Sample records for wired equivalent privacy

  1. Insecurity of Wireless Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA,more » allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.« less

  2. Ad Hoc Networking for Unmanned Ground Vehicles: Design and Evaluation at Command, Control, Communications, Intelligence, Surveillance and Reconnaissance On-the-Move

    DTIC Science & Technology

    2006-11-01

    software components used in the ad hoc nodes for the C4ISR OTM experiment were OLSRD, an open-source proactive MANET routing software, and OpenVPN , an...developed by Mike Baker (openwrt.org). 6OpenVPN is a trademark of OpenVPN Solutions LLC. 6 Secure communications in the MANET are achieved with...encryption provided by Wired Equivalent Privacy (WEP) and OpenVPN . The WEP protocol, which is part of the IEEE 802.11 wireless networking standard

  3. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  4. Structures with Superelastic Shape Memory Alloy Stiffeners for Maximuj Damping and Energy Dissipation

    DTIC Science & Technology

    2010-02-15

    should be equal to the energy dissipation in the equivalent viscous damper . The former energy in a single wire can be evaluated from ( ) w ω π w Vdtt...can be obtained from experiments (e.g., Gandhi and Wolons, 1999). The energy dissipated in an equivalent continuous viscous damper oriented in the x...equivalent viscous damping of a system of wires could be determined from the requirement that the energy dissipation in the wire during a cycle of motion

  5. Experience of wireless local area network in a radiation oncology department.

    PubMed

    Mandal, Abhijit; Asthana, Anupam Kumar; Aggarwal, Lalit Mohan

    2010-01-01

    The aim of this work is to develop a wireless local area network (LAN) between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc) for efficient patient data management and to made easy the availability of information (chair side) to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops) and stationary workstations, all equipped with wireless-fidelity (Wi-Fi) access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ) has been used. The wireless networking was configured with the Service Set Identifier (SSID), Media Access Control (MAC) address filtering, and Wired Equivalent Privacy (WEP) network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.

  6. 46 CFR 72.05-25 - Doors, other than watertight.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... glass shall be fitted in steel or equivalent metal frames and shall be retained by steel or equivalent metal glazing beads or angles. (5) Where wire-inserted glass is required, and the single wire type is.... The cut for the hose port should be approximately 6 inches square. A hinged or pivoted steel or...

  7. 46 CFR 72.05-25 - Doors, other than watertight.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... glass shall be fitted in steel or equivalent metal frames and shall be retained by steel or equivalent metal glazing beads or angles. (5) Where wire-inserted glass is required, and the single wire type is.... The cut for the hose port should be approximately 6 inches square. A hinged or pivoted steel or...

  8. 46 CFR 72.05-30 - Windows and airports.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... strength purposes in certain locations. All glass shall be fitted in steel or equivalent metal frames and shall be retained by steel or equivalent metal glazing beads or angles. (b) Where wire-inserted glass is required, and the single wire type is employed, the strands shall run horizontally and shall be not more...

  9. 46 CFR 72.05-30 - Windows and airports.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... strength purposes in certain locations. All glass shall be fitted in steel or equivalent metal frames and shall be retained by steel or equivalent metal glazing beads or angles. (b) Where wire-inserted glass is required, and the single wire type is employed, the strands shall run horizontally and shall be not more...

  10. 47 CFR 36.156 - Interexchange Cable and Wire Facilities (C&WF)-Category 3-apportionment procedures.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... cost per equivalent interexchange telephone circuit kilometer for all circuits in Category 3 is determined and applied to the equivalent interexchange telephone circuit kilometer counts of each of the... Interexchange Cable and Wire Facilities C&WF where feasible. All study areas shall apportion the non-directly...

  11. 47 CFR 36.156 - Interexchange Cable and Wire Facilities (C&WF)-Category 3-apportionment procedures.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... cost per equivalent interexchange telephone circuit kilometer for all circuits in Category 3 is determined and applied to the equivalent interexchange telephone circuit kilometer counts of each of the... Interexchange Cable and Wire Facilities C&WF where feasible. All study areas shall apportion the non-directly...

  12. 47 CFR 36.156 - Interexchange Cable and Wire Facilities (C&WF)-Category 3-apportionment procedures.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... cost per equivalent interexchange telephone circuit kilometer for all circuits in Category 3 is determined and applied to the equivalent interexchange telephone circuit kilometer counts of each of the... Interexchange Cable and Wire Facilities C&WF where feasible. All study areas shall apportion the non-directly...

  13. 47 CFR 36.156 - Interexchange Cable and Wire Facilities (C&WF)-Category 3-apportionment procedures.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... cost per equivalent interexchange telephone circuit kilometer for all circuits in Category 3 is determined and applied to the equivalent interexchange telephone circuit kilometer counts of each of the... Interexchange Cable and Wire Facilities C&WF where feasible. All study areas shall apportion the non-directly...

  14. Design and verification of large-moment transmitter loops for geophysical applications

    NASA Astrophysics Data System (ADS)

    Sternberg, Ben K.; Dvorak, Steven L.; Feng, Wanjie

    2017-01-01

    In this paper we discuss the modeling, design and verification of large-moment transmitter (TX) loops for geophysical applications. We first develop two equivalent circuit models for TX loops. We show that the equivalent inductance can be predicted using one of two empirical formulas. The stray capacitance of the loop is then calculated using the measured self-resonant frequency and the loop inductance. We model the losses associated with both the skin effect and the dissipation factor in both of these equivalent circuits. We find that the two equivalent circuit models produce the same results provided that the dissipation factor is small. Next we compare the measured input impedances for three TX loops that were constructed with different wire configurations with the equivalent circuit model. We found excellent agreement between the measured and simulated results after adjusting the dissipation factor. Since the skin effect and dissipation factor yield good agreement with measurements, the proximity effect is negligible in the three TX loops that we tested. We found that the effects of the dissipation factor dominated those of the skin effect when the wires were relatively close together. When the wires were widely separated, then the skin effect was the dominant loss mechanism. We also found that loops with wider wire separations exhibited higher self-resonant frequencies and better high-frequency performance.

  15. 12 CFR Appendix A to Part 216 - Model Privacy Form

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... claim history; medical information; overdraft history; purchase history; account transactions; risk...; checking account information; employment information; wire transfer instructions. (c) General instructions... account; enter into an investment advisory contract; give us your income information; provide employment...

  16. 12 CFR Appendix A to Part 332 - Model Privacy Form

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... claim history; medical information; overdraft history; purchase history; account transactions; risk...; checking account information; employment information; wire transfer instructions. (c) General instructions... account; enter into an investment advisory contract; give us your income information; provide employment...

  17. 16 CFR Appendix A to Part 313 - Model Privacy Form

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... scores; insurance claim history; medical information; overdraft history; purchase history; account...; retirement assets; checking account information; employment information; wire transfer instructions. (c... account; enter into an investment advisory contract; give us your income information; provide employment...

  18. Fog Harvesting with Harps.

    PubMed

    Shi, Weiwei; Anderson, Mark J; Tulkoff, Joshua B; Kennedy, Brook S; Boreyko, Jonathan B

    2018-04-11

    Fog harvesting is a useful technique for obtaining fresh water in arid climates. The wire meshes currently utilized for fog harvesting suffer from dual constraints: coarse meshes cannot efficiently capture microscopic fog droplets, whereas fine meshes suffer from clogging issues. Here, we design and fabricate fog harvesters comprising an array of vertical wires, which we call "fog harps". Under controlled laboratory conditions, the fog-harvesting rates for fog harps with three different wire diameters were compared to conventional meshes of equivalent dimensions. As expected for the mesh structures, the mid-sized wires exhibited the largest fog collection rate, with a drop-off in performance for the fine or coarse meshes. In contrast, the fog-harvesting rate continually increased with decreasing wire diameter for the fog harps due to efficient droplet shedding that prevented clogging. This resulted in a 3-fold enhancement in the fog-harvesting rate for the harp design compared to an equivalent mesh.

  19. Critical current density in wire drawn and hydrostatically extruded Nb-Ti superconductors

    NASA Technical Reports Server (NTRS)

    Alterovitz, S. A.; Woollam, J. A.; Collings, E. W.

    1979-01-01

    Critical current studies have been made on copper-clad Nb-Ti composite wire prepared under area reductions of 100:1 and 10,000:1 by hydrostatic extrusion (HE), wire drawing and HE plus drawing. Comparative evaluation of the thermomechanical processing equivalent of HE was performed.

  20. 77 FR 56676 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ... have been reviewed for inclusion of Social Security Numbers or equivalent non-publicly- available... Decisions are made available to the public (after redaction of Social Security Numbers or equivalent non... Judicial Officer Administrative Decisions (after redaction of Social Security Numbers or equivalent non...

  1. The Anonymity vs. Utility Dilemma

    NASA Astrophysics Data System (ADS)

    Bezzi, Michele; Pazzaglia, Jean-Christophe

    The number, the type of users and their usage of the internet, computers and phones have evolved considerably, due to the emergence of the web 2.0, the decreasing cost of portable devices, the expansion of wired and wireless internet access and the digitalization of the main entertainment media. Protecting the assets of service and software providers has been the main driver for the development of security solutions in the past ten years. However, the users/customers/citizen rights have been too often neglected since the risk related to the wrong usage of personal related information was not considered by the other stakeholders. Today, the Right to Privacy is appearing on everyone’s radar and factors as regulations, increasing number of news stories on privacy breaches, brand damages, are forcing organizations to address user privacy as a priority. In this paper, we will briefly review the main business drivers behind the raising of privacy concerns, and outline some of the current technology solutions to address privacy requirements. Finally, we will describe some of the future challenges in the area of privacy.

  2. Frequency-tunable terahertz absorber with wire-based metamaterial and graphene

    NASA Astrophysics Data System (ADS)

    Xiong, Han; Jiang, Yan-Nan; Yang, Cheng; Zeng, Xiao-Ping

    2018-01-01

    We present a dynamically tunable metamaterial graphene absorber (MGA) in the terahertz regime. The unit cell of the proposed MGA consists of metal wire and graphene sheet over the grounded dielectric absorber. The MGA achieves frequency tunable characteristics via changing the chemical potential. In order to understand the absorption mechanism of this absorber, a simple equivalent circuit method has been proposed. Because the coupling between wire-based metamaterial and graphene is complicated and cannot be neglected an equivalent surface impedance was introduced and extracted for simplification. In addition to the chemical potential of graphene, the constitutive parameters of metal wire are also discussed in detail to completely understand how these factors affect the absorption properties. It is believed that this study may be useful for providing valuable guidance in the development of more advanced MGAs.

  3. 12 CFR Appendix A to Part 573 - Model Privacy Form

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... rates and payments; retirement assets; checking account information; employment information; wire... identified as “[account #].” Institutions that require additional or different information, such as a random... for financing; apply for a lease; provide account information; give us your contact information; pay...

  4. 17 CFR Appendix A to Part 160 - Model Privacy Form

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... rates and payments; retirement assets; checking account information; employment information; wire... additional or different information, such as a random opt-out number or a truncated account number, to... retirement earnings; apply for financing; apply for a lease; provide account information; give us your...

  5. 12 CFR Appendix A to Part 40 - Model Privacy Form

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... rates and payments; retirement assets; checking account information; employment information; wire... identified as “[account #].” Institutions that require additional or different information, such as a random... for financing; apply for a lease; provide account information; give us your contact information; pay...

  6. 12 CFR Appendix A to Part 716 - Model Privacy Form

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... rates and payments; retirement assets; checking account information; employment information; wire... identified as “[account #].” Institutions that require additional or different information, such as a random... for financing; apply for a lease; provide account information; give us your contact information; pay...

  7. 46 CFR 163.002-11 - Materials.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... hoist must be made of machine cut steel or machine cut bronze, or must be of a design of equivalent... hoist must be a corrosion-resistant wire rope other than galvanized wire rope. (c) Corrosion-resistant...

  8. 46 CFR 163.002-11 - Materials.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... hoist must be made of machine cut steel or machine cut bronze, or must be of a design of equivalent... hoist must be a corrosion-resistant wire rope other than galvanized wire rope. (c) Corrosion-resistant...

  9. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks.

    PubMed

    Meganathan, Navamani Thandava; Palanichamy, Yogesh

    2015-01-01

    Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols.

  10. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    NASA Astrophysics Data System (ADS)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  11. Equivalence of electronic and mechanical stresses in structural phase stabilization: A case study of indium wires on Si(111)

    NASA Astrophysics Data System (ADS)

    Kim, Sun-Woo; Kim, Hyun-Jung; Ming, Fangfei; Jia, Yu; Zeng, Changgan; Cho, Jun-Hyung; Zhang, Zhenyu

    2015-05-01

    It was recently proposed that the stress state of a material can also be altered via electron or hole doping, a concept termed electronic stress (ES), which is different from the traditional mechanical stress (MS) due to lattice contraction or expansion. Here we demonstrate the equivalence of ES and MS in structural stabilization, using In wires on Si(111) as a prototypical example. Our systematic density-functional theory calculations reveal that, first, for the same degrees of carrier doping into the In wires, the ES of the high-temperature metallic 4 ×1 structure is only slightly compressive, while that of the low-temperature insulating 8 ×2 structure is much larger and highly anisotropic. As a consequence, the intrinsic energy difference between the two phases is significantly reduced towards electronically phase-separated ground states. Our calculations further demonstrate quantitatively that such intriguing phase tunabilities can be achieved equivalently via lattice-contraction induced MS in the absence of charge doping. We also validate the equivalence through our detailed scanning tunneling microscopy experiments. The present findings have important implications for understanding the underlying driving forces involved in various phase transitions of simple and complex systems alike.

  12. 16 CFR 680.23 - Contents of opt-out notice; consolidated and equivalent notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...'s opt-out rights. (4) Model notices. Model notices are provided in Appendix C of Part 698 of this...)(iii) of the Act and the Gramm-Leach-Bliley Act privacy notice. (c) Equivalent notices. A notice or...

  13. Microstructures and Mechanical Properties of as-Drawn and Laboratory Annealed Pearlitic Steel Wires

    NASA Astrophysics Data System (ADS)

    Durgaprasad, A.; Giri, S.; Lenka, S.; Kundu, S.; Mishra, S.; Chandra, S.; Doherty, R. D.; Samajdar, I.

    2017-10-01

    Near eutectoid fully pearlitic wire rod (5.5 mm diameter) was taken through six stages of wire drawing (drawing strains of 0 to 2.47). The as-drawn (AD) wires were further laboratory annealed (LA) to re-austenitize and reform the pearlite. AD and LA grades, for respective wire diameters, had similar pearlite microstructure: interlamellar spacing ( λ) and pearlite alignment with the wire axis. However, LA grade had lower hardness (for both phases) and slightly lower fiber texture and residual stresses in ferrite. Surprisingly, essentially identical tensile yield strengths in AD and LA wires, measured at equivalent spacing, were found. The work hardened AD had, as expected, higher torsional yield strengths and lower tensile and torsional ductilities than LA. In both wires, stronger pearlite alignment gave significantly increased torsional ductility.

  14. Is Big Brother Watching the Wired Campus? Information Technologies Undermine the Climate of Freedom in Academia.

    ERIC Educational Resources Information Center

    Earls, Alan R.

    2000-01-01

    Explores privacy issues raised by information technology at colleges and universities. Drawing on accounts and opinions of faculty and staff members, provides examples of current practices and policies on Internet and e-mail use and discusses the possible need for more developed policies. (EV)

  15. Full-vectorial finite element method in a cylindrical coordinate system for loss analysis of photonic wire bends

    NASA Astrophysics Data System (ADS)

    Kakihara, Kuniaki; Kono, Naoya; Saitoh, Kunimasa; Koshiba, Masanori

    2006-11-01

    This paper presents a new full-vectorial finite-element method in a local cylindrical coordinate system, to effectively analyze bending losses in photonic wires. The discretization is performed in the cross section of a three-dimensional curved waveguide, using hybrid edge/nodal elements. The solution region is truncated by anisotropic, perfectly matched layers in the cylindrical coordinate system, to deal properly with leaky modes of the waveguide. This approach is used to evaluate bending losses in silicon wire waveguides. The numerical results of the present approach are compared with results calculated with an equivalent straight waveguide approach and with reported experimental data. These comparisons together demonstrate the validity of the present approach based on the cylindrical coordinate system and also clarifies the limited validity of the equivalent straight waveguide approximation.

  16. NBIC: Ballast Water Reporting Forms

    Science.gov Websites

    for the Coast Guard's Equivalent Reporting Program (ERP). The ERP program is restricted to NON regulations, submit a BWMR at least 24 hours before the vessel arrives in Montreal, Quebec. Non-US/non | FAQ| Equivalent Reporting Program Privacy policy - Terms of Use - Contact us: nbic@ballastreport.org

  17. 29 CFR 1915.72 - Ladders.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... shipbreaking. (a) General requirements. (1) The use of ladders with broken or missing rungs or steps, broken or... 10d common wire nails or fastened with through bolts or other fasteners of equivalent strength. Cleats... nailed to each rail with five 10d common wire nails or fastened with through bolts or other fasteners of...

  18. Extending SQL to Support Privacy Policies

    NASA Astrophysics Data System (ADS)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  19. Flexible substrate for printed wiring

    NASA Technical Reports Server (NTRS)

    Asakura, M.; Yabe, K.; Tanaka, H.; Soda, A.

    1982-01-01

    A very flexible substrate for printed wiring is disclosed which is composed of a blend of phenoxy resin-polyisocyanate-brominated epoxy resin in which the equivalent ration of the functional groups is hydroxyl grouped: isocyanate group: epoxy group = 1:0.2 to 2:0.5 to 3. The product has outstanding solder resistance and is applied to metal without using adhesives.

  20. Earth's field NMR; a surface moisture detector?

    NASA Astrophysics Data System (ADS)

    Fukushima, Eiichi; Altobelli, Stephen; McDowell, Andrew; Zhang, Tongsheng

    2012-10-01

    Earth's field NMR (EFNMR), being free of magnets, would be an ideal teaching medium as well as a mobile NMR technique except for its weak S/N. The common EFNMR apparatus uses a powerful prepolarization field to enhance the spin magnetization before the experiment. We introduce a coil design geared to larger but manageable samples with sufficient sensitivity without prepolarization to move EFNMR closer to routine use and to provide an inexpensive teaching tool. Our coil consists of parallel wires spread out on a plywood to form a current sheet with the current return wires separated so they will not influence the main part of the coil assembly. The sensitive region is a relatively thin region parallel to the coil and close to it. A single turn of the coil is wound to be topologically equivalent to a figure-8. The two crossing segments in the center of a figure-8 form two of the parallel wires of the flat coil. Thus, a two-turn figure-8 has four crossing wires so its topologically equivalent coil will have four parallel wires with currents in phase. Together with the excellent sensitivity, this coil offers outstanding interference rejection because of the figure-8 geometry. An example of such a coil has 328 parallel wires covering a ˜1 meter square plywood which yields a good NMR signal from 26 liters of water spread out roughly over the area of the coil in less than one minute in a nearby park.

  1. Development of termination and utilization concepts for flat conductor cables. Volume 3: Cost study comparison, flat versus round conductor cable

    NASA Technical Reports Server (NTRS)

    1972-01-01

    A cost study comparing flat conductor cable (FCC) with small-gage wire (SGW) and conventional round conductor cable (RCC) is presented. This study was based on a vehicle wiring system consisting of 110,000 ft of conventional RCC equally divided between AWG sizes 20,22, and 24 using MIL-W-81044-type wire and MIL-C-26500 circular connectors. Basic cost data were developed on a similar-sized commercial jet airplane wiring system on a previous company R&D program in which advanced wiring techniques were carried through equivalent installations on an airplane mockup; and on data developed on typical average bundles during this program. Various cost elements included were engineering labor, operations (manufacturing) labor, material costs, and cost impact on payload. Engineering labor includes design, wiring system integration, wiring diagrams and cable assembly drawings, wire installations, and other related supporting functions such as the electronic data processing for the wiring. Operations labor includes mockup, tooling and production planning, fabrication, assembly, installation, and quality control cost impact on payload is the conversion of wiring system weight variations through use of different wiring concepts to program payload benefits in terms of dollars.

  2. Cable Crosstalk Suppression with Two-Wire Voltage Feedback Method for Resistive Sensor Array

    PubMed Central

    Wu, Jianfeng; He, Shangshang; Li, Jianqing; Song, Aiguo

    2016-01-01

    Using a long, flexible test cable connected with a one-wire voltage feedback circuit, a resistive tactile sensor in a shared row-column fashion exhibited flexibility in robotic operations but suffered from crosstalk caused by the connected cable due to its wire resistances and its contacted resistances. Firstly, we designed a new non-scanned driving-electrode (VF-NSDE) circuit using two wires for every row line and every column line to reduce the crosstalk caused by the connected cables in the circuit. Then, an equivalent resistance expression of the element being tested (EBT) for the two-wire VF-NSDE circuit was analytically derived. Following this, the one-wire VF-NSDE circuit and the two-wire VF-NSDE circuit were evaluated by simulation experiments. Finally, positive features of the proposed method were verified with the experiments of a two-wire VF-NSDE prototype circuit. The experiment results show that the two-wire VF-NSDE circuit can greatly reduce the crosstalk error caused by the cables in the 2-D networked resistive sensor array. PMID:26907279

  3. CAVITATION STUDY OF A PROPELLER OPERATING IN A NONUNIFORM FLOW CREATED BY A WIRE GRID SCREEN.

    DTIC Science & Technology

    a given axial wake as produced by a wire mesh with the cavitation in the same wake as reported by van Manen . The second objective was to determine...observed by van Manen except that the intensity varied suggesting that the cavitation index used in the two studies may not be equivalent. (Author)

  4. Improvement of modulation bandwidth in electroabsorption-modulated laser by utilizing the resonance property in bonding wire.

    PubMed

    Kwon, Oh Kee; Han, Young Tak; Baek, Yong Soon; Chung, Yun C

    2012-05-21

    We present and demonstrate a simple and cost-effective technique for improving the modulation bandwidth of electroabsorption-modulated laser (EML). This technique utilizes the RF resonance caused by the EML chip (i.e., junction capacitance) and bonding wire (i.e, wire inductance). We analyze the effects of the lengths of the bonding wires on the frequency responses of EML by using an equivalent circuit model. To verify this analysis, we package a lumped EML chip on the sub-mount and measure its frequency responses. The results show that, by using the proposed technique, we can increase the modulation bandwidth of EML from ~16 GHz to ~28 GHz.

  5. Calibration of optical particle-size analyzer

    DOEpatents

    Pechin, William H.; Thacker, Louis H.; Turner, Lloyd J.

    1979-01-01

    This invention relates to a system for the calibration of an optical particle-size analyzer of the light-intercepting type for spherical particles, wherein a rotary wheel or disc is provided with radially-extending wires of differing diameters, each wire corresponding to a particular equivalent spherical particle diameter. These wires are passed at an appropriate frequency between the light source and the light detector of the analyzer. The reduction of light as received at the detector is a measure of the size of the wire, and the electronic signal may then be adjusted to provide the desired signal for corresponding spherical particles. This calibrator may be operated at any time without interrupting other processing.

