age and neurological disease is poorly understood. To better understand this subject, we carried out a large methodical study based on almost 200 handwriting specimens of Parkinson patients and age-matched controls. Interestingly, our findings indicate that some of the handwriting changes which occur in these populations tend to resemble forgery indicia although upon close inspection they are distinguishable from them. Thus, document examiners are urged to exercise caution in assessing purported forgeries on wills and other documents signed of written during older age or a writer suffering from neurological disease.
NASA Astrophysics Data System (ADS)
Hildebrandt, Mario; Dittmann, Jana
2015-03-01
The possibility of forging latent fingerprints at crime scenes is known for a long time. Ever since it has been stated that an expert is capable of recognizing the presence of multiple identical latent prints as an indicator towards forgeries. With the possibility of printing fingerprint patterns to arbitrary surfaces using affordable ink- jet printers equipped with artificial sweat, it is rather simple to create a multitude of fingerprints with slight variations to avoid raising any suspicion. Such artificially printed fingerprints are often hard to detect during the analysis procedure. Moreover, the visibility of particular detection properties might be decreased depending on the utilized enhancement and acquisition technique. In previous work primarily such detection properties are used in combination with non-destructive high resolution sensory and pattern recognition techniques to detect fingerprint forgeries. In this paper we apply Benford's Law in the spatial domain to differentiate between real latent fingerprints and printed fingerprints. This technique has been successfully applied in media forensics to detect image manipulations. We use the differences between Benford's Law and the distribution of the most significant digit of the intensity and topography data from a confocal laser scanning microscope as features for a pattern recognition based detection of printed fingerprints. Our evaluation based on 3000 printed and 3000 latent print samples shows a very good detection performance of up to 98.85% using WEKA's Bagging classifier in a 10-fold stratified cross-validation.
Detection of shifted double JPEG compression by an adaptive DCT coefficient model
NASA Astrophysics Data System (ADS)
Wang, Shi-Lin; Liew, Alan Wee-Chung; Li, Sheng-Hong; Zhang, Yu-Jin; Li, Jian-Hua
2014-12-01
In many JPEG image splicing forgeries, the tampered image patch has been JPEG-compressed twice with different block alignments. Such phenomenon in JPEG image forgeries is called the shifted double JPEG (SDJPEG) compression effect. Detection of SDJPEG-compressed patches could help in detecting and locating the tampered region. However, the current SDJPEG detection methods do not provide satisfactory results especially when the tampered region is small. In this paper, we propose a new SDJPEG detection method based on an adaptive discrete cosine transform (DCT) coefficient model. DCT coefficient distributions for SDJPEG and non-SDJPEG patches have been analyzed and a discriminative feature has been proposed to perform the two-class classification. An adaptive approach is employed to select the most discriminative DCT modes for SDJPEG detection. The experimental results show that the proposed approach can achieve much better results compared with some existing approaches in SDJPEG patch detection especially when the patch size is small.
Hyun, Dai-Kyung; Ryu, Seung-Jin; Lee, Hae-Yeoun; Lee, Heung-Kyu
2013-01-01
In many court cases, surveillance videos are used as significant court evidence. As these surveillance videos can easily be forged, it may cause serious social issues, such as convicting an innocent person. Nevertheless, there is little research being done on forgery of surveillance videos. This paper proposes a forensic technique to detect forgeries of surveillance video based on sensor pattern noise (SPN). We exploit the scaling invariance of the minimum average correlation energy Mellin radial harmonic (MACE-MRH) correlation filter to reliably unveil traces of upscaling in videos. By excluding the high-frequency components of the investigated video and adaptively choosing the size of the local search window, the proposed method effectively localizes partially manipulated regions. Empirical evidence from a large database of test videos, including RGB (Red, Green, Blue)/infrared video, dynamic-/static-scene video and compressed video, indicates the superior performance of the proposed method. PMID:24051524
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-12
... Request; Request for the Site Inspection, Landowners Authorization/Ingress/Egress Agreement. AGENCY... . SUPPLEMENTARY INFORMATION: Collection of Information Title: Request for the Site Inspection, Landowners...-09, Request for the Site Inspection; FEMA Form 010-0-10, Landowner's Authorization Ingress- Egress...
22 CFR 208.800 - What are the causes for debarment?
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 208.800 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT GOVERNMENTWIDE DEBARMENT AND... with obtaining, attempting to obtain, or performing a public or private agreement or transaction; (2..., theft, forgery, bribery, falsification or destruction of records, making false statements, tax evasion...
The 'Dollond' Versus 'Dolland' Controversy
NASA Astrophysics Data System (ADS)
Breyer, Walter H.
Discussion of the Dollond and Dolland (a forgery) telescopes. Mentioned are telescope makers, opticians, ...: Chester Moore [1703-1771]; Gordon Bass; Edward Scarlett; James Mann; John Dollond; Peter Dollond; Robert Rew; Benjamin Martin [1714-1782]; George Adams; Henry Pyefinch; John Bevis [1693-1771]; and Charles Tulley.
ERIC Educational Resources Information Center
Drucker, Susan J.; Gumpert, Gary
2000-01-01
Surveys ways in which criminal laws are finding their way into cyberspace, the implications of such actions for communicative rights and liabilities, and the media differentials of crime and punishment. Examines crime committed using email and the Internet; computer mediated felonies, misdemeanors, and violations committed in cyberspace; forgery;…
Behavior Knowledge Space-Based Fusion for Copy-Move Forgery Detection.
Ferreira, Anselmo; Felipussi, Siovani C; Alfaro, Carlos; Fonseca, Pablo; Vargas-Munoz, John E; Dos Santos, Jefersson A; Rocha, Anderson
2016-07-20
The detection of copy-move image tampering is of paramount importance nowadays, mainly due to its potential use for misleading the opinion forming process of the general public. In this paper, we go beyond traditional forgery detectors and aim at combining different properties of copy-move detection approaches by modeling the problem on a multiscale behavior knowledge space, which encodes the output combinations of different techniques as a priori probabilities considering multiple scales of the training data. Afterwards, the conditional probabilities missing entries are properly estimated through generative models applied on the existing training data. Finally, we propose different techniques that exploit the multi-directionality of the data to generate the final outcome detection map in a machine learning decision-making fashion. Experimental results on complex datasets, comparing the proposed techniques with a gamut of copy-move detection approaches and other fusion methodologies in the literature show the effectiveness of the proposed method and its suitability for real-world applications.
NASA Astrophysics Data System (ADS)
Shabunya-Klyachkovskaya, E. V.; Kiris, V. V.; Shimko, A. N.; Belkov, M. V.; Raikov, S. N.
2014-01-01
Results of spectroscopic examinations of three paintings that by the formal and stylistic features can be attributed to the Dutch and Flemish schools of the XVII-XVIIIth centuries were presented. It was supposed that one of the paintings was created by David Teniers the Younger. The signature ″L. de Moni″ was found on the paint layer of another painting. Inorganic art pigments including those of the XIXth century were identified using laser-induced breakdown spectroscopy. Fourier-transform IR spectroscopy was used to determine the paint binders, which allowed the lower limits of the creation time of these artworks to be defined. Results of a microscopic examination of the stratigraphic structure revealed that the creation technology of these artworks differed from that of Dutch and Flemish artists of the XVII-XVIIIth centuries. Thus, all three investigated paintings were XXth century stylistic forgeries of Dutch and Flemish paintings of the XVI-XVIIIth centuries.
2012-09-01
relating to submission of offers, embezzlement, theft, forgery, bribery , falsification or destruction of records, federal tax delinquency, and many...debarment period was necessary to protect the government from doing business with this company for its unethical and dishonest practices. Source: GAO
31 CFR 592.307 - Kimberley Process Certificate.
Code of Federal Regulations, 2010 CFR
2010-07-01
...- and forgery-resistant document that bears the following information in any language, provided that an... shipment; (k) Relevant Harmonized Commodity Description and Coding System; and (l) Validation by the exporting authority. Note to paragraph (l): See § 592.301(a)(4) for procedures governing the validation of...
Project THEORIA: New Media for Values Education.
ERIC Educational Resources Information Center
Covey, Preston
1989-01-01
Describes Project THEORIA, which was developed at Carnegie Mellon University to design interactive simulation environments for testing hypotheses and theories of the arts and human morals. Three projects in various stages of design and development are described: (1) "A Right to Die?; (2) "Art or Forgery?"; and (3) "Birth or…
Code of Federal Regulations, 2010 CFR
2010-10-01
... designee) will designate a NMFS observer certification official who will make decisions for the Observer... of embezzlement, theft, forgery, bribery, falsification or destruction of records, making false... appeal pursuant to paragraph (c) of this section. (c) Appeals process—(1) Decisions. Decisions on appeals...
Fermilab Security Site Access Request Database
Fermilab Security Site Access Request Database Use of the online version of the Fermilab Security Site Access Request Database requires that you login into the ESH&Q Web Site. Note: Only Fermilab generated from the ESH&Q Section's Oracle database on May 27, 2018 05:48 AM. If you have a question
Identifying Image Manipulation Software from Image Features
2015-03-26
obp/ui/#iso:std:iso:ts:22028:-3:ed-2: v1:en. 24. Popescu, Alin and Hany Farid. “Exposing digital forgeries by detecting traces of resampling”. Signal...Processing, IEEE Transactions on, 53(2):758–767, 2005. 25. Popescu, Alin and Hany Farid. “Statistical tools for digital forensics”. Informa- tion
41 CFR 102-117.290 - What is the difference between temporary nonuse, suspension and debarment?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is the difference... Federal or State antitrust statutes; (3) Embezzlement, theft, forgery, bribery, falsification or... Federal agencies. The seriousness of the TSP's acts or omissions and the mitigating factors must be...
5 CFR 919.800 - What are the causes for debarment?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false What are the causes for debarment? 919..., and bid rigging; (3) Commission of embezzlement, theft, forgery, bribery, falsification or destruction...; or (5) Violation of the provisions of the Drug-Free Workplace Act of 1988 (41 U.S.C. 701); or (d) Any...
34 CFR 85.800 - What are the causes for debarment?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 34 Education 1 2010-07-01 2010-07-01 false What are the causes for debarment? 85.800 Section 85... customers between competitors, and bid rigging; (3) Commission of embezzlement, theft, forgery, bribery... debarment or suspension action; or (5) Violation of the provisions of the Drug-Free Workplace Act of 1988...
In Vietnam, Manufacturing Masterworks
ERIC Educational Resources Information Center
Overland, Martha Ann
2006-01-01
Vietnam, with its cheap labor and lax copyright laws, is a counterfeiter's dream. Books are sold hot off the photocopier and Hollywood's latest blockbusters can be had on DVD's for about a dollar. But it is in art forgery that Vietnam excels. With a stable of neoclassically trained art students, who spend years learning to copy the masters, art…
Structural analysis of paintings based on brush strokes
NASA Astrophysics Data System (ADS)
Sablatnig, Robert; Kammerer, Paul; Zolda, Ernestine
1998-05-01
The origin of works of art can often not be attributed to a certain artist. Likewise it is difficult to say whether paintings or drawings are originals or forgeries. In various fields of art new technical methods are used to examine the age, the state of preservation and the origin of the materials used. For the examination of paintings, radiological methods like X-ray and infra-red diagnosis, digital radiography, computer-tomography, etc. and color analyzes are employed to authenticate art. But all these methods do not relate certain characteristics in art work to a specific artist -- the artist's personal style. In order to study this personal style of a painter, experts in art history and image processing try to examine the 'structural signature' based on brush strokes within paintings, in particular in portrait miniatures. A computer-aided classification and recognition system for portrait miniatures is developed, which enables a semi- automatic classification and forgery detection based on content, color, and brush strokes. A hierarchically structured classification scheme is introduced which separates the classification into three different levels of information: color, shape of region, and structure of brush strokes.
Estimation of color modification in digital images by CFA pattern change.
Choi, Chang-Hee; Lee, Hae-Yeoun; Lee, Heung-Kyu
2013-03-10
Extensive studies have been carried out for detecting image forgery such as copy-move, re-sampling, blurring, and contrast enhancement. Although color modification is a common forgery technique, there is no reported forensic method for detecting this type of manipulation. In this paper, we propose a novel algorithm for estimating color modification in images acquired from digital cameras when the images are modified. Most commercial digital cameras are equipped with a color filter array (CFA) for acquiring the color information of each pixel. As a result, the images acquired from such digital cameras include a trace from the CFA pattern. This pattern is composed of the basic red green blue (RGB) colors, and it is changed when color modification is carried out on the image. We designed an advanced intermediate value counting method for measuring the change in the CFA pattern and estimating the extent of color modification. The proposed method is verified experimentally by using 10,366 test images. The results confirmed the ability of the proposed method to estimate color modification with high accuracy. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Authentication Based on Pole-zero Models of Signature Velocity
Rashidi, Saeid; Fallah, Ali; Towhidkhah, Farzad
2013-01-01
With the increase of communication and financial transaction through internet, on-line signature verification is an accepted biometric technology for access control and plays a significant role in authenticity and authorization in modernized society. Therefore, fast and precise algorithms for the signature verification are very attractive. The goal of this paper is modeling of velocity signal that pattern and properties is stable for persons. With using pole-zero models based on discrete cosine transform, precise method is proposed for modeling and then features is founded from strokes. With using linear, parzen window and support vector machine classifiers, the signature verification technique was tested with a large number of authentic and forgery signatures and has demonstrated the good potential of this technique. The signatures are collected from three different database include a proprietary database, the SVC2004 and the Sabanci University signature database benchmark databases. Experimental results based on Persian, SVC2004 and SUSIG databases show that our method achieves an equal error rate of 5.91%, 5.62% and 3.91% in the skilled forgeries, respectively. PMID:24696797
[Counterfeit pharmaceuticals in Peru].
Exebio, Luis E Moreno; Rodríguez, Javier; Sayritupac, Freddy
2010-02-01
To determine the quantity of counterfeit pharmaceutical drugs found by the National Quality Control Center (Centro Nacional de Control de Calidad (CNCC), Instituto Nacional de Salud, Peru) during the period from 2005&2008, and the types and properties of these drugs. A form was created to amass the relevant data collected directly from CNCC reports. The reports underwent a review and analysis process, and where counterfeiting was confirmed, it was categorized by type into one of four groups. The percentage of counterfeit drugs relative to the total drugs evaluated was: 3.0% in 2005, 5.0% in 2006, 7.3% in 2007, and 9.2% in 2008. The main groups of counterfeit drugs, classified according to the World Health Organization Anatomical Therapeutic Chemical Classification System, were: alimentary tract and metabolism, 34.5% (29.1%-39.8%); antiinfectives for systemic use, 21.1% (16.5%-25.7%); nervous system, 17.1% (12.8%-21.3%); and musculo-skeletal system, 15.4% (11.3%-19.5%). The most common type of forgery occurred in cases where the drug contained the correct amount of active ingredients, but the manufacturer was one other than the one indicated (62.4% of the total counterfeit drugs); and medications that did not contain any active ingredient (22.4%). Of the counterfeit drugs, 61.0% (56.0%-67.0%) were national brands and 39.0%, (33.0%-44.0%) were imported. The pharmaceutical formulations with the highest rate of forgery were tablets, 66.0% (60.0%-71.0%); injectables, 19.0% (14.0%-23.0%); and capsules 7.0% (4.0%-10.0%). From 2005-2008, drug counterfeiting had an average annual variation of 45%. Drug counterfeiting was shown to be most prevalent among national brands - as opposed to imported medications - although the types and formulations of the fake drugs attest to a certain level of sophistication employed in the forgery process. The counterfeiting of life-saving drugs, such as antimicrobials, signifies a serious public health threat.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-10
... disasters. This information is required to determine that the infrastructure of the site supports the...; Request for the Site Inspection and Landowners Authorization/Ingress-Egress Agreement AGENCY: Federal...-1), Request for the Site Inspection; FEMA Form 010-0-10 (formerly 90-31), Landowner's Authorization...
22 CFR 706.11 - General provisions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... request. This regulation does not apply to requests for records under the Privacy Act, 5 U.S.C. 552a. OPIC's regulations governing Privacy Act requests are located at 22 CFR part 707. (d) OPIC Internet site. OPIC maintains an Internet site at www.opic.gov. This site contains information on OPIC functions...
Contracting With the Enemy: The Contracting Officer’s Dilemma
2015-06-01
forgery, bribery , etc. Intentionally misusing "Made in America" designation Other offenses indicating a lack of business integrity or honesty that...major risk associated with using local national contractors in contingency environments is the presence of business entities that may directly or...indirectly support adversarial forces. Entering into contracts with enemy-affiliated business entities creates significant contractual and security
Forensic Analysis of Digital Image Tampering
2004-12-01
analysis of when each method fails, which Chapter 4 discusses. Finally, a test image containing an invisible watermark using LSB steganography is...2.2 – Example of invisible watermark using Steganography Software F5 ............. 8 Figure 2.3 – Example of copy-move image forgery [12...Figure 3.11 – Algorithm for JPEG Block Technique ....................................................... 54 Figure 3.12 – “Forged” Image with Result
Piezoelectric sensor pen for dynamic signature verification
DOE Office of Scientific and Technical Information (OSTI.GOV)
EerNisse, E.P.; Land, C.E.; Snelling, J.B.
The concept of using handwriting dynamics for electronic identification is discussed. A piezoelectric sensor pen for obtaining the pen point dynamics during writing is described. Design equations are derived and details of an operating device are presented. Typical output waveforms are shown to demonstrate the operation of the pen and to show the dissimilarities between dynamics of a genuine signature and an attempted forgery.
Signature scheme based on bilinear pairs
NASA Astrophysics Data System (ADS)
Tong, Rui Y.; Geng, Yong J.
2013-03-01
An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.
Forgery quality and its implications for behavioral biometric security.
Ballard, Lucas; Lopresti, Daniel; Monrose, Fabian
2007-10-01
Biometric security is a topic of rapidly growing importance in the areas of user authentication and cryptographic key generation. In this paper, we describe our steps toward developing evaluation methodologies for behavioral biometrics that take into account threat models that have been largely ignored. We argue that the pervasive assumption that forgers are minimally motivated (or, even worse, naive) is too optimistic and even dangerous. Taking handwriting as a case in point, we show through a series of experiments that some users are significantly better forgers than others, that such forgers can be trained in a relatively straightforward fashion to pose an even greater threat, that certain users are easy targets for forgers, and that most humans are a relatively poor judge of handwriting authenticity, and hence, their unaided instincts cannot be trusted. Additionally, to overcome current labor-intensive hurdles in performing more accurate assessments of system security, we present a generative attack model based on concatenative synthesis that can provide a rapid indication of the security afforded by the system. We show that our generative attacks match or exceed the effectiveness of forgeries rendered by the skilled humans we have encountered.
Corrosive Space Gas Restores Artwork, Promises Myriad Applications
NASA Technical Reports Server (NTRS)
2007-01-01
Atomic oxygen's unique characteristic of oxidizing primarily hydrogen, carbon, and hydrocarbon polymers at surface levels has been applied in the restoration of artwork, detection of document forgeries, and removal of bacterial contaminants from surgical implants. The Electro-Physics Branch at Glenn Research Center built on corrosion studies of long-duration coatings for use in space, and applied atomic oxygen's selectivity to instances where elements need to be removed from a surface. Atomic oxygen is able to remove organic compounds high in carbon (mostly soot) from fire-damaged artworks without causing a shift in the paint color. First successfully tested on oil paintings, the team then applied the restoration technique to acrylics, watercolors, and ink. The successful art restoration process was well-publicized, and soon a multinational, nonprofit professional organization dedicated to the art of forensic analysis of documents had successfully applied this process in the field of forgery detection. The gas has biomedical applications as well-Atomic Oxygen technology can be used to decontaminate orthopedic surgical hip and knee implants prior to surgery, and additional collaborative research between the Cleveland Clinic Foundation and the Glenn team shows that this gas's roughening of surfaces improves cell adhesion, which is important for the development of new drugs.
15 CFR 921.12 - Post site selection.
Code of Federal Regulations, 2011 CFR
2011-01-01
... NOAA approval of a proposed site, the state may submit a request for funds to develop the draft... and biological characteristics of the site approved by NOAA necessary for providing EIS information to NOAA. The state's request for these post site selection funds must be accompanied by the information...
15 CFR 921.12 - Post site selection.
Code of Federal Regulations, 2014 CFR
2014-01-01
... NOAA approval of a proposed site, the state may submit a request for funds to develop the draft... and biological characteristics of the site approved by NOAA necessary for providing EIS information to NOAA. The state's request for these post site selection funds must be accompanied by the information...
15 CFR 921.12 - Post site selection.
Code of Federal Regulations, 2013 CFR
2013-01-01
... NOAA approval of a proposed site, the state may submit a request for funds to develop the draft... and biological characteristics of the site approved by NOAA necessary for providing EIS information to NOAA. The state's request for these post site selection funds must be accompanied by the information...
15 CFR 921.12 - Post site selection.
Code of Federal Regulations, 2012 CFR
2012-01-01
... NOAA approval of a proposed site, the state may submit a request for funds to develop the draft... and biological characteristics of the site approved by NOAA necessary for providing EIS information to NOAA. The state's request for these post site selection funds must be accompanied by the information...
78 FR 54241 - Proposed Information Collection; Comment Request; BroadbandMatch Web Site Tool
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-03
... Information Collection; Comment Request; BroadbandMatch Web Site Tool AGENCY: National Telecommunications and... goal of increased broadband deployment and use in the United States. The BroadbandMatch Web site began... empowering technology effectively. II. Method of Collection BroadbandMatch users access the Web site through...
15 CFR 921.12 - Post site selection.
Code of Federal Regulations, 2010 CFR
2010-01-01
... NOAA approval of a proposed site, the state may submit a request for funds to develop the draft... and biological characteristics of the site approved by NOAA necessary for providing EIS information to NOAA. The state's request for these post site selection funds must be accompanied by the information...
40 CFR 63.1285 - Reporting requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... the owner or operator is requested by the Administrator to conduct a performance evaluation for a... requested by the Administrator, a site-specific test plan is not required by this subpart. If requested by the Administrator, the owner or operator must also submit the site-specific test plan required by § 63...
Hezbollah’s Passport: Religion, Culture, and the Lebanese Diaspora
2015-05-23
trafficking, weapons trading, money laundering , and forgery of products and intellectual property. 114 The porous tri-border region between Paraguay...raising money through criminal activities, and directly supporting other terrorist groups. All of its operations on the continent attempt to enhance...diaspora in West Africa, Hezbollah is involved in a multitude of criminal activities which also raise considerable sums of money for the organization
Roman sophisticated surface modification methods to manufacture silver counterfeited coins
NASA Astrophysics Data System (ADS)
Ingo, G. M.; Riccucci, C.; Faraldi, F.; Pascucci, M.; Messina, E.; Fierro, G.; Di Carlo, G.
2017-11-01
By means of the combined use of X-ray photoelectron spectroscopy (XPS), optical microscopy (OM) and scanning electron microscopy (SEM) coupled with energy dispersive X-ray spectroscopy (EDS) the surface and subsurface chemical and metallurgical features of silver counterfeited Roman Republican coins are investigated to decipher some aspects of the manufacturing methods and to evaluate the technological ability of the Roman metallurgists to produce thin silver coatings. The results demonstrate that over 2000 ago important advances in the technology of thin layer deposition on metal substrates were attained by Romans. The ancient metallurgists produced counterfeited coins by combining sophisticated micro-plating methods and tailored surface chemical modification based on the mercury-silvering process. The results reveal that Romans were able systematically to chemically and metallurgically manipulate alloys at a micro scale to produce adherent precious metal layers with a uniform thickness up to few micrometers. The results converge to reveal that the production of forgeries was aimed firstly to save expensive metals as much as possible allowing profitable large-scale production at a lower cost. The driving forces could have been a lack of precious metals, an unexpected need to circulate coins for trade and/or a combinations of social, political and economic factors that requested a change in money supply. Finally, some information on corrosion products have been achieved useful to select materials and methods for the conservation of these important witnesses of technology and economy.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-28
...: Exchange Programs Alumni Web Site Registration, DS-7006 ACTION: Notice of request for public comment and... Collection The Exchange Programs Alumni Web site requires information to process users' voluntary requests for participation in the Web site. Other than contact information, which is required for website...
Mahmood, Toqeer; Irtaza, Aun; Mehmood, Zahid; Tariq Mahmood, Muhammad
2017-10-01
The most common image tampering often for malicious purposes is to copy a region of the same image and paste to hide some other region. As both regions usually have same texture properties, therefore, this artifact is invisible for the viewers, and credibility of the image becomes questionable in proof centered applications. Hence, means are required to validate the integrity of the image and identify the tampered regions. Therefore, this study presents an efficient way of copy-move forgery detection (CMFD) through local binary pattern variance (LBPV) over the low approximation components of the stationary wavelets. CMFD technique presented in this paper is applied over the circular regions to address the possible post processing operations in a better way. The proposed technique is evaluated on CoMoFoD and Kodak lossless true color image (KLTCI) datasets in the presence of translation, flipping, blurring, rotation, scaling, color reduction, brightness change and multiple forged regions in an image. The evaluation reveals the prominence of the proposed technique compared to state of the arts. Consequently, the proposed technique can reliably be applied to detect the modified regions and the benefits can be obtained in journalism, law enforcement, judiciary, and other proof critical domains. Copyright © 2017 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Wai Kuan, Yip; Teoh, Andrew B. J.; Ngo, David C. L.
2006-12-01
We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and[InlineEquation not available: see fulltext.] discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific[InlineEquation not available: see fulltext.] discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT) and discrete fourier transform (DFT). Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs) of[InlineEquation not available: see fulltext.] and[InlineEquation not available: see fulltext.] for random and skilled forgeries for stolen token (worst case) scenario, and[InlineEquation not available: see fulltext.] for both forgeries in the genuine token (optimal) scenario.
78 FR 38388 - SGS North America, Inc. (Formerly SGS U.S. Testing Company, Inc.)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-26
... of one test site and the removal of one test site. This notice presents the Agency's preliminary...'s expansion request covers the addition of one additional test site. SGS's also requests the removal of one test site from its NRTL scope of recognition. SGS informed OSHA of a change in name from SGS U...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-08
...: Exchange Programs Alumni Web Site Registration ACTION: Notice of request for public comment. SUMMARY: The... following methods: Web: Persons with access to the Internet may use the Federal Docket Management System... Programs Alumni Web site Registration OMB Control Number: 1405-0192 Type of Request: Extension of an...
Human Trafficking in Southeast Asia and U.S. National Security
2015-03-01
beneficial to combat the problems at their source in order to have a lasting effect. Criminal organizations use money from drug trafficking rings...trafficking is often paired with other crimes such as drug trafficking, document forgery, money laundering , and human smuggling—all of which yield large... criminal and terrorist organizations to engage in, or launder the proceeds of illegal activity.”169 The report that new strategic focus for the United
Patterns of Global Terrorism 1999
2000-04-01
Italian labor leader Massimo D’Antono in May. In the United Kingdom, the Good Friday accords effectively prolonged the de facto peace while the various...French court as an accessory in the Paris metro bombings in 1995—for attempted murder, criminal association, sedition, and forgery and sentenced him to...outstanding at yearend. In addition, the French Government’s nationwide “Vigi-Pirate” plan—launched in 1998 to prevent a repeat of the Paris metro
5 CFR 1655.10 - Loan application process.
Code of Federal Regulations, 2010 CFR
2010-01-01
... request on the TSP Web site: (1) FERS participants or members of the uniformed services requesting a... described in paragraph (b) of this section may use the TSP Web site to submit a loan application and obtain...
75 FR 35765 - Proposed Information Collection; Comment Request; BroadbandMatch Web Site Tool
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-23
... DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Proposed Information Collection; Comment Request; BroadbandMatch Web Site Tool AGENCY: National Telecommunications and Information Administration, Commerce. ACTION: Notice. SUMMARY: The Department of Commerce, as part of its...
Memo: Request for Approval of a Time-Critical Removal Action and $2 Million
The purpose of this Action Memorandum is to request and document approval of a time-critical removal action described herein for the Mississippi Phosphates Corporation Site (Site) located at 601 Industrial Road, Pascagoula, Jackson County, Mississippi.
How Children’s Mentalistic Theory Widens their Conception of Pictorial Possibilities
Gilli, Gabriella M.; Ruggi, Simona; Gatti, Monica; Freeman, Norman H.
2016-01-01
An interpretative theory of mind enables young children to grasp that people fulfill varying intentions when making pictures. We tested the hypothesis that in middle childhood a unifunctional conception of artists’ intention to produce a picture widens to include artists’ intention to display their pictures to others. Children aged between 5 and 10 years viewed a brief video of an artist deliberately hiding her picture but her intention was thwarted when her picture was discovered and displayed. By 8 years of age children were almost unanimous that a picture-producer without an intention to show her work to others cannot be considered to be an artist. Further exploratory studies centered on aspects of picture-display involving normal public display as well as the contrary intentions of hiding an original picture and of deceitfully displaying a forgery. Interviews suggested that the concept of exhibition widened to take others’ minds into account viewers’ critical judgments and effects of forgeries on viewers’ minds. The approach of interpolating probes of typical possibilities between atypical intentions generated evidence that in middle childhood the foundations are laid for a conception of communication between artists’ minds and viewers’ minds via pictorial display. The combination of hypothesis-testing and exploratory opening-up of the area generates a new testable hypothesis about how an increasingly mentalistic approach enables children to understand diverse possibilities in the pictorial domain. PMID:26955360
Chen, Chenglong; Ni, Jiangqun; Shen, Zhaoyi; Shi, Yun Qing
2017-06-01
Geometric transformations, such as resizing and rotation, are almost always needed when two or more images are spliced together to create convincing image forgeries. In recent years, researchers have developed many digital forensic techniques to identify these operations. Most previous works in this area focus on the analysis of images that have undergone single geometric transformations, e.g., resizing or rotation. In several recent works, researchers have addressed yet another practical and realistic situation: successive geometric transformations, e.g., repeated resizing, resizing-rotation, rotation-resizing, and repeated rotation. We will also concentrate on this topic in this paper. Specifically, we present an in-depth analysis in the frequency domain of the second-order statistics of the geometrically transformed images. We give an exact formulation of how the parameters of the first and second geometric transformations influence the appearance of periodic artifacts. The expected positions of characteristic resampling peaks are analytically derived. The theory developed here helps to address the gap left by previous works on this topic and is useful for image security and authentication, in particular, the forensics of geometric transformations in digital images. As an application of the developed theory, we present an effective method that allows one to distinguish between the aforementioned four different processing chains. The proposed method can further estimate all the geometric transformation parameters. This may provide useful clues for image forgery detection.
Cow urine, Indian yellow, and art forgeries: An update.
Smith, Gregory Dale
2017-07-01
In a recent technical note in this Journal, de Faria et al., 2017 [1] reported the Raman spectrum of authentic Indian yellow artists' pigment, correcting a decades old reference spectrum that has led to the misidentification of this pigment in artworks that actually contained tartrazine yellow. The present communication provides additional information and corrects important experimental details mentioned by de Faria et al. that should lead to further identifications of the authentic pigment in artworks. Despite their claim that the analysis of this naturally fluorescent colorant is only possible with Fourier transform (FT) instruments, the ready characterization of two authentic samples of historic Indian yellow pigment is demonstrated here using commonly available visible and near-infrared excitation sources on a dispersive Raman microspectrometer. To highlight the importance of the proper identification of dyes and colorants, the authentication and art historical implications of previous literature reports that have misidentified Indian yellow on historic documents are more thoroughly discussed here from a forensic science point of view. The numerous modern pigments that are sold as imitation Indian yellow are addressed and analyzed, allowing the ready noninvasive detection of anachronistic colorants in attempted forgeries. Finally, this unusual pigment is positively identified for the first time using non-invasive dispersive Raman microspectroscopy on a historic object of uncertain date, a highly decorative manuscript from the Indian subcontinent. Copyright © 2017 Elsevier B.V. All rights reserved.
Digital image modification detection using color information and its histograms.
Zhou, Haoyu; Shen, Yue; Zhu, Xinghui; Liu, Bo; Fu, Zigang; Fan, Na
2016-09-01
The rapid development of many open source and commercial image editing software makes the authenticity of the digital images questionable. Copy-move forgery is one of the most widely used tampering techniques to create desirable objects or conceal undesirable objects in a scene. Existing techniques reported in the literature to detect such tampering aim to improve the robustness of these methods against the use of JPEG compression, blurring, noise, or other types of post processing operations. These post processing operations are frequently used with the intention to conceal tampering and reduce tampering clues. A robust method based on the color moments and other five image descriptors is proposed in this paper. The method divides the image into fixed size overlapping blocks. Clustering operation divides entire search space into smaller pieces with similar color distribution. Blocks from the tampered regions will reside within the same cluster since both copied and moved regions have similar color distributions. Five image descriptors are used to extract block features, which makes the method more robust to post processing operations. An ensemble of deep compositional pattern-producing neural networks are trained with these extracted features. Similarity among feature vectors in clusters indicates possible forged regions. Experimental results show that the proposed method can detect copy-move forgery even if an image was distorted by gamma correction, addictive white Gaussian noise, JPEG compression, or blurring. Copyright © 2016. Published by Elsevier Ireland Ltd.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-07
...., Metropolis Works; License Amendment Request and Request for a Hearing AGENCY: Nuclear Regulatory Commission... surface impoundment decommissioning plan at its Metropolis Works Facility site located in Metropolis... information. With respect to copyrighted works, except for limited excerpts that serve the purpose of the...
Photo-editing in Orthodontics: How Much is Too Much?.
Kapoor, Priyanka
2015-01-01
Digital photography and radiology are the mainstay of orthodontic records but current image editing software programs nave led to increase in instances of digital forgery and scientific misconduct. In the present study, digital image data of orthodontic study casts and photographs were altered using software such as [Microsoft Paint6 1, Picasa3.1, Adobe Photoshop3.6]. Based on ethical guidelines on digital image manipulations, cropping or intensity adjustments in moderation to entire image were considered permissible while cloning or color adjustments were deemed unethical.
75 FR 8407 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-24
... Request, NA Form 6006, which will be used by NARA employees, on-site contractors, volunteers, Foundation...: Identification Card Request. OMB number: 3095-0057. Agency form number: NA Form 6006. Type of review: Regular...
45 CFR 2507.4 - How are requests for records made?
Code of Federal Regulations, 2011 CFR
2011-10-01
... through the Corporation's “electronic reading room” internet site under “Resource Links”. The following address is the Corporation's Internet Web site: http://www.nationalservice.org. (b) Request must... may have produced or may have custody of the record (e.g., AmeriCorps*State/National Direct, Ameri...
Web Site Freedom of Information Act Sign In Freedom of Information Act Header Search this site ... Search Freedom of Information Act Introduction to FOIA Making A Request Points of Contact FOIA Reports Reading Room Frequently Asked Questions FOIA Links Privacy Act Requests Freedom Of Information (FOIA) &
31 CFR 256.11 - How do agencies request payments?
Code of Federal Regulations, 2014 CFR
2014-07-01
... request forms or by using other approved methods as provided for on the Judgment Fund Web site at http://www.fiscal.treasury.gov/judgefund. Fiscal Service provides forms and detailed information about... Judgment Fund Web site. The submitting agency must complete and sign all required Judgment Fund forms and...
40 CFR 63.775 - Reporting requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... the owner or operator is required by the Administrator to conduct a performance evaluation for a... requested by the Administrator, a site-specific test plan is not required by this subpart. If requested by the Administrator, the owner or operator must also submit the site-specific test plan required by § 63...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-22
..., FAA invites public comments about our intention to request the Office of Management and Budget (OMB... reentry vehicle, its operational capabilities, and its designated reentry site. DATES: Written comments... vehicle, its operational capabilities, and its designated reentry site. Respondents: Approximately 1...
10 CFR 1304.105 - Requests for access to records.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.105 Requests for access to records... request access to his or her own records in writing by addressing a letter to: Privacy Act Officer; U.S... via the internet. Internet requests should be transmitted through the Board's Web site at www.nwtrb...
10 CFR 1304.106 - Processing of requests.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Processing of requests. 1304.106 Section 1304.106 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.106 Processing of requests. Upon receipt...) Requests in writing, including those sent by e-mail, via the Web site, or by Fax. Within five working days...
10 CFR 1304.106 - Processing of requests.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Processing of requests. 1304.106 Section 1304.106 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.106 Processing of requests. Upon receipt...) Requests in writing, including those sent by e-mail, via the Web site, or by Fax. Within five working days...
10 CFR 1304.106 - Processing of requests.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Processing of requests. 1304.106 Section 1304.106 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.106 Processing of requests. Upon receipt...) Requests in writing, including those sent by e-mail, via the Web site, or by Fax. Within five working days...
10 CFR 1304.106 - Processing of requests.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Processing of requests. 1304.106 Section 1304.106 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.106 Processing of requests. Upon receipt...) Requests in writing, including those sent by e-mail, via the Web site, or by Fax. Within five working days...
10 CFR 1304.106 - Processing of requests.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Processing of requests. 1304.106 Section 1304.106 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.106 Processing of requests. Upon receipt...) Requests in writing, including those sent by e-mail, via the Web site, or by Fax. Within five working days...
5 CFR 2606.201 - Requests for access.
Code of Federal Regulations, 2011 CFR
2011-01-01
... on OGE's Web site at http://www.usoge.gov, or upon request from OGE's Office of General Counsel and... Office of Federal Register at the GPO Access Web site (http://www.access.gpo.gov/su_docs/aces/PrivacyAct... individual's full name (including her maiden name, if pertinent), dates of employment, social security number...
6 CFR 5.21 - Requests for access to records.
Code of Federal Regulations, 2011 CFR
2011-01-01
... accessed electronically at the Government Printing Office's World Wide Web site (which can be found at http... Printing Office's World Wide Web site (which can be found at http://www.access.gpo.gov/su_docs). (c... requested records, you may also, at your option, include your social security number. (e) Verification of...
28 CFR 16.41 - Requests for access to records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... the Government Printing Office's World Wide Web site (which can be found at http://www.access.gpo.gov... accessed electronically at the Government Printing Office's World Wide Web site (which can be found at http... requested records, you may also, at your option, include your social security number. (e) Verification of...
6 CFR 5.21 - Requests for access to records.
Code of Federal Regulations, 2010 CFR
2010-01-01
... accessed electronically at the Government Printing Office's World Wide Web site (which can be found at http... Printing Office's World Wide Web site (which can be found at http://www.access.gpo.gov/su_docs). (c... requested records, you may also, at your option, include your social security number. (e) Verification of...
28 CFR 16.41 - Requests for access to records.
Code of Federal Regulations, 2011 CFR
2011-07-01
... the Government Printing Office's World Wide Web site (which can be found at http://www.access.gpo.gov... accessed electronically at the Government Printing Office's World Wide Web site (which can be found at http... requested records, you may also, at your option, include your social security number. (e) Verification of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-29
... benefit. Title of Information Collection: Application for OFM Web site Account. OMB Control Number: 1405...] Notice of Request for Public Comments; 60-Day Notice of Proposed Information Collection: Forms DS-4138... for OFM Web Site Account; Foreign Diplomatic Services Applications, OMB Collection Number 1405-0105...
77 FR 14029 - Rental Assistance Demonstration: Notice of Web Availability and Request for Comments
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-08
... Demonstration: Notice of Web Availability and Request for Comments AGENCY: Office of the Assistant Secretary for... notice announces that HUD has posted on its Web site a demonstration program notice (Program Notice... submitted electronically through the www.regulations.gov Web site can be viewed by other commenters and...
78 FR 47245 - NARA Records Subject to FOIA
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-05
... the NARA Web site, available at: http://www.archives.gov/foia/electronic-reading-room.html . (b) The... 31, 1996, also will be placed on NARA's Web site at http://www.archives.gov/foia/electronic-reading... you faster if we have any questions about your request. It is incumbent on the requester to maintain a...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What criteria must Executive agencies consider when evaluating antenna siting requests? 102-79.90 Section 102-79.90 Public... MANAGEMENT REGULATION REAL PROPERTY 79-ASSIGNMENT AND UTILIZATION OF SPACE Assignment and Utilization of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-13
... Request; Cancer Trials Support Unit (CTSU) Public Use Forms and Customer Satisfaction Surveys (NCI... of customer satisfaction for clinical site staff using the CTSU Help Desk and the CTSU web site. An ongoing user satisfaction survey is in place for the Oncology Patient Enrollment Network (OPEN). User...
77 FR 46773 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-06
... SECURITIES AND EXCHANGE COMMISSION Proposed Collection; Comment Request Upon Written Request, Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy... specified financial information to the Commission and post it on their corporate Web sites, if any, in...
NASA Astrophysics Data System (ADS)
Cabral, Alexandre; Rebordão, José M.
2011-05-01
In optical security (protection against forgery and counterfeit of products and documents) the problem is not exact reproduction but the production of something sufficiently similar to the original. Currently, Diffractive Optically Variable Image Devices (DOVID), that create dynamic chromatic effects which may be easily recognized but are difficult to reproduce, are often used to protect important products and documents. Well known examples of DOVID for security are 3D or 2D/3D holograms in identity documents and credit cards. Others are composed of shapes with different types of microstructures yielding by diffraction to chromatic dynamic effects. A maskless interferometric lithography technique to generate DOVIDs for optical security is presented and compared to traditional techniques. The approach can be considered as a self-masking focused holography on planes tilted with respect to the reference optical axes of the system, and is based on the Scheimpflug and Hinge rules. No physical masks are needed to ensure optimum exposure of the photosensitive film. The system built to demonstrate the technique relies on the digital mirrors device MOEMS technology from Texas Instruments' Digital Light Processing. The technique is linear on the number of specified colors and does not depend either on the area of the device or the number of pixels, factors that drive the complexity of dot-matrix based systems. The results confirmed the technique innovation and capabilities in the creation of diffractive optical elements for security against counterfeiting and forgery.
Analyzing handwriting biometrics in metadata context
NASA Astrophysics Data System (ADS)
Scheidat, Tobias; Wolf, Franziska; Vielhauer, Claus
2006-02-01
In this article, methods for user recognition by online handwriting are experimentally analyzed using a combination of demographic data of users in relation to their handwriting habits. Online handwriting as a biometric method is characterized by having high variations of characteristics that influences the reliance and security of this method. These variations have not been researched in detail so far. Especially in cross-cultural application it is urgent to reveal the impact of personal background to security aspects in biometrics. Metadata represent the background of writers, by introducing cultural, biological and conditional (changing) aspects like fist language, country of origin, gender, handedness, experiences the influence handwriting and language skills. The goal is the revelation of intercultural impacts on handwriting in order to achieve higher security in biometrical systems. In our experiments, in order to achieve a relatively high coverage, 48 different handwriting tasks have been accomplished by 47 users from three countries (Germany, India and Italy) have been investigated with respect to the relations of metadata and biometric recognition performance. For this purpose, hypotheses have been formulated and have been evaluated using the measurement of well-known recognition error rates from biometrics. The evaluation addressed both: system reliance and security threads by skilled forgeries. For the later purpose, a novel forgery type is introduced, which applies the personal metadata to security aspects and includes new methods of security tests. Finally in our paper, we formulate recommendations for specific user groups and handwriting samples.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-08
... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-SFUND-2011-0052; FRL-9263-6] Agency Information Collection Activities; Proposed Collection; Comment Request; Information Collection Request for Superfund Site Evaluation and Hazard Ranking System AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-29
... to obtain or retain a benefit. Title of Information Collection: Application for OFM Web site Account...] 30-Day Notice of Proposed Information Collection: Forms DS-4138, Request for Escort Screening Courtesies; DS-4139, Photograph and Signature Card; & DS-4140, Application for OFM Web Site Account; DS- 1504...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-21
... Disability in Air Travel: Accessibility of Web Sites and Automated Kiosks at U.S. Airports AGENCY: Office of... January 9, 2012. This extension is a result of requests from a number of parties for additional time to... constructive comments for the Department's consideration. The Interactive Travel Services Association requested...
76 FR 77536 - Agency Information Collection Request. 60-Day Public Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-13
... required data elements from applicants. The SF-424 Project/Performance Site Location(s) form is a part of Grants.gov 's mission to reduce duplication of similar or identical forms and data sets, establish... Project/Performance Site Location(s) form and data set that will serve as a common form for various grant...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-29
...; Comment Request; Cancer Trials Support Unit (CTSU) Public Use Forms and Customer Satisfaction Surveys (NCI...: CTSU collects annual surveys of customer satisfaction for clinical site staff using the CTSU Help Desk and the CTSU Web site. An ongoing user satisfaction survey is in place for the Oncology Patient...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-13
...; Comment Request Cancer Trials Support Unit (CTSU) Public Use Forms and Customer Satisfaction Surveys (NCI... Collection: CTSU collects annual surveys of customer satisfaction for clinical site staff using the CTSU Help Desk and the CTSU Web site. An ongoing user satisfaction survey is in place for the Oncology Patient...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-15
... Activities; Proposed Collection; Comment Request; Distribution of Offsite Consequence Analysis Information... Collection Request (ICR), Distribution of Offsite Consequence Analysis Information under Section 112(r)(7)(H... Air Act Section 112(r)(7); Distribution of Off-Site Consequence Analysis Information. CAA section 112...
Code of Federal Regulations, 2010 CFR
2010-07-01
... access, amendment, or accounting by submitting a written request for review to the Director, Information... reverses its initial denial of a request for accounting, the POC will notify the requester when the accounting is available for on-site review or transmission in paper or electronic medium. (e) If ODNI upholds...
Edward's sword? - A non-destructive study of a medieval king's sword
NASA Astrophysics Data System (ADS)
Segebade, Chr.
2013-04-01
Non-destructive and instrumental methods including photon activation analysis were applied in an examination of an ancient sword. It was tried to find indication of forgery or, if authentic, any later processing and alteration. Metal components of the hilt and the blade were analysed by instrumental photon activation. Non-destructive metallurgical studies (hardness measurements, microscopic microstructure analysis) are briefly described, too. The results of these investigations did not yield indication of non-authenticity. This stood in agreement with the results of stylistic and scientific studies by weapon experts.
Edward's sword? - A non-destructive study of a medieval king's sword
DOE Office of Scientific and Technical Information (OSTI.GOV)
Segebade, Chr.
2013-04-19
Non-destructive and instrumental methods including photon activation analysis were applied in an examination of an ancient sword. It was tried to find indication of forgery or, if authentic, any later processing and alteration. Metal components of the hilt and the blade were analysed by instrumental photon activation. Non-destructive metallurgical studies (hardness measurements, microscopic microstructure analysis) are briefly described, too. The results of these investigations did not yield indication of non-authenticity. This stood in agreement with the results of stylistic and scientific studies by weapon experts.