  6. Polyimide-glass multilayer printed wiring boards

    NASA Astrophysics Data System (ADS)

    Lula, J. W.

    1984-07-01

    Multilayer printed wiring boards (PWBs) from a polyimide/glass reinforced copper clad laminate and prepreg were manufactured. A lamination cycle and innerlayer copper surface treatment that gave satisfactory delamination resistance at soldering temperatures were developed. When compared to similar epoxy/glass multilayer PWBs, the polyimide PWBs had higher thermal stability, greater resistance to raised lands, fewer plating voids, less outgassing, and adhesion that was equivalent to urethane foam encapsulants.

  7. 29 CFR (non - mandatory) Appendix A to Subpart L of Part 1926-Scaffold Specifications

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... equivalent in strength to at least 1/2 inch (1.3 cm) diameter improved plow steel wire rope. (s) Float (ship... wire or synthetic rope, and shall be supported by angle irons attached to brackets welded to the steel... inch lumber; or 11/4 inch × 1/8 inch structural angle iron; or 1 inch × .070 inch wall steel tubing; or...

  8. 29 CFR (non - mandatory) appendix A to Subpart L of Part 1926-Scaffold Specifications

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... equivalent in strength to at least 1/2 inch (1.3 cm) diameter improved plow steel wire rope. (s) Float (ship... wire or synthetic rope, and shall be supported by angle irons attached to brackets welded to the steel... inch lumber; or 11/4 inch × 1/8 inch structural angle iron; or 1 inch × .070 inch wall steel tubing; or...

  9. Microstructure and mechanical properties of hot wire laser clad layers for repairing precipitation hardening martensitic stainless steel

    NASA Astrophysics Data System (ADS)

    Wen, Peng; Cai, Zhipeng; Feng, Zhenhua; Wang, Gang

    2015-12-01

    Precipitation hardening martensitic stainless steel (PH-MSS) is widely used as load-bearing parts because of its excellent overall properties. It is economical and flexible to repair the failure parts instead of changing new ones. However, it is difficult to keep properties of repaired part as good as those of the substrate. With preheating wire by resistance heat, hot wire laser cladding owns both merits of low heat input and high deposition efficiency, thus is regarded as an advantaged repairing technology for damaged parts of high value. Multi-pass layers were cladded on the surface of FV520B by hot wire laser cladding. The microstructure and mechanical properties were compared and analyzed for the substrate and the clad layer. For the as-cladded layer, microstructure was found non-uniform and divided into quenched and tempered regions. Tensile strength was almost equivalent to that of the substrate, while ductility and impact toughness deteriorated much. With using laser scanning layer by layer during laser cladding, microstructure of the clad layers was tempered to fine martensite uniformly. The ductility and toughness of the clad layer were improved to be equivalent to those of the substrate, while the tensile strength was a little lower than that of the substrate. By adding TiC nanoparticles as well as laser scanning, the precipitation strengthening effect was improved and the structure was refined in the clad layer. The strength, ductility and toughness were all improved further. Finally, high quality clad layers were obtained with equivalent or even superior mechanical properties to the substrate, offering a valuable technique to repair PH-MSS.

  10. A multibiometric face recognition fusion framework with template protection

    NASA Astrophysics Data System (ADS)

    Chindaro, S.; Deravi, F.; Zhou, Z.; Ng, M. W. R.; Castro Neves, M.; Zhou, X.; Kelkboom, E.

    2010-04-01

    In this work we present a multibiometric face recognition framework based on combining information from 2D with 3D facial features. The 3D biometrics channel is protected by a privacy enhancing technology, which uses error correcting codes and cryptographic primitives to safeguard the privacy of the users of the biometric system at the same time enabling accurate matching through fusion with 2D. Experiments are conducted to compare the matching performance of such multibiometric systems with the individual biometric channels working alone and with unprotected multibiometric systems. The results show that the proposed hybrid system incorporating template protection, match and in some cases exceed the performance of corresponding unprotected equivalents, in addition to offering the additional privacy protection.

  11. Robust Network Architecture Against Random Threats in WMD Environments: Theoretical Limits and Recovery Strategies

    DTIC Science & Technology

    2017-08-01

    green energy sources such as the Photovoltaic (PV) and Wind Turbine (WT). All those devices are equipped with Intelligent Electronic Devices (IEDs...equivalent to the connectivity in the wired networks, which is used as a prerequisite to evaluate the functionality of the network applications. Moreover, a...using different access technologies, including wired and wireless, on licensed and unlicensed frequency bands. The objectives can be two-fold in general

  12. Test of the wire ageing induced by radiation for the CMS barrel muon chambers

    NASA Astrophysics Data System (ADS)

    Conti, E.; Gasparini, F.

    2001-06-01

    We have carried out laboratory tests to measure the ageing of a wire tube due to pollutants outgassed by various materials. The tested materials are those used in the barrel muon drift tubes of the CMS experiment at LHC. An X-ray gun irradiated the test tube to accelerate the ageing process. No ageing effect has been measured for a period equivalent to 10 years of operation at LHC.

  13. The biomechanical analysis of sublaminar wires and cables using luque segmental spinal instrumentation.

    PubMed

    Parsons, J R; Chokshi, B V; Lee, C K; Gundlapalli, R V; Stamer, D

    1997-02-01

    Data was gathered from biomechanical testing of 10 thoracic human cadaveric spines. Spines were tested intact and with a Luque rectangle fixed with wire or cable. To compare the rigidity of fixation and intraspinal penetration of sublaminar monofilament wire and multistrand cable under identical conditions using human cadaveric spines. Reports of neurologic and mechanical complications associated with sublaminar wiring techniques have led to the recent development of more flexible multistrand cable systems. The relative performance of flexible cable versus monofilament wire has not been explored fully in a controlled mechanical environment. A servohydraulic mechanical testing machine was used to measure the static mechanical stiffness of sublaminar wire or cable fixation in conjunction with a Luque rectangle for thoracic human cadaveric spine segments in flexion-extension and torsion modes. Cyclic testing was performed in the flexion-extension mode. Intraspinal penetration of wires and cables was measured. Spine fixation with sublaminar wire and cable resulted in constructs of equal stiffness in flexion-extension and torsion modes. Cyclic testing also indicated similar fatigue profiles for wire- and cable-instrumented spines. Wire and cable fixed spines displayed greater stiffness than the intact spines. Cable encroachment of the spinal canal was less than that seen with wire. Sublaminar multistrand cable may be a rational alternative to monofilament wire in segmental spinal instrumentation because it provides less encroachment into the spinal canal. Further, cadaveric spines instrumented with wire and cable display equivalent mechanical behavior, statically and under cyclic loading. The potential advantages of cable, however, must be balanced against a substantial increase in cost relative to wire.

  14. 78 FR 12337 - Published Privacy Impact Assessments on the Web

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-22

    ... system for intrusion detection, analysis, intrusion prevention, and information sharing capabilities that... equivalent protection to participating Federal civilian agencies pending deployment of EINSTEIN intrusion...-008 Homeland Security Information Network R3 User Accounts (HSIN). Component: Operations Coordination...

  15. With Protein Foods, Variety Is Key: 10 Tips for Choosing Protein

    MedlinePlus

    ... or seeds can be considered as 1 ounce-equivalent from the Protein Foods Group. Revised January 2016 ... Us Advanced Search Help Search Tips Privacy Policy Non-Discrimination Statement Information Quality USA.gov WhiteHouse.gov

  16. Control of interior surface materials for speech privacy in high-speed train cabins.

    PubMed

    Jang, H S; Lim, H; Jeon, J Y

    2017-05-01

    The effect of interior materials with various absorption coefficients on speech privacy was investigated in a 1:10 scale model of one high-speed train cabin geometry. The speech transmission index (STI) and privacy distance (r P ) were measured in the train cabin to quantify speech privacy. Measurement cases were selected for the ceiling, sidewall, and front and back walls and were classified as high-, medium- and low-absorption coefficient cases. Interior materials with high absorption coefficients yielded a low r P , and the ceiling had the largest impact on both the STI and r P among the interior elements. Combinations of the three cases were measured, and the maximum reduction in r P by the absorptive surfaces was 2.4 m, which exceeds the space between two rows of chairs in the high-speed train. Additionally, the contribution of the interior elements to speech privacy was analyzed using recorded impulse responses and a multiple regression model for r P using the equivalent absorption area. The analysis confirmed that the ceiling was the most important interior element for improving speech privacy. These results can be used to find the relative decrease in r P in the acoustic design of interior materials to improve speech privacy in train cabins. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  17. 24 CFR 3280.809 - Grounding.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... and approved as pressure-terminal connectors recognized for the wire size used. Star washers or other... as screws and star washers or equivalent). [40 FR 58752, Dec. 18, 1975. Redesignated at 44 FR 20679...

  18. 24 CFR 3280.809 - Grounding.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... and approved as pressure-terminal connectors recognized for the wire size used. Star washers or other... as screws and star washers or equivalent). [40 FR 58752, Dec. 18, 1975. Redesignated at 44 FR 20679...

  19. 24 CFR 3280.809 - Grounding.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... and approved as pressure-terminal connectors recognized for the wire size used. Star washers or other... as screws and star washers or equivalent). [40 FR 58752, Dec. 18, 1975. Redesignated at 44 FR 20679...

  20. 24 CFR 3280.809 - Grounding.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... and approved as pressure-terminal connectors recognized for the wire size used. Star washers or other... as screws and star washers or equivalent). [40 FR 58752, Dec. 18, 1975. Redesignated at 44 FR 20679...

  1. Randomized comparison of the magnetic navigation system vs. standard wires in the treatment of bifurcations.

    PubMed

    Ramcharitar, Steve; van der Giessen, Willem J; van der Ent, Martin; Serruys, Patrick W; van Geuns, Robert Jan

    2011-06-01

    Aims Randomly compare the magnetic navigation system (MNS) to standard guidewire techniques in managing bifurcating lesions. Methods and results Thirty-one consecutive patients with bifurcating lesions were randomized to cross the bifurcating vessels prior to treatment and thereafter the struts of deployed stents with either magnetic or standard guidewires. Crossing success, crossing/fluoroscopy times, and contrast media usage were directly compared. Similar times were noted in both the magnetic wire crossings (median, IQR; 68 s, 45-138 s vs. 59 s, 32-133 s) and fluoroscopic times (median, IQR; 62 s, 44-135 s vs. 55 s, 27-133 s) when compared with standard conventional wires passage through the deployed struts. The MNS successful crossings were 30/31 (96.8%) compared with 28/31 (90.0%) observed with the standard wires. Two previously failed standard wire cases were successfully crossed with magnetic guidewires. Conclusion In contemporary stented bifurcations, the MNS achieved equivalent crossing/fluoroscopy times through deployed stents struts and may be useful in salvaging failed standard wire cases.

  2. Si Wire-Array Solar Cells

    NASA Astrophysics Data System (ADS)

    Boettcher, Shannon

    2010-03-01

    Micron-scale Si wire arrays are three-dimensional photovoltaic absorbers that enable orthogonalization of light absorption and carrier collection and hence allow for the utilization of relatively impure Si in efficient solar cell designs. The wire arrays are grown by a vapor-liquid-solid-catalyzed process on a crystalline (111) Si wafer lithographically patterned with an array of metal catalyst particles. Following growth, such arrays can be embedded in polymethyldisiloxane (PDMS) and then peeled from the template growth substrate. The result is an unusual photovoltaic material: a flexible, bendable, wafer-thickness crystalline Si absorber. In this paper I will describe: 1. the growth of high-quality Si wires with controllable doping and the evaluation of their photovoltaic energy-conversion performance using a test electrolyte that forms a rectifying conformal semiconductor-liquid contact 2. the observation of enhanced absorption in wire arrays exceeding the conventional light trapping limits for planar Si cells of equivalent material thickness and 3. single-wire and large-area solid-state Si wire-array solar cell results obtained to date with directions for future cell designs based on optical and device physics. In collaboration with Michael Kelzenberg, Morgan Putnam, Joshua Spurgeon, Daniel Turner-Evans, Emily Warren, Nathan Lewis, and Harry Atwater, California Institute of Technology.

  3. Strain tolerance in technical Nb3Al superconductors

    NASA Astrophysics Data System (ADS)

    Banno, N.; Takeuchi, T.; Kitaguchi, H.; Tagawa, K.

    2006-10-01

    We observed crack formation in transformation-processed Nb3Al wires at room temperature, the wire being bent with a small clamp fixture with a curvature. The polished cross-section parallel to the longitudinal axis was observed, using a high power optical microscope or a field-emission scanning electron microscope. The bend strain limit for microcrack formation is found, changing the radius of the curvature of the clamp. The bend strain limit was found to be around 0.3% for standard Nb3Al wires. This corresponds to the irreversible tensile strain limit of the Ic characteristics determined with a 0.1 µV cm-1 criterion. Reduction of the barrier thickness should be avoided to keep to the bend strain limit. A new configuration of the Nb3Al wire is demonstrated to improve the bend strain limit. The filament is divided into segments in the transverse cross-section. The wire is fabricated by a double-stacking method. The bend strain limit is enhanced to about 0.85% for the wire surface; the equivalent strain of the outermost filament location is about 0.66%. A simple react and wind test for this wire was performed, where the wire experienced 0.86% bend strain. The degradation of Jc was found to be very small.

  4. On the Physical Realizability of Broad-Band Equivalent Circuits for Wire Loop and Dipole Antennas.

    DTIC Science & Technology

    1979-05-01

    found numerically, the task of grouping the poles by eigenmodes is much more difficult. For a complex object where the poles are experimentally . ived...structure is PR or can be made PR, then when all the poles for the structure are grouped the low frequency non -PR character of the higher poles are...the quarter point of the wire, some non -PR results are discovered. These groupings are indicated in Figures 45 through 49. The postulated eigenmode

  5. 29 CFR (non - mandatory) Appendix A to Subpart L of Part 1926-Scaffold Specifications

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... equivalent in strength to at least 1/2 inch (1.3 cm) diameter improved plow steel wire rope. (s) Float (ship... force. (d) Guardrails shall be as follows: (i) Toprails shall be equivalent in strength to 2 inch by 4 inch lumber; or 11/4 inch × 1/8 inch structural angle iron; or 1 inch × .070 inch wall steel tubing; or...

  6. 29 CFR (non - mandatory) Appendix A to Subpart L of Part 1926-Scaffold Specifications

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... equivalent in strength to at least 1/2 inch (1.3 cm) diameter improved plow steel wire rope. (s) Float (ship... force. (d) Guardrails shall be as follows: (i) Toprails shall be equivalent in strength to 2 inch by 4 inch lumber; or 11/4 inch × 1/8 inch structural angle iron; or 1 inch × .070 inch wall steel tubing; or...

  7. Patellar Tendon Repair Augmentation With a Knotless Suture Anchor Internal Brace: A Biomechanical Cadaveric Study.

    PubMed

    Rothfeld, Alex; Pawlak, Amanda; Liebler, Stephenie A H; Morris, Michael; Paci, James M

    2018-04-01

    Patellar tendon repair with braided polyethylene suture alone is subject to knot slippage and failure. Several techniques to augment the primary repair have been described. Purpose/Hypothesis: The purpose was to evaluate a novel patellar tendon repair technique augmented with a knotless suture anchor internal brace with suture tape (SAIB). The hypothesis was that this technique would be biomechanically superior to a nonaugmented repair and equivalent to a standard augmentation with an 18-gauge steel wire. Controlled laboratory study. Midsubstance patellar tendon tears were created in 32 human cadaveric knees. Two comparison groups were created. Group 1 compared #2 supersuture repair without augmentation to #2 supersuture repair with SAIB augmentation. Group 2 compared #2 supersuture repair with an 18-gauge stainless steel cerclage wire augmentation to #2 supersuture repair with SAIB augmentation. The specimens were potted and biomechanically loaded on a materials testing machine. Yield load, maximum load, mode of failure, plastic displacement, elastic displacement, and total displacement were calculated for each sample. Standard statistical analysis was performed. There was a statistically significant increase in the mean ± SD yield load and maximum load in the SAIB augmentation group compared with supersuture alone (mean yield load: 646 ± 202 N vs 229 ± 60 N; mean maximum load: 868 ± 162 N vs 365 ± 54 N; P < .001). Group 2 showed no statistically significant differences between the augmented repairs (mean yield load: 495 ± 213 N vs 566 ± 172 N; P = .476; mean maximum load: 737 ± 210 N vs 697 ± 130 N; P = .721). Patellar tendon repair augmented with SAIB is biomechanically superior to repair without augmentation and is equivalent to repair with augmentation with an 18-gauge stainless steel cerclage wire. This novel patellar tendon repair augmentation is equivalent to standard 18-gauge wire augmentation at time zero. It does not require a second surgery for removal, and it is biomechanically superior to primary repair alone.

  8. Development of ultrafine-grained microstructure in Al-Cu-Mg alloy through equal-channel angular pressing

    NASA Astrophysics Data System (ADS)

    Sai Anuhya, Danam; Gupta, Ashutosh; Nayan, Niraj; Narayana Murty, S. V. S.; Manna, R.; Sastry, G. V. S.

    2014-08-01

    Al-Cu-Mg alloys are extensively used for riveting applications in aerospace industries due to their relatively high shear strength coupled with high plasticity. The significant advantage of using V65 aluminum alloy ((Al-4Cu-0.2Mg) for rivet application also stems from its significantly slower natural aging kinetics, which gives operational flexibility to carryout riveting operation even after 4 days of solution heat treatment, in contrast to its equivalent alloy AA2024.Rivets are usually made by cold heading of wire rods. In order to form a defect free rivet head, grain size control in wire rods is essential at each and every stage of processing right from casting onwards upto the final wire drawing stage. Wire drawing is carried out at room temperature to reduce diameter as well as impart good surface finish. In the present study, different microstructures in V65 alloy bars were produced by rolling at different temperatures (room temperature to 523K) and subsequently deformed by equal channel angular pressing (ECAP) at 423K upto an equivalent strain of 7. ECAP was carried out to study the effect of initial microstructure on grain refinement and degree of deformation on the evolution of ultrafine grain structure. The refinement of V65 alloy by ECAP is significantly influenced by Initial microstructure but amount of deformation strongly affects the evolution processes as revealed by optical microscopy and transmission electron microscopy.

  9. Noise Characterization and Filtering in the MicroBooNE Liquid Argon TPC

    NASA Astrophysics Data System (ADS)

    Acciarri, R.; Adams, C.; An, R.; Anthony, J.; Asaadi, J.; Auger, M.; Bagby, L.; Balasubramanian, S.; Baller, B.; Barnes, C.; Barr, G.; Bass, M.; Bay, F.; Bishai, M.; Blake, A.; Bolton, T.; Bullard, B.; Camilleri, L.; Caratelli, D.; Carls, B.; Castillo Fernandez, R.; Cavanna, F.; Chen, H.; Church, E.; Cianci, D.; Cohen, E.; Collin, G. H.; Conrad, J. M.; Convery, M.; Crespo-Anadón, J. I.; De Geronimo, G.; Del Tutto, M.; Devitt, D.; Dytman, S.; Eberly, B.; Ereditato, A.; Escudero Sanchez, L.; Esquivel, J.; Fadeeva, A. A.; Fleming, B. T.; Foreman, W.; Furmanski, A. P.; Garcia-Gamez, D.; Garvey, G. T.; Genty, V.; Goeldi, D.; Gollapinni, S.; Graf, N.; Gramellini, E.; Greenlee, H.; Grosso, R.; Guenette, R.; Hackenburg, A.; Hamilton, P.; Hen, O.; Hewes, J.; Hill, C.; Ho, J.; Horton-Smith, G.; Hourlier, A.; Huang, E.-C.; James, C.; de Vries, J. Jan; Jen, C.-M.; Jiang, L.; Johnson, R. A.; Joshi, J.; Jostlein, H.; Kaleko, D.; Karagiorgi, G.; Ketchum, W.; Kirby, B.; Kirby, M.; Kobilarcik, T.; Kreslo, I.; Laube, A.; Li, S.; Li, Y.; Lister, A.; Littlejohn, B. R.; Lockwitz, S.; Lorca, D.; Louis, W. C.; Luethi, M.; Lundberg, B.; Luo, X.; Marchionni, A.; Mariani, C.; Marshall, J.; Martinez Caicedo, D. A.; Meddage, V.; Miceli, T.; Mills, G. B.; Moon, J.; Mooney, M.; Moore, C. D.; Mousseau, J.; Murrells, R.; Naples, D.; Nienaber, P.; Nowak, J.; Palamara, O.; Paolone, V.; Papavassiliou, V.; Pate, S. F.; Pavlovic, Z.; Piasetzky, E.; Porzio, D.; Pulliam, G.; Qian, X.; Raaf, J. L.; Radeka, V.; Rafique, A.; Rescia, S.; Rochester, L.; von Rohr, C. Rudolf; Russell, B.; Schmitz, D. W.; Schukraft, A.; Seligman, W.; Shaevitz, M. H.; Sinclair, J.; Smith, A.; Snider, E. L.; Soderberg, M.; Söldner-Rembold, S.; Soleti, S. R.; Spentzouris, P.; Spitz, J.; St. John, J.; Strauss, T.; Szelc, A. M.; Tagg, N.; Terao, K.; Thomson, M.; Thorn, C.; Toups, M.; Tsai, Y.-T.; Tufanli, S.; Usher, T.; Van De Pontseele, W.; Van de Water, R. G.; Viren, B.; Weber, M.; Wickremasinghe, D. A.; Wolbers, S.; Wongjirad, T.; Woodruff, K.; Yang, T.; Yates, L.; Yu, B.; Zeller, G. P.; Zennamo, J.; Zhang, C.

    2017-08-01

    The low-noise operation of readout electronics in a liquid argon time projection chamber (LArTPC) is critical to properly extract the distribution of ionization charge deposited on the wire planes of the TPC, especially for the induction planes. This paper describes the characteristics and mitigation of the observed noise in the MicroBooNE detector. The MicroBooNE's single-phase LArTPC comprises two induction planes and one collection sense wire plane with a total of 8256 wires. Current induced on each TPC wire is amplified and shaped by custom low-power, low-noise ASICs immersed in the liquid argon. The digitization of the signal waveform occurs outside the cryostat. Using data from the first year of MicroBooNE operations, several excess noise sources in the TPC were identified and mitigated. The residual equivalent noise charge (ENC) after noise filtering varies with wire length and is found to be below 400 electrons for the longest wires (4.7 m). The response is consistent with the cold electronics design expectations and is found to be stable with time and uniform over the functioning channels. This noise level is significantly lower than previous experiments utilizing warm front-end electronics.