2002-12-01
504.6, p < .01. The Kaiser - Meyer - Olkin measure of sampling adequacy was .74 this exceeds the stated level for suitability of .70 (Hair, 1995). For...680.1, p < .01. The Kaiser - Meyer - Olkin measure of sampling adequacy was .76. These tests of assumption reveal the data is suitable for exploratory...Experiment 2, the Bartlett’s test of spericity revealed the data was also suitable for factor analysis with a χ2 = 282.1, p < .01. The Kaiser - Meyer
Experimental realization of quantum cheque using a five-qubit quantum computer
NASA Astrophysics Data System (ADS)
Behera, Bikash K.; Banerjee, Anindita; Panigrahi, Prasanta K.
2017-12-01
Quantum cheques could be a forgery-free way to make transaction in a quantum networked banking system with perfect security against any no-signalling adversary. Here, we demonstrate the implementation of quantum cheque, proposed by Moulick and Panigrahi (Quantum Inf Process 15:2475-2486, 2016), using the five-qubit IBM quantum computer. Appropriate single qubit, CNOT and Fredkin gates are used in an optimized configuration. The accuracy of implementation is checked and verified through quantum state tomography by comparing results from the theoretical and experimental density matrices.
Multicollision attack on CBC-MAC, EMAC, and XCBC-MAC of AES-128 algorithm
NASA Astrophysics Data System (ADS)
Brolin Sihite, Alfonso; Hayat Susanti, Bety
2017-10-01
A Message Authentication Codes (MAC) can be constructed based on a block cipher algorithm. CBC-MAC, EMAC, and XCBC-MAC constructions are some of MAC schemes that used in the hash function. In this paper, we do multicollision attack on CBC-MAC, EMAC, and XCBC-MAC construction which uses AES-128 block cipher algorithm as basic construction. The method of multicollision attack utilizes the concept of existential forgery on CBC-MAC. The results show that the multicollision can be obtained easily in CBC-MAC, EMAC, and XCBC-MAC construction.
Operating a wide-area remote observing system for the W. M. Keck Observatory
NASA Astrophysics Data System (ADS)
Wirth, Gregory D.; Kibrick, Robert I.; Goodrich, Robert W.; Lyke, James E.
2008-07-01
For over a decade, the W. M. Keck Observatory's two 10-meter telescopes have been operated remotely from its Waimea headquarters. Over the last 6 years, WMKO remote observing has expanded to allow teams at dedicated sites in California to observe either in collaboration with colleagues in Waimea or entirely from the U.S. mainland. Once an experimental effort, the Observatory's mainland observing capability is now fully operational, supported on all science instruments (except the interferometer) and regularly used by astronomers at eight mainland sites. Establishing a convenient and secure observing capability from those sites required careful planning to ensure that they are properly equipped and configured. It also entailed a significant investment in hardware and software, including both custom scripts to simplify launching the instrument interface at remote sites and automated routers employing ISDN backup lines to ensure continuation of observing during Internet outages. Observers often wait until shortly before their runs to request use of the mainland facilities. Scheduling these requests and ensuring proper system operation prior to observing requires close coordination between personnel at WMKO and the mainland sites. An established protocol for approving requests and carrying out pre-run checkout has proven useful in ensuring success. The Observatory anticipates enhancing and expanding its remote observing system. Future plans include deploying dedicated summit computers for running VNC server software, implementing a web-based tracking system for mainland-based observing requests, expanding the system to additional mainland sites, and converting to full-time VNC operation for all instruments.
Guéguen, Nicolas
2003-04-01
In an attempt to test the door-in-the-face (DITF) technique in a computer-mediated context, 1,607 men and women taken at random in various e-mail lists were solicited to visit a web site for the profit of a humanitarian organization. In DITF condition, subjects were first solicited by an exaggerated request and, after refusing, were solicited for a small donation. In control condition the donation solicitation was formulated directly. In all the cases, the request was manipulated by the order of the successive HTML pages of the site. Results show that the DITF procedure increase compliance to the last request. The theoretical implication of the effect of this technique in a computer-communication context is discussed.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-12
... NCCAM Web site at http://nccam.nih.gov from on or about May 10 through May 24, 2010. The public is... guided by NCCAM's previous strategic plans, located on the NCCAM Web site at http://nccam.nih.gov/about... May 24, 2010. The papers may be viewed at http://nccam.nih.gov/ . Request for Comments: The public is...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Requests for Commission records available in the Public Reference Room and from the Commission's web site, http://www.ferc.gov... available in the Public Reference Room and from the Commission's web site, http://www.ferc.gov. (a)(1) A...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Requests for Commission records available in the Public Reference Room and from the Commission's web site, http://www.ferc.gov... available in the Public Reference Room and from the Commission's web site, http://www.ferc.gov. (a)(1) A...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 18 Conservation of Power and Water Resources 1 2011-04-01 2011-04-01 false Requests for Commission records available in the Public Reference Room and from the Commission's web site, http://www.ferc.gov... available in the Public Reference Room and from the Commission's web site, http://www.ferc.gov. (a)(1) A...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Requests for Commission records available in the Public Reference Room and from the Commission's web site, http://www.ferc.gov... available in the Public Reference Room and from the Commission's web site, http://www.ferc.gov. (a)(1) A...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Requests for Commission records available in the Public Reference Room and from the Commission's web site, http://www.ferc.gov... available in the Public Reference Room and from the Commission's web site, http://www.ferc.gov. (a)(1) A...
75 FR 44053 - Proposed Collection; Comment Request: CDFI/CDE Project Profiles Web Form
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-27
...; Comment Request: CDFI/CDE Project Profiles Web Form ACTION: Notice and request for comments. SUMMARY: The... the Treasury, is soliciting comments concerning the CDFI/CDE Project Profile Web Form, a voluntary... CIIS. The CDFI Fund plans to use the descriptions in CDFI Fund publications, on its Web site and in...
7 CFR 3601.7 - Requests for published data and information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Requests for published data and information. 3601.7... STATISTICS SERVICE, DEPARTMENT OF AGRICULTURE PUBLIC INFORMATION § 3601.7 Requests for published data and information. (a) Published data and reports produced by NASS since 1995 are available via the NASS Web site at...
7 CFR 3701.7 - Requests for published data and information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Requests for published data and information. 3701.7... SERVICE, DEPARTMENT OF AGRICULTURE PUBLIC INFORMATION § 3701.7 Requests for published data and information. Published data and reports produced by ERS since 1996 are available on the ERS Web site at http://www.ers...
77 FR 27151 - Implementing the Freedom of Information Act
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-09
... e-FOIA Reading Room. OSTP shall make records available on its Web site in accordance with 5 U.S.C... review documents available at the OSTP e-FOIA Reading Room before submitting a request. (c) Definitions... qualify for faster processing. (2) Complex requests. The second track is for requests involving ``unusual...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-26
... (soil dwelling ``white grubs''). Halofenozide is registered for use on non-agricultural uses sites... agricultural uses. In a letter dated June 25, 2012, the technical registrant, Dow AgroSciences, requested EPA..., Dow AgroSciences requested cancellation of its nine halofenozide product registrations because they no...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... OFFICE OF PERSONNEL MANAGEMENT Proposed Collection; Comment Request for Review of a Revised... Management and Budget (OMB) a request for review of a revised information collection. This information...) System'' (OMB Control No. 3206-0201), and the Open Season Web site, Open Season Online, are used by...
22 CFR 503.2 - Making a request.
Code of Federal Regulations, 2010 CFR
2010-04-01
... addressed to The Broadcasting Board of Governors (BBG), FOIA/Privacy Act Officer, Office of the General... the Internet on BBG's World Wide Web site (http://www.ibb.gov). The more specific the request for...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-22
... OFFICE OF PERSONNEL MANAGEMENT Submission for OMB Review; Comment Request for Review of a Revised... and Budget (OMB) a request for review of a revised information collection. This information collection...'' (OMB Control No. 3206-0201), and the Open Season Web site, Open Season Online, are used by retirees and...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-12
... for OMB Review; Comment Request; Job Corps Process Study ACTION: Notice. SUMMARY: The Department of... collection request (ICR) proposal titled, ``Job Corps Process Study,'' to the Office of Management and Budget... conduct site visits to Job Corps centers and a survey of center directors for a process study of the Job...
75 FR 16868 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-02
... provide the information necessary for engineering studies of operational anomalies and trends and patterns... clearance requests are available at the NRC World Wide Web site: http://www.nrc.gov/public-involve/doc...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-05
... certification responsibilities for the chemistry and microbiology laboratories that they oversee in their...--including an assessment of Proficiency Test results; and on-site audits at least triennially). Whereas 40...
On the usability and security of pseudo-signatures
NASA Astrophysics Data System (ADS)
Chen, Jin; Lopresti, Daniel
2010-01-01
Handwriting has been proposed as a possible biometric for a number of years. However, recent work has shown that handwritten passphrases are vulnerable to both human-based and machine-based forgeries. Pseudosignatures as an alternative are designed to thwart such attacks while still being easy for users to create, remember, and reproduce. In this paper, we briefly review the concept of pseudo-signatures, then describe an evaluation framework that considers aspects of both usability and security. We present results from preliminary experiments that examine user choice in creating pseudo-signatures and discuss the implications when sketching is used for generating cryptographic keys.
24 CFR 15.103 - How can I get other records from HUD?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false How can I get other records from... request form on HUD's Internet web site at http://www.hud.gov. (d) What should I include in my FOIA... on his or her behalf; and (7) If you are requesting expedited processing, your request should set out...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-13
... from the United States. That request may be found at www.wto.org contained in a document designated as... requested consultations with China. That request may be found at www.wto.org contained in a document... of the Appellate Body, will be available on the Web site of the World Trade Organization, www.wto.org...
5 CFR 1640.6 - Methods of providing information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... part to participants by making it available on the TSP Web site. A participant can request paper copies of that information from the TSP by calling the ThriftLine, submitting a request through the TSP Web...
5 CFR 1640.6 - Methods of providing information.
Code of Federal Regulations, 2014 CFR
2014-01-01
... part to participants by making it available on the TSP Web site. A participant can request paper copies of that information from the TSP by calling the ThriftLine, submitting a request through the TSP Web...
5 CFR 1640.6 - Methods of providing information.
Code of Federal Regulations, 2013 CFR
2013-01-01
... part to participants by making it available on the TSP Web site. A participant can request paper copies of that information from the TSP by calling the ThriftLine, submitting a request through the TSP Web...
5 CFR 1650.24 - How to obtain a post-employment withdrawal.
Code of Federal Regulations, 2010 CFR
2010-01-01
... request form or use the TSP Web site to initiate a request. (A participant's ability to complete a post-employment withdrawal on the Web will depend on his or her retirement system coverage, withdrawal election...
Koch Mineral Services Response to Section 114 Information Request
Koch Minerals asserts EPA's request exceeds the scope of the Clean Air Act; but does provide site information for its KCBX, Duluth, and Green Bay petroleum coke staging and handling facilities, throughput logs, and fugitive emissions prevention measures.
5 CFR 1650.24 - How to obtain a post-employment withdrawal.
Code of Federal Regulations, 2011 CFR
2011-01-01
... request form or use the TSP Web site to initiate a request. (A participant's ability to complete a post-employment withdrawal on the Web will depend on his or her retirement system coverage, withdrawal election...
5 CFR 1650.24 - How to obtain a post-employment withdrawal.
Code of Federal Regulations, 2012 CFR
2012-01-01
... request form or use the TSP Web site to initiate a request. (A participant's ability to complete a post-employment withdrawal on the Web will depend on his or her retirement system coverage, withdrawal election...
Configuring a Graphical User Interface for Managing Local HYSPLIT Model Runs Through AWIPS
NASA Technical Reports Server (NTRS)
Wheeler, mark M.; Blottman, Peter F.; Sharp, David W.; Hoeth, Brian; VanSpeybroeck, Kurt M.
2009-01-01
Responding to incidents involving the release of harmful airborne pollutants is a continual challenge for Weather Forecast Offices in the National Weather Service. When such incidents occur, current protocol recommends forecaster-initiated requests of NOAA's Hybrid Single-Particle Lagrangian Integrated Trajectory (HYSPLIT) model output through the National Centers of Environmental Prediction to obtain critical dispersion guidance. Individual requests are submitted manually through a secured web site, with desired multiple requests submitted in sequence, for the purpose of obtaining useful trajectory and concentration forecasts associated with the significant release of harmful chemical gases, radiation, wildfire smoke, etc., into local the atmosphere. To help manage the local HYSPLIT for both routine and emergency use, a graphical user interface was designed for operational efficiency. The interface allows forecasters to quickly determine the current HYSPLIT configuration for the list of predefined sites (e.g., fixed sites and floating sites), and to make any necessary adjustments to key parameters such as Input Model. Number of Forecast Hours, etc. When using the interface, forecasters will obtain desired output more confidently and without the danger of corrupting essential configuration files.
Static Signature Synthesis: A Neuromotor Inspired Approach for Biometrics.
Ferrer, Miguel A; Diaz-Cabrera, Moises; Morales, Aythami
2015-03-01
In this paper we propose a new method for generating synthetic handwritten signature images for biometric applications. The procedures we introduce imitate the mechanism of motor equivalence which divides human handwriting into two steps: the working out of an effector independent action plan and its execution via the corresponding neuromuscular path. The action plan is represented as a trajectory on a spatial grid. This contains both the signature text and its flourish, if there is one. The neuromuscular path is simulated by applying a kinematic Kaiser filter to the trajectory plan. The length of the filter depends on the pen speed which is generated using a scalar version of the sigma lognormal model. An ink deposition model, applied pixel by pixel to the pen trajectory, provides realistic static signature images. The lexical and morphological properties of the synthesized signatures as well as the range of the synthesis parameters have been estimated from real databases of real signatures such as the MCYT Off-line and the GPDS960GraySignature corpuses. The performance experiments show that by tuning only four parameters it is possible to generate synthetic identities with different stability and forgers with different skills. Therefore it is possible to create datasets of synthetic signatures with a performance similar to databases of real signatures. Moreover, we can customize the created dataset to produce skilled forgeries or simple forgeries which are easier to detect, depending on what the researcher needs. Perceptual evaluation gives an average confusion of 44.06 percent between real and synthetic signatures which shows the realism of the synthetic ones. The utility of the synthesized signatures is demonstrated by studying the influence of the pen type and number of users on an automatic signature verifier.
NASA Astrophysics Data System (ADS)
Prijono, Agus; Darmawan Hangkawidjaja, Aan; Ratnadewi; Saleh Ahmar, Ansari
2018-01-01
The verification to person who is used today as a fingerprint, signature, personal identification number (PIN) in the bank system, identity cards, attendance, easily copied and forged. This causes the system not secure and is vulnerable to unauthorized persons to access the system. In this research will be implemented verification system using the image of the blood vessels in the back of the palms as recognition more difficult to imitate because it is located inside the human body so it is safer to use. The blood vessels located at the back of the human hand is unique, even humans twins have a different image of the blood vessels. Besides the image of the blood vessels do not depend on a person’s age, so it can be used for long term, except in the case of an accident, or disease. Because of the unique vein pattern recognition can be used in a person. In this paper, we used a modification method to perform the introduction of a person based on the image of the blood vessel that is using Modified Local Line Binary Pattern (MLLBP). The process of matching blood vessel image feature extraction using Hamming Distance. Test case of verification is done by calculating the percentage of acceptance of the same person. Rejection error occurs if a person was not matched by the system with the data itself. The 10 person with 15 image compared to 5 image vein for each person is resulted 80,67% successful Another test case of the verification is done by verified two image from different person that is forgery, and the verification will be true if the system can rejection the image forgery. The ten different person is not verified and the result is obtained 94%.
76 FR 17116 - Notice of Proposed Information Collection Requests
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-28
... collection requirements and provide the requested data in the desired format. The Director, Information... Review: Extension. Title of Collection: Experimental Sites Initiative--Data Collection Instrument. OMB... data collection instrument will be used to collect specific information and performance data for...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-19
... Maricopa County, AZ; Application for Expansion; (New Magnet Site) Under Alternative Site Framework An... additional new magnet sites in western Maricopa County, Arizona and request usage-driven designation for an..., Arizona. The current zone project includes the following magnet sites: Site 1 (230.25 acres)--within the...
Report: Congressional Request on Funding Needs for Non-Federal Superfund Sites
Report #2004-P-00001, January 7, 2004. During FY 2003, limited funding prevented EPA from beginning construction at all sites or providing additional funds needed to address sites in a manner believed necessary by regional officials.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-31
... DEPARTMENT OF TRANSPORTATION Federal Aviation Administration Agency Information Collection Activities: Requests for Comments; Clearance of Renewed Approval of Information Collection: License Requirements for Operation of a Launch Site AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... Consent Decree upon written request and payment of reproduction costs. Please mail your request and... enclose a check or money order for $6.00 (25 cents per page reproduction cost) payable to the United...
78 FR 72679 - Submission for OMB Review: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-03
... OMB Review: Comment Request Title: RPG National Cross-Site Evaluation and Evaluation Technical..., activities, and services designed to increase well-being, improve permanency, and enhance the safety of... Research. The evaluation is being implemented by Mathematica Policy Research and its subcontractors, Walter...
30 CFR 285.416 - How do I request a lease or grant suspension?
Code of Federal Regulations, 2010 CFR
2010-07-01
... SAP, COP, or GAP, as required, you may request a suspension to extend the preliminary or site assessment term of your lease or grant that includes a revised schedule for submission of a SAP, COP, or GAP...
Elevation Request Letter to Army - signed April 25, 1989
A request for review of the decision to issue a Section 404 permit to Ham Mountain Development Corporation authorizing the placement of fill material into 97.41 acres of federally regulated wetlands at a site known as Mill Creek in Secaucus, NJ.
76 FR 49491 - Proposed Information Collection Activity; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-10
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Administration for Children and Families Proposed Information Collection Activity; Comment Request Title: Understanding Urban Indians' Interactions with ACF...' Interactions with ACF Programs and Services'' research study, site visits will be conducted to three to five...
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1994-12-01
This document represents a Site-specific Standard Request for underground storage tanks (USTs) 1219-U,1222-U and 2082-U previously located at former Building 9754-1, and tank 2086-U previously located at Building 9720-15, Oak Ridge Y-12 Plant, Oak Ridge, Tennessee. The tanks previously contained petroleum products. For the purposes of this report, the two building sites will be regarded as a single UST site and will be referred to as the Rust Garage Facility. The current land use associated with the Y-12 Plant is light industrial and the operational period of the plant is projected to be at least 30 years. Thus, potential futuremore » residential exposures are not expected to occur for at least 30 years. Based on the degradation coefficient for benzene (the only carcinogenic petroleum constituent detected in soils or groundwater at the Rust Garage Facility), it is expected that the benzene and other contaminants at the site will likely be reduced prior to expiration of the 30-year plant operational period. As the original sources of petroleum contamination have been removed, and the area of petroleum contamination is limited, a site-specific standard is therefore being requested for the Rust Garage Facility.« less
A Flexible Monitoring Infrastructure for the Simulation Requests
NASA Astrophysics Data System (ADS)
Spinoso, V.; Missiato, M.
2014-06-01
Running and monitoring simulations usually involves several different aspects of the entire workflow: the configuration of the job, the site issues, the software deployment at the site, the file catalogue, the transfers of the simulated data. In addition, the final product of the simulation is often the result of several sequential steps. This project tries a different approach to monitoring the simulation requests. All the necessary data are collected from the central services which lead the submission of the requests and the data management, and stored by a backend into a NoSQL-based data cache; those data can be queried through a Web Service interface, which returns JSON responses, and allows users, sites, physics groups to easily create their own web frontend, aggregating only the needed information. As an example, it will be shown how it is possible to monitor the CMS services (ReqMgr, DAS/DBS, PhEDEx) using a central backend and multiple customized cross-language frontends.
A hash based mutual RFID tag authentication protocol in telecare medicine information system.
Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C
2015-01-01
Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.
Societal and ethical implications of anti-spoofing technologies in biometrics.
Rebera, Andrew P; Bonfanti, Matteo E; Venier, Silvia
2014-03-01
Biometric identification is thought to be less vulnerable to fraud and forgery than are traditional forms of identification. However biometric identification is not without vulnerabilities. In a 'spoofing attack' an artificial replica of an individual's biometric trait is used to induce a system to falsely infer that individual's presence. Techniques such as liveness-detection and multi-modality, as well as the development of new and emerging modalities, are intended to secure biometric identification systems against such threats. Unlike biometrics in general, the societal and ethical issues raised by spoofing and anti-spoofing techniques have not received much attention. This paper examines these issues.
Practical of Ethics Education in Junior High School Technical Arts
NASA Astrophysics Data System (ADS)
Iwata, Ryo; Hirano, Shigeo
Now, such as forgery, camouflage, concealment, and the alteration, the problems resulting from lack of the sense of ethics are occurring frequently. The department of junior high school technical arts to engineering ethics education is required for the solution. However, the example of introducing the ethics education is few in a current junior high school technical arts department. It is considered that it leads to a further improvement of the morality consideration by teaching from a past case to the engineering ethics at the stage of the compulsory education. In this thesis, it reports on the execution contents and an educational result.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-16
...: Exchange Programs Alumni Web Site Registration ACTION: Notice of request for public comment and submission... Information Collection: Exchange Programs Alumni Web site Registration. OMB Control Number: 1405-0192. Type of... proposed collection: The International Exchange Alumni Web site requires information to process users...
22 CFR 502.3 - Availability of program materials on public Web sites.
Code of Federal Regulations, 2014 CFR
2014-04-01
... sites. 502.3 Section 502.3 Foreign Relations BROADCASTING BOARD OF GOVERNORS DOMESTIC REQUESTS FOR BROADCASTING BOARD OF GOVERNORS PROGRAM MATERIALS § 502.3 Availability of program materials on public Web sites... information Web sites designed for foreign audiences. To access currently-available Agency program materials...
50 CFR 300.103 - Procedure for according protection to CCAMLR Ecosystem Monitoring Program Sites.
Code of Federal Regulations, 2010 CFR
2010-10-01
... valid for a period of up to five years. Applicants requesting a permit to reenter a Protected Site must... corner of Elephant Island, South Shetland Islands. The Seal Islands CEMP Protected Site includes the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-29
... ``magnet'' site. The ASF allows for the possible exemption of one magnet site from the ``sunset'' time.... In addition, the applicant is also requesting the approval of the following new magnet site: Proposed...
30 CFR 585.416 - How do I request a lease or grant suspension?
Code of Federal Regulations, 2013 CFR
2013-07-01
... submit a SAP, COP, or GAP, as required, you may request a suspension to extend the preliminary or site assessment term of your lease or grant that includes a revised schedule for submission of a SAP, COP, or GAP...
30 CFR 585.416 - How do I request a lease or grant suspension?
Code of Federal Regulations, 2014 CFR
2014-07-01
... submit a SAP, COP, or GAP, as required, you may request a suspension to extend the preliminary or site assessment term of your lease or grant that includes a revised schedule for submission of a SAP, COP, or GAP...
30 CFR 585.416 - How do I request a lease or grant suspension?
Code of Federal Regulations, 2012 CFR
2012-07-01
... submit a SAP, COP, or GAP, as required, you may request a suspension to extend the preliminary or site assessment term of your lease or grant that includes a revised schedule for submission of a SAP, COP, or GAP...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-04
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0077] Agency Information Collection Activities: Submission for Review; Information Collection Request for the Department of Homeland Security (DHS), Science and Technology, External S&T Collaboration Site (E-STCS) AGENCY: Science and Technology...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1994-08-01
This document is a site-specific standard request for underground storage tanks located at the Rust Garage Facility. These standards are justified based on conclusion derived from the exposure assessment that indicates there is no current or forseeable future human health risk associated with petroleum contaminants on the site, that current and future ecological risks would be generally limited to subsurface species and plant life with roots extending into the area, and that most of the impacted area at the site is covered by asphalt or concrete. The vertical and horizontal extent of soil and ground water contamination are limited tomore » immediate area of the Rust Garage Facility.« less
10 CFR 52.27 - Limited work authorization after issuance of early site permit.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Limited work authorization after issuance of early site..., AND APPROVALS FOR NUCLEAR POWER PLANTS Early Site Permits § 52.27 Limited work authorization after issuance of early site permit. A holder of an early site permit may request a limited work authorization in...
10 CFR 52.27 - Limited work authorization after issuance of early site permit.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Limited work authorization after issuance of early site..., AND APPROVALS FOR NUCLEAR POWER PLANTS Early Site Permits § 52.27 Limited work authorization after issuance of early site permit. A holder of an early site permit may request a limited work authorization in...
Hanford Site Environmental Safety and Health Fiscal Year 2001 Budget-Risk management summary
DOE Office of Scientific and Technical Information (OSTI.GOV)
REEP, I.E.
1999-05-12
The Hanford Site Environment, Safety and Health (ES&H) Budget-Risk Management Summary report is prepared to support the annual request to sites in the U.S. Department of Energy (DOE) Complex by DOE, Headquarters. The request requires sites to provide supplementary crosscutting information related to ES&H activities and the ES&H resources that support these activities. The report includes the following: (1) A summary status of fiscal year (FY) 1999 ES&H performance and ES&H execution commitments; (2)Status and plans of Hanford Site Office of Environmental Management (EM) cleanup activities; (3) Safety and health (S&H) risk management issues and compliance vulnerabilities of FY 2001more » Target Case and Below Target Case funding of EM cleanup activities; (4) S&H resource planning and crosscutting information for FY 1999 to 2001; and (5) Description of indirect-funded S&H activities.« less
32 CFR Appendix B to Part 286 - Addressing FOIA Requests
Code of Federal Regulations, 2012 CFR
2012-07-01
... Administration Under Secretary of Defense (Acquisition & Technology) Deputy Under Secretary of Defense (Logistics... Experiments Command Center On-Site Inspection Agency Under Secretary of Defense (Comptroller) Director..., VA 22314-1651. AP2.2.9. Defense Logistics Agency (DLA). DLA records may be requested from its...
Code of Federal Regulations, 2014 CFR
2014-07-01
... PROGRAM DEFENSE LOGISTICS AGENCY FREEDOM OF INFORMATION ACT PROGRAM General Provisions § 300.4 Policy. DLA... Requester Service Center contact information. (1) To meet the requirements of Executive Order 13392, each FOIA Requester Service Center shall have an internet Web site that serves to educate the public on the...
32 CFR Appendix B to Part 286 - Addressing FOIA Requests
Code of Federal Regulations, 2013 CFR
2013-07-01
... Administration Under Secretary of Defense (Acquisition & Technology) Deputy Under Secretary of Defense (Logistics... Experiments Command Center On-Site Inspection Agency Under Secretary of Defense (Comptroller) Director..., VA 22314-1651. AP2.2.9. Defense Logistics Agency (DLA). DLA records may be requested from its...
32 CFR Appendix B to Part 286 - Addressing FOIA Requests
Code of Federal Regulations, 2014 CFR
2014-07-01
... Administration Under Secretary of Defense (Acquisition & Technology) Deputy Under Secretary of Defense (Logistics... Experiments Command Center On-Site Inspection Agency Under Secretary of Defense (Comptroller) Director..., VA 22314-1651. AP2.2.9. Defense Logistics Agency (DLA). DLA records may be requested from its...
32 CFR Appendix B to Part 286 - Addressing FOIA Requests
Code of Federal Regulations, 2011 CFR
2011-07-01
... Administration Under Secretary of Defense (Acquisition & Technology) Deputy Under Secretary of Defense (Logistics... Experiments Command Center On-Site Inspection Agency Under Secretary of Defense (Comptroller) Director..., VA 22314-1651. AP2.2.9. Defense Logistics Agency (DLA). DLA records may be requested from its...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-22
... Collection; Comment Request; Survey of Hawaii Resident Resource Users' Knowledge, Attitudes and Perceptions... two priority sites. The purpose of this survey is to identify resident users' knowledge, attitudes...' knowledge, attitudes, and perceptions will supplement broader public input into the conservation planning...
American Lead Action Memorandum
ACTION MEMORANDUM— Request for a Time-Critical Removal Action andExemption from the $2 Million and 12-Month Statutory Limits at the AmericanLead Site, Indianapolis, Marion County, Indiana (Site ID #B56J)
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Site audit. 149.3 Section 149.3... LIVESTOCK IMPROVEMENT VOLUNTARY TRICHINAE CERTIFICATION PROGRAM § 149.3 Site audit. (a) General. (1) The producer must contact a QAV or QVMO to request a site audit. A list of available QAVs may be obtained by...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-02
... Copper Mine Site AGENCY: Environmental Protection Agency. ACTION: Notice, request for public comments... concerning the ANACONDA COPPER MINE SITE (the ``Site''), located in Yerington, Lyon County, Nevada. The... Peak Services Agreement for the Anaconda Copper Mine Site, and Region IX Docket No. 9-2012-07. FOR...
Globalization amid the Cornfields: Teaching Sustainable Practices in the American Midwest
ERIC Educational Resources Information Center
Writing Instructor, 2010
2010-01-01
This article discusses three sites that disrupt accustomed expectations and roles for technical communication. These sites include an agricultural processing site that is requesting tax abatements in exchange for decreased emissions so that it can remain competitive in the global market. The second is also an agricultural manufacturing site that…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-29
... (HPRP) grantees, as well as the site visit interview guide that will serve as the protocol for 15-18... site visit interview guide that will serve as the protocol for 15-18 site visits to be conducted to...
78 FR 68360 - Unmanned Aircraft System Test Site Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-14
...-0061] Unmanned Aircraft System Test Site Program AGENCY: Federal Aviation Administration (FAA), DOT...'') test site program; response to comments. SUMMARY: On February 22, 2013 the FAA published and requested public comment on the proposed privacy requirements (the ``Draft Privacy Requirements'') for UAS test...
5 CFR 1655.12 - Loan agreement.
Code of Federal Regulations, 2010 CFR
2010-01-01
... information as appropriate, to the participant. (2) If the participant initiates a loan request on the TSP Web site, which cannot be completed on the Web site, the participant must print the partially completed loan agreement directly from the Web site, provide any missing information (including spouse's...
5 CFR 1655.12 - Loan agreement.
Code of Federal Regulations, 2014 CFR
2014-01-01
... information as appropriate, to the participant. (2) If the participant initiates a loan request on the TSP Web site, which cannot be completed on the Web site, the participant must print the partially completed loan agreement directly from the Web site, provide any missing information (including spouse's...
76 FR 2690 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-14
... information on the CMS' public Internet Web site concerning a self-referral disclosure protocol (SRDP) that... participate in the SRDP. The SRDP is a voluntary self-disclosure instrument that will allow providers of... Collection Request: Revision of currently approved collection; Title of Information Collection: Medicare Self...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-08
... preparedness. The NETC site has facilities and housing available for those participating in emergency... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2010-0043...: Federal Emergency Management Agency, DHS. ACTION: Notice; 30-day notice and request for comments; revision...
75 FR 50005 - Notice of Public Information Collection Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-16
... submission of the following public information collection request (ICR) to the Office of Management and... estimated total burden may be obtained from the RegInfo.gov Web site at http://www.reginfo.gov/public/do..., including the validity of the methodology and assumptions used; (3) Enhance the quality, utility, and...
75 FR 50006 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-16
... submission of the following public information collection request (ICR) to the Office of Management and... estimated total burden may be obtained from the RegInfo.gov Web site at http://www.reginfo.gov/public/do..., including the validity of the methodology and assumptions used; (3) Enhance the quality, utility, and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-27
... delivery, or hand delivery. Please note that comments submitted by fax or email and those submitted after the comment period will not be accepted. Written requests for information or comments submitted by... respondents, including through the use of information technology. Please note that written comments received...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... Activities; Proposed Collection; Comment Request; Company-Run Annual Stress Test Reporting Template and... Federal savings associations titled, ``Company-Run Annual Stress Test Reporting Template and Documentation... Web site under Tools and Forms ( http://www.occ.gov/tools-forms/forms/bank-operations/stress-test...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-10
... order to evaluate current stormwater management practices, the scope of the current State and local...; Stormwater Management Including Discharges From Developed Sites Questionnaires AGENCY: Environmental... forwarded to the Office of Management and Budget (OMB) for review and approval. This is a request for a new...
18 CFR 388.109 - Fees for record requests.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Fees for record requests. 388.109 Section 388.109 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY... mail from the Public Reference Room. This schedule is also available on the Commission's Web site...
18 CFR 388.109 - Fees for record requests.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Fees for record requests. 388.109 Section 388.109 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY... mail from the Public Reference Room. This schedule is also available on the Commission's Web site...
18 CFR 388.109 - Fees for record requests.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Fees for record requests. 388.109 Section 388.109 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY... mail from the Public Reference Room. This schedule is also available on the Commission's Web site...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-13
... DEPARTMENT OF LABOR Office of the Secretary Agency Information Collection Activities; Submission for OMB Review; Comment Request; Job Clubs Study ACTION: Notice; correction. SUMMARY: The Department... comments on site visits to job clubs. The document contained incorrect dates. FOR FURTHER INFORMATION...
75 FR 39694 - Agency Information Collection Request. 60-Day Public Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-12
... Topic and community Guide). members. Guide for Discussion with Control group 48 1 1 48 Control Group... and Evaluation (ASPE), the Centers for Disease Control and Prevention (CDC), and the Administration... the treatment-control contrast evaluated in each site. It will also help in interpreting impact...
Code of Federal Regulations, 2011 CFR
2011-01-01
... COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CWC CLARIFICATION PROCEDURES (CONSULTATIONS AND CHALLENGE... through consultation between themselves or through the Organization for the Prohibition of Chemical Weapons (OPCW). A State Party may also request the OPCW to conduct an on-site challenge inspection of any...
78 FR 67099 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-08
... professionals, who provide meals in institutional settings, can locate processors who manufacture foods... Service Title: USDA Food Connect Web site. OMB Control Number: 0581-0224. Summary of Collection: The USDA Food Connect Web site (previously known as the USDA Food and Commodity Connection Web site) operates...
Astronomical Data Tsunami Full Site FAQ Site Info Feedback Click map for forecast jQuery Mobile Framework = Requested Location Satellite Visible (Vis) Infrared (IR) Regional Vis Regional IR Legal Mobile site Product : NWS Internet Team Privacy Policy Mobile Page Feedback Full Survey Tweet feedback (#nwsmobileweb
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-14
... State-administered FDPIR programs, participating households will be selected for data collection. Data... operations and experiences of FDPIR participants and eligible nonparticipants. Site visit data collection... providers; visits to FDPIR enrollment sites, warehouses, and distribution sites; and discussion groups with...
78 FR 48909 - SGS North America, Inc. (formerly SGS U.S. Testing Company, Inc.)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-12
... of one test site. OSHA also recognizes the removal of one test site and 13 test standards from SGS's... expand its recognition to include one additional test site located at 620 Old Peachtree Road, Suwanee, GA... this move, SGS requests the removal of one test site, located at 291 Fairfield Avenue, Fairfield, NJ...
75 FR 75962 - Proposed Information Collection; Comment Request; Commerce.Gov Web Site User Survey
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-07
...; Commerce.Gov Web Site User Survey AGENCY: Office of the Secretary, Office of Public Affairs. ACTION: Notice... serve users of Commerce.gov and the Department of Commerce bureaus' Web sites, the Offices of Public Affairs will collect information from users about their experience on the Web sites. A random number of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-07
... Liability Act, as Amended, Former W&J Lanyon Zinc Works Superfund Site, Pittsburg, Crawford County, KS... compromise of past response costs concerning the Former W&J Lanyon Zinc Works Superfund Site (the ``Site... 66219, (913) 551-7567. Requests should reference the Former W&J Lanyon Zinc Works Superfund Site, EPA...
22 CFR 1304.3 - Records available to the public.
Code of Federal Regulations, 2011 CFR
2011-04-01
... the information requested is already available on its Web site, which contains information readily... writing, to advise the individual of the availability of the information on the public Web site. MCC... after November 1, 1996 shall be made available electronically via the Web site at http://www.mcc.gov. (2...
22 CFR 1304.3 - Records available to the public.
Code of Federal Regulations, 2010 CFR
2010-04-01
... the information requested is already available on its Web site, which contains information readily... writing, to advise the individual of the availability of the information on the public Web site. MCC... after November 1, 1996 shall be made available electronically via the Web site at http://www.mcc.gov. (2...
40 CFR 1602.2 - Requests for access to records.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Government Printing Office's World Wide Web site (which can be found at http://www.access.gpo.gov/su_docs... requested records, you may also, at your option, include your social security number. (e) Verification of..., date and place of birth, and, at your option, the social security number of the individual; (2) Your...
40 CFR 1602.2 - Requests for access to records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Government Printing Office's World Wide Web site (which can be found at http://www.access.gpo.gov/su_docs... requested records, you may also, at your option, include your social security number. (e) Verification of..., date and place of birth, and, at your option, the social security number of the individual; (2) Your...
77 FR 67442 - Proposed Information Collections; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-09
... summarized in our request for Office of Management and Budget (OMB) approval of the relevant information... changes to these two forms, see the TTB announcement posted on the beer page of the TTB Web site at http://www.ttb.gov/beer/index.shtml . Type of Review: Revision of a currently approved collection. Affected...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-05
... provides that a registrant of a pesticide product may at any time request that any of its pesticide... these products who desire continued use on crops or sites being deleted should contact the applicable... Green, Information Technology and Resources Management Division, Office of Pesticide Programs...
75 FR 44017 - Office of the Secretary; Submission for OMB review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-27
... submission of the following public information collection request (ICR) to the Office of Management and... estimated total burden may be obtained from the RegInfo.gov Web site at http://www.reginfo.gov/public/do... information, including the validity of the methodology and assumptions used; (3) Enhance the quality, utility...
75 FR 44990 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-30
... submission of the following public information collection request (ICR) to the Office of Management and... estimated total burden may be obtained from the RegInfo.gov Web site at http://www.reginfo.gov/public/do...) Enhance the quality, utility, and clarity of the information to be collected; and (4) Minimize the burden...
75 FR 44287 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-28
... submission of the following public information collection request (ICR) to the Office of Management and... estimated total burden may be obtained from the RegInfo.gov Web site at http://www.reginfo.gov/public/do...) Enhance the quality, utility, and clarity of the information to be collected; and (4) Minimize the burden...
75 FR 6208 - Proposed Collection; Comment Request; Web Based Training for Pain Management Providers
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-08
... Request; Web Based Training for Pain Management Providers SUMMARY: Under the provisions of Section 3507(a... comment. Proposed Collection Title: Web Based Training for Pain Management Providers. Type of Information... effectiveness of the Web Based Training for Pain Management Providers, via the Web site PainAndAddiction...
76 FR 23354 - Notice of Request for the Extension of Currently Approved Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-26
... Administration (FTA), DOT. ACTION: Notice of Request for Comments. SUMMARY: In accordance with the Paperwork... electronic docket site. (Note: -The U.S. Department of Transportation's (DOT's) electronic docket is no....gov . You may review DOT's complete Privacy Act Statement in the Federal Register published April 11...
77 FR 40409 - Notice of Request for the Extension of a Currently Approved Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-09
... Administration (FTA), DOT. ACTION: Notice of request for comments. SUMMARY: In accordance with the Paperwork.... Government electronic docket site. (Note: The U.S. Department of Transportation's (DOT's) electronic docket... . You may review DOT's complete Privacy Act Statement in the Federal Register published April 11, 2000...
Code of Federal Regulations, 2014 CFR
2014-01-01
... processes the paper application or on the date the request is entered on the TSP Web site. (b) The interest... participant informs the TSP record keeper that he or she entered into active duty military service, and, as a result, requests that the interest rate on a loan issued before entry into active duty military service...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-15
... the Land and Water Conservation Fund (L&WCF) State assistance program. Matching grants are provided to... free-of-charge. SUPPLEMENTARY INFORMATION: OMB Control Number: 1024-0034. Title: Land and Water Conservation Fund On-Site Inspection Report. Expiration Date: August 31, 2010. Form: None. Type of Request...
77 FR 70444 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-26
... Collection Request: New collection; Title: Medicare Plan Finder Experiment; Use: The mission of the Centers... experimental design to assess the effectiveness of two potential enhancements to the Medicare Plan Finder tool... experiment is to test the effects of two prospective enhancements to the Medicare Plan Finder (MPF) Web site...
75 FR 39258 - Proposed Agency Information Collection Activities; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
... collections, along with an analysis of comments and recommendations received, will be submitted to the Board... by Reg H-3, by any of the following methods: Agency Web site: http://www.federalreserve.gov . Follow.../reportforms/review.cfm or may be requested from the agency clearance officer, whose name appears below...
76 FR 5800 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-02
....regulations.gov Web site is an ``anonymous access'' system, which means EPA will not know your identity or... renew an existing approved Information Collection Request (ICR) 2258.02-- Implementation of the 1997 and...-566-1741 Mail: Attention Docket ID No. EPA-HQ-OAR-2007-0265, U.S. Environmental Protection Agency, EPA...
31 CFR 344.3 - What provisions apply to the SLGSafe Service?
Code of Federal Regulations, 2011 CFR
2011-07-01
... documents, which may be downloaded from BPD's Web site and which may change from time to time, apply to... and other transaction requests exclusively through SLGSafe, except to the extent you establish to the satisfaction of BPD that good cause exists for you to submit such subscriptions and requests by other means...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... Historic Site has completed an inventory of human remains, in consultation with the appropriate Indian... the human remains and any present-day Indian tribes or Native Hawaiian organizations. Representatives... request transfer of control of these human remains should submit a written request to Grant-Kohrs Ranch...
76 FR 35482 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-17
... NRC action to submit an information collection request to the Office of Management and Budget (OMB... publicly available documents, including the draft supporting statement, at the NRC's Public Document Room... . The document will be available on the NRC home page site for 60 days after the signature date of this...
78 FR 43863 - Proposed Information Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
... education through the application Web site of the President's Higher Education Community Service Honor Roll... with the Paperwork Reduction Act of 1995 (PRA95) (44 U.S.C. Sec. 3506(c)(2)(A)). This program helps to ensure that requested data can be provided in the desired format, reporting burden (time and financial...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-23
... on electronic storage media. Participants may not submit paper copies of their filings unless they... have a good cause for not submitting documents electronically must file an exemption request, in.... Participants are requested not to include personal privacy information, such as social security numbers, home...
76 FR 71036 - Agency Information Collection Request. 30-Day Public Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-16
... performance of the agency's functions; (2) the accuracy of the estimated burden; (3) ways to enhance the... three waves of in- person data collection collected from incarcerated and released fathers and their... months post-baseline in five sites. A fourth wave of data collection at approximately 34 months, will be...
76 FR 51980 - Agency Information Collection Request. 60-Day Public Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-19
... collection for the proper performance of the agency's functions; (2) the accuracy of the estimated burden; (3... for the evaluation will come from three waves of in- person data collection collected from... follow-up surveys at approximately 9 and 18 months post-baseline in five sites. A fourth wave of data...
Code of Federal Regulations, 2010 CFR
2010-01-01
...'s publicly available Web site or on Western's Web site. Customers posting their IRPs on their own Web site must notify Western of this decision when they submit their IRP. A hotlink on Western's Web site to IRPs posted on customer Web sites gives interested parties ready access to those IRPs. Western...
Code of Federal Regulations, 2014 CFR
2014-01-01
...'s publicly available Web site or on Western's Web site. Customers posting their IRPs on their own Web site must notify Western of this decision when they submit their IRP. A hotlink on Western's Web site to IRPs posted on customer Web sites gives interested parties ready access to those IRPs. Western...
Code of Federal Regulations, 2011 CFR
2011-01-01
...'s publicly available Web site or on Western's Web site. Customers posting their IRPs on their own Web site must notify Western of this decision when they submit their IRP. A hotlink on Western's Web site to IRPs posted on customer Web sites gives interested parties ready access to those IRPs. Western...
Code of Federal Regulations, 2012 CFR
2012-01-01
...'s publicly available Web site or on Western's Web site. Customers posting their IRPs on their own Web site must notify Western of this decision when they submit their IRP. A hotlink on Western's Web site to IRPs posted on customer Web sites gives interested parties ready access to those IRPs. Western...
Code of Federal Regulations, 2013 CFR
2013-01-01
...'s publicly available Web site or on Western's Web site. Customers posting their IRPs on their own Web site must notify Western of this decision when they submit their IRP. A hotlink on Western's Web site to IRPs posted on customer Web sites gives interested parties ready access to those IRPs. Western...
Continuous-variable quantum homomorphic signature
NASA Astrophysics Data System (ADS)
Li, Ke; Shang, Tao; Liu, Jian-wei
2017-10-01
Quantum cryptography is believed to be unconditionally secure because its security is ensured by physical laws rather than computational complexity. According to spectrum characteristic, quantum information can be classified into two categories, namely discrete variables and continuous variables. Continuous-variable quantum protocols have gained much attention for their ability to transmit more information with lower cost. To verify the identities of different data sources in a quantum network, we propose a continuous-variable quantum homomorphic signature scheme. It is based on continuous-variable entanglement swapping and provides additive and subtractive homomorphism. Security analysis shows the proposed scheme is secure against replay, forgery and repudiation. Even under nonideal conditions, it supports effective verification within a certain verification threshold.
Two-out-of-two color matching based visual cryptography schemes.
Machizaud, Jacques; Fournel, Thierry
2012-09-24
Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.
NASA Astrophysics Data System (ADS)
Gloe, Thomas; Borowka, Karsten; Winkler, Antje
2010-01-01
The analysis of lateral chromatic aberration forms another ingredient for a well equipped toolbox of an image forensic investigator. Previous work proposed its application to forgery detection1 and image source identification.2 This paper takes a closer look on the current state-of-the-art method to analyse lateral chromatic aberration and presents a new approach to estimate lateral chromatic aberration in a runtime-efficient way. Employing a set of 11 different camera models including 43 devices, the characteristic of lateral chromatic aberration is investigated in a large-scale. The reported results point to general difficulties that have to be considered in real world investigations.
Figgener, L; Runte, C
2003-12-01
In some countries physicians and dentists are required by law to keep medical and dental records. These records not only serve as personal notes and memory aids but have to be in accordance with the necessary standard of care and may be used as evidence in litigation. Inadequate, incomplete or even missing records can lead to reversal of the burden of proof, resulting in a dramatically reduced chance of successful defence in litigation. The introduction of digital radiography and electronic data storage presents a new problem with respect to legal evidence, since digital data can easily be manipulated and industry is now required to provide adequate measures to prevent manipulations and forgery.
Security of the arbitrated quantum signature protocols revisited
NASA Astrophysics Data System (ADS)
Kejia, Zhang; Dan, Li; Qi, Su
2014-01-01
Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided.
NASA Astrophysics Data System (ADS)
Chaplin, Tracey D.; Clark, Robin J. H.