  10. Experimental characterization of shape memory alloy actuator cables

    NASA Astrophysics Data System (ADS)

    Biggs, Daniel B.; Shaw, John A.

    2016-04-01

    Wire rope (or cables) are a fundamental structural element in many engineering applications. Recently, there has been growing interest in stranding NiTi wires into cables to scale up the adaptive properties of NiTi tension elements and to make use of the desirable properties of wire rope. Exploratory experiments were performed to study the actuation behavior of two NiTi shape memory alloy cables and straight monofilament wire of the same material. The specimens were held under various dead loads ranging from 50 MPa to 400 MPa and thermally cycled 25 times from 140°C to 5°C at a rate of 12°C/min. Performance metrics of actuation stroke, residual strain, and work output were measured and compared between specimen types. The 7x7 cable exhibited similar actuation to the single straight wire, but with slightly longer stroke and marginally more shakedown, while maintaining equivalent specific work output. This leads to the conclusion that the 7x7 cable effectively scaled up the adaptive properties the straight wire. Under loads below 150 MPa, the 1x27 cable had up to double the actuation stroke and work output, but exhibited larger shakedown and poorer performance when loaded higher.

  11. 29 CFR 1926.604 - Site clearing.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... this canopy structure shall be of not less than 1/8-inch steel plate or 1/4-inch woven wire mesh with openings no greater than 1 inch, or equivalent. (ii) The opening in the rear of the canopy structure shall...

  12. 29 CFR 1926.604 - Site clearing.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... this canopy structure shall be of not less than 1/8-inch steel plate or 1/4-inch woven wire mesh with openings no greater than 1 inch, or equivalent. (ii) The opening in the rear of the canopy structure shall...

  13. 29 CFR 1926.604 - Site clearing.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... this canopy structure shall be of not less than 1/8-inch steel plate or 1/4-inch woven wire mesh with openings no greater than 1 inch, or equivalent. (ii) The opening in the rear of the canopy structure shall...

  14. Progress in high performance DI-BSCCO wire

    NASA Astrophysics Data System (ADS)

    Kikuchi, M.; Ayai, N.; Fujikami, J.; Kobayashi, S.; Yamazaki, K.; Yamade, S.; Ishida, T.; Kato, T.; Hayashi, K.; Sato, K.; Hata, R.; Iihara, J.; Yamaguchi, K.; Kumakura, H.; Kitaguchi, H.; Osamura, K.; Shimoyama, J.

    2008-03-01

    The high performances of Dynamically Innovative BSCCO (DI-BSCCO) wire have been reviewed. Critical current (Ic) has reached 210 A (77 K and self-field), which is equivalent 500 A per 10 mm width, by total optimization of whole manufacturing process including Controlled Over Pressure (CT-OP) sintering. The further higher Ic value will be available on preferable oxide filaments with the improved c-axis orientation of Bi2223 grains, the minimized non-superconducting phases, and so on. The Ic of long length wires has been reached 203 A of 42 m 180 A of 1,400 m. Ic in the magnetic field at low temperature has showed great improvements in comparison with the past 150 A class wire. The mechanical performances has been improved due to the densification of the Bi2223 filaments up to 100% by CT-OP process, moreover have been dynamically improved by reinforcement with stainless steel tapes or brass tapes. These results can enable DI-BSCCO wire to be applied for the cryogenic applications such as motors, magnets, cables and so on.

  15. 78 FR 22526 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-16

    ...); (4) United States Social Security Number (SSN), (if any), United States Immigration and Naturalization Service (INS) Identification or similar number(s), (if any), and any equivalent social security or...) spouse; (c) children; (d) brothers; (e) sisters; (f) others; (9) team name; (10) place of insertion; (11...

  16. Less-invasive stabilization of rib fractures by intramedullary fixation: a biomechanical evaluation.

    PubMed

    Bottlang, Michael; Helzel, Inga; Long, William; Fitzpatrick, Daniel; Madey, Steven

    2010-05-01

    This study evaluated intramedullary fixation of rib fractures with Kirschner wires and novel ribs splints. We hypothesized that rib splints can provide equivalent fixation strength while avoiding complications associated with Kirschner wires, namely wire migration and cutout. The durability, strength, and failure modes of rib fracture fixation with Kirschner wires and rib splints were evaluated in 22 paired human ribs. First, intact ribs were loaded to failure to determine their strength. After fracture fixation with Kirschner wires and rib splints, fixation constructs were dynamically loaded to 360,000 cycles at five times the respiratory load to determine their durability. Finally, constructs were loaded to failure to determine residual strength and failure modes. All constructs sustained dynamic loading without failure. Dynamic loading caused three times more subsidence in Kirschner wire constructs (1.2 mm +/- 1.4 mm) than in rib splint constructs (0.4 mm +/- 0.2 mm, p = 0.09). After dynamic loading, rib splint constructs remained 48% stronger than Kirschner wire constructs (p = 0.001). Five of 11 Kirschner wire constructs failed catastrophically by cutting through the medial cortex, leading to complete loss of stability and wire migration through the lateral cortex. The remaining six constructs failed by wire bending. Rib splint constructs failed by development of fracture lines along the superior and interior cortices. No splint construct failed catastrophically, and all splint constructs retained functional reduction and fixation. Because of their superior strength and absence of catastrophic failure mode, rib splints can serve as an attractive alternative to Kirschner wires for intramedullary stabilization of rib fractures, especially in the case of posterior rib fractures where access for plating is limited.

  17. Piezo-Potential Generation in Capacitive Flexible Sensors Based on GaN Horizontal Wires.

    PubMed

    El Kacimi, Amine; Pauliac-Vaujour, Emmanuelle; Delléa, Olivier; Eymery, Joël

    2018-06-12

    We report an example of the realization of a flexible capacitive piezoelectric sensor based on the assembly of horizontal c¯-polar long Gallium nitride (GaN) wires grown by metal organic vapour phase epitaxy (MOVPE) with the Boostream ® technique spreading wires on a moving liquid before their transfer on large areas. The measured signal (<0.6 V) obtained by a punctual compression/release of the device shows a large variability attributed to the dimensions of the wires and their in-plane orientations. The cause of this variability and the general operating mechanisms of this flexible capacitive device are explained by finite element modelling simulations. This method allows considering the full device composed of a metal/dielectric/wires/dielectric/metal stacking. We first clarify the mechanisms involved in the piezo-potential generation by mapping the charge and piezo-potential in a single wire and studying the time-dependent evolution of this phenomenon. GaN wires have equivalent dipoles that generate a tension between metallic electrodes only when they have a non-zero in-plane projection. This is obtained in practice by the conical shape occurring spontaneously during the MOVPE growth. The optimal aspect ratio in terms of length and conicity (for the usual MOVPE wire diameter) is determined for a bending mechanical loading. It is suggested to use 60⁻120 µm long wires (i.e., growth time less than 1 h). To study further the role of these dipoles, we consider model systems with in-plane 1D and 2D regular arrays of horizontal wires. It is shown that a strong electrostatic coupling and screening occur between neighbouring horizontal wires depending on polarity and shape. This effect, highlighted here only from calculations, should be taken into account to improve device performance.

  18. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services.

    PubMed

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.

  19. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services

    PubMed Central

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider. PMID:27571421

  20. Noise Characterization and Filtering in the MicroBooNE Liquid Argon TPC

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Acciarri, R.; et al.

    The low-noise operation of readout electronics in a liquid argon time projection chamber (LArTPC) is critical to properly extract the distribution of ionization charge deposited on the wire planes of the TPC, especially for the induction planes. This paper describes the characteristics and mitigation of the observed noise in the MicroBooNE detector. The MicroBooNE's single-phase LArTPC comprises two induction planes and one collection sense wire plane with a total of 8256 wires. Current induced on each TPC wire is amplified and shaped by custom low-power, low-noise ASICs immersed in the liquid argon. The digitization of the signal waveform occurs outsidemore » the cryostat. Using data from the first year of MicroBooNE operations, several excess noise sources in the TPC were identified and mitigated. The residual equivalent noise charge (ENC) after noise filtering varies with wire length and is found to be below 400 electrons for the longest wires (4.7 m). The response is consistent with the cold electronics design expectations and is found to be stable with time and uniform over the functioning channels. This noise level is significantly lower than previous experiments utilizing warm front-end electronics.« less

  1. Noise Characterization and Filtering in the MicroBooNE Liquid Argon TPC

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Acciarri, R.; Adams, C.; An, R.

    The low-noise operation of readout electronics in a liquid argon time projection chamber (LArTPC) is critical to properly extract the distribution of ionization charge deposited on the wire planes of the TPC, especially for the induction planes. This paper describes the characteristics and mitigation of the observed noise in the MicroBooNE detector. The MicroBooNE's single-phase LArTPC comprises two induction planes and one collection sense wire plane with a total of 8256 wires. Current induced on each TPC wire is amplified and shaped by custom low-power, low-noise ASICs immersed in the liquid argon. The digitization of the signal waveform occurs outsidemore » the cryostat. Using data from the first year of MicroBooNE operations, several excess noise sources in the TPC were identified and mitigated. The residual equivalent noise charge (ENC) after noise filtering varies with wire length and is found to be below 400 electrons for the longest wires (4.7 m). The response is consistent with the cold electronics design expectations and is found to be stable with time and uniform over the functioning channels. In conclusion, this noise level is significantly lower than previous experiments utilizing warm front-end electronics.« less

  2. Reliability Assessment and Activation Energy Study of Au and Pd-Coated Cu Wires Post High Temperature Aging in Nanoscale Semiconductor Packaging.

    PubMed

    Gan, C L; Hashim, U

    2013-06-01

    Wearout reliability and high temperature storage life (HTSL) activation energy of Au and Pd-coated Cu (PdCu) ball bonds are useful technical information for Cu wire deployment in nanoscale semiconductor device packaging. This paper discusses the influence of wire type on the wearout reliability performance of Au and PdCu wire used in fine pitch BGA package after HTSL stress at various aging temperatures. Failure analysis has been conducted to identify the failure mechanism after HTSL wearout conditions for Au and PdCu ball bonds. Apparent activation energies (Eaa) of both wire types are investigated after HTSL test at 150 °C, 175 °C and 200 °C aging temperatures. Arrhenius plot has been plotted for each ball bond types and the calculated Eaa of PdCu ball bond is 0.85 eV and 1.10 eV for Au ball bond in 110 nm semiconductor device. Obviously Au ball bond is identified with faster IMC formation rate with IMC Kirkendall voiding while PdCu wire exhibits equivalent wearout and or better wearout reliability margin compare to conventional Au wirebond. Lognormal plots have been established and its mean to failure (t 50 ) have been discussed in this paper.

  3. Noise Characterization and Filtering in the MicroBooNE Liquid Argon TPC

    DOE PAGES

    Acciarri, R.; Adams, C.; An, R.; ...

    2017-08-04

    The low-noise operation of readout electronics in a liquid argon time projection chamber (LArTPC) is critical to properly extract the distribution of ionization charge deposited on the wire planes of the TPC, especially for the induction planes. This paper describes the characteristics and mitigation of the observed noise in the MicroBooNE detector. The MicroBooNE's single-phase LArTPC comprises two induction planes and one collection sense wire plane with a total of 8256 wires. Current induced on each TPC wire is amplified and shaped by custom low-power, low-noise ASICs immersed in the liquid argon. The digitization of the signal waveform occurs outsidemore » the cryostat. Using data from the first year of MicroBooNE operations, several excess noise sources in the TPC were identified and mitigated. The residual equivalent noise charge (ENC) after noise filtering varies with wire length and is found to be below 400 electrons for the longest wires (4.7 m). The response is consistent with the cold electronics design expectations and is found to be stable with time and uniform over the functioning channels. In conclusion, this noise level is significantly lower than previous experiments utilizing warm front-end electronics.« less

  4. In-surface confinement of topological insulator nanowire surface states

    NASA Astrophysics Data System (ADS)

    Chen, Fan W.; Jauregui, Luis A.; Tan, Yaohua; Manfra, Michael; Klimeck, Gerhard; Chen, Yong P.; Kubis, Tillmann

    2015-09-01

    The bandstructures of [110] and [001] Bi2Te3 nanowires are solved with the atomistic 20 band tight binding functionality of NEMO5. The theoretical results reveal: The popular assumption that all topological insulator (TI) wire surfaces are equivalent is inappropriate. The Fermi velocity of chemically distinct wire surfaces differs significantly which creates an effective in-surface confinement potential. As a result, topological insulator surface states prefer specific surfaces. Therefore, experiments have to be designed carefully not to probe surfaces unfavorable to the surface states (low density of states) and thereby be insensitive to the TI-effects.

  5. X-wing fly-by-wire vehicle management system

    NASA Technical Reports Server (NTRS)

    Fischer, Jr., William C. (Inventor)

    1990-01-01

    A complete, computer based, vehicle management system (VMS) for X-Wing aircraft using digital fly-by-wire technology controlling many subsystems and providing functions beyond the classical aircraft flight control system. The vehicle management system receives input signals from a multiplicity of sensors and provides commands to a large number of actuators controlling many subsystems. The VMS includes--segregating flight critical and mission critical factors and providing a greater level of back-up or redundancy for the former; centralizing the computation of functions utilized by several subsystems (e.g. air data, rotor speed, etc.); integrating the control of the flight control functions, the compressor control, the rotor conversion control, vibration alleviation by higher harmonic control, engine power anticipation and self-test, all in the same flight control computer (FCC) hardware units. The VMS uses equivalent redundancy techniques to attain quadruple equivalency levels; includes alternate modes of operation and recovery means to back-up any functions which fail; and uses back-up control software for software redundancy.

  6. Security Issues for Mobile Medical Imaging: A Primer.

    PubMed

    Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George

    2015-10-01

    The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.

  7. Determination of the Pressure Equivalent Noise Signal of Vector Sensors in a Hybrid Array

    DTIC Science & Technology

    2012-12-01

    pressure sensors for acoustic signals raises the possibility of increased sonar array performance with smaller arrays. Caulk successfully...contribution of the preamplifier in the circuit was estimated as . So the Johnson noise of the sensor wires themselves is expected to dominate

  8. Arthroscopic Talar Dome Access Using a Standard Versus Wire-Based Traction Method for Ankle Joint Distraction.

    PubMed

    Barg, Alexej; Saltzman, Charles L; Beals, Timothy C; Bachus, Kent N; Blankenhorn, Brad D; Nickisch, Florian

    2016-07-01

    To evaluate the accessibility of the talar dome through anterior and posterior portals for ankle arthroscopy with the standard noninvasive distraction versus wire-based longitudinal distraction using a tensioned wire placed transversely through the calcaneal tuberosity. Seven matched pairs of thigh-to-foot specimens underwent ankle arthroscopy with 1 of 2 methods of distraction: a standard noninvasive strapping technique or a calcaneal tuberosity wire-based technique. The order of the arthroscopic approach and use of a distraction method was randomly determined. The areas accessed from both 2-portal anterior and 2-portal posterior approaches were determined by using a molded translucent grid. The mean talar surface accessible by anterior ankle arthroscopy was comparable with noninvasive versus calcaneal wire distraction with 57.8% ± 17.2% (range, 32.9% to 75.7%) versus 61.5% ± 15.2% (range, 38.5% to 79.1%) of the talar dome, respectively (P = .590). The use of calcaneal wire distraction significantly improved posterior talar dome accessibility compared with noninvasive distraction, with 56.4% ± 20.0% (range, 14.4% to 78.0%) versus 39.8% ± 14.9% (range, 20.0% to 57.6%) of the talar dome, respectively (P = .031). Under the conditions studied, our cadaveric model showed equivalent talar dome access with 2-portal anterior arthroscopy of calcaneal wire-based distraction versus noninvasive strap distraction, but improved access for 2-portal posterior arthroscopy with calcaneal wire-based distraction versus noninvasive strap distraction. The posterior 40% of the talar dome is difficult to access via anterior ankle arthroscopy. Posterior calcaneal tuberosity wire-based longitudinal distraction improved arthroscopic access to the centro-posterior talar dome with a posterior arthroscopic approach. Published by Elsevier Inc.

  9. Predicting efficiency of solar cells based on transparent conducting electrodes

    NASA Astrophysics Data System (ADS)

    Kumar, Ankush

    2017-01-01

    Efficiency of a solar cell is directly correlated with the performance of its transparent conducting electrodes (TCEs) which dictates its two core processes, viz., absorption and collection efficiencies. Emerging designs of a TCE involve active networks of carbon nanotubes, silver nanowires and various template-based techniques providing diverse structures; here, voids are transparent for optical transmittance while the conducting network acts as a charge collector. However, it is still not well understood as to which kind of network structure leads to an optimum solar cell performance; therefore, mostly an arbitrary network is chosen as a solar cell electrode. Herein, we propose a new generic approach for understanding the role of TCEs in determining the solar cell efficiency based on analysis of shadowing and recombination losses. A random network of wires encloses void regions of different sizes and shapes which permit light transmission; two terms, void fraction and equivalent radius, are defined to represent the TCE transmittance and wire spacings, respectively. The approach has been applied to various literature examples and their solar cell performance has been compared. To obtain high-efficiency solar cells, optimum density of the wires and their aspect ratio as well as active layer thickness are calculated. Our findings show that a TCE well suitable for one solar cell may not be suitable for another. For high diffusion length based solar cells, the void fraction of the network should be low while for low diffusion length based solar cells, the equivalent radius should be lower. The network with less wire spacing compared to the diffusion length behaves similar to continuous film based TCEs (such as indium tin oxide). The present work will be useful for architectural as well as material engineering of transparent electrodes for improvisation of solar cell performance.

  10. Unconditionally Secure Credit/Debit Card Chip Scheme and Physical Unclonable Function

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Entesari, Kamran; Granqvist, Claes-Göran; Kwan, Chiman

    The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions (PUFs).

  11. Bend-imitating models of abruptly bent electron waveguides

    NASA Astrophysics Data System (ADS)

    Vakhnenko, Oleksiy O.

    2011-07-01

    The fundamentals of bend-imitating approach regarding the one-electron quantum mechanics in abruptly bent ideal electron waveguides are given. In general, the theory allows to model each particular circularlike bend of a continuous quantum wire as some effective multichannel scatterer being pointlike in longitudinal direction. Its scattering ability is determined by the bending angle, mean bending radius, lateral coordinate (or coordinates) in wire cross section, time (or electronic energy), and possibly by the applied magnetic field. In an equivalent formulation, the theory gives rise to rather simple matching rules for the electron wave function and its longitudinal derivative affecting only the straight parts of a wire and thereby permitting to bypass a detailed quantum mechanical consideration of elbow domains. The proposed technique is applicable for the analytical investigation of spectral and transport electronic properties related to the ideal abruptly bent 3D wirelike structures of fixed cross section and is adaptable to the 2D wirelike structures as well as to the wirelike structures subjected to the magnetic field perpendicular to the plane of wire bending. In the framework of bend-imitating approach, the investigation of electron scattering in a singly bent 2D quantum wire and a doubly bent 2D quantum wire with S-like bend has been made and the explicit dependences of transmission and reflection coefficients on geometrical parameters of respective structure as well as on electron energy have been obtained. The total suppression of mixing between the scattering channels of S-like bent quantum wire is predicted.

  12. 49 CFR 393.102 - What are the minimum performance criteria for cargo securement devices and systems?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... chains, wire rope, steel strapping, synthetic webbing, and cordage) and other attachment or fastening..., steel strapping, synthetic webbing, and cordage) and other attachment or fastening devices used to... contained within the structure of the vehicle. Securement systems must provide a downward force equivalent...

  13. 49 CFR 393.102 - What are the minimum performance criteria for cargo securement devices and systems?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... chains, wire rope, steel strapping, synthetic webbing, and cordage) and other attachment or fastening..., steel strapping, synthetic webbing, and cordage) and other attachment or fastening devices used to... contained within the structure of the vehicle. Securement systems must provide a downward force equivalent...

  14. 49 CFR 393.102 - What are the minimum performance criteria for cargo securement devices and systems?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... chains, wire rope, steel strapping, synthetic webbing, and cordage) and other attachment or fastening..., steel strapping, synthetic webbing, and cordage) and other attachment or fastening devices used to... contained within the structure of the vehicle. Securement systems must provide a downward force equivalent...

  15. 14 CFR 23.853 - Passenger and crew compartment interiors.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... instruments in a common housing, seatbelts, shoulder harnesses, and cargo and baggage tiedown equipment... portions of appendix F of this part or by other approved equivalent methods. (v) Except for electrical wire cable insulation, and for small parts (such as knobs, handles, rollers, fasteners, clips, grommets, rub...

  16. 14 CFR 23.853 - Passenger and crew compartment interiors.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... instruments in a common housing, seatbelts, shoulder harnesses, and cargo and baggage tiedown equipment... portions of appendix F of this part or by other approved equivalent methods. (v) Except for electrical wire cable insulation, and for small parts (such as knobs, handles, rollers, fasteners, clips, grommets, rub...

  17. Quantum currents and pair correlation of electrons in a chain of localized dots

    NASA Astrophysics Data System (ADS)

    Morawetz, Klaus

    2017-03-01

    The quantum transport of electrons in a wire of localized dots by hopping, interaction and dissipation is calculated and a representation by an equivalent RCL circuit is found. The exact solution for the electric-field induced currents allows to discuss the role of virtual currents to decay initial correlations and Bloch oscillations. The dynamical response function in random phase approximation (RPA) is calculated analytically with the help of which the static structure function and pair correlation function are determined. The pair correlation function contains a form factor from the Brillouin zone and a structure factor caused by the localized dots in the wire.

  18. Prediction of Performance of Diamond Wire Saw with Respect to Texture Characteristics of Rock / Prognozowanie Wydajności Pracy Strunowej Piły Diamentowej W Odniesieniu Do Charakterystyki Tekstury Skał

    NASA Astrophysics Data System (ADS)

    Ghaysari, N.; Ataei, M.; Sereshki, F.; Mikaiel, R.

    2012-12-01

    In this study, prediction of production rate in diamond wire saw has been investigated. Performance measurements of diamond wire saw carried out in 7 different quarries of carbonate rocks in Iran. For determination textural properties, rock samples were collected from these quarries. At first, a thin section was prepared for each rock and then 5 digital photographs were taken from each section. After this, all images were digitized using AutoCAD software. Then, area, perimeter, longest diameter and shortest diameter were assigned. According to these parameters, all of the other textural characteristics and texture coefficient were determined too. The correlation between sawing rate and textural characteristics were evaluated using multiple and simple regression analyses. Then developed model was validated by P-value test. It was concluded that area, perimeter, diameter equivalent and index of grain size homogeneity are very effective on production rate. Production rate using diamond wire saw can reliably be predicted using developed model.

  19. Polarization-dependent thin-film wire-grid reflectarray for terahertz waves

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Niu, Tiaoming; School of Information Science and Engineering, Lanzhou University, Lanzhou 730000; Upadhyay, Aditi

    2015-07-20

    A thin-film polarization-dependent reflectarray based on patterned metallic wire grids is realized at 1 THz. Unlike conventional reflectarrays with resonant elements and a solid metal ground, parallel narrow metal strips with uniform spacing are employed in this design to construct both the radiation elements and the ground plane. For each radiation element, a certain number of thin strips with an identical length are grouped to effectively form a patch resonator with equivalent performance. The ground plane is made of continuous metallic strips, similar to conventional wire-grid polarizers. The structure can deflect incident waves with the polarization parallel to the stripsmore » into a designed direction and transmit the orthogonal polarization component. Measured radiation patterns show reasonable deflection efficiency and high polarization discrimination. Utilizing this flexible device approach, similar reflectarray designs can be realized for conformal mounting onto surfaces of cylindrical or spherical devices for terahertz imaging and communications.« less

  20. Preparation, mechanical, and in vitro properties of glass fiber-reinforced polycarbonate composites for orthodontic application.

    PubMed

    Tanimoto, Yasuhiro; Inami, Toshihiro; Yamaguchi, Masaru; Nishiyama, Norihiro; Kasai, Kazutaka

    2015-05-01

    Generally, orthodontic treatment uses metallic wires made from stainless steel, cobalt-chromium-nickel alloy, β-titanium alloy, and nickel-titanium (Ni-Ti) alloy. However, these wires are not esthetically pleasing and may induce allergic or toxic reactions. To correct these issues, in the present study we developed glass-fiber-reinforced plastic (GFRP) orthodontic wires made from polycarbonate and E-glass fiber by using pultrusion. After fabricating these GFRP round wires with a diameter of 0.45 mm (0.018 inch), we examined their mechanical and in vitro properties. To investigate how the glass-fiber diameter affected their physical properties, we prepared GFRP wires of varying diameters (7 and 13 µm). Both the GFRP with 13-µm fibers (GFRP-13) and GFRP with 7 µm fibers (GFRP-7) were more transparent than the metallic orthodontic wires. Flexural strengths of GFRP-13 and GFRP-7 were 690.3 ± 99.2 and 938.1 ± 95.0 MPa, respectively; flexural moduli of GFRP-13 and GFRP-7 were 25.4 ± 4.9 and 34.7 ± 7.7 GPa, respectively. These flexural properties of the GFRP wires were nearly equivalent to those of available Ni-Ti wires. GFRP-7 had better flexural properties than GFRP-13, indicating that the flexural properties of GFRP increase with decreasing fiber diameter. Using thermocycling, we found no significant change in the flexural properties of the GFRPs after 600 or 1,200 cycles. Using a cytotoxicity detection kit, we found that the glass fiber and polycarbonate components comprising the GFRP were not cytotoxic within the limitations of this study. We expect this metal-free GFRP wire composed of polycarbonate and glass fiber to be useful as an esthetically pleasing alternative to current metallic orthodontic wire. © 2014 Wiley Periodicals, Inc.

  1. A biomechanical analysis of sublaminar and subtransverse process fixation using metal wires and polyethylene cables.

    PubMed

    Fujita, Masaru; Diab, Mohammad; Xu, Zheng; Puttlitz, Christian M

    2006-09-01

    An in vitro biomechanical calf thoracic spine study. To evaluate the biomechanical stability of sublaminar and subtransverse process fixation using stainless steel wires and ultra-high molecular weight polyethylene (UHMWPE) cables. It is commonly held that transverse process fixation provides less stability than sublaminar fixation. To our knowledge, this is the first biomechanical study to compare the stability afforded by sublaminar fixation and subtransverse process fixation using metal wire and UHMWPE cable before and after cyclic loading. There were 6 fresh-frozen calf thoracic spines (T4-T9) used to determine the sublaminar fixation stiffness and subtransverse process fixation stiffness in each group. Double strands of 18-gauge stainless steel wire, 3 and 5 mm-width UHMWPE cable (Nesplon; Alfresa, Inc., Osaka, Japan) were applied to each spine. Cyclic pure flexion-extension moment loading (2 Nm, 0.5 Hz, 5000 cycles) was applied after the initial stability was analyzed by measuring the range of motion. Statistical analyses were used to delineate differences between the various experimental groups. Subtransverse process wiring was more stable than sublaminar wiring after cyclic loading in flexion-extension (P < 0.05). There were no significant differences between each group in lateral bending and axial rotation after cyclic loading. Sublaminar stainless steel wiring was more stable than sublaminar 3 and 5-mm cable before and after cyclic loading in axial rotation (P < 0.01). Acute subtransverse process fixation using 3-mm cable was less stable after cyclic loading in axial rotation (P < 0.05). All other groups did not produce statistically significant differences. Subtransverse process fixation provides at least as much stability as sublaminar fixation. A 5-mm UHMWPE cable and stainless steel wire result in equivalent sublaminar and subtransverse process stability.

  2. Effect of Stress Ratio and Loading Frequency on the Corrosion Fatigue Behavior of Smooth Steel Wire in Different Solutions

    PubMed Central

    Wang, Songquan; Zhang, Dekun; Hu, Ningning; Zhang, Jialu

    2016-01-01

    In this work, the effects of loading condition and corrosion solution on the corrosion fatigue behavior of smooth steel wire were discussed. The results of polarization curves and weight loss curves showed that the corrosion of steel wire in acid solution was more severe than that in neutral and alkaline solutions. With the extension of immersion time in acid solution, the cathodic reaction of steel wire gradually changed from the reduction of hydrogen ion to the reduction of oxygen, but was always the reduction of hydrogen ion in neutral and alkaline solutions. The corrosion kinetic parameters and equivalent circuits of steel wires were also obtained by simulating the Nyquist diagrams. In corrosion fatigue test, the effect of stress ratio and loading frequency on the crack initiation mechanism was emphasized. The strong corrosivity of acid solution could accelerate the nucleation of crack tip. The initiation mechanism of crack under different conditions was summarized according to the side and fracture surface morphologies. For the crack initiation mechanism of anodic dissolution, the stronger the corrosivity of solution was, the more easily the fatigue crack source formed, while, for the crack initiation mechanism of deformation activation, the lower stress ratio and higher frequency would accelerate the generation of corrosion fatigue crack source. PMID:28773869

  3. Size-dependent physicochemical and mechanical interactions in battery paste anodes of Si-microwires revealed by Fast-Fourier-Transform Impedance Spectroscopy

    NASA Astrophysics Data System (ADS)

    Hansen, Sandra; Quiroga-González, Enrique; Carstensen, Jürgen; Adelung, Rainer; Föll, Helmut

    2017-05-01

    Perfectly aligned silicon microwire arrays show exceptionally high cycling stability with record setting (high) areal capacities of 4.25 mAh cm-2. Those wires have a special, modified length and thickness in order to perform this good. Geometry and sizes are the most important parameters of an anode to obtain batteries with high cycling stability without irreversible losses. The wires are prepared with a unique etching fabrication method, which allows to fabricate wires of very precise sizes. In order to investigate how good randomly oriented silicon wires perform in contrast to the perfect order of the array, the wires are embedded in a paste. This study reveals the fundamental correlation between geometry, mechanics and charge transfer kinetics of silicon electrodes. Using a suitable RC equivalent circuit allows to evaluate data from cyclic voltammetry and simultaneous FFT-Impedance Spectroscopy (FFT-IS), yielding in time-resolved resistances, time constants, and their direct correlation to the phase transformations. The change of the resistances during lithiation and delithiation correlates to kinetics and charge transfer mechanisms. This study demonstrates how the mechanical and physiochemical interactions at the silicon/paste interface inside the paste electrodes lead to void formation around silicon and with it to material loss and capacity fading.

  4. Direct-reading inductance meter

    NASA Technical Reports Server (NTRS)

    Kolbly, R. B.

    1977-01-01

    Meter indicates from 30 nH to 3 micro H. Reference inductor of 15 micro H is made by winding 50 turns of Number 26 Formvar wire on Micrometal type 50-2 (or equivalent) core. Circuit eliminates requirement for complex instrument compensation prior to taking coil inductance measurement and thus is as easy to operate as common ohmmeter.

  5. 46 CFR 72.40-5 - Where rails required.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... business of the vessel, as in the case of a sport fishing vessel, other arrangements may be specifically..., excursion vessels, and vessels of a similar type, the space below the top of the rail shall be fitted with suitable wire mesh or the equivalent. Depending upon the type of construction, the lower rail courses may...

  6. 29 CFR 1926.104 - Safety belts, lifelines, and lanyards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... be subjected to cutting or abrasion, shall be a minimum of 7/8-inch wire core manila rope. For all other lifeline applications, a minimum of 3/4-inch manila or equivalent, with a minimum breaking... nominal breaking strength of 5,400 pounds. (e) All safety belt and lanyard hardware shall be drop forged...

  7. 29 CFR 1926.104 - Safety belts, lifelines, and lanyards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... be subjected to cutting or abrasion, shall be a minimum of 7/8-inch wire core manila rope. For all other lifeline applications, a minimum of 3/4-inch manila or equivalent, with a minimum breaking... nominal breaking strength of 5,400 pounds. (e) All safety belt and lanyard hardware shall be drop forged...

  8. 29 CFR 1926.104 - Safety belts, lifelines, and lanyards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... be subjected to cutting or abrasion, shall be a minimum of 7/8-inch wire core manila rope. For all other lifeline applications, a minimum of 3/4-inch manila or equivalent, with a minimum breaking... nominal breaking strength of 5,400 pounds. (e) All safety belt and lanyard hardware shall be drop forged...

  9. Breast surgery techniques: preoperative bracketing wire localization by surgeons.

    PubMed

    Burkholder, Hans C; Witherspoon, Laura E; Burns, R Phillip; Horn, Jeffrey S; Biderman, Michael D

    2007-06-01

    With the development of expertise in image guidance for breast surgery, many surgeons now perform preoperative wire localization themselves. Use of a single wire versus multiple wires to bracket a radiographic breast abnormality has previously been described, although benefits of this technique based on clinical outcomes such as margin status, tissue volume removed, and re-excision rates have not been established. This study is a retrospective analysis of wire-localized breast biopsies performed by 14 surgeons over 29 months; stereotactic and ultrasound guidance were used. During this time, 489 wire localizations were done, of which 159 used multiple wires. Two hundred eleven of these biopsies were done for malignant disease, 86 using multiple wires. After controlling for tumor node metastases stage, single and multiple wire placements were compared using endpoints of margin status, need for re-excision, and total volume of tissue removed. Neither margin status nor re-excision was related to the number of wires placed. However, the number of wires placed was significantly related to the total volume of tissue removed. Use of more than one localizing wire was associated with greater volume of tissue removal (measured in centimeters cubed) in benign disease (46 vs 25, P < 0.001), equivalent volumes in stage 0 disease (73 vs 67), less volume in stage 1 disease (113 vs 164), and less volume in stages 2 through 4 (158 vs 207, P = 0.03). Outcomes based on surgeon case volume during the study period demonstrated that low- (1-40), medium- (41-80), and high-volume (>80) surgeons did not differ in the type or stage of breast pathology treated. Surgeons with high case volumes were more likely to place multiple localizing wires (P < 0.001) and were more likely to do a breast-conserving procedure if re-excision was performed (P < 0.018). Surgeons with low case volumes were more likely to perform a re-excision (P < 0.025). Surgeon experience has a positive impact on quality outcome measures such as performance of a definitive procedure at the time of initial surgery and use of breast-conserving procedures at the time of re-excision. Multiple wire localization can be used to significantly reduce the volume of breast tissue removed in malignant disease without sacrificing margin status or increasing the need for future re-excision.

  10. Trust in Anonymity Networks

    NASA Astrophysics Data System (ADS)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  11. Enhanced autocompensating quantum cryptography system.

    PubMed

    Bethune, Donald S; Navarro, Martha; Risk, William P

    2002-03-20

    We have improved the hardware and software of our autocompensating system for quantum key distribution by replacing bulk optical components at the end stations with fiber-optic equivalents and implementing software that synchronizes end-station activities, communicates basis choices, corrects errors, and performs privacy amplification over a local area network. The all-fiber-optic arrangement provides stable, efficient, and high-contrast routing of the photons. The low-bit error rate leads to high error-correction efficiency and minimizes data sacrifice during privacy amplification. Characterization measurements made on a number of commercial avalanche photodiodes are presented that highlight the need for improved devices tailored specifically for quantum information applications. A scheme for frequency shifting the photons returning from Alice's station to allow them to be distinguished from backscattered noise photons is also described.

  12. 30 CFR 75.1101-15 - Construction of dry powder chemical systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... equipped with hose or pipe lines which are no longer than necessary. (b) Metal piping and/or hose between control valves and nozzles shall have a minimum bursting pressure of 500 p.s.i.g. (c) Hose shall be protected by wire braid or its equivalent. (d) Nozzles and reservoirs shall be sufficient in number to...

  13. 30 CFR 75.1101-15 - Construction of dry powder chemical systems.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... equipped with hose or pipe lines which are no longer than necessary. (b) Metal piping and/or hose between control valves and nozzles shall have a minimum bursting pressure of 500 p.s.i.g. (c) Hose shall be protected by wire braid or its equivalent. (d) Nozzles and reservoirs shall be sufficient in number to...

  14. 30 CFR 75.1101-15 - Construction of dry powder chemical systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... equipped with hose or pipe lines which are no longer than necessary. (b) Metal piping and/or hose between control valves and nozzles shall have a minimum bursting pressure of 500 p.s.i.g. (c) Hose shall be protected by wire braid or its equivalent. (d) Nozzles and reservoirs shall be sufficient in number to...

  15. 30 CFR 75.1101-15 - Construction of dry powder chemical systems.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... equipped with hose or pipe lines which are no longer than necessary. (b) Metal piping and/or hose between control valves and nozzles shall have a minimum bursting pressure of 500 p.s.i.g. (c) Hose shall be protected by wire braid or its equivalent. (d) Nozzles and reservoirs shall be sufficient in number to...

  16. 30 CFR 75.1101-15 - Construction of dry powder chemical systems.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... equipped with hose or pipe lines which are no longer than necessary. (b) Metal piping and/or hose between control valves and nozzles shall have a minimum bursting pressure of 500 p.s.i.g. (c) Hose shall be protected by wire braid or its equivalent. (d) Nozzles and reservoirs shall be sufficient in number to...

  17. 46 CFR 28.410 - Deck rails, lifelines, storm rails, and hand grabs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Deck rails, lifelines, storm rails, and hand grabs. 28..., lifelines, storm rails, and hand grabs. (a) Except as otherwise provided in paragraph (d) of this section... with a bulwark, chain link fencing, wire mesh, or an equivalent. (f) A suitable storm rail or hand grab...

  18. 46 CFR 28.410 - Deck rails, lifelines, storm rails, and hand grabs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 1 2014-10-01 2014-10-01 false Deck rails, lifelines, storm rails, and hand grabs. 28..., lifelines, storm rails, and hand grabs. (a) Except as otherwise provided in paragraph (d) of this section... with a bulwark, chain link fencing, wire mesh, or an equivalent. (f) A suitable storm rail or hand grab...

  19. 46 CFR 28.810 - Deck rails, lifelines, storm rails and hand grabs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Deck rails, lifelines, storm rails and hand grabs. 28..., storm rails and hand grabs. (a) Except as otherwise provided in paragraph (d) of this section, deck... bulwark, chain link fencing, wire mesh, or an equivalent. (f) A suitable storm rail or hand grab must be...

  20. 46 CFR 28.810 - Deck rails, lifelines, storm rails and hand grabs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Deck rails, lifelines, storm rails and hand grabs. 28..., storm rails and hand grabs. (a) Except as otherwise provided in paragraph (d) of this section, deck... bulwark, chain link fencing, wire mesh, or an equivalent. (f) A suitable storm rail or hand grab must be...

  1. 46 CFR 28.810 - Deck rails, lifelines, storm rails and hand grabs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Deck rails, lifelines, storm rails and hand grabs. 28..., storm rails and hand grabs. (a) Except as otherwise provided in paragraph (d) of this section, deck... bulwark, chain link fencing, wire mesh, or an equivalent. (f) A suitable storm rail or hand grab must be...

  2. 46 CFR 28.410 - Deck rails, lifelines, storm rails, and hand grabs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Deck rails, lifelines, storm rails, and hand grabs. 28..., lifelines, storm rails, and hand grabs. (a) Except as otherwise provided in paragraph (d) of this section... with a bulwark, chain link fencing, wire mesh, or an equivalent. (f) A suitable storm rail or hand grab...

  3. 46 CFR 28.410 - Deck rails, lifelines, storm rails, and hand grabs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Deck rails, lifelines, storm rails, and hand grabs. 28..., lifelines, storm rails, and hand grabs. (a) Except as otherwise provided in paragraph (d) of this section... with a bulwark, chain link fencing, wire mesh, or an equivalent. (f) A suitable storm rail or hand grab...

  4. 46 CFR 28.410 - Deck rails, lifelines, storm rails, and hand grabs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Deck rails, lifelines, storm rails, and hand grabs. 28..., lifelines, storm rails, and hand grabs. (a) Except as otherwise provided in paragraph (d) of this section... with a bulwark, chain link fencing, wire mesh, or an equivalent. (f) A suitable storm rail or hand grab...

  5. 46 CFR 28.810 - Deck rails, lifelines, storm rails and hand grabs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Deck rails, lifelines, storm rails and hand grabs. 28..., storm rails and hand grabs. (a) Except as otherwise provided in paragraph (d) of this section, deck... bulwark, chain link fencing, wire mesh, or an equivalent. (f) A suitable storm rail or hand grab must be...

  6. 46 CFR 28.810 - Deck rails, lifelines, storm rails and hand grabs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 1 2014-10-01 2014-10-01 false Deck rails, lifelines, storm rails and hand grabs. 28..., storm rails and hand grabs. (a) Except as otherwise provided in paragraph (d) of this section, deck... bulwark, chain link fencing, wire mesh, or an equivalent. (f) A suitable storm rail or hand grab must be...

  7. 30 CFR Appendix II to Subpart D of... - Appendix II to Subpart D of Part 18

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) Approval 2G- Motor: (Manufacturing Company) Frame ___ Hp., ___ Volts, ___ Ph., ___ Cy., ___ R.P.M. X/P... wires shall not be used for grounding except in conjunction with diode(s) or equivalent. The operating voltage should match the voltage rating of the motor(s). 2. Servicing. Explosion-proof enclosures shall be...

  8. 30 CFR Appendix II to Subpart D of... - Appendix II to Subpart D of Part 18

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Approval 2G- Motor: (Manufacturing Company) Frame ___ Hp., ___ Volts, ___ Ph., ___ Cy., ___ R.P.M. X/P... wires shall not be used for grounding except in conjunction with diode(s) or equivalent. The operating voltage should match the voltage rating of the motor(s). 2. Servicing. Explosion-proof enclosures shall be...

  9. 30 CFR Appendix II to Subpart D of... - Appendix II to Subpart D of Part 18

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) Approval 2G- Motor: (Manufacturing Company) Frame ___ Hp., ___ Volts, ___ Ph., ___ Cy., ___ R.P.M. X/P... wires shall not be used for grounding except in conjunction with diode(s) or equivalent. The operating voltage should match the voltage rating of the motor(s). 2. Servicing. Explosion-proof enclosures shall be...

  10. 30 CFR Appendix II to Subpart D of... - Appendix II to Subpart D of Part 18

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) Approval 2G- Motor: (Manufacturing Company) Frame ___ Hp., ___ Volts, ___ Ph., ___ Cy., ___ R.P.M. X/P... wires shall not be used for grounding except in conjunction with diode(s) or equivalent. The operating voltage should match the voltage rating of the motor(s). 2. Servicing. Explosion-proof enclosures shall be...

  11. 30 CFR Appendix II to Subpart D of... - Appendix II to Subpart D of Part 18

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) Approval 2G- Motor: (Manufacturing Company) Frame ___ Hp., ___ Volts, ___ Ph., ___ Cy., ___ R.P.M. X/P... wires shall not be used for grounding except in conjunction with diode(s) or equivalent. The operating voltage should match the voltage rating of the motor(s). 2. Servicing. Explosion-proof enclosures shall be...

  12. Minimum depth of investigation for grounded-wire TEM due to self-transients

    NASA Astrophysics Data System (ADS)

    Zhou, Nannan; Xue, Guoqiang

    2018-05-01

    The grounded-wire transient electromagnetic method (TEM) has been widely used for near-surface metalliferous prospecting, oil and gas exploration, and hydrogeological surveying in the subsurface. However, it is commonly observed that such TEM signal is contaminated by the self-transient process occurred at the early stage of data acquisition. Correspondingly, there exists a minimum depth of investigation, above which the observed signal is not applicable for reliable data processing and interpretation. Therefore, for achieving a more comprehensive understanding of the TEM method, it is necessary to perform research on the self-transient process and moreover develop an approach for quantifying the minimum detection depth. In this paper, we first analyze the temporal procedure of the equivalent circuit of the TEM method and present a theoretical equation for estimating the self-induction voltage based on the inductor of the transmitting wire. Then, numerical modeling is applied for building the relationship between the minimum depth of investigation and various properties, including resistivity of the earth, offset, and source length. It is guide for the design of survey parameters when the grounded-wire TEM is applied to the shallow detection. Finally, it is verified through applications to a coal field in China.

  13. Refreshing Music: Fog Harvesting with Harps

    NASA Astrophysics Data System (ADS)

    Shi, Weiwei; Anderson, Mark; Kennedy, Brook; Boreyko, Jonathan

    2017-11-01

    Fog harvesting is a useful technique for obtaining fresh water in arid climates. The wire meshes currently utilized for fog harvesting suffer from dual constraints: coarse meshes cannot efficiently capture fog, while fine meshes suffer from clogging issues. Here, we design a new type of fog harvester comprised of an array of vertical wires, which we call ``fog harps.'' To investigate the water collection efficiency, three fog harps were designed with different diameters (254 μm, 508 μm and 1.30 mm) but the same pitch-to-diameter ratio of 2. For comparison, three different size meshes were purchased with equivalent dimensions. As expected for the mesh structures, the mid-sized wires performed the best, with a drop-off in performance for the fine or coarse meshes. In contrast, the fog harvesting rate continually increased with decreasing wire diameter for the fog harps, due to its low hysteresis that prevented droplet clogging. This resulted in a 3-fold enhancement in the fog harvesting rate for the harp form factor compared to the mesh. The lack of a performance ceiling for the harps suggest that even greater enhancements could be achieved by scaling down to yet smaller sizes.