2016-03-01
A painting purported to be by the artist Marc Chagall has been examined using Raman microscopy to check on its proposed execution date of 1910. The analysis shows that, due the presence of phthalocyanine pigments, the painting cannot have been created prior to c.1938. Transport of the painting to the Chagall Committee in France for inspection has led to their declaration that the painting is a forgery. Under French law the painting is required to be destroyed rather than retained for other forensic examination; the consequences for preservation of such items is of paramount importance, as is the need for auction houses to carry out analyses prior to auction.
The story of a largely unknown evolution - Germ theory hoax.
Wainwright, Milton; Alharbi, Sulaiman Ali
2011-10-01
The Piltdown Man debacle provides us with the most infamous forgery in science. However, another equally intriguing story exists concerning a document by a Bostonian called George Sleeper, which purported to be a pre-Darwin-Wallace anticipation of evolution and an equally convincing account of the germ theory published before Louis Pasteur's famous studies on this subject. The story involves two giants in the world of evolutionary theory, Alfred Russel Wallace and E.B. Poulton. While Wallace was convinced that the Sleeper document was genuine, Poulton's detailed investigations showed that it was a fake and a hoax. Despite this conclusion, doubts still exist about the authenticity of the Sleeper document.
10 CFR Appendix Q to Part 50 - Pre-Application Early Review of Site Suitability Issues
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Pre-Application Early Review of Site Suitability Issues Q... FACILITIES Pt. 50, App. Q Appendix Q to Part 50—Pre-Application Early Review of Site Suitability Issues This... Reactor Safeguards of requests for early review of one or more site suitability issues relating to the...
10 CFR Appendix Q to Part 50 - Pre-Application Early Review of Site Suitability Issues
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Pre-Application Early Review of Site Suitability Issues Q... FACILITIES Pt. 50, App. Q Appendix Q to Part 50—Pre-Application Early Review of Site Suitability Issues This... Reactor Safeguards of requests for early review of one or more site suitability issues relating to the...
12 CFR 611.1216 - Public availability of documents related to the termination.
Code of Federal Regulations, 2012 CFR
2012-01-01
... the termination. (a) We may post on our Web site, or require you to post on your Web site: (1) Results... related transactions. (b) We will not post confidential information on our Web site and will not require you to post it on your Web site. (c) You may request that we treat specific information as...
12 CFR 611.1216 - Public availability of documents related to the termination.
Code of Federal Regulations, 2014 CFR
2014-01-01
... the termination. (a) We may post on our Web site, or require you to post on your Web site: (1) Results... related transactions. (b) We will not post confidential information on our Web site and will not require you to post it on your Web site. (c) You may request that we treat specific information as...
12 CFR 611.1216 - Public availability of documents related to the termination.
Code of Federal Regulations, 2013 CFR
2013-01-01
... the termination. (a) We may post on our Web site, or require you to post on your Web site: (1) Results... related transactions. (b) We will not post confidential information on our Web site and will not require you to post it on your Web site. (c) You may request that we treat specific information as...
12 CFR 611.1216 - Public availability of documents related to the termination.
Code of Federal Regulations, 2011 CFR
2011-01-01
... the termination. (a) We may post on our Web site, or require you to post on your Web site: (1) Results... related transactions. (b) We will not post confidential information on our Web site and will not require you to post it on your Web site. (c) You may request that we treat specific information as...
77 FR 40370 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-09
... enhanced and standard data collection and a longitudinal cohort design, and will include a comparative...-site evaluation design includes a process and an outcome evaluation and data will be collected over a 3-year period from 7 grantee sites. The cross-site evaluation is designed to address the following...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-06
...: Exchange Programs Alumni Web Site Registration, DS-7006 ACTION: Notice of request for public comments... the Paperwork Reduction Act of 1995. Title of Information Collection: Exchange Programs Alumni Web... techniques or other forms of technology. Abstract of proposed collection: The State Alumni Web site requires...
76 FR 18827 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-05
... individuals. Time to conduct study: 90 minutes. Estimated travel time to and from site: 30 minutes. Estimated... minutes. Estimated travel time to and from site: 30 minutes. Estimated floater burden: 84 hours (24 x 210... study: 90 minutes. Estimated travel time to and from site: 30 minutes. Estimated participant burden: 50...
10 CFR 1303.103 - Public reading area.
Code of Federal Regulations, 2010 CFR
2010-01-01
... the address in this paragraph (a): (2) Telephone: 703-235-4473; (3) A request to the Board's Web site... Board's Web site or by letter or fax. Please ensure that the records sought are clearly described... available electronically at the Board's Web site (http://www.nwtrb.gov). (d) Records of the Board available...
31 CFR 321.22 - Forwarding securities not payable by an agent.
Code of Federal Regulations, 2014 CFR
2014-07-01
... must follow. These instructions are available from a TRS Site or online at www.treasurydirect.gov. [77... TRS Site. The requests for payment on the securities should be properly certified. Any documentary... TRS Site in accordance with the rules in this part. The Bureau of the Fiscal Service provides agents...
31 CFR 321.22 - Forwarding securities not payable by an agent.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... These instructions are available from a TRS Site or online at www.treasurydirect.gov. [77 FR 16167, Mar... TRS Site. The requests for payment on the securities should be properly certified. Any documentary... TRS Site in accordance with the rules in this part. The Bureau of the Public Debt provides agents with...
31 CFR 321.22 - Forwarding securities not payable by an agent.
Code of Federal Regulations, 2012 CFR
2012-07-01
.... These instructions are available from a TRS Site or online at www.treasurydirect.gov. [77 FR 16167, Mar... TRS Site. The requests for payment on the securities should be properly certified. Any documentary... TRS Site in accordance with the rules in this part. The Bureau of the Public Debt provides agents with...
The EMSL-LV operates an Off-Site Radiological Safety Program around the NTS and other sites as requested by the Department of Energy (DOE) under an Interagency Agreement between DOE and EPA. This report, prepared in accordance with DOE guidelines (DOE85a), covers the program acti...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-24
... Activities; Submission to OMB for Review and Approval; Comment Request; NESHAP for Site Remediation (Renewal...: NESHAP for Site Remediation (Renewal). ICR Numbers: EPA ICR Number 2062.05, OMB Control Number 2060-0534.... Respondents/Affected Entities: Owners or operator of site remediation facilities. Estimated Number of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-04
... Activities; Submission to OMB for Review and Approval; Comment Request; NESHAP for Site Remediation, EPA ICR... electronic docket, go to http://www.regulations.gov . Title: NESHAP for Site Remediation. ICR Numbers: EPA.... Abstract: 40 CFR part 63, subpart GGGGG, applies to site remediation activities to cleanup materials...
10 CFR 1003.14 - Notice of proceedings.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Wide Web site, a digest of the applications, appeals, petitions and other requests filed, and a summary... OHA's web site is located at http://www.oha.doe.gov. [60 FR 15006, Mar. 21, 1995, as amended at 63 FR...
10 CFR 1003.14 - Notice of proceedings.
Code of Federal Regulations, 2011 CFR
2011-01-01
... OHA's web site is located at http://www.oha.doe.gov. [60 FR 15006, Mar. 21, 1995, as amended at 63 FR... Wide Web site, a digest of the applications, appeals, petitions and other requests filed, and a summary...
10 CFR 1003.14 - Notice of proceedings.
Code of Federal Regulations, 2014 CFR
2014-01-01
... OHA's web site is located at http://www.oha.doe.gov. [60 FR 15006, Mar. 21, 1995, as amended at 63 FR... Wide Web site, a digest of the applications, appeals, petitions and other requests filed, and a summary...
10 CFR 1003.14 - Notice of proceedings.
Code of Federal Regulations, 2012 CFR
2012-01-01
... OHA's web site is located at http://www.oha.doe.gov. [60 FR 15006, Mar. 21, 1995, as amended at 63 FR... Wide Web site, a digest of the applications, appeals, petitions and other requests filed, and a summary...
10 CFR 1003.14 - Notice of proceedings.
Code of Federal Regulations, 2013 CFR
2013-01-01
... OHA's web site is located at http://www.oha.doe.gov. [60 FR 15006, Mar. 21, 1995, as amended at 63 FR... Wide Web site, a digest of the applications, appeals, petitions and other requests filed, and a summary...
78 FR 39584 - Domestic Requests for Broadcasting Board of Governors Program Materials
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-02
... available on agency Web sites. 502.7 Denial of requests. 502.8 Fees. Authority: 22 U.S.C. 1461, 1461-1a. Sec... interest to a segment of the public, turns gathered information into a distinct work, or distributes that... primarily for scientific, educational, service, charitable, or similar purpose, including but not limited to...
75 FR 44809 - Office of the Secretary Submission for OMB Review: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-29
... Management and Budget published the Final Information Quality Bulletin for Peer Review on December 15, 2004... submission of the following public information collection requests (ICR) to the Office of Management and... estimated total burden may be obtained from the RegInfo.gov Web site at http://www.reginfo.gov/public/do...
75 FR 44016 - Office of the Secretary; Submission for OMB review; comment request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-27
... submission of the following public information collection request (ICR) to the Office of Management and... estimated total burden may be obtained from the RegInfo.gov Web site at http://www.reginfo.gov/public/do... Safety and Health Administration (MSHA), Office of Management and Budget, 725 17th Street, NW., Room...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-01
... Request: Web-Based Supply Chain Management Commodity Offer Forms AGENCY: Farm Service Agency and Commodity..., and yearly bases. Special invitations, however, are issued throughout the month. Web-Based Supply... will be posted to the FSA Web site and also to the WBSCM portal and FedBizOpps ( https://www.fbo.gov...
5 CFR 1650.41 - How to obtain an age-based withdrawal.
Code of Federal Regulations, 2010 CFR
2010-01-01
... record keeper a properly completed paper TSP age-based withdrawal request form or use the TSP Web site to initiate a request. A participant's ability to complete an age-based withdrawal on the Web will depend on his or her retirement system coverage, marital status, and whether or not part or all of the...
10 CFR 62.13 - Contents of a request for emergency access: Alternatives.
Code of Federal Regulations, 2011 CFR
2011-01-01
... EMERGENCY ACCESS TO NON-FEDERAL AND REGIONAL LOW-LEVEL WASTE DISPOSAL FACILITIES Request for a Commission... following: (1) Storage of low-level radioactive waste at the site of generation; (2) Storage of low-level... disposal at a Federal low-level radioactive waste disposal facility in the case of a Federal or defense...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-03
... for OMB Review; Comment Request; Information Collection Plan for GovBenefits Online ACTION: Notice... Collection Plan for GovBenefits Online,'' to the Office of Management and Budget (OMB) for review and... response, and estimated total burden may be obtained from the RegInfo.gov Web site, http://www.reginfo.gov...
5 CFR 1650.41 - How to obtain an age-based withdrawal.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false How to obtain an age-based withdrawal... an age-based withdrawal. To request an age-based withdrawal, a participant must submit to the TSP record keeper a properly completed paper TSP age-based withdrawal request form or use the TSP Web site to...
5 CFR 1650.41 - How to obtain an age-based withdrawal.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false How to obtain an age-based withdrawal... an age-based withdrawal. To request an age-based withdrawal, a participant must submit to the TSP record keeper a properly completed paper TSP age-based withdrawal request form or use the TSP Web site to...
5 CFR 1650.41 - How to obtain an age-based withdrawal.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false How to obtain an age-based withdrawal... an age-based withdrawal. To request an age-based withdrawal, a participant must submit to the TSP record keeper a properly completed paper TSP age-based withdrawal request form or use the TSP Web site to...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-19
... Act of 1995 which requires a 30-day advance opportunity for public comment on the proposed information collection project, the Indian Health Service (IHS) has submitted to the Office of Management and Budget (OMB... the academic performance of awardees, to place awardees at payback sites, and for awardees to request...
76 FR 81943 - Agency Information Collection Request. 30-Day Public Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
... performance of the agency's functions; (2) the accuracy of the estimated burden; (3) ways to enhance the... full clearance to collect data using site-specific instruments with a 3-year expiration date. [[Page.../WAIT Training.. 533 1 42/60 373 Princeton Center for Leadership Traning 533 1 36/60 320 (PCLT)/TeenPEP...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Request for... Control and Prevention (CDC), Department of Health and Human Services (HHS) The CDC is soliciting... available on the ICSH, OSH Web site: http://www.cdc.gov/tobacco/ICSH/index.htm . Nominees will be selected...
Girelli, Carlos Magno Alves
2016-05-01
Fingerprints present in false identity documents were found on the web. In some cases, laterally reversed (mirrored) images of a same fingerprint were observed in different documents. In the present work, 100 fingerprints images downloaded from the web, as well as their reversals obtained by image editing, were compared between themselves and against the database of the Brazilian Federal Police AFIS, in order to better understand trends about this kind of forgery in Brazil. Some image editing effects were observed in the analyzed fingerprints: addition of artifacts (such as watermarks), image rotation, image stylization, lateral reversal and tonal reversal. Discussion about lateral reversals' detection is presented in this article, as well as suggestion to reduce errors due to missed HIT decisions between reversed fingerprints. The present work aims to highlight the importance of the fingerprints' analysis when performing document examination, especially when only copies of documents are available, something very common in Brazil. Besides the intrinsic features of the fingermarks considered in three levels of details by ACE-V methodology, some visual features of the fingerprints images can be helpful to identify sources of forgeries and modus operandi, such as: limits and image contours, fails in the friction ridges caused by excess or lack of inking and presence of watermarks and artifacts arising from the background. Based on the agreement of such features in fingerprints present in different identity documents and also on the analysis of the time and location where the documents were seized, it is possible to highlight potential links between apparently unconnected crimes. Therefore, fingerprints have potential to reduce linkage blindness and the present work suggests the analysis of fingerprints when profiling false identity documents, as well as the inclusion of fingerprints features in the profile of the documents. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Local Media Influence on Opting-Out from an Exception from Informed Consent Trial
Nelson, Maria J; DeIorio, Nicole M; MD, Terri Schmidt; Griffiths, Denise; Daya, Mohamud; Haywood, Liana; Zive, Dana; Newgard, Craig D
2010-01-01
Objectives News media are used for community education and notification in exception from informed consent clinical trials, yet their effectiveness as an added safeguard in such research remains unknown. We assessed the number of callers requesting opt-out bracelets following each local media report and described the errors and content within each media report. Methods We undertook a descriptive analysis of local media trial coverage (newspaper, television, radio, and weblog) and opt-out requests over a 41-month period at a single site participating in an exception from informed consent out-of-hospital trial. Two non-trial investigators independently assessed forty-one content-based media variables (including background, trial information, graphics, errors, publication information, assessment) using a standardized, semi-qualitative data collection tool. Major errors were considered serious misrepresentation of the trial purpose or protocol, whereas minor errors included misinformation unlikely to mislead the lay reader about the trial. We plotted the temporal relationship between opt-out bracelet requests and media reports. Descriptive information about the news sources and the trial coverage are presented. Results We collected 39 trial-related media reports (33 newspaper, 1 television, 1 radio, and 4 blogs). There were thirteen errors in 9 (23%) publications, 7 of which were major and 6 minor. Of 384 requests for 710 bracelets, 310 requests (80%) occurred within 4 days after trial media coverage. Graphical timeline representation of the data suggested a close association between media reports about the trial and requests for opt-out bracelets. Conclusions Based on results from a single site, local media coverage for an exception from informed consent clinical trial had a substantial portion of errors and appeared closely associated with opt-out requests. PMID:19682770
7 CFR 658.4 - Guidelines for use of criteria.
Code of Federal Regulations, 2012 CFR
2012-01-01
... site is farmland as defined in § 658.2(a) or the agency may request that NRCS make such a determination... whether the site is farmland subject to the Act. If neither the entire site nor any part of it are subject to the Act, then the Act will not apply and NRCS will so notify the agency. If the site is determined...
7 CFR 658.4 - Guidelines for use of criteria.
Code of Federal Regulations, 2013 CFR
2013-01-01
... site is farmland as defined in § 658.2(a) or the agency may request that NRCS make such a determination... whether the site is farmland subject to the Act. If neither the entire site nor any part of it are subject to the Act, then the Act will not apply and NRCS will so notify the agency. If the site is determined...
7 CFR 658.4 - Guidelines for use of criteria.
Code of Federal Regulations, 2014 CFR
2014-01-01
... site is farmland as defined in § 658.2(a) or the agency may request that NRCS make such a determination... whether the site is farmland subject to the Act. If neither the entire site nor any part of it are subject to the Act, then the Act will not apply and NRCS will so notify the agency. If the site is determined...
7 CFR 658.4 - Guidelines for use of criteria.
Code of Federal Regulations, 2010 CFR
2010-01-01
... site is farmland as defined in § 658.2(a) or the agency may request that NRCS make such a determination... whether the site is farmland subject to the Act. If neither the entire site nor any part of it are subject to the Act, then the Act will not apply and NRCS will so notify the agency. If the site is determined...
7 CFR 658.4 - Guidelines for use of criteria.
Code of Federal Regulations, 2011 CFR
2011-01-01
... site is farmland as defined in § 658.2(a) or the agency may request that NRCS make such a determination... whether the site is farmland subject to the Act. If neither the entire site nor any part of it are subject to the Act, then the Act will not apply and NRCS will so notify the agency. If the site is determined...
31 CFR 256.11 - How do agencies request payments?
Code of Federal Regulations, 2010 CFR
2010-07-01
... forms or by using other approved methods as provided for on the Judgment Fund Web site at http://www.fms..., Volume I, Part 6, Chapter 3100. The TFM is also available on the Judgment Fund Web site. The submitting...
7 CFR 1520.6 - Other information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... found on the FAS web site, www.fas.usda.gov. Also, the FAS annual FOIA report is available on the agency's web site at www.fas.usda.gov. Click on FOIA at the bottom of the page. To request a paper copy of...
7 CFR 1520.6 - Other information.
Code of Federal Regulations, 2012 CFR
2012-01-01
... found on the FAS web site, www.fas.usda.gov. Also, the FAS annual FOIA report is available on the agency's web site at www.fas.usda.gov. Click on FOIA at the bottom of the page. To request a paper copy of...
7 CFR 1520.6 - Other information.
Code of Federal Regulations, 2013 CFR
2013-01-01
... found on the FAS web site, www.fas.usda.gov. Also, the FAS annual FOIA report is available on the agency's web site at www.fas.usda.gov. Click on FOIA at the bottom of the page. To request a paper copy of...
7 CFR 1520.6 - Other information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... found on the FAS web site, www.fas.uda.gov. Also, the FAS annual FOIA report is available on the agency's web site at www.fas.usda.gov. Click on FOIA at the bottom of the page. To request a paper copy of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-05
... Flight Delay Data on Web Sites AGENCY: Office of the Secretary (OST), Department of Transportation (DOT... information on their Web sites. This extension is in response to requests by several carrier associations for... on Web sites in view of the extensive changes to carriers' reporting systems that are necessitated by...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-03
... Services, Working On-Site at Delphi Automotive Systems, LLC, Powertrain Division, El Paso, TX; Amended..., 2011, applicable to leased workers from Kelly Services working on-site at Delphi Automotive Systems... automotive components. The notice will be published soon in the Federal Register. At the request of the State...
ERIC Educational Resources Information Center
Rooks, Clay D.
This paper addresses the subject of cheating and plagiarism via the World Wide Web. After spending just a few hours browsing on the Internet, the author found dozens of "cheat" sites that offered term papers of all kinds. Some sites charge a fee for papers, some sites only request that students join by sending in one of their papers to add to the…
12 CFR 1204.4 - How will FHFA respond to my Privacy Act request?
Code of Federal Regulations, 2010 CFR
2010-01-01
... records it owns or controls. You can find descriptions of FHFA systems of records on its Web site at http... Web site. A description of the systems of records also is available in the “Privacy Act Issuances... libraries or electronically at the Government Printing Office Web site at: http://www.gpoaccess.gov...
30 CFR 585.500 - How do I make payments under this part?
Code of Federal Regulations, 2012 CFR
2012-07-01
... credit card or automated clearing house payments through the Pay.gov Web site, and you must include one copy of the Pay.gov confirmation receipt page with your unsolicited request or signed lease instrument. You may access the Pay.gov Web site through links on the BOEM Offshore Web site at: http://www.boem...
30 CFR 585.500 - How do I make payments under this part?
Code of Federal Regulations, 2013 CFR
2013-07-01
... credit card or automated clearing house payments through the Pay.gov Web site, and you must include one copy of the Pay.gov confirmation receipt page with your unsolicited request or signed lease instrument. You may access the Pay.gov Web site through links on the BOEM Offshore Web site at: http://www.boem...
30 CFR 285.500 - How do I make payments under this part?
Code of Federal Regulations, 2010 CFR
2010-07-01
... or automated clearing house payments through the Pay.gov Web site, and you must include one copy of the Pay.gov confirmation receipt page with your unsolicited request or signed lease instrument. You may access the Pay.gov Web site through links on the MMS Offshore Web site at: http://www.mms.gov...
75 FR 53999 - Notice of Request for the Extension of Currently Approved Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-02
... identified by the docket number by only one of the following methods: 1. Web site: www.regulations.gov . Follow the instructions for submitting comments on the U.S. Government electronic docket site. (Note: The... comments.) All electronic submissions must be made to the U.S. Government electronic docket site at http...
Click to "like" organ donation: the use of online media to promote organ donor registration.
Stefanone, Michael; Anker, Ashley E; Evans, Melanie; Feeley, Thomas Hugh
2012-06-01
Efforts to promote organ donation have traditionally relied on mass-mediated or interpersonal communication to promote donor registration. Despite its popularity, the use of online media has yet to be carefully evaluated as a platform to promote organ donation. To describe results of an intervention to promote donor registration that relies solely on online media to communicate to target audiences. For 3 years, 6 campaigns were implemented in 3 different online media formats. Online media formats included (1) traditional online advertising, (2) student seeders' social networking sites campaigns, and (3) challenge campaigns. Online media campaigns primarily targeted college-aged individuals.Intervention-Each campaign directed individuals to the dedicated project website, where they could access educational material about donation and request a donor registration card. Unique website visitors, webpages viewed per site visit, time spent on site, and organ donor cards requested/received were tracked in relation to each online media format. Traditional online advertising offered greater message exposure but failed to result in a higher proportion of website visitors who registered their donation intentions. Use of student seeders (ie, motivated students who promote donation by using social networking sites) and challenge campaigns resulted in greater attention to the project website, donor card requests, and subsequent returns. Additional research is recommended to reveal the effect of combining 2 or more varying online media formats within a single campaign.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-19
... reimbursed 100 percent of their costs, except for record maintenance. Under this ICR, the states will apply... productive and useful reuse of the sites. The respondents on whom a burden is placed include state and tribal... response: On occasion, Once. Total estimated burden: 308,458 hours (per year). Burden is defined at 5 CFR...
40 CFR 2.101 - Where requests for records are to be filed.
Code of Federal Regulations, 2014 CFR
2014-07-01
... (2822T), NW, Washington, DC 20460; e-mail: [email protected]gov. You may also access EPA Headquarters and Regional Freedom of Information Offices' Web sites at http://www.epa.gov/foia and submit a request via an...; e-mail: [email protected]gov. (2) Region II (NJ, NY, PR, VI): EPA, FOI Officer, 290 Broadway, 26th Floor...
40 CFR 2.101 - Where requests for records are to be filed.
Code of Federal Regulations, 2011 CFR
2011-07-01
... (2822T), NW, Washington, DC 20460; e-mail: [email protected]gov. You may also access EPA Headquarters and Regional Freedom of Information Offices' Web sites at http://www.epa.gov/foia and submit a request via an...-mail: [email protected]gov. (2) Region II (NJ, NY, PR, VI): EPA, FOI Officer, 290 Broadway, 26th Floor, New...