  14. A novel method for harmless disposal and resource reutilization of steel wire rope sludges.

    PubMed

    Zhang, Li; Liu, Yang-Sheng

    2016-10-01

    Rapid development of steel wire rope industry has led to the generation of large quantities of pickling sludge, which causes significant ecological problems and considerable negative environmental effects. In this study, a novel method was proposed for harmless disposal and resource reutilization of the steel wire rope sludge. Based on the method, two steel wire rope sludges (the Pb sludge and the Zn sludge) were firstly extracted by hydrochloric or sulfuric acid and then mixed with the hydrochloride acid extracting solution of aluminum skimmings to produce composite polyaluminum ferric flocculants. The optimum conditions (acid concentration, w/v ratio, reaction time, and reaction temperature) for acid extraction of the sludges were studied. Results showed that 97.03 % of Pb sludge and 96.20 % of Zn sludge were extracted. Leaching potential of the residues after acid extraction was evaluated, and a proposed treatment for the residues had been instructed. The obtained flocculant products were used to purify the real domestic wastewater and showed an equivalent or better performance than the commercial ones. This method is environmental-friendly and cost-effective when compared with the conventional sludge treatments.

  15. Astrophysically relevant radiatively cooled hypersonic bow shocks in nested wire arrays

    NASA Astrophysics Data System (ADS)

    Ampleford, David

    2009-11-01

    We have performed laboratory experiments which introduce obstructions into hypersonic plasma flows to study the formation of shocks. Astrophysical observations have demonstrated many examples of equivalent radiatively cooled bow shocks, for example the head of protostellar jets or supernova remnants passing through the interstellar medium or between discrete clumps in jets. Wire array z-pinches allow us to study quasi-planar radiatively cooled flows in the laboratory. The early stage of a wire array z-pinch implosion consists of a steady flow of the wire material towards the axis. Given a high rate of radiative cooling, these flows reach high sonic- Mach numbers, typically up to 5. The 2D nature of this configuration allows the insertion of obstacles into the flow, such as a concentric ``inner'' wire array, as has previously been studied for ICF research. Here we study the application of such a nested array to laboratory astrophysics where the inner wires act as obstructions perpendicular to the flow, and induce bow shocks. By varying the wire array material (W/Al), the significance of radiative cooling on these shocks can be controlled, and is shown to change the shock opening angle. As multiple obstructions are present, the experiments show the interaction of multiple bow shocks. It is also possible to introduce a magnetic field around the static object, increasing the opening angle of the shocks. Further experiments can be designed to control the flow density, magnetic field structure and obstruction locations. In collaboration with: S.V. Lebedev, M.E. Cuneo, C.A. Jennings, S.N. Bland, J.P. Chittenden, A. Ciardi, G.N. Hall, S.C. Bott, M. Sherlock, A. Frank, E. Blackman

  16. Homogenized boundary conditions and resonance effects in Faraday cages

    PubMed Central

    Hewitt, I. J.

    2016-01-01

    We present a mathematical study of two-dimensional electrostatic and electromagnetic shielding by a cage of conducting wires (the so-called ‘Faraday cage effect’). Taking the limit as the number of wires in the cage tends to infinity, we use the asymptotic method of multiple scales to derive continuum models for the shielding, involving homogenized boundary conditions on an effective cage boundary. We show how the resulting models depend on key cage parameters such as the size and shape of the wires, and, in the electromagnetic case, on the frequency and polarization of the incident field. In the electromagnetic case, there are resonance effects, whereby at frequencies close to the natural frequencies of the equivalent solid shell, the presence of the cage actually amplifies the incident field, rather than shielding it. By appropriately modifying the continuum model, we calculate the modified resonant frequencies, and their associated peak amplitudes. We discuss applications to radiation containment in microwave ovens and acoustic scattering by perforated shells. PMID:27279775

  17. Eshelby problem of polygonal inclusions in anisotropic piezoelectric full- and half-planes

    NASA Astrophysics Data System (ADS)

    Pan, E.

    2004-03-01

    This paper presents an exact closed-form solution for the Eshelby problem of polygonal inclusion in anisotropic piezoelectric full- and half-planes. Based on the equivalent body-force concept of eigenstrain, the induced elastic and piezoelectric fields are first expressed in terms of line integral on the boundary of the inclusion with the integrand being the Green's function. Using the recently derived exact closed-form line-source Green's function, the line integral is then carried out analytically, with the final expression involving only elementary functions. The exact closed-form solution is applied to a square-shaped quantum wire within semiconductor GaAs full- and half-planes, with results clearly showing the importance of material orientation and piezoelectric coupling. While the elastic and piezoelectric fields within the square-shaped quantum wire could serve as benchmarks to other numerical methods, the exact closed-form solution should be useful to the analysis of nanoscale quantum-wire structures where large strain and electric fields could be induced by the misfit strain.

  18. Homogenized boundary conditions and resonance effects in Faraday cages

    NASA Astrophysics Data System (ADS)

    Hewett, D. P.; Hewitt, I. J.

    2016-05-01

    We present a mathematical study of two-dimensional electrostatic and electromagnetic shielding by a cage of conducting wires (the so-called `Faraday cage effect'). Taking the limit as the number of wires in the cage tends to infinity, we use the asymptotic method of multiple scales to derive continuum models for the shielding, involving homogenized boundary conditions on an effective cage boundary. We show how the resulting models depend on key cage parameters such as the size and shape of the wires, and, in the electromagnetic case, on the frequency and polarization of the incident field. In the electromagnetic case, there are resonance effects, whereby at frequencies close to the natural frequencies of the equivalent solid shell, the presence of the cage actually amplifies the incident field, rather than shielding it. By appropriately modifying the continuum model, we calculate the modified resonant frequencies, and their associated peak amplitudes. We discuss applications to radiation containment in microwave ovens and acoustic scattering by perforated shells.

  19. Homogenized boundary conditions and resonance effects in Faraday cages.

    PubMed

    Hewett, D P; Hewitt, I J

    2016-05-01

    We present a mathematical study of two-dimensional electrostatic and electromagnetic shielding by a cage of conducting wires (the so-called 'Faraday cage effect'). Taking the limit as the number of wires in the cage tends to infinity, we use the asymptotic method of multiple scales to derive continuum models for the shielding, involving homogenized boundary conditions on an effective cage boundary. We show how the resulting models depend on key cage parameters such as the size and shape of the wires, and, in the electromagnetic case, on the frequency and polarization of the incident field. In the electromagnetic case, there are resonance effects, whereby at frequencies close to the natural frequencies of the equivalent solid shell, the presence of the cage actually amplifies the incident field, rather than shielding it. By appropriately modifying the continuum model, we calculate the modified resonant frequencies, and their associated peak amplitudes. We discuss applications to radiation containment in microwave ovens and acoustic scattering by perforated shells.

  20. Defect Facilitated Phonon Transport through Kinks in Boron Carbide Nanowires

    DOE PAGES

    Zhang, Qian; Cui, Zhiguang; Wei, Zhiyong; ...

    2017-05-08

    Nanowires of complex morphologies, such as kinked wires, have been recently synthesized and demonstrated for novel devices and applications. However, the effects of these morphologies on thermal transport have not been well studied. Through systematic experimental measurements, we show in this paper that single-crystalline, defect-free kinks in boron carbide nanowires can pose a thermal resistance up to ~30 times larger than that of a straight wire segment of equivalent length. Analysis suggests that this pronounced resistance can be attributed to the combined effects of backscattering of highly focused phonons and required mode conversion at the kink. Interestingly, it is alsomore » found that instead of posing resistance, structural defects in the kink can actually assist phonon transport through the kink and reduce its resistance. Finally, given the common kink-like wire morphology in nanoelectronic devices and required low thermal conductivity for thermoelectric devices, these findings have important implications in precise thermal management of electronic devices and thermoelectrics.« less

  1. Defect Facilitated Phonon Transport through Kinks in Boron Carbide Nanowires

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Qian; Cui, Zhiguang; Wei, Zhiyong

    Nanowires of complex morphologies, such as kinked wires, have been recently synthesized and demonstrated for novel devices and applications. However, the effects of these morphologies on thermal transport have not been well studied. Through systematic experimental measurements, we show in this paper that single-crystalline, defect-free kinks in boron carbide nanowires can pose a thermal resistance up to ~30 times larger than that of a straight wire segment of equivalent length. Analysis suggests that this pronounced resistance can be attributed to the combined effects of backscattering of highly focused phonons and required mode conversion at the kink. Interestingly, it is alsomore » found that instead of posing resistance, structural defects in the kink can actually assist phonon transport through the kink and reduce its resistance. Finally, given the common kink-like wire morphology in nanoelectronic devices and required low thermal conductivity for thermoelectric devices, these findings have important implications in precise thermal management of electronic devices and thermoelectrics.« less

  2. Temporal changes in the tensile strength of ultra-high-molecular-weight polyethylene cable embedded in muscle tissue.

    PubMed

    Matsumori, Hiroaki; Ueda, Yurito; Koizumi, Munehisa; Miyazaki, Kiyoshi; Shigematsu, Hideki; Satoh, Nobuhisa; Oshima, Takuya; Tanaka, Masato; Tanaka, Yasuhito; Takakura, Yoshinori

    2010-02-01

    Wires and cables have been used extensively for spinal sublaminar wiring, but damages to the spinal cord due to compression by metal wires have been reported. We have used more flexible ultra-high-molecular-weight polyethylene cable (Tekmilon tape) instead of metal wires since 1999 and have obtained good clinical outcomes. Although the initial strength of Tekmilon tape is equivalent to metal wires, the temporal changes in the strength of Tekmilon tape in the body should be investigated to show that sufficient strength is maintained over time until bone union is complete. Tekmilon tape was embedded into the paravertebral muscle of 10-week-old male Japanese white rabbits. Samples were embedded for 0, 1, 3, 6 or 12 months. At the end of each period, sequential straight tensile strength and sequential knot-pull tensile strength were measured. The initial strength of Tekmilon tape in muscle tissue was maintained over time, with 92% straight tensile strength and 104% knot-pull tensile strength at 6months, and values of 77% and 100% at 12 months, respectively. Since single knot is clinically relevant, it is very important that the knot-pull tensile strength did not decrease over a 12-month period. This suggests that temporal changes in the tensile strength of Tekmilon tape are negligible at 1 year. Tekmilon tape maintains sufficient strength in vivo until bone union has occurred. It is useful for sublaminar wiring instead of metal materials due to its flexibility and strength and may reduce the risk of neurological damage. Copyright (c) 2009 Elsevier Ltd. All rights reserved.

  3. Development of an instantaneous local fuel-concentration measurement probe: an engine application

    NASA Astrophysics Data System (ADS)

    Guibert, P.; Boutar, Z.; Lemoyne, L.

    2003-11-01

    This work presents a new tool which can deliver instantaneous local measurements of fuel concentration in an engine cylinder with a high temporal resolution, particularly during compression strokes. Fuel concentration is represented by means of equivalence fuel-air ratio, i.e. the real engine mass ratio of fuel to air divided by the same ratio in ideal stoichiometry conditions. Controlling the mixture configuration for any strategy in a spark ignition engine and for auto-ignition combustion has a dominant effect on the subsequent processes of ignition, flame propagation and auto-ignition combustion progression, pollutant formation under lean or even stoichiometric operating conditions. It is extremely difficult, under a transient operation, to control the equivalence air/fuel ratio precisely at a required value and at the right time. This requires the development of a highly accurate equivalence air/fuel ratio control system and a tool to measure using crank angle (CA) resolution. Although non-intrusive laser techniques have considerable advantages, they are most of the time inappropriate due to their optical inaccessibility or the complex experimental set-up involved. Therefore, as a response to the demand for a relatively simple fuel-concentration measurement system a probe is presented that replaces a spark plug and allows the engine to run completely normally. The probe is based on hot-wire like apparatus, but involves catalytic oxidation at the wire surface. The development, characteristics and calibration of the probe are presented followed by applications to in-cylinder engine measurements.

  4. A design procedure for a tension-wire stiffened truss-column

    NASA Technical Reports Server (NTRS)

    Greene, W. H.

    1980-01-01

    A deployable, tension wire stiffened, truss column configuration was considered for space structure applications. An analytical procedure, developed for design of the truss column and exercised in numerical studies, was based on equivalent beam stiffness coefficients in the classical analysis for an initially imperfect beam column. Failure constraints were formulated to be used in a combined weight/strength and nonlinear mathematical programming automated design procedure to determine the minimum mass column for a particular combination of design load and length. Numerical studies gave the mass characteristics of the truss column for broad ranges of load and length. Comparisons of the truss column with a baseline tubular column used a special structural efficiency parameter for this class of columns.

  5. The Electromotive Force in Different Reference Frames

    NASA Astrophysics Data System (ADS)

    Adler, Charles L.

    2018-05-01

    The electromotive force (EMF) is the work per unit charge around a wire loop caused by a time-varying magnetic flux threading the loop. It is due to a force moving the charges around the loop. This is true whether the change in flux is due to the wire loop being stationary and the field changing in time, or the loop moving through a spatially varying field. In the first case, we say that the time-varying magnetic field induces an electric field that provides the force; in the second, we say that the force is due to the magnetic field acting on the charges in the moving loop. The theory of relativity states that both viewpoints must be equivalent, but it is sometimes difficult to harmonize them.

  6. Limits of Kirchhoff's Laws in Plasmonics.

    PubMed

    Razinskas, Gary; Biagioni, Paolo; Hecht, Bert

    2018-01-30

    The validity of Kirchhoff's laws in plasmonic nanocircuitry is investigated by studying a junction of plasmonic two-wire transmission lines. We find that Kirchhoff's laws are valid for sufficiently small values of a phenomenological parameter κ relating the geometrical parameters of the transmission line with the effective wavelength of the guided mode. Beyond such regime, for large values of the phenomenological parameter, increasing deviations occur and the equivalent impedance description (Kirchhoff's laws) can only provide rough, but nevertheless useful, guidelines for the design of more complex plasmonic circuitry. As an example we investigate a system composed of a two-wire transmission line and a nanoantenna as the load. By addition of a parallel stub designed according to Kirchhoff's laws we achieve maximum signal transfer to the nanoantenna.

  7. SpaceWire Driver Software for Special DSPs

    NASA Technical Reports Server (NTRS)

    Clark, Douglas; Lux, James; Nishimoto, Kouji; Lang, Minh

    2003-01-01

    A computer program provides a high-level C-language interface to electronics circuitry that controls a SpaceWire interface in a system based on a space qualified version of the ADSP-21020 digital signal processor (DSP). SpaceWire is a spacecraft-oriented standard for packet-switching data-communication networks that comprise nodes connected through bidirectional digital serial links that utilize low-voltage differential signaling (LVDS). The software is tailored to the SMCS-332 application-specific integrated circuit (ASIC) (also available as the TSS901E), which provides three highspeed (150 Mbps) serial point-to-point links compliant with the proposed Institute of Electrical and Electronics Engineers (IEEE) Standard 1355.2 and equivalent European Space Agency (ESA) Standard ECSS-E-50-12. In the specific application of this software, the SpaceWire ASIC was combined with the DSP processor, memory, and control logic in a Multi-Chip Module DSP (MCM-DSP). The software is a collection of low-level driver routines that provide a simple message-passing application programming interface (API) for software running on the DSP. Routines are provided for interrupt-driven access to the two styles of interface provided by the SMCS: (1) the "word at a time" conventional host interface (HOCI); and (2) a higher performance "dual port memory" style interface (COMI).

  8. PCDD/Fs in air and soil around an e-waste dismantling area with open burning of insulated wires in south China.

    PubMed

    Ren, M; Tang, Y H; Peng, P A; Cai, Y

    2015-05-01

    Polychlorinated dibenzo-p-dioxins and dibenzofurans (PCDD/Fs) in ambient air and farmland soil sampled in 2006 around an e-waste dismantling area with open burning of insulated wires in Longtang in south China were investigated. The total toxic equivalent concentrations of PCDD/Fs were 3.2-31.7 pg/m(3) in air and 5.8 12.4 ng/kg in farmland soil at an e-waste site and 0.063-0.091 pg/m(3) in air at a background site. PCDD/Fs in the air at the e-waste site were characterized with dominant 1,2,3,4,6,7,8-HpCDF and OCDF and higher concentrations of furans than dioxins, suggesting open burning of insulated wires was likely to be the main source of PCDD/Fs. Compared with the results in this study, the level of PCDD/F tended to lessen with the average TEQ concentration decreasing by 41 % and the pattern changed to be dominated by OCDD in the air of Longtang in 2010 when insulated wires were openly burned in only a small scale. Our results indicate that the lower chlorinated congeners with higher vapor pressures have enhanced atmospheric transport tendencies.

  9. A Comparison of Zero Mean Strain Rotating Beam Fatigue Test Methods for Nitinol Wire

    NASA Astrophysics Data System (ADS)

    Norwich, Dennis W.

    2014-07-01

    Zero mean strain rotating beam fatigue testing has become the standard for comparing the fatigue properties of Nitinol wire. Most commercially available equipment consists of either a two-chuck or a chuck and bushing system, where the wire length and center-to-center axis distance determine the maximum strain on the wire. For the two-chuck system, the samples are constrained at either end of the wire, and both chucks are driven at the same speed. For the chuck and bushing system, the sample is constrained at one end in a chuck and rides freely in a bushing at the other end. These equivalent systems will both be herein referred to as Chuck-to-Chuck systems. An alternate system uses a machined test block with a specific radius to guide the wire at a known strain during testing. In either system, the test parts can be immersed in a temperature-controlled fluid bath to eliminate any heating effect created in the specimen due to dissipative processes during cyclic loading (cyclic stress induced the formation of martensite) Wagner et al. ( Mater. Sci. Eng. A, 378, p 105-109, 1). This study will compare the results of the same starting material tested with each system to determine if the test system differences affect the final results. The advantages and disadvantages of each system will be highlighted and compared. The factors compared will include ease of setup, operator skill level required, consistency of strain measurement, equipment test limits, and data recovery and analysis. Also, the effect of test speed on the test results for each system will be investigated.

  10. Comparison of novel ultra-high molecular weight polyethylene tape versus conventional metal wire for sublaminar segmental fixation in the treatment of adolescent idiopathic scoliosis.

    PubMed

    Takahata, Masahiko; Ito, Manabu; Abumi, Kuniyoshi; Kotani, Yoshihisa; Sudo, Hideki; Ohshima, Shigeki; Minami, Akio

    2007-08-01

    Retrospective study. To compare the surgical outcomes of posterior translational correction and fusion using hybrid instrumentation systems with either sublaminar Nesplon tape or sublaminar metal wire to treat adolescent idiopathic scoliosis (AIS). Nesplon tape, which consists of a thread of ultra-high molecular weight polyethylene fibers, has advantages over metal wire: (1) its soft and flexible properties avoid neural damage and (2) its flat configuration avoids focal distribution of the stresses to lamina; however, the efficacy of Nesplon tape in the correction of spinal deformity is as yet, still unclear. Thirty AIS patients at a single institution underwent posterior correction and fusion using hybrid instrumentation containing hook, pedicle screw, and either sublaminar polyethylene taping (15) or sublaminar metal wiring (15). Patients were evaluated preoperatively, immediately after surgery, and at a 2-year follow-up according to the radiographic changes in curve correction, operating time, intraoperative blood loss, complications, and the Scoliosis Research Society patient questionnaire (SRS-24) score. The average correction rate was 63.0% in the Nesplon tape group and 59.9% in the metal wire group immediately after surgery (P = 0.62). Fusion was obtained in all the patients without significant correction loss in both groups. There was no significant difference in operative time, intraoperative blood loss, and postoperative SRS-24 scores between the 2 groups. Complications were superficial skin infection in a single patient in the Nesplon tape group, and transient sensory disturbance in 1 patient and temporal superior mesenteric artery syndrome in another patient in the metal wire group. The efficacy of Nesplon tape in correction of deformity is equivalent to that of metal wire, and fusion was completed without significant correction loss. The soft and flexible properties and flat configuration of Nesplon tape make this a safe application for the treatment of AIS with bone fragility or with the fusion areas containing the spinal cord.

  11. Weight concerns scale applied to college students: comparison between pencil-and-paper and online formats.

    PubMed

    Dias, Juliana Chioda Ribeiro; Maroco, João; Campos, Juliana Alvares Duarte Bonini

    2015-03-01

    Online data collection is becoming increasingly common and has some advantages compared to traditional paper-and-pencil formats, such as reducing loss of data, increasing participants' privacy, and decreasing the effect of social desirability. However, the validity and reliability of this administration format must be established before results can be considered acceptable. The aim of this study was to evaluate the validity, reliability, and equivalence of paper-and-pencil and online versions of the Weight Concerns Scale (WCS) when applied to Brazilian university students. A crossover design was used, and the Portuguese version of the WCS (in both paper-and-pencil and online formats) was completed by 100 college students. The results indicated adequate fit in both formats. The simultaneous fit of data for both groups was excellent, with strong invariance between models. Adequate convergent validity, internal consistency, and mean score equivalence of the WCS in both formats were observed. Thus, the WCS presented adequate reliability and validity in both administration formats, with equivalence/stability between answers.

  12. Retractor Tool for Brain Surgery

    NASA Technical Reports Server (NTRS)

    Helms, R.; Hayes, T.

    1982-01-01

    Proposed brain-surgery tool has an octogonal fixture for positioning latex tube over incision. Eight stainless-steel wires embedded in latex extend to hold positioning fixture. Another eight are also embedded in the latex. Concentric sleeves are successively inserted into expandable latex tube. The first sleeve is placed over a solid rod. Last sleeve is a stainless-steel tube 1 inch in diameter. It is overcoated with Teflon (or equivalent) material.

  13. Influences of Cr/Ni equivalent ratios of filler wires on pitting corrosion and ductility-dip cracking of AISI 316L weld metals

    NASA Astrophysics Data System (ADS)

    Kim, Y. H.; Kim, D. G.; Sung, J. H.; Kim, I. S.; Ko, D. E.; Kang, N. H.; Hong, H. U.; Park, J. H.; Lee, H. W.

    2011-02-01

    To study the pitting corrosion of AISI 316L weld metals according to the chromium/nickel equivalent ratio (Creq/Nieq ratio), three filler wires were newly designed for the flux-cored arc welding process. The weld metal with delta-ferrite at less than 3 vol.%, was observed for ductility-dip cracking (DDC) in the reheated region after multi-pass welding. The tensile strength and yield strength increased with increasing Creq/Nieq ratio. The result of anodic polarization tests in a 0.1 M NaCl solution at the room temperature (25) for 45 min, revealed that the base metal and weld metals have a similar corrosion potential of -0.34 VSCE. The weld metal with the highest content of Cr had the highest pitting potential (0.39 VSCE) and the passivation range (0.64 VSCE) was higher than the base metal (0.21 VSCE and 0.46 VSCE, respectively). Adding 0.001 M Na2S to the 0.1M NaCl solution, the corrosion occurred more severely by H2S. The corrosion potentials of the base metal and three weld metals decreased to -1.0 VSCE. DDC caused the decrease of the pitting potential by inducing a locally intense corrosion attack around the crack openings.

  14. Review of Slow-Wave Structures

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.; Qureshi, A. Haq

    1994-01-01

    The majority of recent theoretical and experimental reports published in the literature dealing with helical slow-wave structures focus on the dispersion characteristics and their effects due to the finite helix wire thickness and attenuation, dielectric loading, metal loading, and the introduction of plasma. In many papers, an effective dielectric constant is used to take into account helix wire dimensions and conductivity losses, while the propagation constant of the signal and the interaction impedance of the structure are found to depend on the surface resistivity of the helix. Also, various dielectric supporting rods are simulated by one or several uniform cylinders having an effective dielectric constant, while metal vane loading and plasma effects are incorporated in the effective dielectric constant. The papers dealing with coupled cavities and folded or loaded wave guides describe equivalent circuit models, efficiency enhancement, and the prediction of instabilities for these structures. Equivalent circuit models of various structures are found using computer software programs SUPERFISH and TOUCHSTONE. Efficiency enhancement in tubes is achieved through dynamic velocity and phase adjusted tapers using computer techniques. The stability threshold of unwanted antisymmetric and higher order modes is predicted using SOS and MAGIC codes and the dependence of higher order modes on beam conductance, section length, and effective Q of a cavity is shown.

  15. Biomechanical analysis comparing three C1-C2 transarticular screw salvaging fixation techniques.

    PubMed

    Elgafy, Hossein; Potluri, Tejaswy; Goel, Vijay K; Foster, Scott; Faizan, Ahmad; Kulkarni, Nikhil

    2010-02-15

    This is an in vitro biomechanical study. To compare the biomechanical stability of the 3 C1-C2 transarticular screw salvaging fixation techniques. Stabilization of the atlantoaxial complex is a challenging procedure because of its complicated anatomy. Many posterior stabilization techniques of the atlantoaxial complex have been developed with C1-C2 transarticular screw fixation been the current gold standard. The drawback of using the transarticular screws is that it has a potential risk of vertebral artery injury due to a high riding transverse foramen of C2 vertebra, and screw malposition. In such cases, it is not recommended to proceed with inserting the contralateral transarticular screw and the surgeon should find an alternative to fix the contralateral side. Many studies are available comparing different atlantoaxial stabilization techniques, but none of them compared the techniques to fix the contralateral side while using the transarticular screw on one side. The current options are C1 lateral mass screw and short C2 pedicle screw or C1 lateral mass screw and C2 intralaminar screw, or C1-C2 sublaminar wire. Nine fresh human cervical spines with intact ligaments (C0-C4) were subjected to pure moments in the 6 loading directions. The resulting spatial orientations of the vertebrae were recorded using an Optotrak 3-dimensional Motion Measurement System. Measurements were made sequentially for the intact spine after creating type II odontoid fracture and after stabilization with unilateral transarticular screw placement across C1-C2 (TS) supplemented with 1 of the 3 transarticular salvaging techniques on the contralateral side; C1 lateral mass screw and C2 pedicle screw (TS+C1LMS+C2PS), C1 lateral mass and C2 intralaminar screw (TS+C1LMS+C2ILS), or sublaminar wire (TS + wire). The data indicated that all the 3 stabilization techniques significantly decreased motion when compared to intact in all the loading cases (left/right lateral bending, left/right axial rotation, flexion) except extension. All the 3 instrumented specimens were equally stable in extension/flexion and lateral bending modes. TS+C1LMS+C2PS was equivalent to TS+C1LMS+C2ILS (P > 0.05) and superior to TS + wire in axial rotation (P < 0.05). Also, TS+C1LMS+C2ILS was superior to TS + wire in axial rotation (P < 0.05). Fixation of atlantoaxial complex using unilateral transarticular screw supplemented with contralateral C1 lateral mass and C2 intralaminar screws is biomechanically equivalent to C1 lateral mass and C2 pedicle screws and both are biomechanically superior to C1-C2 sublaminar wire in axial rotation.

  16. 2G HTS wires made on 30 μm thick Hastelloy substrate

    NASA Astrophysics Data System (ADS)

    Sundaram, A.; Zhang, Y.; Knoll, A. R.; Abraimov, D.; Brownsey, P.; Kasahara, M.; Carota, G. M.; Nakasaki, R.; Cameron, J. B.; Schwab, G.; Hope, L. V.; Schmidt, R. M.; Kuraseko, H.; Fukushima, T.; Hazelton, D. W.

    2016-10-01

    REBCO (RE = rare earth) based high temperature superconducting (HTS) wires are now being utilized for the development of electric and electromagnetic devices for various industrial, scientific and medical applications. In the last several years, the increasing efforts in using the so-called second generation (2G) HTS wires for some of the applications require a further increase in their engineering current density (J e). The applications are those typically related to high magnetic fields where the higher J e of a REBCO wire, in addition to its higher irreversibility fields and higher mechanical strength, is already a major advantage over other superconducting wires. An effective way to increase the J e is to decrease the total thickness of a wire, for which using a thinner substrate becomes an obvious and attractive approach. By using our IBAD-MOCVD (ion beam assisted deposition-metal organic chemical vapor deposition) technology we have successfully made 2G HTS wires using a Hastelloy® C276 substrate that is only 30 μm in thickness. By using this thinner substrate instead of the typical 50 μm thick substrate and with a same critical current (I c), the J e of a wire can be increased by 30% to 45% depending on the copper stabilizer thickness. In this paper, we report the fabrication and characterization of the 2G HTS wires made on the 30 μm thick Hastelloy® C276 substrate. It was shown that with the optimization in the processing protocol, the surface of the thinner Hastelloy® C276 substrate can be readily electropolished to the quality needed for the deposition of the buffer stack. Same in the architecture as that on the standard 50 μm thick substrate, the buffer stack made on the 30 μm thick substrate showed an in-plane texture with a Δϕ of around 6.7° in the LaMnO3 cap layer. Low-temperature in-field transport measurement results suggest that the wires on the thinner substrate had achieved equivalent superconducting performance, most importantly the I c, as those on the 50 μm thick substrate. It is expected the 2G HTS wires made on the 30 μm thick Hastelloy® C276 substrate, the thinnest and with the highest J e to date, will greatly benefit such applications as high field magnets and high current cables.

  17. Corrosion of stainless steel sternal wire after long-term implantation.

    PubMed

    Tomizawa, Yasuko; Hanawa, Takao; Kuroda, Daisuke; Nishida, Hiroshi; Endo, Masahiro

    2006-01-01

    A variety of metallic components have been used in medical devices where lifelong durability and physical strength are demanded. To investigate the in vivo changes of implanted metallic medical devices in humans, stainless steel sternal wires removed from patients were evaluated. Stainless steel (316L) sternal wires removed from four patients after 10, 13, 22, and 30 years of implantation were evaluated using scanning electron microscopy (SEM) and energy dispersive X-ray spectroscopy (EDS). Macroscopically, the removed specimens maintained their metallic luster and color. Under SEM, small holes were observed sporadically at 10 years and they tended to connect in the drawing direction. The longer the implanted duration, the more numerous and deeper were the crevices observed. By EDS, sulfur, phosphorus, and calcium were identified in all areas at 10 years, in addition to the component elements of stainless steel, comprising iron, chromium, nickel, and manganese. Corrosion products observed at 30 years were identified as calcium phosphate. In conclusion, stainless steel sternal wires develop corroded pores that grow larger and deeper with time after implantation; however, the pores remain shallow even after decades of implantation and they may not be a cause of mechanical failure. An amount of metal ions equivalent to the corroded volume must have been released into the human body, but the effect of these metal ions on the body is not apparent.

  18. Proposal to probe quantum nonlocality of Majorana fermions in tunneling experiments

    NASA Astrophysics Data System (ADS)

    Sau, Jay D.; Swingle, Brian; Tewari, Sumanta

    2015-07-01

    Topological Majorana fermion (MF) quasiparticles have been recently suggested to exist in semiconductor quantum wires with proximity induced superconductivity and a Zeeman field. Although the experimentally observed zero bias tunneling peak and a fractional ac-Josephson effect can be taken as necessary signatures of MFs, neither of them constitutes a sufficient "smoking gun" experiment. Since one pair of Majorana fermions share a single conventional fermionic degree of freedom, MFs are in a sense fractionalized excitations. Based on this fractionalization we propose a tunneling experiment that furnishes a nearly unique signature of end state MFs in semiconductor quantum wires. In particular, we show that a "teleportation"-like experiment is not enough to distinguish MFs from pairs of MFs, which are equivalent to conventional zero energy states, but our proposed tunneling experiment, in principle, can make this distinction.

  19. Effect of rolling on the high temperature tensile and stress-rupture properties of tungsten fiber-superalloy composites

    NASA Technical Reports Server (NTRS)

    Petrasek, D. W.

    1974-01-01

    An investigation was conducted to determine the effects of mechanical working on the 1093 C (2000 F) tensile and stress-rupture strength of tungsten alloy/superalloy composites. Hot pressed composites containing either conventional tungsten lamp filament wire or tungsten-1% ThO2 wire and a nickel base alloy matrix were hot rolled at 1093 C (2000 F). The hot pressed and rolled composite specimens were then tested in tension and stress-rupture at 1093 C (2000 F). Rolling decreased the degree of fiber-matrix reaction as a function of time of exposure at 1093 C (2000 F). The stress-rupture properties of the rolled composites were superior to hot pressed composites containing equivalent diameter fibers. Rolling did not appreciably affect the 1093 C (2000 F) ultimate tensile strength of the composites.

  20. Progress on the Use of Internal Fins as Barriers to Reduce Magnetization on High Current Density Mono Element Internal Tin Conductors (MEIT)

    NASA Astrophysics Data System (ADS)

    Zeitlin, Bruce A.; Gregory, Eric; Pyon, Taeyoung; Scanlan, R. M.; Polyanskii, Anatolii A.; Lee, Peter J.

    2004-06-01

    A number of configurations of a mono element internal tin conductor (MEIT) were fabricated to explore the effect of internal fins on the effective filament size (Deff) and its effect on wire processing. A current density of 2.85 × 109 A/m2 (12 T) was achieved in a high tin, high Nb conductor. Wire lengths as long as 15.8 km at 0.254 mm diameter with breaks averaging 3 per unit length were achieved. Magnetization measurements and Magneto-Optical (MO) images were taken of the finned and non-fin conductor which indicated the fins appeared to be effective. The Deff achieved in the fin conductor was 80 μm compared with an equivalent conductor without a fin of 165 μm.

  1. Privacy Is Become with, Data Perturbation

    NASA Astrophysics Data System (ADS)

    Singh, Er. Niranjan; Singhai, Niky

    2011-06-01

    Privacy is becoming an increasingly important issue in many data mining applications that deal with health care, security, finance, behavior and other types of sensitive data. Is particularly becoming important in counterterrorism and homeland security-related applications. We touch upon several techniques of masking the data, namely random distortion, including the uniform and Gaussian noise, applied to the data in order to protect it. These perturbation schemes are equivalent to additive perturbation after the logarithmic Transformation. Due to the large volume of research in deriving private information from the additive noise perturbed data, the security of these perturbation schemes is questionable Many artificial intelligence and statistical methods exist for data analysis interpretation, Identifying and measuring the interestingness of patterns and rules discovered, or to be discovered is essential for the evaluation of the mined knowledge and the KDD process as a whole. While some concrete measurements exist, assessing the interestingness of discovered knowledge is still an important research issue. As the tool for the algorithm implementations we chose the language of choice in industrial world MATLAB.

  2. Thermo-Mechanical Behavior and Shakedown of Shape Memory Alloy Cable Structures

    NASA Astrophysics Data System (ADS)

    Biggs, Daniel B.

    Shape memory alloys (SMAs) are a versatile class of smart materials that exhibit adaptive properties which have been applied to solve engineering problems in wide-ranging fields from aerospace to biomedical engineering. Yet there is a lack of understanding of the fundamental nature of SMAs in order to effectively apply them to challenging problems within these engineering fields. Stranding fine NiTi wires into a cable form satisfies the demands of many aerospace and civil engineering applications which require actuators to withstand large tensile loads. The impact of increased bending and twisting in stranded NiTi wire structures, as well as introducing contact mechanics to the unstable phase transformation is not well understood, and this work aims to fill that void. To study the scalability of NiTi cables, thermo-mechanical characterization tests are conducted on cables much larger than those previously tested. These cables are found to have good superelastic properties and repeatable cyclic behavior with minimal induced plasticity. The behavior of additional cables, which have higher transition temperatures that can be used in a shape memory mode as thermo-responsive, high force actuator elements, are explored. These cables are found to scale up the performance of straight wire by maintaining an equivalent work output. Moreover, this work investigates the degradation of the thermal actuation of SMA wires through novel stress-temperature paths, discovering several path dependent behaviors of transformation-induced plasticity. The local mechanics of NiTi cable structures are explored through experiments utilizing digital image correlation, revealing new periodic transformation instabilities. Finite element simulations are presented, which indicate that the instabilities are caused by friction and relative sliding between wires in a cable. Finally, a study of the convective heat transfer of helical wire involving a suite of wind tunnel experiments, numerical analyses, and an empirical correlation is presented. This provides a method to better model the thermal behavior of helical SMA actuators and highlights the non-monotonic dependence of the convective heat transfer coefficient of helical wire with respect to the angle of the flow.

  3. Design of an Optically Controlled MR-Compatible Active Needle

    PubMed Central

    Ryu, Seok Chang; Quek, Zhan Fan; Koh, Je-Sung; Renaud, Pierre; Black, Richard J.; Moslehi, Behzad; Daniel, Bruce L.; Cho, Kyu-Jin; Cutkosky, Mark R.

    2015-01-01

    An active needle is proposed for the development of magnetic resonance imaging (MRI)-guided percutaneous procedures. The needle uses a low-transition-temperature shape memory alloy (LT SMA) wire actuator to produce bending in the distal section of the needle. Actuation is achieved with internal optical heating using laser light transported via optical fibers and side coupled to the LT SMA. A prototype, with a size equivalent to a standard 16-gauge biopsy needle, exhibits significant bending, with a tip deflection of more than 14° in air and 5° in hard tissue. A single-ended optical sensor with a gold-coated tip is developed to measure the curvature independently of temperature. The experimental results in tissue phantoms show that human tissue causes fast heat dissipation from the wire actuator; however, the active needle can compensate for typical targeting errors during prostate biopsy. PMID:26512231

  4. I-Wire Heart-on-a-Chip II: Biomechanical analysis of contractile, three-dimensional cardiomyocyte tissue constructs.

    PubMed

    Schroer, Alison K; Shotwell, Matthew S; Sidorov, Veniamin Y; Wikswo, John P; Merryman, W David

    2017-01-15

    This companion study presents the biomechanical analysis of the "I-Wire" platform using a modified Hill model of muscle mechanics that allows for further characterization of construct function and response to perturbation. The I-Wire engineered cardiac tissue construct (ECTC) is a novel experimental platform to investigate cardiac cell mechanics during auxotonic contraction. Whereas passive biomaterials often exhibit nonlinear and dissipative behavior, active tissue equivalents, such as ECTCs, also expend metabolic energy to perform mechanical work that presents additional challenges in quantifying their properties. The I-Wire model uses the passive mechanical response to increasing applied tension to measure the inherent stress and resistance to stretch of the construct before, during, and after treatments. Both blebbistatin and isoproterenol reduced prestress and construct stiffness; however, blebbistatin treatment abolished subsequent force-generating potential while isoproterenol enhanced this property. We demonstrate that the described model can replicate the response of these constructs to intrinsic changes in force-generating potential in response to both increasing frequency of stimulation and decreasing starting length. This analysis provides a useful mathematical model of the I-Wire platform, increases the number of parameters that can be derived from the device, and serves as a demonstration of quantitative characterization of nonlinear, active biomaterials. We anticipate that this quantitative analysis of I-Wire constructs will prove useful for qualifying patient-specific cardiomyocytes and fibroblasts prior to their utilization for cardiac regenerative medicine. Passive biomaterials may have non-linear elasticity and losses, but engineered muscle tissue also exhibits time- and force-dependent contractions. Historically, mathematical muscle models include series-elastic, parallel-elastic, contractile, and viscous elements. While hearts-on-a-chip can demonstrate in vitro the contractile properties of engineered cardiac constructs and their response to drugs, most of these use cellular monolayers that cannot be readily probed with controlled forces. The I-Wire platform described in the preceding paper by Sidorov et al. addresses these limitations with three-dimensional tissue constructs to which controlled forces can be applied. In this companion paper, we show how to characterize I-Wire constructs using a non-linear, active Hill model, which should be useful for qualifying cells prior to their use in cardiac regenerative medicine. Copyright © 2016 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved.

  5. Report on accelerated corrosion studies.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mowry, Curtis Dale; Glass, Sarah Jill; Sorensen, Neil Robert

    2011-03-01

    Sandia National Laboratories (SNL) conducted accelerated atmospheric corrosion testing for the U.S. Consumer Product Safety Commission (CPSC) to help further the understanding of the development of corrosion products on conductor materials in household electrical components exposed to environmental conditions representative of homes constructed with problem drywall. The conditions of the accelerated testing were chosen to produce corrosion product growth that would be consistent with long-term exposure to environments containing humidity and parts per billion (ppb) levels of hydrogen sulfide (H{sub 2}S) that are thought to have been the source of corrosion in electrical components from affected homes. This report documentsmore » the test set-up, monitoring of electrical performance of powered electrical components during the exposure, and the materials characterization conducted on wires, screws, and contact plates from selected electrical components. No degradation in electrical performance (measured via voltage drop) was measured during the course of the 8-week exposure, which was approximately equivalent to 40 years of exposure in a light industrial environment. Analyses show that corrosion products consisting of various phases of copper sulfide, copper sulfate, and copper oxide are found on exposed surfaces of the conductor materials including wires, screws, and contact plates. The morphology and the thickness of the corrosion products showed a range of character. In some of the copper wires that were observed, corrosion product had flaked or spalled off the surface, exposing fresh metal to the reaction with the contaminant gasses; however, there was no significant change in the wire cross-sectional area.« less

  6. Inductive phenomena at low frequencies in impedance spectra of proton exchange membrane fuel cells - A review

    NASA Astrophysics Data System (ADS)

    Pivac, Ivan; Barbir, Frano

    2016-09-01

    The results of electrochemical impedance spectroscopy of proton exchange membrane (PEM) fuel cells may exhibit inductive phenomena at low frequencies. The occurrence of inductive features at high frequencies is explained by the cables and wires of the test system. However, explanation of inductive loop at low frequencies requires a more detailed study. This review paper discusses several possible causes of such inductive behavior in PEM fuel cells, such as side reactions with intermediate species, carbon monoxide poisoning, and water transport, also as their equivalent circuit representations. It may be concluded that interpretation of impedance spectra at low frequencies is still ambiguous, and that better equivalent circuit models are needed with clearly defined physical meaning of each of the circuit elements.

  7. Plasmon resonant cavities in vertical nanowire arrays

    DOEpatents

    Bora, Mihail; Bond, Tiziana C.; Fasenfest, Benjamin J.; Behymer, Elaine M.

    2014-07-15

    Tunable plasmon resonant cavity arrays in paired parallel nanowire waveguides are presented. Resonances can be observed when the waveguide length is an odd multiple of quarter plasmon wavelengths, consistent with boundary conditions of node and antinode at the ends. Two nanowire waveguides can satisfy the dispersion relation of a planar metal-dielectric-metal waveguide of equivalent width equal to the square field average weighted gap. Confinement factors of over 10.sup.3 are possible due to plasmon focusing in the inter-wire space.

  8. Multi-gap high impedance plasma opening switch

    DOEpatents

    Mason, Rodney J.

    1996-01-01

    A high impedance plasma opening switch having an anode and a cathode and at least one additional electrode placed between the anode and cathode. The presence of the additional electrodes leads to the creation of additional plasma gaps which are in series, increasing the net impedance of the switch. An equivalent effect can be obtained by using two or more conventional plasma switches with their plasma gaps wired in series. Higher impedance switches can provide high current and voltage to higher impedance loads such as plasma radiation sources.

  9. Design of shape memory alloy actuated intelligent parabolic antenna for space applications

    NASA Astrophysics Data System (ADS)

    Kalra, Sahil; Bhattacharya, Bishakh; Munjal, B. S.

    2017-09-01

    The deployment of large flexible antennas is becoming critical for space applications today. Such antenna systems can be reconfigured in space for variable antenna footprint, and hence can be utilized for signal transmission to different geographic locations. Due to quasi-static shape change requirements, coupled with the demand of large deflection, shape memory alloy (SMA) based actuators are uniquely suitable for this system. In this paper, we discuss the design and development of a reconfigurable parabolic antenna structure. The reflector skin of the antenna is vacuum formed using a metalized polycarbonate shell. Two different strategies are chosen for the antenna actuation. Initially, an SMA wire based offset network is formed on the back side of the reflector. A computational model is developed using equivalent coefficient of thermal expansion (ECTE) for the SMA wire. Subsequently, the interaction between the antenna and SMA wire is modeled as a constrained recovery system, using a 1D modified Brinson model. Joule effect based SMA phase transformation is considered for the relationship between input voltage and temperature at the SMA wire. The antenna is modeled using ABAQUS based finite element methodology. The deflection found through the computational model is compared with that measured in experiment. Subsequently, a point-wise actuation system is developed for higher deflection. For power-minimization, an auto-locking device is developed. The performance of the new configuration is compared with the offset-network configuration. It is envisaged that the study will provide a comprehensive procedure for the design of intelligent flexible structures especially suitable for space applications.

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    De Geronimo, G.; Li, S.; D'Andragora, A.

    We present a front-end application-specific integrated circuit (ASIC) for a wire based time-projection-chamber (TPC) operating in liquid Argon (LAr). The LAr TPC will be used for long baseline neutrino oscillation experiments. The ASIC must provide a low-noise readout of the signals induced on the TPC wires, digitization of those signals at 2 MSamples/s, compression, buffering and multiplexing. A resolution of better than 1000 rms electrons at 200 pF input capacitance for an input range of 300 fC is required, along with low power and operation in LAr (at 87 K). We include the characterization of a commercial technology for operationmore » in the cryogenic environment and the first experimental results on the analog front end. The results demonstrate that complementary metal-oxide semiconductor transistors have lower noise and much improved dc characteristics at LAr temperature. Finally, we introduce the concept of '1/f equivalent' to model the low-frequency component of the noise spectral density, for use in the input metal-oxide semiconductor field-effect transistor optimization.« less

  11. Superconducting bearings for application in cryogenic experiments in space

    NASA Technical Reports Server (NTRS)

    Everitt, C. W. F.; Worden, P. W., Jr.

    1980-01-01

    Linear superconducting magnetic bearings suitable for use in a proposed orbital equivalence principle experiment and for general application in space were developed and tested. Current flows in opposite directions in adjacent superconducting wires arranged parallel to the axis of a cylinder. This configuration provides maximum stiffness radially while allowing the test mass to move freely along the cylinder axis. In a space application, the wires are extended to cover the entire perimeter of the cylinder: for the earth-based tests it was desirable to use only the bottom half. Control of the axial position of the test mass is by small control coils which may be positioned inside or outside the main bearing. The design is suitable for application to other geometries where maximum stiffness is desired. A working model scaled to operate in a 1-g environment was perfected approximate solutions for the bearings were developed. A superconducting transformer method of charging the magnets for the bearing, and a position detector based on a SQUID magnetometer and associated superconducting circuit were also investigated.