40 CFR 2.101 - Where requests for records are to be filed.
Code of Federal Regulations, 2012 CFR
2012-07-01
... (2822T), NW, Washington, DC 20460; e-mail: [email protected]gov. You may also access EPA Headquarters and Regional Freedom of Information Offices' Web sites at http://www.epa.gov/foia and submit a request via an...; e-mail: [email protected]gov. (2) Region II (NJ, NY, PR, VI): EPA, FOI Officer, 290 Broadway, 26th Floor...
40 CFR 2.101 - Where requests for records are to be filed.
Code of Federal Regulations, 2013 CFR
2013-07-01
... (2822T), NW, Washington, DC 20460; e-mail: [email protected]gov. You may also access EPA Headquarters and Regional Freedom of Information Offices' Web sites at http://www.epa.gov/foia and submit a request via an...; e-mail: [email protected]gov. (2) Region II (NJ, NY, PR, VI): EPA, FOI Officer, 290 Broadway, 26th Floor...
40 CFR 2.101 - Where requests for records are to be filed.
Code of Federal Regulations, 2010 CFR
2010-07-01
... (2822T), NW, Washington, DC 20460; e-mail: [email protected]gov. You may also access EPA Headquarters and Regional Freedom of Information Offices' Web sites at http://www.epa.gov/foia and submit a request via an...-mail: [email protected]gov. (2) Region II (NJ, NY, PR, VI): EPA, FOI Officer, 290 Broadway, 26th Floor, New...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-11
... request a hearing and intervention via electronic submission through the NRC's E-filing system. Requests... entities participating under 10 CFR 2.315(c), must be filed in accordance with the NRC's E-Filing rule (72 FR 49139; August 28, 2007). The E-Filing process requires participants to submit and serve all...
76 FR 39842 - Draft Investigation Report-DuPont Belle; Public Comment Requested
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-07
... the CSB Web site ( http://www.csb.gov .). Comments may also be sent to CSB Headquarters (see address... public review either at CSB Headquarters or by following directions posted on the CSB Web site. By..., operating [[Page 39843
Chromatographic and electrophoretic approaches in ink analysis.
Zlotnick, J A; Smith, F P
1999-10-15
Inks are manufactured from a wide variety of substances that exhibit very different chemical behaviors. Inks designed for use in different writing instruments or printing methods have quite dissimilar components. Since the 1950s chromatographic and electrophoretic methods have played important roles in the analysis of inks, where compositional information may have bearing on the investigation of counterfeiting, fraud, forgery, and other crimes. Techniques such as paper chromatography and electrophoresis, thin-layer chromatography, high-performance liquid chromatography, gas chromatography, gel electrophoresis, and the relatively new technique of capillary electrophoresis have all been explored as possible avenues for the separation of components of inks. This paper reviews the components of different types of inks and applications of the above separation methods are reviewed.
Piltdown Man: Combining the Instruction of Scientific Ethics and Qualitative Analysis
NASA Astrophysics Data System (ADS)
Vincent, John B.
1999-11-01
In combination with lectures on scientific method and the problems of scientific misconduct in a freshman chemistry course at The University of Alabama, a laboratory experiment was developed to allow students to feel some of the sense of scientific discovery associated with the exposure of the Piltdown Man fraud. This is accomplished by modifying a commonly performed freshman chemistry laboratory experiment, qualitative analysis of group III metal ions. Pieces of chalk are treated with chromium, manganese, and iron to simulate the treatment used to forge the Piltdown "fossils"; students can use techniques in qualitative analysis schemes for the group III ions to determine whether the samples are "forgeries" and if so which metal ion(s) were used.
Razzak, Md Abdur; Hamid, Sharifah Bee Abd; Ali, Md Eaqub
2015-01-01
Food forgery has posed considerable risk to public health, religious rituals, personal budget and wildlife. Pig, dog, cat, rat and monkey meat are restricted in most religions, but their sporadic adulteration are rampant. Market controllers need a low-cost but reliable technique to track and trace suspected species in the food chain. Considering the need, here we documented a lab-on-a-chip-based multiplex polymerase chain reaction (PCR) assay for the authentication of five non-halal meat species in foods. Using species-specific primers, 172, 163, 141, 129 and 108-bp sites of mitochondrial ND5, ATPase 6 and cytochrome b genes were amplified to detect cat, dog, pig, monkey and rat species under complex matrices. Species-specificity was authenticated against 20 different species with the potential to be used in food. The targets were stable under extreme sterilisation (121°C at 45 psi for 2.5 h) which severely degrades DNA. The assay was optimised under the backgrounds of various commercial meat products and validated for the analysis of meatballs, burgers and frankfurters, which are popular fast food items across the globe. The assay was tested to detect 0.1% suspected meats under commercial backgrounds of marketed foods. Instead of simplex PCR which detects only one species at a time, such a multiplex platform can reduce cost by at least fivefolds by detecting five different species in a single assay platform.
30 CFR 203.3 - Do I have to pay a fee to request royalty relief?
Code of Federal Regulations, 2010 CFR
2010-07-01
... administer royalty relief. (b) You must file all payments electronically through the Pay.gov Web site and you must include a copy of the Pay.gov confirmation receipt page with your application or assessment. The Pay.gov Web site may be accessed through a link on the MMS Offshore Web site at: http://www.mms.gov...
30 CFR 203.3 - Do I have to pay a fee to request royalty relief?
Code of Federal Regulations, 2012 CFR
2012-07-01
... administer royalty relief. (b) You must file all payments electronically through the Pay.gov Web site and you must include a copy of the Pay.gov confirmation receipt page with your application or assessment. The Pay.gov Web site may be accessed through a link on the BSEE Offshore Web site at: http://www.bsee.gov...
30 CFR 203.3 - Do I have to pay a fee to request royalty relief?
Code of Federal Regulations, 2013 CFR
2013-07-01
... administer royalty relief. (b) You must file all payments electronically through the Pay.gov Web site and you must include a copy of the Pay.gov confirmation receipt page with your application or assessment. The Pay.gov Web site may be accessed through a link on the BSEE Offshore Web site at: http://www.bsee.gov...
30 CFR 203.3 - Do I have to pay a fee to request royalty relief?
Code of Federal Regulations, 2014 CFR
2014-07-01
... administer royalty relief. (b) You must file all payments electronically through the Pay.gov Web site and you must include a copy of the Pay.gov confirmation receipt page with your application or assessment. The Pay.gov Web site may be accessed through a link on the BSEE Offshore Web site at: http://www.bsee.gov...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-20
...'' in the context of the Board's standard 2,000-acre activation limit for a general-purpose zone project... 29975-29976, 05/28/10). The current zone project includes the following sites: Site 1 (727 acres... entry. The applicant is requesting authority to reorganize its existing zone project to remove Sites 2-4...
Code of Federal Regulations, 2010 CFR
2010-04-01
... recipient has the effective ability to access. (3) Free paper copy of applicable notice. At the time the... request benefit distributions from the plan on Plan A's Internet Web site. Under Plan A's system for such... qualified plan, permits participants to request benefit distributions from the plan on Plan B's Internet Web...
Code of Federal Regulations, 2010 CFR
2010-10-01
... preparing copies shall be the same as that charged by the Commission as described in § 0.465(c)(2). The fee... and § 0.423) or on the Commission's Web site, http://www.fcc.gov/formpage.html. (f) Anyone requesting... available, or made available, for public inspection. 0.465 Section 0.465 Telecommunication FEDERAL...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Parks, Forests, and Public Property NATIONAL PARK SERVICE, DEPARTMENT OF THE INTERIOR SOLID WASTE... is required to operate a solid waste disposal site within the boundaries of a unit of the National... must approve or deny a solid waste disposal site request under this part within 180 calendar days of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-27
... Amended, Big River Mine Tailings Superfund Site, St. Francois County, MO AGENCY: Environmental Protection.... Louis, Missouri, for recovery of past response costs concerning the Big River Mine Tailings Superfund..., Kansas City, Kansas, (913) 551-7567. Requests should reference the Big River Mine Tailings Superfund Site...
42 CFR 422.111 - Disclosure requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... providers, including through a web site on the Internet. (g) CMS may require an MA organization to disclose... enrollees upon request. These mechanisms must include all of the following: (1) A toll-free customer service... non-English speaking and limited English proficient (LEP) individuals. (2) An Internet Web site that...
42 CFR 422.111 - Disclosure requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... providers, including through a web site on the Internet. (g) CMS may require an MA organization to disclose... enrollees upon request. These mechanisms must include all of the following: (1) A toll-free customer service... non-English speaking and limited English proficient (LEP) individuals. (2) An Internet Web site that...
42 CFR 422.111 - Disclosure requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... providers, including through a web site on the Internet. (g) CMS may require an MA organization to disclose... enrollees upon request. These mechanisms must include all of the following: (1) A toll-free customer service... non-English speaking and limited English proficient (LEP) individuals. (2) An Internet Web site that...
76 FR 39133 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-05
... assess the adequacy of proposed seismic design bases and the design bases for other site hazards for... sited, designed, constructed, and maintained to withstand geologic hazards, such as faulting, seismic... potential man-made hazards will be appropriately accounted for in the design of nuclear power and test...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-19
... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: Federal Cyber Service: Scholarship for Service (SFS) Registration Web Site AGENCY: U.S. Office of Personnel Management. ACTION: 60-Day Notice and request for comments. SUMMARY: The Human Resources Solutions, Office of Personnel Management (OPM) offers...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-17
... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: Federal Cyber Service: Scholarship for Service (SFS) Registration Web Site AGENCY: Office of Personnel Management. ACTION: 30-Day Notice and request for comments. SUMMARY: The Office of Personnel Management (OPM), Human Resources Solutions...
75 FR 51821 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-23
... Verification form, the Employment Verification and Community Site Information form, the Payment Information Form, the Authorization to Release Information form and the Self-Certification Form. Once health...,035 Employment Verification and 5,175 1 5,175 .75 3,881 Community Site Information Form Loan...
43 CFR 3273.12 - How will BLM review my site license application?
Code of Federal Regulations, 2011 CFR
2011-10-01
...) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) GEOTHERMAL RESOURCE... information. (b) If your site license is located on geothermal leases where the surface is managed by the... requested by the Federal Energy Regulatory Commission. (d) If another Federal agency manages the surface, we...
47 CFR 90.675 - Information exchange.
Code of Federal Regulations, 2010 CFR
2010-10-01
... business days before a new cell site is activated or an existing cell site is modified: (1) Location; (2... believes a proposed cell will generate unacceptable interference; (2) Permit ESMR or part 22 Cellular... cell is activated. (c) Public safety information exchange. (1) Upon request by an ESMR or part 22...
Fermilab History and Archives Project | Home
Fermilab History and Archives Project Fermilab History and Archives Project Fermi National Accelerator Laboratory Home About the Archives History & Archives Online Request Contact Us Site Index SEARCH the site: History & Archives Project Fermilab History and Archives Project The History of
Kuder, Margaret; Goheen, Mary Jett; Dize, Laura; Barnes, Mathilda; Gaydos, Charlotte A
2015-05-01
The www.iwantthekit.org provides Internet-based, at-home sexually transmitted infection screening. The Web site implemented an automated test result access system. To evaluate potential deleterious effects of the new system, we analyzed demographics, Web site usage, and treatment. The post-Web site design captured more participant information and no decrease in requests, kit return, or treatment adherence.
30 CFR 203.3 - Do I have to pay a fee to request royalty relief?
Code of Federal Regulations, 2011 CFR
2011-07-01
... electronically through the Pay.gov Web site and you must include a copy of the Pay.gov confirmation receipt page with your application or assessment. The Pay.gov Web site may be accessed through a link on the MMS Offshore Web site at: http://www.mms.gov/offshore/ homepage or directly through Pay.gov at: https://www.pay...
BLOODR: blood donor and requester mobile application
Tatikonda, Vamsi Krishna
2017-01-01
Background With rapid increase in the usage of social networks sites across the world, there is also a steady increase in blood donation requests as being noticed in the number of posts on these sites such as Facebook and twitter seeking blood donors. Finding blood donor is a challenging issue in almost every country. There are some blood donor finder applications in the market such as Blood app by Red Cross and Blood Donor Finder application by Neologix. However, more reliable applications that meet the needs of users are prompted. Methods Several software technologies including languages and framework are used to develop our blood-donor web application known as BLOODR application. These technologies comprise Ruby programming language (simply known as Ruby) along with JavaScript and PostgreSQL for database are used. Ruby on Rails (simply known as Rails) is an open source Web framework that makes it possible to quickly and easily create data-based web applications. Results We show screenshots for the BLOODR application for different types of users including requester, donor, and administrator. Various features of the application are described and their needs of use are analyzed. If a patient needs a blood at a clinic, blood donors in vicinity can be contacted through using a clinic management service provided in this application. Registered donors will get notification for the blood requests only if their blood group is compatible with the requested blood type and in the same city/region. Then matching blood donors can go to the requesting clinic and donate. Conclusions BLOODR application provides a reliable platform to connect local blood donors with patients. BLOODR creates a communication channel through authenticated clinics whenever a patient needs blood donation. It is a useful tool to find compatible blood donors who can receive blood request posts in their local area. Clinics can use this web application to maintain the blood donation activity. Future improvement of the BLOODR is explained. PMID:29184892
BLOODR: blood donor and requester mobile application.
Tatikonda, Vamsi Krishna; El-Ocla, Hosam
2017-01-01
With rapid increase in the usage of social networks sites across the world, there is also a steady increase in blood donation requests as being noticed in the number of posts on these sites such as Facebook and twitter seeking blood donors. Finding blood donor is a challenging issue in almost every country. There are some blood donor finder applications in the market such as Blood app by Red Cross and Blood Donor Finder application by Neologix. However, more reliable applications that meet the needs of users are prompted. Several software technologies including languages and framework are used to develop our blood-donor web application known as BLOODR application. These technologies comprise Ruby programming language (simply known as Ruby) along with JavaScript and PostgreSQL for database are used. Ruby on Rails (simply known as Rails) is an open source Web framework that makes it possible to quickly and easily create data-based web applications. We show screenshots for the BLOODR application for different types of users including requester, donor, and administrator. Various features of the application are described and their needs of use are analyzed. If a patient needs a blood at a clinic, blood donors in vicinity can be contacted through using a clinic management service provided in this application. Registered donors will get notification for the blood requests only if their blood group is compatible with the requested blood type and in the same city/region. Then matching blood donors can go to the requesting clinic and donate. BLOODR application provides a reliable platform to connect local blood donors with patients. BLOODR creates a communication channel through authenticated clinics whenever a patient needs blood donation. It is a useful tool to find compatible blood donors who can receive blood request posts in their local area. Clinics can use this web application to maintain the blood donation activity. Future improvement of the BLOODR is explained.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Traub, David; Nguyen, Jason
The Slick Rock, Colorado, Processing Sites are referred to as the Slick Rock West Processing Site (SRK05) and the Slick Rock East Processing Site (SRK06). This annual event involved sampling both sites for a total of 16 monitoring wells and 6 surface water locations as required by the 2006 Draft Final Ground Water Compliance Action Plan for the Slick Rock, Colorado, Processing Sites (GCAP). A domestic well was also sampled at a property adjacent to the Slick Rock East site at the request of the landowner.
Photosynthesis and the web: 2001.
Orr, L
2001-01-01
First, a brief history of the Internet and the World Wide Web is presented. This is followed by relevant information on photosynthesis-related web sites grouped into several categories: (1) large group sites, (2) comprehensive overview sites, (3) specific subject sites, (4) individual researcher sites, (5) kindergarten through high school (K-12) educational sites, (6) books and journals, and, 7) other useful sites. A section on searching the Web is also included. Finally, we have included an appendix with all of the web sites discussed herein as well as other web sites that space did not allow. Readers are requested to send comments, corrections and additions to gov@uiuc.edu.
Identification of forgeries in handwritten petitions for ballot propositions
NASA Astrophysics Data System (ADS)
Srihari, Sargur; Ramakrishnan, Veshnu; Malgireddy, Manavender; Ball, Gregory R.
2009-01-01
Many governments have some form of "direct democracy" legislation procedure whereby individual citizens can propose various measures creating or altering laws. Generally, such a process is started with the gathering of a large number of signatures. There is interest in whether or not there are fraudulent signatures present in such a petition, and if so what percentage of the signatures are indeed fraudulent. However, due to the large number of signatures (tens of thousands), it is not feasible to have a document examiner verify the signatures directly. Instead, there is interest in creating a subset of signatures where there is a high probability of fraud that can be verified. We present a method by which a pairwise comparison of signatures can be performed and subsequent sorting can generate such subsets.
X-ray computed tomography datasets for forensic analysis of vertebrate fossils.
Rowe, Timothy B; Luo, Zhe-Xi; Ketcham, Richard A; Maisano, Jessica A; Colbert, Matthew W
2016-06-07
We describe X-ray computed tomography (CT) datasets from three specimens recovered from Early Cretaceous lakebeds of China that illustrate the forensic interpretation of CT imagery for paleontology. Fossil vertebrates from thinly bedded sediments often shatter upon discovery and are commonly repaired as amalgamated mosaics grouted to a solid backing slab of rock or plaster. Such methods are prone to inadvertent error and willful forgery, and once required potentially destructive methods to identify mistakes in reconstruction. CT is an efficient, nondestructive alternative that can disclose many clues about how a specimen was handled and repaired. These annotated datasets illustrate the power of CT in documenting specimen integrity and are intended as a reference in applying CT more broadly to evaluating the authenticity of comparable fossils.
Optimal chroma-like channel design for passive color image splicing detection
NASA Astrophysics Data System (ADS)
Zhao, Xudong; Li, Shenghong; Wang, Shilin; Li, Jianhua; Yang, Kongjin
2012-12-01
Image splicing is one of the most common image forgeries in our daily life and due to the powerful image manipulation tools, image splicing is becoming easier and easier. Several methods have been proposed for image splicing detection and all of them worked on certain existing color channels. However, the splicing artifacts vary in different color channels and the selection of color model is important for image splicing detection. In this article, instead of finding an existing color model, we propose a color channel design method to find the most discriminative channel which is referred to as optimal chroma-like channel for a given feature extraction method. Experimental results show that both spatial and frequency features extracted from the designed channel achieve higher detection rate than those extracted from traditional color channels.
NASA Astrophysics Data System (ADS)
Polyakov, M.; Odinokov, S.
2017-05-01
The report focuses on special printing industry, which is called secure printing, which uses printing techniques to prevent forgery or falsification of security documents. The report considered the possibility of establishing a spectral device for determining the authenticity of certain documents that are protected by machine-readable luminophor labels. The device works in two spectral ranges - visible and near infrared that allows to register Stokes and anti-Stokes spectral components of protective tags. The proposed device allows verification of the authenticity of security documents based on multiple criteria in different spectral ranges. It may be used at enterprises related to the production of security printing products, expert units of law enforcement bodies at check of authenticity of banknotes and other structures.
X-ray computed tomography datasets for forensic analysis of vertebrate fossils
Rowe, Timothy B.; Luo, Zhe-Xi; Ketcham, Richard A.; Maisano, Jessica A.; Colbert, Matthew W.
2016-01-01
We describe X-ray computed tomography (CT) datasets from three specimens recovered from Early Cretaceous lakebeds of China that illustrate the forensic interpretation of CT imagery for paleontology. Fossil vertebrates from thinly bedded sediments often shatter upon discovery and are commonly repaired as amalgamated mosaics grouted to a solid backing slab of rock or plaster. Such methods are prone to inadvertent error and willful forgery, and once required potentially destructive methods to identify mistakes in reconstruction. CT is an efficient, nondestructive alternative that can disclose many clues about how a specimen was handled and repaired. These annotated datasets illustrate the power of CT in documenting specimen integrity and are intended as a reference in applying CT more broadly to evaluating the authenticity of comparable fossils. PMID:27272251
Developing and promoting an intranet site for a drug information service.
Costerison, Emily C; Graham, Angie S
2008-04-01
The development and promotion of a drug information service (DIS) intranet site are described. Stanford Hospital and Clinics (SHC) is an acute and tertiary care facility with 613 licensed inpatient beds and 48 outpatient clinics. A DIS intranet site was developed to allow better accessibility to pharmacy forms and products (e.g., drug shortage list, reference guides) and to reduce repetitive requests to the DIS. The goal was to continue to provide information to SHC health care providers but allow the drug information specialist to focus on answering clinical questions. The intranet site was completed over a four-month period. The intranet site was divided into seven webpages: DIS overview, pharmacy and therapeutics, frequently asked questions, quick drug reference guide, ask the pharmacist, drug information resources, and referral center. The preparation for and implementation of the promotional phase took approximately two months. Promotional strategies included the creation and dissemination of brochures and stickers. The intranet site went live on January 1, 2007, and the advertising campaign began one month later. The utility of the site was measured for five months by tracking the number of visits to the site, the number of visits to each webpage, and the number of downloaded files. Request volume, caller affiliation, and question types received by the DIS call center were also recorded. Establishing a DIS intranet site required a considerable time investment and a willingness to work with existing infrastructures, such as the marketing and communications department and Web marketing staff.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-23
... ENVIRONMENTAL PROTECTION AGENCY [FRL-9269-7] Settlement Agreement for Recovery of Past Response Costs 10,000 Havana Street Site, Commerce City, Adams County, CO AGENCY: Environmental Protection Agency. ACTION: Notice and request for public comment. SUMMARY: In accordance with the requirements of Section...
Using the Nova Southeastern University Web Site
audiences (i.e. students, alumni, faculty, staff, vendors), the site still provides categorized resource pages for current students, faculty, and staff. Information for these groups can be accessed through the Now / Request Info Giving Alumni Select A College Nova Southeastern University Abraham S. Fischler
75 FR 17125 - Foreign-Trade Zone 157-Casper, Wyoming, Application for Expansion
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-05
...): Proposed Site 2 (984 acres) Casper Logistics Hub, located adjacent to and northeast of the airport at 6... Industrial Ranch, LLC and the Casper Logistics Hub. The site will be used to provide logistics, warehousing and distribution services to area businesses. No specific manufacturing authority is being requested...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-13
... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Project No. 13843-001] Qualified Hydro 24, LLC; Notice of Cancellation of Scoping Meetings and Environmental Site Review Take notice that Qualified Hydro 24, LLC, filed a request on June 4, 2012, to surrender the preliminary permit for the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-19
... 202-395-6974, Attention: NIH Desk Officer. Comment Due Date: Comments regarding this information... addition, CTSU collects annual surveys of customer satisfaction for clinical site staff using the CTSU Help Desk, the CTSU Web site, and the Protocol and Information Office (PIO). An ongoing user satisfaction...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [Docket 58-2010] Foreign-Trade Zone 51--Duluth... FTZ 51, requesting authority to reorganize the zone under the alternative site framework (ASF) adopted... or reorganizing a general-purpose zone, the application would have no impact on FTZ 51's authorized...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-05
... Collection; Information Collection Plan for Benefits.gov Online; Extension Without Change AGENCY: Office of...-free number) or e-mail to [email protected]gov . Send comments regarding this proposed collection of... Benefits.gov Web site. The Benefits.gov Web site assists citizens by providing information and eligibility...
78 FR 31941 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... burden 810 RISE Staff Pre-Test 157 1 .25 39 RISE Staff Post-Test 157 1 .25 39 RISE burden 78 Estimated... addition, evaluation plans were developed to support rigorous site-specific and cross-site studies to... and Lesbian Center's Recognize Intervene Support Empower (RISE) project. A third phase of the study...