  12. Multi-gap high impedance plasma opening switch

    DOEpatents

    Mason, R.J.

    1996-10-22

    A high impedance plasma opening switch having an anode and a cathode and at least one additional electrode placed between the anode and cathode is disclosed. The presence of the additional electrodes leads to the creation of additional plasma gaps which are in series, increasing the net impedance of the switch. An equivalent effect can be obtained by using two or more conventional plasma switches with their plasma gaps wired in series. Higher impedance switches can provide high current and voltage to higher impedance loads such as plasma radiation sources. 12 figs.

  13. Self isolating high frequency saturable reactor

    DOEpatents

    Moore, James A.

    1998-06-23

    The present invention discloses a saturable reactor and a method for decoupling the interwinding capacitance from the frequency limitations of the reactor so that the equivalent electrical circuit of the saturable reactor comprises a variable inductor. The saturable reactor comprises a plurality of physically symmetrical magnetic cores with closed loop magnetic paths and a novel method of wiring a control winding and a RF winding. The present invention additionally discloses a matching network and method for matching the impedances of a RF generator to a load. The matching network comprises a matching transformer and a saturable reactor.

  14. Thermocouple error correction for measuring the flame temperature with determination of emissivity and heat transfer coefficient.

    PubMed

    Hindasageri, V; Vedula, R P; Prabhu, S V

    2013-02-01

    Temperature measurement by thermocouples is prone to errors due to conduction and radiation losses and therefore has to be corrected for precise measurement. The temperature dependent emissivity of the thermocouple wires is measured by the use of thermal infrared camera. The measured emissivities are found to be 20%-40% lower than the theoretical values predicted from theory of electromagnetism. A transient technique is employed for finding the heat transfer coefficients for the lead wire and the bead of the thermocouple. This method does not require the data of thermal properties and velocity of the burnt gases. The heat transfer coefficients obtained from the present method have an average deviation of 20% from the available heat transfer correlations in literature for non-reacting convective flow over cylinders and spheres. The parametric study of thermocouple error using the numerical code confirmed the existence of a minimum wire length beyond which the conduction loss is a constant minimal. Temperature of premixed methane-air flames stabilised on 16 mm diameter tube burner is measured by three B-type thermocouples of wire diameters: 0.15 mm, 0.30 mm, and 0.60 mm. The measurements are made at three distances from the burner tip (thermocouple tip to burner tip/burner diameter = 2, 4, and 6) at an equivalence ratio of 1 for the tube Reynolds number varying from 1000 to 2200. These measured flame temperatures are corrected by the present numerical procedure, the multi-element method, and the extrapolation method. The flame temperatures estimated by the two-element method and extrapolation method deviate from numerical results within 2.5% and 4%, respectively.

  15. Accelerated aging test results for aerospace wire insulation constructions

    NASA Technical Reports Server (NTRS)

    Dunbar, William G.

    1995-01-01

    Several wire insulation constructions were evaluated with and without continuous glow discharges at low pressure and high temperature to determine the aging characteristics of acceptable wire insulation constructions. It was known at the beginning of the test program that insulation aging takes several years when operated at normal ambient temperature and pressure of 20 C and 760 torr. Likewise, it was known that the accelerated aging process decreases insulation life by approximately 50% for each 10 C temperature rise. Therefore, the first phases of the program, not reported in these test results, were to select wire insulation constructions that could operate at high temperature and low pressure for over 10,000 hours with negligible shrinkage and little materials' deterioration.The final phase of the program was to determine accelerated aging characteristics. When an insulation construction is subjected to partial discharges the insulation is locally heated by the bombardment of the discharges, the insulation is also subjected to ozone and other deteriorating gas particles that may significantly increase the aging process. Several insulation systems using either a single material or combinations of teflon, kapton, and glass insulation constructions were tested. All constructions were rated to be partial discharge and/or corona-free at 240 volts, 400 Hz and 260 C (500 F) for 50, 000 hours at altitudes equivalent to the Paschen law. Minimum partial discharge aging tests were preceded by screening tests lasting 20 hours at 260 C. The aging process was accelerated by subjecting the test articles to temperatures up to 370 C (700 F) with and without partial discharges. After one month operation with continuous glow discharges surrounding the test articles, most insulation systems were either destroyed or became brittle, cracked, and unsafe for use. Time with space radiation as with partial discharges is accumulative.

  16. Accelerated aging test results for aerospace wire insulation constructions

    NASA Astrophysics Data System (ADS)

    Dunbar, William G.

    1995-11-01

    Several wire insulation constructions were evaluated with and without continuous glow discharges at low pressure and high temperature to determine the aging characteristics of acceptable wire insulation constructions. It was known at the beginning of the test program that insulation aging takes several years when operated at normal ambient temperature and pressure of 20 C and 760 torr. Likewise, it was known that the accelerated aging process decreases insulation life by approximately 50% for each 10 C temperature rise. Therefore, the first phases of the program, not reported in these test results, were to select wire insulation constructions that could operate at high temperature and low pressure for over 10,000 hours with negligible shrinkage and little materials' deterioration.The final phase of the program was to determine accelerated aging characteristics. When an insulation construction is subjected to partial discharges the insulation is locally heated by the bombardment of the discharges, the insulation is also subjected to ozone and other deteriorating gas particles that may significantly increase the aging process. Several insulation systems using either a single material or combinations of teflon, kapton, and glass insulation constructions were tested. All constructions were rated to be partial discharge and/or corona-free at 240 volts, 400 Hz and 260 C (500 F) for 50, 000 hours at altitudes equivalent to the Paschen law. Minimum partial discharge aging tests were preceded by screening tests lasting 20 hours at 260 C. The aging process was accelerated by subjecting the test articles to temperatures up to 370 C (700 F) with and without partial discharges. After one month operation with continuous glow discharges surrounding the test articles, most insulation systems were either destroyed or became brittle, cracked, and unsafe for use. Time with space radiation as with partial discharges is accumulative.

  17. Thermocouple error correction for measuring the flame temperature with determination of emissivity and heat transfer coefficient

    NASA Astrophysics Data System (ADS)

    Hindasageri, V.; Vedula, R. P.; Prabhu, S. V.

    2013-02-01

    Temperature measurement by thermocouples is prone to errors due to conduction and radiation losses and therefore has to be corrected for precise measurement. The temperature dependent emissivity of the thermocouple wires is measured by the use of thermal infrared camera. The measured emissivities are found to be 20%-40% lower than the theoretical values predicted from theory of electromagnetism. A transient technique is employed for finding the heat transfer coefficients for the lead wire and the bead of the thermocouple. This method does not require the data of thermal properties and velocity of the burnt gases. The heat transfer coefficients obtained from the present method have an average deviation of 20% from the available heat transfer correlations in literature for non-reacting convective flow over cylinders and spheres. The parametric study of thermocouple error using the numerical code confirmed the existence of a minimum wire length beyond which the conduction loss is a constant minimal. Temperature of premixed methane-air flames stabilised on 16 mm diameter tube burner is measured by three B-type thermocouples of wire diameters: 0.15 mm, 0.30 mm, and 0.60 mm. The measurements are made at three distances from the burner tip (thermocouple tip to burner tip/burner diameter = 2, 4, and 6) at an equivalence ratio of 1 for the tube Reynolds number varying from 1000 to 2200. These measured flame temperatures are corrected by the present numerical procedure, the multi-element method, and the extrapolation method. The flame temperatures estimated by the two-element method and extrapolation method deviate from numerical results within 2.5% and 4%, respectively.

  18. A Cryogenic Magnetostrictive Actuator Using a Persistent High Temperature Superconducting Magnet. Part 1; Concept and Design

    NASA Technical Reports Server (NTRS)

    Horner, Garnett; Bromberg, Leslie; Teter, J. P.

    2000-01-01

    Cryogenic magnetostrictive materials, such as rare earth zinc crystals, offer high strains and high forces with minimally applied magnetic fields, making the material ideally suited for deformable optics applications. For cryogenic temperature applications the use of superconducting magnets offer the possibility of a persistent mode of operation, i.e., the magnetostrictive material will maintain a strain field without power. High temperature superconductors (HTS) are attractive options if the temperature of operation is higher than 10 degrees Kelvin (K) and below 77 K. However, HTS wires have constraints that limit the minimum radius of winding, and even if good wires can be produced, the technology for joining superconducting wires does not exist. In this paper, the design and capabilities of a rare earth zinc magnetostrictive actuator using bulk HTS is described. Bulk superconductors can be fabricated in the sizes required with excellent superconducting properties. Equivalent permanent magnets, made with this inexpensive material, are persistent, do not require a persistent switch as in HTS wires, and can be made very small. These devices are charged using a technique which is similar to the one used for charging permanent magnets, e.g., by driving them into saturation. A small normal conducting coil can be used for charging or discharging. Because of the magnetic field capability of the superconductor material, a very small amount of superconducting magnet material is needed to actuate the rare earth zinc. In this paper, several designs of actuators using YBCO and BSCCO 2212 superconducting materials are presented. Designs that include magnetic shielding to prevent interaction between adjacent actuators will also be described. Preliminary experimental results and comparison with theory for BSCCO 2212 with a magnetostrictive element will be discussed.

  19. A novel biomechanical model assessing continuous orthodontic archwire activation

    PubMed Central

    Canales, Christopher; Larson, Matthew; Grauer, Dan; Sheats, Rose; Stevens, Clarke; Ko, Ching-Chang

    2013-01-01

    Objective The biomechanics of a continuous archwire inserted into multiple orthodontic brackets is poorly understood. The purpose of this research was to apply the birth-death technique to simulate insertion of an orthodontic wire and consequent transfer of forces to the dentition in an anatomically accurate model. Methods A digital model containing the maxillary dentition, periodontal ligament (PDL), and surrounding bone was constructed from human computerized tomography data. Virtual brackets were placed on four teeth (central and lateral incisors, canine and first premolar), and a steel archwire (0.019″ × 0.025″) with a 0.5 mm step bend to intrude the lateral incisor was virtually inserted into the bracket slots. Forces applied to the dentition and surrounding structures were simulated utilizing the birth-death technique. Results The goal of simulating a complete bracket-wire system on accurate anatomy including multiple teeth was achieved. Orthodontic force delivered by the wire-bracket interaction was: central incisor 19.1 N, lateral incisor 21.9 N, and canine 19.9 N. Loading the model with equivalent point forces showed a different stress distribution in the PDL. Conclusions The birth-death technique proved to be a useful biomechanical simulation method for placement of a continuous archwire in orthodontic brackets. The ability to view the stress distribution throughout proper anatomy and appliances advances understanding of orthodontic biomechanics. PMID:23374936

  20. Suspended circummandibular wire fixation for mixed-dentition pediatric mandible fractures.

    PubMed

    Nishioka, G J; Larrabee, W F; Murakami, C S; Renner, G J

    1997-07-01

    To introduce and evaluate the technique of cirummandibular wires with piriform rim suspension (CMW-PRS) combined with arch bars and a fracture site bridle in the treatment of mixed-dentition pediatric mandible fractures. Five male patients (mean age, 8.2 years [age range, 7-10 years]) with an isolated mixed-dentition mandible fracture were treated with the CMW-PRS technique at the University of Texas Health Science Center, San Antonio, from 1985 to 1987 and at the University of Missouri, Columbia, from 1992 to 1995. Clinical and radiographic fracture healing, somatosensory status, and complications were evaluated. All patients demonstrated clinical union to their preinjury occlusion by 3 or 4 weeks. They remained without complications until they were no longer available for follow-up. Panoramic radiographs supported the findings of clinical examinations throughout the study, and no radiographic abnormalities were found. There were no somatosensory disturbances of the lingual or mental/inferior alveolar nerves. One patient required a tracheostomy unrelated to the procedure. The CMW-PRS technique combined with arch bars and a fracture site bridle wire achieved equivalent historical results when compared with the dental splint. The potential advantages and disadvantages of the CMW-PRS technique compared with those of monocortical bone plating, as well as the significant advantages of the CMW-PRS over the dental splint, are discussed in the text.

  1. Noisy processing and distillation of private quantum States.

    PubMed

    Renes, Joseph M; Smith, Graeme

    2007-01-12

    We provide a simple security proof for prepare and measure quantum key distribution protocols employing noisy processing and one-way postprocessing of the key. This is achieved by showing that the security of such a protocol is equivalent to that of an associated key distribution protocol in which, instead of the usual maximally entangled states, a more general private state is distilled. In addition to a more general target state, the usual entanglement distillation tools are employed (in particular, Calderbank-Shor-Steane-like codes), with the crucial difference that noisy processing allows some phase errors to be left uncorrected without compromising the privacy of the key.

  2. Electromagnetically Clean Solar Arrays

    NASA Technical Reports Server (NTRS)

    Stem, Theodore G.; Kenniston, Anthony E.

    2008-01-01

    The term 'electromagnetically clean solar array' ('EMCSA') refers to a panel that contains a planar array of solar photovoltaic cells and that, in comparison with a functionally equivalent solar-array panel of a type heretofore used on spacecraft, (1) exhibits less electromagnetic interferences to and from other nearby electrical and electronic equipment and (2) can be manufactured at lower cost. The reduction of electromagnetic interferences is effected through a combination of (1) electrically conductive, electrically grounded shielding and (2) reduction of areas of current loops (in order to reduce magnetic moments). The reduction of cost is effected by designing the array to be fabricated as a more nearly unitary structure, using fewer components and fewer process steps. Although EMCSAs were conceived primarily for use on spacecraft they are also potentially advantageous for terrestrial applications in which there are requirements to limit electromagnetic interference. In a conventional solar panel of the type meant to be supplanted by an EMCSA panel, the wiring is normally located on the back side, separated from the cells, thereby giving rise to current loops having significant areas and, consequently, significant magnetic moments. Current-loop geometries are chosen in an effort to balance opposing magnetic moments to limit far-0field magnetic interactions, but the relatively large distances separating current loops makes full cancellation of magnetic fields problematic. The panel is assembled from bare photovoltaic cells by means of multiple sensitive process steps that contribute significantly to cost, especially if electomagnetic cleanliness is desired. The steps include applying a cover glass and electrical-interconnect-cell (CIC) sub-assemble, connecting the CIC subassemblies into strings of series-connected cells, laying down and adhesively bonding the strings onto a panel structure that has been made in a separate multi-step process, and mounting the wiring on the back of the panel. Each step increases the potential for occurrence of latent defects, loss of process control, and attrition of components. An EMCSA panel includes an integral cover made from a transparent material. The silicone cover supplants the individual cover glasses on the cells and serves as an additional unitary structural support that offers the advantage, relative to glass, of the robust, forgiving nature of the silcone material. The cover contains pockets that hold the solar cells in place during the lamination process. The cover is coated with indium tin oxide to make its surface electrically conductive, so that it serves as a contiguous, electrically grounded shield over the entire panel surface. The cells are mounted in proximity to metallic printed wiring. The painted-wiring layer comprises metal-film traces on a sheet of Kapton (or equivalent) polyimide. The traces include contact pads on one side of the sheet for interconnecting the cells. Return leads are on the opposite side of the sheet, positioned to form the return currents substantially as mirror images of, and in proximity to, the cell sheet currents, thereby minimizing magnetic moments. The printed-wiring arrangement mimics the back-wiring arrangement of conventional solar arrays, but the current-loop areas and the resulting magnetic moments are much smaller because the return-current paths are much closer to the solar-cell sheet currents. The contact pads are prepared with solder fo electrical and mechanical bonding to the cells. The pocketed cover/shield, the solar cells, the printed-wiring layer, an electrical bonding agent, a mechanical-bonding agent, a composite structural front-side face sheet, an aluminum honeycomb core, and a composite back-side face sheet are all assembled, then contact pads are soldered to the cells and the agents are cured in a single lamination process.

  3. De-Trending Techniques: Methods for Cleaning Questionable Shock Data

    NASA Technical Reports Server (NTRS)

    Grillo, Vincent J.

    2010-01-01

    Not all zero shifted acceleration data can De-trended using this technique. DC shifts, improper AC coupling, Circuit noise/EMI/EMR, Equivalent RC circuit gain response/Circuit saturation(Slew Rate Limited), fixture grounding and wiring losses can all contribute to bad shock data being recorded. Some data that is zero-shifted or exhibit large instantaneous velocity shifts is inherently bad and a retest is warranted. Clean Acceleration-Time history data can be bad upon examining the Velocity & Displacement profiles. Laser Vibrometers provide a high level of accuracy for pyrotechnic shock testing. Engineering judgment and experience will determine the validity of Shock data.

  4. Coblation versus unipolar electrocautery tonsillectomy: a prospective, randomized, single-blind study in adult patients.

    PubMed

    Noordzij, J Pieter; Affleck, Brian D

    2006-08-01

    To determine if the coblation tonsillectomy (subcapsular dissection) results in less postoperative pain, equivalent intraoperative blood loss, equivalent postoperative hemorrhage rates, and faster healing compared with tonsillectomy was performed using unipolar electrocautery in adult patients. The authors conducted a prospective clinical trial. Forty-eight patients underwent tonsillectomy and were randomly assigned to have one tonsil removed with coblation and the other with unipolar electrocautery. Outcome measures included time to remove each tonsil, intraoperative blood loss, patient-reported pain, postoperative hemorrhage, and amount of healing 2 weeks after surgery. Mean time to remove a single tonsil with coblation and electrocautery was 8.22 minutes and 6.33 minutes, respectively (P = .011). Mean intraoperative blood loss for each technique was less than 10 mL. Postoperative pain was significantly less with coblation as compared with electrocautery: 18.6% less painful during the first week of recovery. Seventy percent of blinded patients identified the coblation side as less painful during the overall 14-day convalescent period. Postoperative hemorrhage rates (2.1% for coblation and 6.2% for electrocautery) were not significantly different. No difference in tonsillar fossa healing was observed between the two techniques 2 weeks after surgery. During nine of the 48 surgeries, wires on the tip of the coblation handpiece experienced thinning to the point of discontinuity while removing a single tonsil. Coblation subcapsular tonsillectomy was less painful than electrocautery tonsillectomy in this 48-patient group. On average, intraoperative blood loss was less than 10 mL for both techniques. Postoperative hemorrhage rates and the degree of tonsillar fossa healing were similar between the two techniques. The coblation handpiece experienced degradation of vital wires in 18% of cases necessitating the use of a second, new handpiece.

  5. Information superhighway: Issues affecting development

    NASA Astrophysics Data System (ADS)

    1994-09-01

    Technological advances in the transmission of voice, video, and data are fostering fundamental changes in the telecommunications industry. For example, large local telephone companies plan to offer video services in competition with cable and broadcast television, while cable television companies plan to offer local telephone service over their wires in competition with the local telephone companies. The administration believes that these technological changes provide the opportunity to develop an 'Information Superhighway' that could provide every element of society with ready access to data, voice, and video communications. Concurrently, the Congress is considering sweeping changes to telecommunications regulations to keep pace with this dynamic industry. GAO prepared this report to serve as an overview of three key issues that decisionmakers may face as they deliberate telecommunications legislation; it focuses on three pivotal issues they face in formulating new telecommunications legislation: (1) managing the transition to a more competitive local telecommunications marketplace; (2) ensuring that all consumers have access to affordable telecommunications as competition develops; and (3) ensuring that the Information Superhighway provides adequate security, privacy, reliability, and interoperability.

  6. A Cryogenic Magnetostrictive Actuator using a Persistent High Temperature Superconducting Magnet, Part 1: Concept and Design. Part 1; Concept and Design

    NASA Technical Reports Server (NTRS)

    Horner, Garnett C.; Bromberg, Leslie; Teter, J. P.

    2001-01-01

    Cryogenic magnetostrictive materials, such as rare earth zinc crystals, offer high strains and high forces with minimally applied magnetic fields, making the material ideally suited for deformable optics applications. For cryogenic temperature applications, such as Next Generation Space Telescope (NGST), the use of superconducting magnets offer the possibility of a persistent mode of operation, i.e., the magnetostrictive material will maintain a strain field without power. High temperature superconductors (HTS) are attractive options if the temperature of operation is higher than 10 degrees Kelvin (K) and below 77 K. However, HTS wires have constraints that limit the minimum radius of winding, and even if good wires can be produced, the technology for joining superconducting wires does not exist. In this paper, the design and capabilities of a rare earth zinc magnetostrictive actuator using bulk HTS is described. Bulk superconductors can be fabricated in the sizes required with excellent superconducting properties. Equivalent permanent magnets, made with this inexpensive material, are persistent, do not require a persistent switch as in HTS wires, and can be made very small. These devices are charged using a technique which is similar to the one used for charging permanent magnets, e.g., by driving them into saturation. A small normal conducting coil can be used for charging or discharging. Very fast charging and discharging of HTS tubes, as short as 100 microseconds, has been demonstrated. Because of the magnetic field capability of the superconductor material, a very small amount of superconducting magnet material is needed to actuate the rare earth zinc. In this paper, several designs of actuators using YBCO and BSCCO 2212 superconducting materials are presented. Designs that include magnetic shielding to prevent interaction between adjacent actuators will also be described. Preliminary experimental results and comparison with theory for BSSCO 2212 with a magnetostrictive element will be discussed.

  7. A Conversion of Wheatstone Bridge to Current-Loop Signal Conditioning for Strain Gages

    NASA Technical Reports Server (NTRS)

    Anderson, Karl F.

    1995-01-01

    Current loop circuitry replaced Wheatstone bridge circuitry to signal-condition strain gage transducers in more than 350 data channels for two different test programs at NASA Dryden Flight Research Center. The uncorrected test data from current loop circuitry had a lower noise level than data from comparable Wheatstone bridge circuitry, were linear with respect to gage-resistance change, and were uninfluenced by varying lead-wire resistance. The current loop channels were easier for the technicians to set up, verify, and operate than equivalent Wheatstone bridge channels. Design choices and circuit details are presented in this paper in addition to operational experience.

  8. Radiated Susceptibility Test Procedure and Setup Exploiting Crosstalk

    NASA Astrophysics Data System (ADS)

    Grassi, F.; Pignari, S. A.; Spadacini, G.; Bisognin, P.; Pelissou, P.; Marra, S.

    2016-05-01

    In this work, basic principles of an alternative test procedure exploiting crosstalk to reproduce in the terminal loads of a wiring structure the same disturbances that would be induced by traditional radiated susceptibility (RS) tests are presented. Equivalence with radiation is achieved by the use of a generator circuit properly fed with two synchronized RF generators, and holds for whatever loads (even not linear) connected to the terminations of the cable harness. The proposed procedure is here tailored to the specific conditions of incidence foreseen by aerospace Standards on RS. Its effectiveness is validated by measurements carried out in an ad hoc test setup.