ERIC Educational Resources Information Center
Mathews, Brian
2009-01-01
The web site is a library's most important feature. Patrons use the web site for numerous functions, such as renewing materials, placing holds, requesting information, and accessing databases. The homepage is the place they turn to look up the hours, branch locations, policies, and events. Whether users are at work, at home, in a building, or on…
75 FR 32237 - Information Collection Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-07
.... Title: Bad Order and Home Shop Card. OMB Control Number: 2130-0519. Type of Request: Extension without... installations are to be drop-tested at the job site after initial installation and before being used as a fall... is maintained at the job site promotes safe bridge worker practices. Form Number(s): N/A. Annual...
75 FR 70948 - Proposed Extension of the Approval of Information Collection Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-19
...Rulemaking Portal: http:[sol][sol]www.regulations.gov. Follow the instructions for submitting comments. Mail... comments electronically via the regulations.gov Web site or to submit them by mail early. Comments... regulations.gov Web site. They will also be summarized and/or included in the request for Office of Management...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-71,494] Johns Manville; Engineered Products Division, Including On-Site Leased Workers From Volt Workforce Solutions; Spartanburg, SC; Notice of Revised Determination on Reconsideration By application dated May 2, 2010, a petitioner requested administrative reconsideration of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... Company Including On-Site Leased Workers From Manpower, Inc. Old Fort, NC; Notice of Affirmative Determination Regarding Application for Reconsideration By application dated May 12, 2011, workers requested administrative reconsideration of the negative determination regarding workers' eligibility to apply for Trade...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-17
... during site visits with security and operating officials of transit systems. The STSIs capture and... assessments during site visits with security and operating officials of transit agencies. DATES: Send your... distance passenger railroad providers operate in the United States.\\1\\ Mass transit and passenger rail...
NASA Technical Reports Server (NTRS)
Perry, Charleen M.; Vansteenberg, Michael E.
1992-01-01
The National Space Science Data Center (NSSDC) has developed an automated data retrieval request service utilizing our Data Archive and Distribution Service (NDADS) computer system. NDADS currently has selected project data written to optical disk platters with the disks residing in a robotic 'jukebox' near-line environment. This allows for rapid and automated access to the data with no staff intervention required. There are also automated help information and user services available that can be accessed. The request system permits an average-size data request to be completed within minutes of the request being sent to NSSDC. A mail message, in the format described in this document, retrieves the data and can send it to a remote site. Also listed in this document are the data currently available.
End-to-End Network QoS via Scheduling of Flexible Resource Reservation Requests
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sharma, S.; Katramatos, D.; Yu, D.
2011-11-14
Modern data-intensive applications move vast amounts of data between multiple locations around the world. To enable predictable and reliable data transfer, next generation networks allow such applications to reserve network resources for exclusive use. In this paper, we solve an important problem (called SMR3) to accommodate multiple and concurrent network reservation requests between a pair of end-sites. Given the varying availability of bandwidth within the network, our goal is to accommodate as many reservation requests as possible while minimizing the total time needed to complete the data transfers. We first prove that SMR3 is an NP-hard problem. Then we solvemore » it by developing a polynomial-time heuristic, called RRA. The RRA algorithm hinges on an efficient mechanism to accommodate large number of requests by minimizing the bandwidth wastage. Finally, via numerical results, we show that RRA constructs schedules that accommodate significantly larger number of requests compared to other, seemingly efficient, heuristics.« less
Hanauer, David A; Hruby, Gregory W.; Fort, Daniel G.; Rasmussen, Luke V.; Mendonça, Eneida A.; Weng, Chunhua
2014-01-01
Many academic medical centers have aggregated data from multiple clinical systems into centralized repositories. These repositories can then be queried by skilled data analysts who act as intermediaries between the data stores and the research teams. To obtain data, researchers are often expected to complete a data request form. Such forms are meant to support record-keeping and, most importantly, provide a means for conveying complex data needs in a clear and understandable manner. Yet little is known about how data request forms are constructed and how effective they are likely to be. We conducted a content analysis of ten data request forms from CTSA-supported institutions. We found that most of the forms over-emphasized the collection of metadata that were not considered germane to the actual data needs. Based on our findings, we provide recommendations to improve the quality of data request forms in support of clinical and translational research. PMID:25954367
... Website You are exiting the Department of Labor's Web server. The Department of Labor does not endorse, ... the use of copyrighted materials contained in linked Web sites. Users must request such authorization from the ...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
....regulations.gov ). Instructions for submitting and reading comments are detailed on the site. Submit Comments Using the Internet: Go to Regulations.gov ( http://www.regulations.gov ). Instructions for submitting and reading comments are detailed on the site. Mail, Courier or Hand Delivery: Eric J. Jabs, Chief...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
... Certification for Live Fish and Fish Eggs AGENCY: Fish and Wildlife Service, Interior. ACTION: Notice; request... recent certification. Number, life stage, and species of animals or eggs. Site and date of sample collection. Name and address of laboratory conducting the assays. Site from which the animals or eggs will be...
New Partnerships Help Utilities Break Down Solar Barriers | News | NREL
local customers. Due to the small size of many member organizations and customer bases, some members face a challenge in accommodating customer requests to interconnect customer-sited solar photovoltaic supported the growth of customer-sited solar PV installations in recent years. In response to customer
77 FR 3768 - Agency Information Collection Activities; Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-25
... the TSCA Section 8(b) Inventory Data Base, Production and Site Reports'' and identified by EPA ICR No... section 8. Title: Partial Update of the TSCA Section 8(b) Inventory Data Base, Production and Site Reports... assumptions that you used. 3. Provide copies of any technical information and/or data you used that support...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-09
... site. The URL for this survey site will also be advertised separately through media and social media... information on the proposed project, contact: Laura M. Koehly, Ph.D., Senior Investigator, Social and... in health conditions and associated risk factors; The role of friends, family, media, and health...
76 FR 28821 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-18
... exclusively through computer software-based models or applications termed under the rule as ``interactive Web... conducted through an interactive Web site in accordance with the rule.\\7\\ \\1\\ 17 CFR 275.203A-2(f). Included in rule 203A-2(f) is a limited exception to the interactive Web site requirement which allows these...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-20
... data will affect our ability to conduct rigorous evaluations of these grants. For example, site visits are the only way the research team can observe the training programs in operation and collect real... Development and Research, Room N-5641, Employment and Training Administration, U.S. Department of Labor, 200...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-07
... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [Docket 1-2011] Foreign-Trade Zone 153--San Diego... to the Foreign-Trade Zones (FTZ) Board (the Board) by the City of San Diego, grantee of FTZ 153, requesting authority to reorganize and expand the zone under the alternative site framework (ASF) adopted by...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-26
... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [B-46-2012] Foreign-Trade Zone 70--Detroit, MI... Foreign-Trade Zones (FTZ) Board (the Board) by the Greater Detroit Foreign-Trade Zone, Inc., grantee of FTZ 70, requesting authority to reorganize the zone under the alternative site framework (ASF) adopted...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-23
... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [B-51-2012] Foreign-Trade Zone 32--Miami, FL... Foreign-Trade Zones (FTZ) Board (the Board) by the Greater Miami Foreign-Trade Zone, Inc., grantee of FTZ 32, requesting authority to reorganize the zone under the alternative site framework (ASF) adopted by...
Plantation establishment: site preparation and tree planting methods
J. W. Van Sambeek
2008-01-01
The Silviculture and Ecology of the Central Hardwoods research unit of the USDA Forest Service is developing a series of technical notes for the management of forest lands in the Midwest. Many of the technical notes on different aspects of hardwood plantation establishment have been completed. At the request of the editor, the technical notes for site preparation, slit...
30 CFR 285.500 - How do I make payments under this part?
Code of Federal Regulations, 2011 CFR
2011-07-01
... your lease, you must make credit card or automated clearing house payments through the Pay.gov Web site, and you must include one copy of the Pay.gov confirmation receipt page with your unsolicited request or signed lease instrument. You may access the Pay.gov Web site through links on the MMS Offshore Web...
75 FR 14443 - Proposed Information Collection Activity; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-25
... Customer Satisfaction Survey Individuals/ 1000 1 0.078 78.00 (Web site, E-mail, Print, Households. 216 1 0... State, Local, or 14 1 0.052 0.73 Tribal Governments. Comment Card (General Web and Individuals/ 300 1 0..., Local, or Tribal Governments. Web site Tools Comment Card... Individuals/ 229 1 0.014 3.21 Households...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-01
... Statement for the Ice Age National Scenic Trail Interpretive Site, Wisconsin AGENCY: National Park Service... (GMP/EIS) for the Ice Age National Scenic Trail (Trail) Interpretive Site, Wisconsin. ADDRESSES: Copies may be picked up in person or by mailing a request in writing to the Ice Age National Scenic Trail...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-05
... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-74,813A] Eastman Kodak Company... Eastman Kodak Company, IPS, including on-site leased workers from Adecco, Dayton, Ohio (TA-W-74, 813A). At the request of Eastman Kodak Company, the Department reviewed the certification applicable to workers...
7 CFR 1520.6 - Other information.
Code of Federal Regulations, 2014 CFR
2014-01-01
... found on the FAS web site, www.fas.usda.gov. Also, the FAS annual FOIA report is available on the agency's web site at www.fas.usda.gov. Click on FOIA at the bottom of the page. To request a paper copy of the FAS FOAI annual report, write to: Foreign Agricultural Service, U.S. Department of Agriculture...
31 CFR 256.11 - How do agencies request payments?
Code of Federal Regulations, 2013 CFR
2013-07-01
... forms or by using other approved methods as provided for on the Judgment Fund Web site at http://www.fms.treas.gov/judgefund. FMS provides forms and detailed information about Judgment Fund payments in the TFM, Volume I, Part 6, Chapter 3100. The TFM is also available on the Judgment Fund Web site. The submitting...
31 CFR 256.11 - How do agencies request payments?
Code of Federal Regulations, 2012 CFR
2012-07-01
... forms or by using other approved methods as provided for on the Judgment Fund Web site at http://www.fms.treas.gov/judgefund. FMS provides forms and detailed information about Judgment Fund payments in the TFM, Volume I, Part 6, Chapter 3100. The TFM is also available on the Judgment Fund Web site. The submitting...
31 CFR 256.11 - How do agencies request payments?
Code of Federal Regulations, 2011 CFR
2011-07-01
... forms or by using other approved methods as provided for on the Judgment Fund Web site at http://www.fms.treas.gov/judgefund. FMS provides forms and detailed information about Judgment Fund payments in the TFM, Volume I, Part 6, Chapter 3100. The TFM is also available on the Judgment Fund Web site. The submitting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [B-103-2013] Foreign-Trade Zone 62--Brownsville, Texas; Application for Reorganization Under Alternative Site Framework An application has been submitted to the Foreign-Trade Zones (FTZ) Board by the Brownsville Navigation District, grantee of FTZ 62, requesting authority to reorganize the zone...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-30
... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [B-87-2013] Foreign-Trade Zone 160--Anchorage, Alaska; Application for Reorganization Under Alternative Site Framework An application has been submitted to the Foreign-Trade Zones (FTZ) Board by the Municipality of Anchorage, grantee of FTZ 160, requesting authority to reorganize the zone under th...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-25
...-acre activation limit for a general-purpose zone project. The application was submitted pursuant to the..., 1996 (Board Order 818, 61 FR 21157, 5/9/1996). The current zone project includes the following sites... port of entry. The applicant is requesting authority to reorganize its existing zone project to include...
An open source Java web application to build self-contained Web GIS sites
NASA Astrophysics Data System (ADS)
Zavala Romero, O.; Ahmed, A.; Chassignet, E.; Zavala-Hidalgo, J.
2014-12-01
This work describes OWGIS, an open source Java web application that creates Web GIS sites by automatically writing HTML and JavaScript code. OWGIS is configured by XML files that define which layers (geographic datasets) will be displayed on the websites. This project uses several Open Geospatial Consortium standards to request data from typical map servers, such as GeoServer, and is also able to request data from ncWMS servers. The latter allows for the displaying of 4D data stored using the NetCDF file format (widely used for storing environmental model datasets). Some of the features available on the sites built with OWGIS are: multiple languages, animations, vertical profiles and vertical transects, color palettes, color ranges, and the ability to download data. OWGIS main users are scientists, such as oceanographers or climate scientists, who store their data in NetCDF files and want to analyze, visualize, share, or compare their data using a website.
... Website You are exiting the Department of Labor's Web server. The Department of Labor does not endorse, ... the use of copyrighted materials contained in linked Web sites. Users must request such authorization from the ...
... Website You are exiting the Department of Labor's Web server. The Department of Labor does not endorse, ... the use of copyrighted materials contained in linked Web sites. Users must request such authorization from the ...
The long tail: a usage analysis of pre-1993 print biomedical journal literature
Starr, Susan; Williams, Jeff
2008-01-01
Objective: The research analyzes usage of a major biomedical library's pre-1993 print journal collection. Methodology: In July 2003, in preparation for a renovation and expansion project, the Biomedical Library at the University of California, San Diego, moved all of its pre-1993 journal volumes off-site, with the exception of twenty-two heavily used titles. Patrons wishing to consult one of these stored volumes could request that it be delivered to the library for their use. In the spring of 2006, an analysis was made of these requests. Results: By July of 2006, 79,827 journal volumes published in 1992 or earlier had been requested from storage. The number of requests received declined with age of publication. The usage distribution exhibited a “long tail”: 50% of the 79,827 requests were for journal volumes published before 1986. The availability of electronic access dramatically reduced the chance that corresponding print journal volumes would be requested. Conclusions: The older biomedical print journal literature appears to be of continued value to the biomedical research community. When electronic access was provided to the older literature, demand for older print volumes declined dramatically. PMID:18219377
... Website You are exiting the Department of Labor's Web server. The Department of Labor does not endorse, ... the use of copyrighted materials contained in linked Web sites. Users must request such authorization from the ...
Review of passive-blind detection in digital video forgery based on sensing and imaging techniques
NASA Astrophysics Data System (ADS)
Tao, Junjie; Jia, Lili; You, Ying
2016-01-01
Advances in digital video compression and IP communication technologies raised new issues and challenges concerning the integrity and authenticity of surveillance videos. It is so important that the system should ensure that once recorded, the video cannot be altered; ensuring the audit trail is intact for evidential purposes. This paper gives an overview of passive techniques of Digital Video Forensics which are based on intrinsic fingerprints inherent in digital surveillance videos. In this paper, we performed a thorough research of literatures relevant to video manipulation detection methods which accomplish blind authentications without referring to any auxiliary information. We presents review of various existing methods in literature, and much more work is needed to be done in this field of video forensics based on video data analysis and observation of the surveillance systems.
Experimental quantum forgery of quantum optical money
NASA Astrophysics Data System (ADS)
Bartkiewicz, Karol; Černoch, Antonín; Chimczak, Grzegorz; Lemr, Karel; Miranowicz, Adam; Nori, Franco
2017-03-01
Unknown quantum information cannot be perfectly copied (cloned). This statement is the bedrock of quantum technologies and quantum cryptography, including the seminal scheme of Wiesner's quantum money, which was the first quantum-cryptographic proposal. Surprisingly, to our knowledge, quantum money has not been tested experimentally yet. Here, we experimentally revisit the Wiesner idea, assuming a banknote to be an image encoded in the polarization states of single photons. We demonstrate that it is possible to use quantum states to prepare a banknote that cannot be ideally copied without making the owner aware of only unauthorized actions. We provide the security conditions for quantum money by investigating the physically-achievable limits on the fidelity of 1-to-2 copying of arbitrary sequences of qubits. These results can be applied as a security measure in quantum digital right management.
DOE Office of Scientific and Technical Information (OSTI.GOV)
DOE /NV
This Corrective Action Decision Document/Closure Report (CADD/CR) has been prepared for Corrective Action Unit (CAU) 252: Area 25 Engine Test Stand-1 Decontamination Pad, in accordance with the Federal Facility Agreement and Consent Order (FFACO). Located at the Nevada Test Site in Nevada, CAU 252 consists of only one Corrective Action Site (25-07-04, Decontamination Pad). This CADD/CR identifies and rationalizes the U.S. Department of Energy, Nevada Operations Office's (DOE/NV's) recommendation that no corrective action is deemed necessary at CAU 252. The Corrective Action Decision Document and Closure Report have been combined into one report because the potential contaminants of concern weremore » either not detected during the corrective action investigation or were only present at naturally occurring concentrations. Based on the field results, neither corrective action or a corrective action plan is required at this site. A Notice of Completion to DOE/NV is being requested from the Nevada Division of Environmental Protection for closure of CAU 252, as well as a request that this site be moved from Appendix III to Appendix IV of the FFACO. Further, no use restrictions are required to be placed on this CAU.« less
Nuclear criticality safety evaluation of SRS 9971 shipping package. [SRS (Savannah River Site)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vescovi, P.J.
1993-02-01
This evaluation is requested to revise the criticality evaluation used to generate Chapter 6 (Criticality Evaluation) of the Safety Analysis Report for Packaging (SARP) for shipment Of UO[sub 3] product from the Uranium Solidification Facility (USF) in the SRS 9971 shipping package. The pertinent document requesting this evaluation is included as Attachment I. The results of the evaluation are given in Attachment II which is written as Chapter 6 of a NRC format SARP.
39 CFR 501.7 - Postage Evidencing System requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... on the Postal Service Web site at http://www.usps.com/postagesolutions/programdoc.html or requests..., is: (1) Consistent with the Postal Service's intent to maintain neutrality on religious, social...
39 CFR 501.7 - Postage Evidencing System requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... on the Postal Service Web site at http://www.usps.com/postagesolutions/programdoc.html or requests..., is: (1) Consistent with the Postal Service's intent to maintain neutrality on religious, social...
Suspension Trauma / Orthostatic Intolerance
... Website You are exiting the Department of Labor's Web server. The Department of Labor does not endorse, ... the use of copyrighted materials contained in linked Web sites. Users must request such authorization from the ...
Computer Workstation: Pointer/Mouse
... Website You are exiting the Department of Labor's Web server. The Department of Labor does not endorse, ... the use of copyrighted materials contained in linked Web sites. Users must request such authorization from the ...
7 CFR 3430.607 - Stakeholder input.
Code of Federal Regulations, 2010 CFR
2010-01-01
... ASSISTANCE PROGRAMS-GENERAL AWARD ADMINISTRATIVE PROVISIONS Beginning Farmer and Rancher Development Program... (e.g., public meetings, request for input and/or via Web site), as well as through a notice in the...
41 CFR 60-300.40 - Applicability of the affirmative action program requirement.
Code of Federal Regulations, 2014 CFR
2014-07-01
... FEDERAL CONTRACTORS AND SUBCONTRACTORS REGARDING DISABLED VETERANS, RECENTLY SEPARATED VETERANS, ACTIVE... contractor also shall make the affirmative action program promptly available on-site upon OFCCP's request. ...
78 FR 30268 - Information Collection Activity; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-22
... $5 million in grant funds available to facilitate the expansion of NOAA Weather Radio system coverage... space and other site resources to establish new rural NOAA Weather Radio transmitters. Eligible...
... Disease , Heart Disease , Heart Attack Elsewhere On The Web MedlinePlus Medical Encyclopedia: Rhabdomyolysis MedlinePlus Medical Encyclopedia: Myositis ... request form. If your question relates to this web site and not to a specific lab test, ...
Meert, Kathleen L.; Keele, Linda; Morrison, Wynne; Berg, Robert A.; Dalton, Heidi; Newth, Christopher J. L.; Harrison, Rick; Wessel, David L.; Shanley, Thomas; Carcillo, Joseph; Clark, Amy; Holubkov, Richard; Jenkins, Tammara L.; Doctor, Allan; Dean, J. Michael; Pollack, Murray
2015-01-01
Objective To describe variability in end-of-life practices among tertiary care pediatric intensive care units (PICUs) in the U.S. Design Secondary analysis of data prospectively collected from a random sample of patients (n=10,078) admitted to PICUs affiliated with the Collaborative Pediatric Critical Care Research Network (CPCCRN) between December 4, 2011 and April 7, 2013. Setting Seven clinical centers affiliated with the CPCCRN Patients Patients included in the primary study were <18 years of age, admitted to a PICU, and not moribund on PICU admission. Patients included in the secondary analysis were those who died during their hospital stay. Interventions None. Measurements and Main Results Two hundred and seventy-five (2.7%, range across sites 1.3%–5.0%) patients died during their hospital stay; of these, 252 (92%, 76%–100%) died in a PICU. Discussions with families about limitation or withdrawal of support occurred during the initial PICU stay for 173 (63%, 47%–76%, p=0.27) patients who died. Of these, palliative care was consulted for 67 (39%, 12%–46%); pain service for 11 (6%, 10 of which were at a single site); and ethics committee for 6 (3%, from 3 sites). Mode of death was withdrawal of support for 141 (51%, 42%–59%), failed CPR for 53 (19%, 12%–28%), limitation of support for 46 (17%, 7%–24%), and brain death for 35 (13%, 8%–20%); mode of death did not differ across sites (p=0.58). Organ donation was requested from 101 (37%, 17%–88%, p<0.001) families. Of these, 20 (20%, 0%–64%) donated. Sixty-two (23%, 10%–53%, p<0.001) deaths were medical examiner cases. Of non-medical examiner cases (n=213), autopsy was requested for 79 (37%, 17%–75%, p<0.001). Of autopsies requested, 53 (67%, 50%–100%) were performed. Conclusions Most deaths in CPCCRN-affiliated PICUs occur after life support has been limited or withdrawn. Wide practice variation exists in requests for organ donation and autopsy. PMID:26335128
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-24
... following the instructions on the web- based form. If you prefer to file your comment on paper, mail or... the Web site of a vendor of personal health records; (2) offers products or services through the Web... Web site, at http://www.ftc.gov/os/publiccomments.shtm . As a matter of discretion, the Commission...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-16
... the list of speakers, will be posted on the NTP Web site ( http://ntp.niehs.nih.gov/go/rocprocess... ( http://ntp.niehs.nih.gov/go/rocprocess ). The guidelines and deadlines published in the Federal... 27560. Registration for the listening session is via the NTP Web site ( http://ntp.niehs.nih.gov/go...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-28
... [email protected] , or by telephone at (301) 415-1677, to request (1) a digital ID certificate, which..., or its counsel or representative, already holds an NRC-issued digital ID certificate). Based upon... digital ID certificate is available on NRC's public Web site at http://www.nrc.gov/site-help/e-submittals...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-13
... [email protected] , or by telephone at (301) 415-1677, to request (1) a digital ID certificate, which..., or its counsel or representative, already holds an NRC- issued digital ID certificate). Based upon... digital ID certificate is available on NRC's public Web site at http://www.nrc.gov/site-help/e-submittals...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-25
... through the NCCAM Web site at http://nccam.nih.gov from on or about August 30 through September 30, 2010... professionals, have been guided by NCCAM's previous strategic plans, located on the NCCAM Web site at http... provide comments from August 30 through September 30, 2010. The papers may be viewed at http://nccam.nih...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-19
... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [Docket 33-2011] Foreign-Trade Zone 59--Lincoln, NE; Application for Reorganization Under Alternative Site Framework An application has been submitted to the Foreign-Trade Zones (FTZ) Board (the Board) by the Lincoln Foreign-Trade Zone, Inc., grantee of FTZ 59, requesting authority to reorganize...
performance in promoting the ideals and goals of the OAS. Américas will continue to fulfill requests for back English Español Americas Magazine Banner Americas Magazine Main Site OAS Main Site Home Back magazine. The last issue published was Volume 64, Number 3 (May/June) 2012. Beginning in 1949, Américas, a
Code of Federal Regulations, 2010 CFR
2010-07-01
... filed through the Office's web site, at http://www.uspto.gov. Paper documents and cover sheets to be... trademark documents can be ordered through the Office's web site at www.uspto.gov. Paper requests for...: Madrid Processing Unit, 600 Dulany Street, MDE-7B87, Alexandria, VA 22314-5793. [68 FR 48289, Aug. 13...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-12
... comments using the Internet, you may use the Web site http://www.regulations.gov . Please follow the instructions for submitting an electronic comment. You can also review comments on-line at the same Web site... consequences (e.g., a train in dark territory proceeds beyond its authority); (3) events that are below the FRA...
Occupational Safety and Health Administration
... Website You are exiting the Department of Labor's Web server. The Department of Labor does not endorse, ... the use of copyrighted materials contained in linked Web sites. Users must request such authorization from the ...
... Diseases , Fungal Infections , Pneumonia , Tuberculosis Elsewhere On The Web Centers for Disease Control and Prevention: HIV/AIDS ... request form. If your question relates to this web site and not to a specific lab test, ...
Computer Workstations: Good Working Positions
... Website You are exiting the Department of Labor's Web server. The Department of Labor does not endorse, ... the use of copyrighted materials contained in linked Web sites. Users must request such authorization from the ...
Second Trimester Maternal Serum Screening
... Non-invasive Prenatal Screening (2016) Elsewhere On The Web National Down Syndrome Society Spina Bifida Association Trisomy ... request form. If your question relates to this web site and not to a specific lab test, ...
Computer Workstations: Wrist/Palm Supports
... Website You are exiting the Department of Labor's Web server. The Department of Labor does not endorse, ... the use of copyrighted materials contained in linked Web sites. Users must request such authorization from the ...
76 FR 80885 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-27
... follows the guidelines contained in the OMB Resource Manual for Customer Surveys. In accordance with... being conducted include Web site satisfaction surveys, a Chart Users survey, and a Coastal Services...
Safety and Health Topics: Asbestos
... Website You are exiting the Department of Labor's Web server. The Department of Labor does not endorse, ... the use of copyrighted materials contained in linked Web sites. Users must request such authorization from the ...
This memorandum requests approval for a time-critical removal action at the 27 residential properties that compose the Oak Canyon Site located in the Village of Paguate, Pueblo of Laguna, near Cibola County, New Mexico.
32 CFR 505.4 - Collecting personal information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.4 Collecting personal information. (a) General... information on public Web sites without the express permission of the user. Requests for exceptions must be...
First Trimester Down Syndrome Screen
... Non-invasive Prenatal Screening (2016) Elsewhere On The Web KidsHealth.org: Down Syndrome National Down Syndrome Society ... request form. If your question relates to this web site and not to a specific lab test, ...
76 FR 61667 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-05
..., including: Mining and milling of nuclear materials; buildings on sites of facilities selected by the IAEA... verify the forms' data. The revision involves text clarifications. Affected Public: Business or other for...
43 CFR 429.12 - Where do I file my application?
Code of Federal Regulations, 2011 CFR
2011-10-01
... Reclamation office having jurisdiction over the land, facility, or waterbody associated with your request. Reclamation office locations may be found on http://www.usbr.gov, the official Reclamation Internet Web site. ...
43 CFR 429.12 - Where do I file my application?
Code of Federal Regulations, 2010 CFR
2010-10-01
... Reclamation office having jurisdiction over the land, facility, or waterbody associated with your request. Reclamation office locations may be found on http://www.usbr.gov, the official Reclamation Internet Web site. ...
78 FR 53765 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-30
... patients, such as evidence-based medicine guidelines, best practice guidelines, and shared decision-making... consider a broad variety of evidence for evaluating the nature and impact of each site's interventions...
78 FR 8149 - Extension of a Currently Approved Information Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-05
... in achieving sustainable, systemic change that results in greater safety, permanency, and well-being... agreements. The cross-site evaluation uses a mixed-method, longitudinal approach. Data collection methods...
78 FR 26324 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-06
... our Web site: www.cfa.gov . Inquiries regarding the agenda and requests to submit written or oral... address; by emailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring sign language...
77 FR 5495 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-03
... available on our Web site: http://www.cfa.gov . Inquiries regarding the agenda and requests to submit..., at the above address; by emailing [email protected]cfa.gov ; or by calling (202) 504- 2200. Individuals...
77 FR 13563 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-07
... our Web site: www.cfa.gov . Inquiries regarding the agenda and requests to submit written or oral... address; by emailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring sign language...
77 FR 23226 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-18
... our Web site: www.cfa.gov . Inquiries regarding the agenda and requests to submit written or oral... address; by emailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring sign language...
77 FR 68113 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-15
... are available on our Web site: www.cfa.gov . Inquiries regarding the agenda and requests to submit..., at the above address; by emailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals...
78 FR 64926 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-30
... are available on our Web site: www.cfa.gov . Inquiries regarding the agenda and requests to submit..., at the above address; by emailing [email protected]cfa.gov ; or by calling 202-504-2000. Individuals...
78 FR 54242 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-03
... are available on our Web site: www.cfa.gov . Inquiries regarding the agenda and requests to submit..., at the above address; by emailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals...
75 FR 28024 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-19
... the data-capturing process. SAMHSA will place Web site registration information into a Knowledge Management database and will place email subscription information into a database maintained by a third-party...
40 CFR 146.95 - Class VI injection depth waiver requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... detection tools), unless the Director determines, based on site-specific geology, that such methods are not... geology, that such methods are not appropriate; (5) Any additional requirements requested by the Director...
77 FR 24211 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-23
... through the use of automated collection techniques or other forms of information technology. Proposed... designated OTP site History (Screening) of Hepatitis C exposure Results of Rapid Hepatitis C Testing (Kit...
77 FR 74666 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-17
... sites: The Best Start Los Angeles Pilot Community Evaluation, currently led by the Urban Institute's... Poverty Center of the University of Michigan. Respondents: Low-income women who have resident children and...
Risk of Social Media for Teens in an Urban Setting.
Knowles, Megan; Lee, Sara Hirschfeld; O'Riordan, MaryAnn; Lazebnik, Rina
2014-01-01
Purpose. To describe the self-reported risky behaviors associated with adolescent social media use. Methods. Adolescents ages 13 to 21 years were recruited from a large, urban academic center to complete a written survey regarding social media use. Results are presented as frequencies and percentage; nominal variables were compared using χ(2) analysis. Results. Almost all participants (93%) reported belonging to a social media site. The majority of adolescents (72%) access the Internet with a phone. Nearly half (49%) of participants accept friend requests from strangers, 42% send friend requests to strangers, and 55% of participants report meeting people from social media sites in person. Conclusion. Adolescents self-report engaging in a number of risky behaviors when they use social media. Teenagers' use of social media is an additional behavior that requires attention and monitoring.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-14
... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [S-2-2013] Foreign-Trade Zone 196--Fort Worth, TX, Foreign-Trade Subzone 196A--TTI, Inc.; Application for Additional Subzone Site An application has been submitted to the Foreign-Trade Zones Board (the Board) by Alliance Corridor, Inc., grantee of FTZ 196, requesting an additional site for Subzone...
Web Proxy Auto Discovery for the WLCG
NASA Astrophysics Data System (ADS)
Dykstra, D.; Blomer, J.; Blumenfeld, B.; De Salvo, A.; Dewhurst, A.; Verguilov, V.
2017-10-01
All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily support that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids registered in the ATLAS Grid Information System (AGIS) and CMS SITECONF files, cross-checked with squids registered by sites in the Grid Configuration Database (GOCDB) and the OSG Information Management (OIM) system, and combined with some exceptions manually configured by people from ATLAS and CMS who operate WLCG Squid monitoring. WPAD servers at CERN respond to http requests from grid nodes all over the world with a PAC file that lists available web proxies, based on IP addresses matched from a database that contains the IP address ranges registered to organizations. Large grid sites are encouraged to supply their own WPAD web servers for more flexibility, to avoid being affected by short term long distance network outages, and to offload the WLCG WPAD servers at CERN. The CERN WPAD servers additionally support requests from jobs running at non-grid sites (particularly for LHC@Home) which they direct to the nearest publicly accessible web proxy servers. The responses to those requests are geographically ordered based on a separate database that maps IP addresses to longitude and latitude.
Web Proxy Auto Discovery for the WLCG
Dykstra, D.; Blomer, J.; Blumenfeld, B.; ...
2017-11-23
All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily supportmore » that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids registered in the ATLAS Grid Information System (AGIS) and CMS SITECONF files, cross-checked with squids registered by sites in the Grid Configuration Database (GOCDB) and the OSG Information Management (OIM) system, and combined with some exceptions manually configured by people from ATLAS and CMS who operate WLCG Squid monitoring. WPAD servers at CERN respond to http requests from grid nodes all over the world with a PAC file that lists available web proxies, based on IP addresses matched from a database that contains the IP address ranges registered to organizations. Large grid sites are encouraged to supply their own WPAD web servers for more flexibility, to avoid being affected by short term long distance network outages, and to offload the WLCG WPAD servers at CERN. The CERN WPAD servers additionally support requests from jobs running at non-grid sites (particularly for LHC@Home) which it directs to the nearest publicly accessible web proxy servers. Furthermore, the responses to those requests are geographically ordered based on a separate database that maps IP addresses to longitude and latitude.« less
Web Proxy Auto Discovery for the WLCG
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dykstra, D.; Blomer, J.; Blumenfeld, B.
All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily supportmore » that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids registered in the ATLAS Grid Information System (AGIS) and CMS SITECONF files, cross-checked with squids registered by sites in the Grid Configuration Database (GOCDB) and the OSG Information Management (OIM) system, and combined with some exceptions manually configured by people from ATLAS and CMS who operate WLCG Squid monitoring. WPAD servers at CERN respond to http requests from grid nodes all over the world with a PAC file that lists available web proxies, based on IP addresses matched from a database that contains the IP address ranges registered to organizations. Large grid sites are encouraged to supply their own WPAD web servers for more flexibility, to avoid being affected by short term long distance network outages, and to offload the WLCG WPAD servers at CERN. The CERN WPAD servers additionally support requests from jobs running at non-grid sites (particularly for LHC@Home) which it directs to the nearest publicly accessible web proxy servers. Furthermore, the responses to those requests are geographically ordered based on a separate database that maps IP addresses to longitude and latitude.« less
17 CFR 229.1118 - (Item 1118) Reports and additional information.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Commission maintains an Internet site that contains reports, proxy and information statements, and other... electronic or paper copies of those filings and other reports free of charge upon request. [70 FR 1597, Jan...
17 CFR 229.1118 - (Item 1118) Reports and additional information.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Commission maintains an Internet site that contains reports, proxy and information statements, and other... electronic or paper copies of those filings and other reports free of charge upon request. [70 FR 1597, Jan...
17 CFR 229.1118 - (Item 1118) Reports and additional information.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Commission maintains an Internet site that contains reports, proxy and information statements, and other... electronic or paper copies of those filings and other reports free of charge upon request. [70 FR 1597, Jan...
17 CFR 229.1118 - (Item 1118) Reports and additional information.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Commission maintains an Internet site that contains reports, proxy and information statements, and other... electronic or paper copies of those filings and other reports free of charge upon request. [70 FR 1597, Jan...
17 CFR 229.1118 - (Item 1118) Reports and additional information.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Commission maintains an Internet site that contains reports, proxy and information statements, and other... electronic or paper copies of those filings and other reports free of charge upon request. [70 FR 1597, Jan...
75 FR 54916 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-09
... Web site at http://www.reginfo.gov/public/do/PRAMain or by contacting Michel Smyth on 202- 693-4129... previously approved collection. Title of Collection: Crawler, Locomotive, and Truck Cranes Standard (29 CFR...
48 CFR 970.2702-6 - Notice of right to request patent waiver.
Code of Federal Regulations, 2010 CFR
2010-10-01
... AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND OPERATING CONTRACTS Patents, Data, and Copyrights 970....5227-9 in all solicitations for contracts for the management and operation of DOE sites or facilities. ...
Site Map News Organization Search NWS All NOAA Go Local forecast by "City, St" Search by city or zip code. Press enter or select the go button to submit request City, St Go Front Office OWP
Site Map News Organization Search NWS All NOAA Go Local forecast by "City, St" Search by city or zip code. Press enter or select the go button to submit request City, St Go Front Office OWP
Site Map News Organization Search NWS All NOAA Go Local forecast by "City, St" Search by city or zip code. Press enter or select the go button to submit request City, St Go Front Office OWP
Site Map News Organization Search NWS All NOAA Go Local forecast by "City, St" Search by city or zip code. Press enter or select the go button to submit request City, St Go Front Office OWP
Site Map News Organization Search NWS All NOAA Go Local forecast by "City, St" Search by city or zip code. Press enter or select the go button to submit request City, St Go Front Office OWP
NMCI: History, Implementation, and Change
2006-09-01
RAS Remote Access Service RFP Request for Proposal SAME Similar to Automated Maintenance Environment SDG Site Deployment Guide...instead of participants individually with different sections of the organization maintaining their own information supply , and when they need something
77 FR 32084 - Information Collection; Submission for OMB Review, Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-31
... Corporation for National and Community Service Web site. Type of Review: New. Agency: Corporation for National... minutes. Estimated Total Burden Hours: 100 hours. Total Burden Cost (Capital/Startup): None. Total Burden...
75 FR 37765 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-30
... Educational Agencies (SEAs) or Local Educational Agencies (LEAs). Estimated Number of Annual Responses: 2,627... the RegInfo.gov Web site at http://www.reginfo.gov/public/do/PRAMain or from the Department's website...
76 FR 2087 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-12
... available on our Web site: http://www.cfa.gov . Inquiries regarding the agenda and requests to submit..., at the above address; by e-mailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring...
78 FR 40727 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-08
... available on our Web site: www.cfa.gov . Inquiries regarding the agenda and requests to submit written or... above address; by emailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring sign...
75 FR 67348 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-02
... available on our Web site: http://www.cfa.gov . Inquiries regarding the agenda and requests to submit..., at the above address; by e-mailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring...
75 FR 9587 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-03
... our Web site: http://www.cfa.gov . Inquiries regarding the agenda and requests to submit written or... above address; by e-mailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring sign...
76 FR 9328 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-17
... available on our Web site: http://www.cfa.gov . Inquiries regarding the agenda and requests to submit..., at the above address; by e-mailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring...
78 FR 15357 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-11
... available on our Web site: www.cfa.gov . Inquiries regarding the agenda and requests to submit written or... above address; by emailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring sign...
78 FR 34654 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-10
... available on our Web site: www.cfa.gov . Inquiries regarding the agenda and requests to submit written or... above address; by emailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring sign...
76 FR 39859 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-07
... our Web site: http://www.cfa.gov . Inquiries regarding the agenda and requests to submit written or... above address; by e-maiing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring sign...
75 FR 59697 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-28
... available on our Web site: http://www.cfa.gov . Inquiries regarding the agenda and requests to submit..., at the above address; by e-mailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring...
76 FR 28424 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-17
... our Web site: http://www.cfa.gov . Inquiries regarding the agenda and requests to submit written or... above address; by e-mailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring sign...
75 FR 42380 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-21
... our Web site: http://www.cfa.gov . Inquiries regarding the agenda and requests to submit written or... above address; by e-mailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring sign...
78 FR 20094 - Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-03
... available on our Web site: www.cfa.gov . Inquiries regarding the agenda and requests to submit written or... above address; by emailing [email protected]cfa.gov ; or by calling 202-504- 2200. Individuals requiring sign...
75 FR 46943 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-04
...-capturing process. SAMHSA will place Web site registration information into a Knowledge Management database... September 3, 2010 to: SAMHSA Desk Officer, Human Resources and Housing Branch, Office of Management and...
Seneca Compressed Air Energy Storage (CAES) Project
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2012-11-30
This document provides specifications for the process air compressor for a compressed air storage project, requests a budgetary quote, and provides supporting information, including compressor data, site specific data, water analysis, and Seneca CAES value drivers.
Keywords and Co-Occurrence Patterns in the Voynich Manuscript: An Information-Theoretic Analysis
Montemurro, Marcelo A.; Zanette, Damián H.
2013-01-01
The Voynich manuscript has remained so far as a mystery for linguists and cryptologists. While the text written on medieval parchment -using an unknown script system- shows basic statistical patterns that bear resemblance to those from real languages, there are features that suggested to some researches that the manuscript was a forgery intended as a hoax. Here we analyse the long-range structure of the manuscript using methods from information theory. We show that the Voynich manuscript presents a complex organization in the distribution of words that is compatible with those found in real language sequences. We are also able to extract some of the most significant semantic word-networks in the text. These results together with some previously known statistical features of the Voynich manuscript, give support to the presence of a genuine message inside the book. PMID:23805215
Advanced Q-switched DPSS lasers for ID-card marking
NASA Astrophysics Data System (ADS)
Hertwig, Michael; Paster, Martin; Terbrueggen, Ralf
2008-02-01
Increased homeland security concerns across the world have generated a strong demand for forgery-proof ID documents. Manufacturers currently employ a variety of high technology techniques to produce documents that are difficult to copy. However, production costs and lead times are still a concern when considering any possible manufacturing technology. Laser marking has already emerged as an important tool in the manufacturer's arsenal, and is currently being utilized to produce a variety of documents, such as plastic ID cards, drivers' licenses, health insurance cards and passports. The marks utilized can range from simple barcodes and text to high resolution, true grayscale images. The technical challenges posed by these marking tasks include delivering adequate mark legibility, minimizing substrate burning or charring, accurately reproducing grayscale data, and supporting the required process throughput. This article covers the advantages and basic requirements on laser marking of cards and reviews how laser output parameters affect marking quality, speed and overall process economics.
Khalil, Mohammed S.; Khan, Muhammad Khurram; Alginahi, Yasser M.
2014-01-01
This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small. PMID:25028681
Khalil, Mohammed S; Kurniawan, Fajri; Khan, Muhammad Khurram; Alginahi, Yasser M
2014-01-01
This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.
Joint forensics and watermarking approach for video authentication
NASA Astrophysics Data System (ADS)
Thiemert, Stefan; Liu, Huajian; Steinebach, Martin; Croce-Ferri, Lucilla
2007-02-01
In our paper we discuss and compare the possibilities and shortcomings of both content-fragile watermarking and digital forensics and analyze if the combination of both techniques allows the identification of more than the sum of all manipulations identified by both techniques on their own due to synergetic effects. The first part of the paper discusses the theoretical possibilities offered by a combined approach, in which forensics and watermarking are considered as complementary tools for data authentication or deeply combined together, in order to reduce their error rate and to enhance the detection efficiency. After this conceptual discussion the paper proposes some concrete examples in which the joint approach is applied to video authentication. Some specific forensics techniques are analyzed and expanded to handle efficiently video data. The examples show possible extensions of passive-blind image forgery detection to video data, where the motion and time related characteristics of video are efficiently exploited.
Science and the Detective: Selected Reading in Forensic Science
NASA Astrophysics Data System (ADS)
Kaye, Brian H.
1996-12-01
Who killed Napoleon? Were the witches of Salem high on LSD? What do maggots on a body tell us about the time of death? In his unique, engaging style, Brian Kaye tells the story of some spectacular cases in which forensic evidence played a key role. You'll also read about the fascinating ways in which scientific evidence can be used to establish guilt or innocence in today's courtroom. The use of voice analysis, methods for developing fingerprints and for uncovering art forgeries, and the examination of bullet wounds are just a few topics considered. In a special section on fraud, the author takes you into the world of counterfeit money. There's no solving crime without science. Written for everyone interested in whodunnits, this book explains the basis of the analytical techniques available for studying evidence in offenses ranging from doping in sports to first-degree murder.
Glove-based approach to online signature verification.
Kamel, Nidal S; Sayeed, Shohel; Ellis, Grant A
2008-06-01
Utilizing the multiple degrees of freedom offered by the data glove for each finger and the hand, a novel on-line signature verification system using the Singular Value Decomposition (SVD) numerical tool for signature classification and verification is presented. The proposed technique is based on the Singular Value Decomposition in finding r singular vectors sensing the maximal energy of glove data matrix A, called principal subspace, so the effective dimensionality of A can be reduced. Having modeled the data glove signature through its r-principal subspace, signature authentication is performed by finding the angles between the different subspaces. A demonstration of the data glove is presented as an effective high-bandwidth data entry device for signature verification. This SVD-based signature verification technique is tested and its performance is shown to be able to recognize forgery signatures with a false acceptance rate of less than 1.2%.
NASA Astrophysics Data System (ADS)
Kajiya, E. A. M.; Campos, P. H. O. V.; Rizzutto, M. A.; Appoloni, C. R.; Lopes, F.
2014-02-01
This paper presents systematic studies and analysis that contributed to the identification of the forgery of a work by the artist Emiliano Augusto Cavalcanti de Albuquerque e Melo, known as Di Cavalcanti. The use of several areas of expertise such as brush stroke analysis ("pinacologia"), applied physics, and art history resulted in an accurate diagnosis for ascertaining the authenticity of the work entitled "Violeiro" (1950). For this work we used non-destructive methods such as techniques of infrared, ultraviolet, visible and tangential light imaging combined with chemical analysis of the pigments by portable X-Ray Fluorescence (XRF) and graphic gesture analysis. Each applied method of analysis produced specific information that made possible the identification of materials and techniques employed and we concluded that this work is not consistent with patterns characteristic of the artist Di Cavalcanti.
North Carolina DOT traffic separation studies. Volume I, Assessment.
DOT National Transportation Integrated Search
2004-09-01
The Federal Railroad Administration requested the Volpe National Transportation Systems Center to assess ten sites in depth that used the Traffic Separation Study (TSS) process. The assessment involved a quantitative and qualitative analysis of the i...
Litter survey : status report 1.
DOT National Transportation Integrated Search
1979-01-01
At the request of the Division of Litter Control of the Department of Conservation and Economic Development, the Research Council has initiated a litter survey program at approximately 25 sites on the state highway system. The purpose of this program...
18 CFR 385.2010 - Service (Rule 2010).
Code of Federal Regulations, 2010 CFR
2010-04-01
... Commission. (2) The certificate of service must conform to the following format: I hereby certify that I have... public in hard copy upon request and through the Commission's web site at http://www.ferc.gov. (4) Any...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-02
...; (2) Build the National Catalog by providing site-specific metadata for items in inventoried... geophysical data; (b) Digital infrastructure; (c) Metadata for items in data collections; and (d) Special data...
76 FR 16778 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-25
... or toolkit development, or ``think aloud'' testing of prototype Web sites. Exhibit 2--Estimated Cost... each, and two focus groups, automated data collections or lab experiments at an average cost of $20,000...
76 FR 54229 - Pesticide Experimental Use Permit; Receipt of Application; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-31
... Peraclean, treatment of wastewater effluent from oil well fracturing. The Agency has determined that the... treating oil and gas fracturing in the Chesapeake Energy Well site in Conway, Arkansas. A copy of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-01
.../sites/default/files/Grants/ReferenceMaterials/2014-GrantAssurances-Proposed.pdf . DATES: All comments...-GrantAssurances-Proposed.pdf . Interested parties are requested to provide comments concerning the...
This memorandum requests approval for a time-critical removal action at the II residential properties that compose the Rio San Jose Radiation Site located in Laguna, Mesita, Paraje, and Seama, Pueblo of Laguna located in Cibola County, New Mexico.