  9. Synthesis of Asynchronous Systems from Data Flow Specifications

    DTIC Science & Technology

    1993-12-01

    Sarma B. K. Vrudhula, UA-ECE ISI/RR-93-366 December 1993 DTIC S ELECTE APR 2 81994 U G D!MC QUA& f n MC’W". 1 S INFORMATION SCIENCES 3101822-1511...wire data types is denoted by nb, where n is a positive integer. 3. Group data types are denoted by (g1,g2,.. . , g ,), where each gi is a null data type...During the manipulation of a DFG, a data type may be reduced to an equiv- alent data type. (gl) is equivalent to g1 , and (g1,g2,. . . , g 3 i--9,g9,gj+1

  10. Fly-by-Light Advanced Systems Hardware (FLASH) program

    NASA Astrophysics Data System (ADS)

    Bedoya, Carlos A.

    1995-05-01

    Fiber optics are immune to electromagnetic emissions and have the potential to eliminate this concern especially in flight critical applications if they can be developed to the same level of technology as current systems using wire to carry the signals. As aircraft become more and more dependent of digital signals to control all systems, the Electromagnetic Environment (EME) will become more and more a concern for the safe long term operation. The International Severe HIRF electromagnetic environment (EME) is less than 2000 Volts per meter below 400 MHz and reaches a maximum of 6,850 Volts per meter in the 4-6 GHz range. The normal assumption is that a metal or composite aircraft skin with appropriate seals provides 20 dB attenuation of the external environment. This reduces peak levels at the avionics boxes to less than 200 Volts per meter below 400 MHz and a maximum of 685 Volts per meter in the 406 GHz range. MIL-STD-461D imposed an additional box level requirement to 200 Volts per meter from 10 KHz to 40 GHz. This requirement equals or surpasses the attenuated HIRF environment over significant portions of the spectrum and implies that the aircraft must be designed to achieve and maintain this value throughout its service life. Although wires can be shielded and designed to achieve these requirements, it is a more expensive process, adds the weight of shielding and requires maintenance of the shielding integrity at all times. The very light weight and high bandwidth of fiber optics also offer the potential of eliminating the number of connections and weight savings in aircraft. For example on a one to one replacement of wire by fiber, it is estimated that fiber would weight about 1/20 the weight of wire. Current wire buses used for duplex communications in aircraft applications have a bandwidth of about 1 MHz while equivalent buses using fiber optics have a bandwidth of 20 MHz. For other applications such as video and avionics interfaces, fiber buses in the hundreds of MHz are available. Applications of fiber optic buses would then result in the reduction of wires and connections because of reduction in the number of buses needed for information transfer due to the fact that a large number of different signals can be sent across one fiber by multiplexing each signal. The Advanced Research Projects Agency (ARPA) Technology Reinvestment Project (TRP) Fly-by-Light Advanced Systems Hardware (FLASH) program addresses the development of Fly-by-Light Technology in order to apply the benefits of fiber optics to military and commercial aircraft.

  11. Privacy and Technology: Folk Definitions and Perspectives

    PubMed Central

    Kwasny, Michelle N.; Caine, Kelly E.; Rogers, Wendy A.; Fisk, Arthur D.

    2017-01-01

    In this paper we present preliminary results from a study of individual differences in privacy beliefs, as well as relate folk definitions of privacy to extant privacy theory. Focus groups were conducted with young adults aged 18–28 and older adults aged 65–75. Participants first shared their individual definitions of privacy, followed by a discussion of privacy in six scenarios chosen to represent a range of potentially invasive situations. Taken together, Westin’s and Altman’s theories of privacy accounted for both younger and older adults’ ideas about privacy, however, neither theory successfully accounted for findings across all age and gender groups. Whereas males tended to think of privacy in terms of personal needs and convenience, females focused more on privacy in terms of others, respecting privacy rights, and safety. Older adults tended to be more concerned about privacy of space rather than information privacy. Initial results reinforce the notion that targeting HCI design to the user population, even with respect to privacy, is critically important. PMID:29057397

  12. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  13. From Data Privacy to Location Privacy

    NASA Astrophysics Data System (ADS)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  14. Radioguided localisation of impalpable breast lesions using 99m-Technetium macroaggregated albumin: Lessons learnt during introduction of a new technique to guide preoperative localisation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Landman, Joanne; Kulawansa, Sagarika; McCarthy, Michael

    2015-03-15

    Preoperative wire-guided localisation (WGL) of impalpable breast lesions is widely used but can be technically difficult. Risks include wire migration, inaccurate placement, and inadequate surgical margins. Research shows that radioguided occult lesion localisation (ROLL) is quicker, easier, and can improve surgical and cosmetic outcomes. An audited introduction of ROLL was conducted to validate the technique as a feasible alternative to WGL. Fifty patients with single impalpable lesions and biopsy proven malignancy or indeterminate histology underwent WGL followed by intralesional radiopharmaceutical injection of 99m-Technetium macroaggregated albumin. Postprocedural mammography was performed to demonstrate wire position, and scintigraphy to evaluate radiopharmaceutical migration. Lymphoscintigraphymore » and intraoperative sentinel node biopsy were performed if indicated, followed by lesion localisation and excision using a gamma probe. Specimen imaging was performed, with immediate reexcision for visibly inadequate margins. Accurate localisation was achieved in 86% of patients with ROLL compared to 72% with WGL. All lesions were successfully removed, with clear margins in 71.8% of malignant lesions. Reexcision and intraoperative sentinel node localisation rates were equivalent to preaudit figures for WGL. ROLL was easy to perform and problems were infrequent. Inaccurate radiopharmaceutical placement necessitating WGL occurred in four patients. Minor radiopharmaceutical migration was common, but precluded using ROLL in only two cases. ROLL is effective, simple, inexpensive, and easily learnt; however, preoperative confirmation of correct radiopharmaceutical placement using mammography and the gamma probe is important to help ensure successful lesion removal. Insertion of a backup hookwire is recommended during the initial introduction of ROLL.« less

  15. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  16. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  17. Partitioning-based mechanisms under personalized differential privacy.

    PubMed

    Li, Haoran; Xiong, Li; Ji, Zhanglong; Jiang, Xiaoqian

    2017-05-01

    Differential privacy has recently emerged in private statistical aggregate analysis as one of the strongest privacy guarantees. A limitation of the model is that it provides the same privacy protection for all individuals in the database. However, it is common that data owners may have different privacy preferences for their data. Consequently, a global differential privacy parameter may provide excessive privacy protection for some users, while insufficient for others. In this paper, we propose two partitioning-based mechanisms, privacy-aware and utility-based partitioning, to handle personalized differential privacy parameters for each individual in a dataset while maximizing utility of the differentially private computation. The privacy-aware partitioning is to minimize the privacy budget waste, while utility-based partitioning is to maximize the utility for a given aggregate analysis. We also develop a t -round partitioning to take full advantage of remaining privacy budgets. Extensive experiments using real datasets show the effectiveness of our partitioning mechanisms.

  18. Partitioning-based mechanisms under personalized differential privacy

    PubMed Central

    Li, Haoran; Xiong, Li; Ji, Zhanglong; Jiang, Xiaoqian

    2017-01-01

    Differential privacy has recently emerged in private statistical aggregate analysis as one of the strongest privacy guarantees. A limitation of the model is that it provides the same privacy protection for all individuals in the database. However, it is common that data owners may have different privacy preferences for their data. Consequently, a global differential privacy parameter may provide excessive privacy protection for some users, while insufficient for others. In this paper, we propose two partitioning-based mechanisms, privacy-aware and utility-based partitioning, to handle personalized differential privacy parameters for each individual in a dataset while maximizing utility of the differentially private computation. The privacy-aware partitioning is to minimize the privacy budget waste, while utility-based partitioning is to maximize the utility for a given aggregate analysis. We also develop a t-round partitioning to take full advantage of remaining privacy budgets. Extensive experiments using real datasets show the effectiveness of our partitioning mechanisms. PMID:28932827

  19. Feasibility study of a 270V dc flat cable aircraft electrical power distributed system

    NASA Astrophysics Data System (ADS)

    Musga, M. J.; Rinehart, R. J.

    1982-01-01

    This report documents the efforts of a one man-year feasibility study to evaluate the usage of flat conductors in place of conventional round wires for a 270 volt direct current aircraft power distribution system. This study consisted of designing electrically equivalent power distribution harnesses in flat conductor configurations for a currently operational military aircraft. Harness designs were established for installation in aircraft airframes which are: (1) All metal, or (2) All composite, or (3) a mixture of both. Flat cables have greater surface areas for heat transfer allowing higher current densities and therefore lighter weight conductors, than with round wires. Flat cables are less susceptible to electromagnetic effects. However, these positive factors are partially offset by installation and maintenance difficulties. This study concludes that the extent of these difficulties can be adequately limited with appropriate modification to present installation and maintenance practices. A comparative analysis of the flat and the round conductor power distribution harnesses was made for weight, cost, maintenance and reliability. The knowledge gained from the design and comparative analysis phases was used to generate design criteria for flat power cable harnesses and to identify and prioritize flat cable harness components and associated production tooling which require development.

  20. Altered states: state health privacy laws and the impact of the Federal Health Privacy Rule.

    PubMed

    Pritts, Joy L

    2002-01-01

    Although the Federal Health Privacy Rule has evened out some of the inconsistencies between states' health privacy laws, gaps in protection still remain. Furthermore, the Federal Rule contains some lax standards for the disclosure of health information. State laws can play a vital role in filling these gaps and strengthening the protections afforded health information. By enacting legislation that has higher privacy-protective standards than the Federal Health Privacy Rule, states can play three important roles. First, because they can directly regulate entities that are beyond HHS's mandate, states can afford their citizens a broader degree of privacy protection than the Federal Health Privacy Rule. Second, by having state health privacy laws, states can enforce privacy protections at the local level. Finally, action by the states can positively influence health privacy policies at the federal level by raising the standard as to what constitutes sufficient privacy protection. High privacy protections imposed by states may serve as the standard for comprehensive federal legislation, if and when Congress reconsiders the issue. So far, states' reactions to the Federal Privacy Rule have been mixed. Only time will tell whether states will assume the mantle of leadership on health privacy or relinquish their role as the primary protectors of health information.

  1. Through Patients' Eyes: Regulation, Technology, Privacy, and the Future.

    PubMed

    Petersen, Carolyn

    2018-04-22

    Privacy is commonly regarded as a regulatory requirement achieved via technical and organizational management practices. Those working in the field of informatics often play a role in privacy preservation as a result of their expertise in information technology, workflow analysis, implementation science, or related skills. Viewing privacy from the perspective of patients whose protected health information is at risk broadens the considerations to include the perceived duality of privacy; the existence of privacy within a context unique to each patient; the competing needs inherent within privacy management; the need for particular consideration when data are shared; and the need for patients to control health information in a global setting. With precision medicine, artificial intelligence, and other treatment innovations on the horizon, health care professionals need to think more broadly about how to preserve privacy in a health care environment driven by data sharing. Patient-reported privacy preferences, privacy portability, and greater transparency around privacy-preserving functionalities are potential strategies for ensuring that privacy regulations are met and privacy is preserved. Georg Thieme Verlag KG Stuttgart.

  2. [The Comparison of the Difference Between the Emphasis on and the Receipt of Patient Privacy in the Hospital Setting].

    PubMed

    Li, Chiu-Kuel; Lin, Chiou-Fen

    2015-10-01

    Privacy is a unique privilege for humans. Enhancing the balance between the importance given to patient privacy and the receipt of this privacy by patients is one key approach to improving the relationship between patients and the hospital. This study compared the difference between the importance of patient privacy and receipt of this privacy by patients as a reference for future patient privacy policy planning. This study was a cross-sectional design. We randomly sampled three hospitals in northern Taiwan and investigated patients using a questionnaire. The questionnaire was self-designed and verified for reliability and validity. We used frequency and percentage to describe demographic data and used a t-test to compare the deviation between the emphasis on and receipt of patient privacy. There were 296 valid samples in this study and the effective rate was 84.57%. The highest degree of importance was information privacy and the lowest was physical privacy. Physical privacy (t = 3.04, p < .001) and mental privacy (t = 2.42, p < .01) exhibited significant differences between emphasis and receipt. Demographic data on gender, age, education level, marital status, and occupation. Type of hospital and ward level correlated with the emphasis and receipt of privacy. The importance of privacy for physical and mental wellbeing was higher than the actual receipt of this privacy among the patient sample. The importance of privacy for married individuals and young women with high education levels was higher, while males and less-educated individuals scored lower in terms of privacy receipt. Medical agencies must provide higher levels of physical and mental privacy in order to enhance patient satisfaction.

  3. Informational privacy and the public's health: the Model State Public Health Privacy Act.

    PubMed

    Gostin, L O; Hodge, J G; Valdiserri, R O

    2001-09-01

    Protecting public health requires the acquisition, use, and storage of extensive health-related information about individuals. The electronic accumulation and exchange of personal data promises significant public health benefits but also threatens individual privacy; breaches of privacy can lead to individual discrimination in employment, insurance, and government programs. Individuals concerned about privacy invasions may avoid clinical or public health tests, treatments, or research. Although individual privacy protections are critical, comprehensive federal privacy protections do not adequately protect public health data, and existing state privacy laws are inconsistent and fragmented. The Model State Public Health Privacy Act provides strong privacy safeguards for public health data while preserving the ability of state and local public health departments to act for the common good.

  4. Predicting user concerns about online privacy in Hong Kong.

    PubMed

    Yao, Mike Z; Zhang, Jinguang

    2008-12-01

    Empirical studies on people's online privacy concerns have largely been conducted in the West. The global threat of privacy violations on the Internet calls for similar studies to be done in non-Western regions. To fill this void, the current study develops a path model to investigate the influence of people's Internet use-related factors, their beliefs in the right to privacy, and psychological need for privacy on Hong Kong people's concerns about online privacy. Survey responses from 332 university students were analyzed. Results from this study show that people's belief in the right to privacy was the most important predictor of their online privacy concerns. It also significantly mediated the relationship between people's psychological need for privacy and their concerns with privacy violations online. Moreover, while frequent use of the Internet may increase concerns about online privacy issues, Internet use diversity may actually reduce such worries. The final model, well supported by the observed data, successfully explained 25% of the variability in user concerns about online privacy.

  5. Limited privacy protection and poor sensitivity: Is it time to move on from the statistical linkage key-581?

    PubMed

    Randall, Sean M; Ferrante, Anna M; Boyd, James H; Brown, Adrian P; Semmens, James B

    2016-08-01

    The statistical linkage key (SLK-581) is a common tool for record linkage in Australia, due to its ability to provide some privacy protection. However, newer privacy-preserving approaches may provide greater privacy protection, while allowing high-quality linkage. To evaluate the standard SLK-581, encrypted SLK-581 and a newer privacy-preserving approach using Bloom filters, in terms of both privacy and linkage quality. Linkage quality was compared by conducting linkages on Australian health datasets using these three techniques and examining results. Privacy was compared qualitatively in relation to a series of scenarios where privacy breaches may occur. The Bloom filter technique offered greater privacy protection and linkage quality compared to the SLK-based method commonly used in Australia. The adoption of new privacy-preserving methods would allow both greater confidence in research results, while significantly improving privacy protection. © The Author(s) 2016.

  6. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy.

    PubMed

    Mulligan, Deirdre K; Koopman, Colin; Doty, Nick

    2016-12-28

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy's disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy's essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy's multiple uses across multiple contexts.This article is part of the themed issue 'The ethical impact of data science'. © 2016 The Author(s).

  7. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  8. Privacy and Data Protection in Japan.

    ERIC Educational Resources Information Center

    Srinivasan, Srinija

    1992-01-01

    Discussion of individual rights and privacy in Japan focuses on the Privacy Protection Act, which acknowledges the threat posed by government databases to the individual's right of privacy. Characteristics of the Japanese legal system are described, origins of privacy in Japanese law are examined, and privacy and government databases are…

  9. 76 FR 19107 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-06

    ... Ellen Callahan, Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC... (703-235- 0780), Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC... Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245...

  10. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  11. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  12. 17 CFR 160.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... privacy notices. 160.6 Section 160.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy notices that you...

  13. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  14. 16 CFR 313.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...

  15. 16 CFR 313.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...

  16. 16 CFR 313.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...

  17. 6 CFR 1002.4 - Responses to Privacy Act requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Responses to Privacy Act requests. 1002.4 Section 1002.4 Domestic Security PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 1002.4 Responses to Privacy Act requests. (a) Acknowledgement. The Privacy Act Officer...

  18. 17 CFR 160.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Initial privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...

  19. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  20. 17 CFR 160.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Annual privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...

  1. 16 CFR 313.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...

  2. 16 CFR 313.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...

  3. 16 CFR 313.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...

  4. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  5. The Privacy Jungle:On the Market for Data Protection in Social Networks

    NASA Astrophysics Data System (ADS)

    Bonneau, Joseph; Preibusch, Sören

    We have conducted the first thorough analysis of the market for privacy practices and policies in online social networks. From an evaluation of 45 social networking sites using 260 criteria we find that many popular assumptions regarding privacy and social networking need to be revisited when considering the entire ecosystem instead of only a handful of well-known sites. Contrary to the common perception of an oligopolistic market, we find evidence of vigorous competition for new users. Despite observing many poor security practices, there is evidence that social network providers are making efforts to implement privacy enhancing technologies with substantial diversity in the amount of privacy control offered. However, privacy is rarely used as a selling point, even then only as auxiliary, nondecisive feature. Sites also failed to promote their existing privacy controls within the site. We similarly found great diversity in the length and content of formal privacy policies, but found an opposite promotional trend: though almost all policies are not accessible to ordinary users due to obfuscating legal jargon, they conspicuously vaunt the sites' privacy practices. We conclude that the market for privacy in social networks is dysfunctional in that there is significant variation in sites' privacy controls, data collection requirements, and legal privacy policies, but this is not effectively conveyed to users. Our empirical findings motivate us to introduce the novel model of a privacy communication game, where the economically rational choice for a site operator is to make privacy control available to evade criticism from privacy fundamentalists, while hiding the privacy control interface and privacy policy to maximize sign-up numbers and encourage data sharing from the pragmatic majority of users.

  6. Gap Gene Regulatory Dynamics Evolve along a Genotype Network

    PubMed Central

    Crombach, Anton; Wotton, Karl R.; Jiménez-Guri, Eva; Jaeger, Johannes

    2016-01-01

    Developmental gene networks implement the dynamic regulatory mechanisms that pattern and shape the organism. Over evolutionary time, the wiring of these networks changes, yet the patterning outcome is often preserved, a phenomenon known as “system drift.” System drift is illustrated by the gap gene network—involved in segmental patterning—in dipteran insects. In the classic model organism Drosophila melanogaster and the nonmodel scuttle fly Megaselia abdita, early activation and placement of gap gene expression domains show significant quantitative differences, yet the final patterning output of the system is essentially identical in both species. In this detailed modeling analysis of system drift, we use gene circuits which are fit to quantitative gap gene expression data in M. abdita and compare them with an equivalent set of models from D. melanogaster. The results of this comparative analysis show precisely how compensatory regulatory mechanisms achieve equivalent final patterns in both species. We discuss the larger implications of the work in terms of “genotype networks” and the ways in which the structure of regulatory networks can influence patterns of evolutionary change (evolvability). PMID:26796549

  7. Flow-Field Surveys for Rectangular Nozzles

    NASA Technical Reports Server (NTRS)

    Zaman, K. B. M. Q.

    2012-01-01

    Flow field survey results for three rectangular nozzles are presented for a low subsonic condition obtained primarily by hot-wire anemometry. The three nozzles have aspect ratios of 2:1, 4:1 and 8:1. A fourth case included has 2:1 aspect ratio with chevrons added to the long edges. Data on mean velocity, turbulent normal and shear stresses as well as streamwise vorticity are presented covering a streamwise distance up to sixteen equivalent diameters from the nozzle exit. These detailed flow properties, including initial boundary layer characteristics, are usually difficult to measure in high speed flows and the primary objective of the study is to aid ongoing and future computational and noise modeling efforts.

  8. 13 CFR 102.39 - SBA's exempt Privacy Act systems of records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false SBA's exempt Privacy Act systems... DISCLOSURE AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.39 SBA's exempt Privacy Act systems of records. (a) Systems of records subject to investigatory...

  9. 12 CFR 1204.2 - What do the terms in this part mean?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... appeals. Privacy Act Officer means the FHFA employee who has primary responsibility for privacy and data... Section 1204.2 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ORGANIZATION AND OPERATIONS PRIVACY ACT... Enterprise Oversight. Privacy Act means the Privacy Act of 1974, as amended (5 U.S.C. 552a). Privacy Act...

  10. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  11. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  12. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions...

  13. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  14. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  15. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...

  16. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this...

  17. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  18. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions...

  19. 17 CFR 160.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Delivering privacy and opt out... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out notices...

  20. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  1. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  2. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...

  3. 16 CFR 313.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Information to be included in privacy... OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy notices...

  4. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  5. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  6. 12 CFR 216.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Information to be included in privacy notices... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy...

  7. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  8. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  9. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this...

  10. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  11. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  12. 16 CFR 313.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Information to be included in privacy... OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy notices...

  13. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 13 Business Credit and Assistance 1 2014-01-01 2014-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...

  14. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  15. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  16. 16 CFR 313.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Information to be included in privacy... OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy notices...

  17. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  18. 16 CFR 313.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Delivering privacy and opt out notices. 313... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out...

  19. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions...

  20. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  1. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 13 Business Credit and Assistance 1 2013-01-01 2013-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...

  2. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Model privacy form and... (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  3. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions...

  4. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  5. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  6. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  7. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  8. 12 CFR 332.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Information to be included in privacy notices... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.6 Information to be included in privacy notices. (a) General rule. The initial, annual and revised privacy...

  9. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...

  10. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  11. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  12. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  13. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-109)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  14. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  15. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  16. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions...

  17. 12 CFR 716.5 - Annual privacy notice to members required.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Annual privacy notice to members required. 716... UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.5 Annual privacy... members that accurately reflects your privacy policies and practices not less than annually during the...

  18. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

  19. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  20. The role of privacy protection in healthcare information systems adoption.

    PubMed

    Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui

    2013-10-01

    Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.

  1. Biobank research and the right to privacy.

    PubMed

    Ursin, Lars Oystein

    2008-01-01

    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants in biobank research might have to privacy, it is argued that their interests should be related to the specific context of the provision and reception of health care that participation in biobank research is connected with. Rather than just granting participants an exclusive right to or ownership of their health information, which must be waived in order to make biobank research possible, the privacy aspect of health information should be viewed in light of the moral rights and duties that accompany any involvement in a research based system of health services.

  2. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendixA of this part, consistent with the instructions in appendixA...

  3. 12 CFR 332.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Delivering privacy and opt out notices. 332.9... GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out...

  4. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in Appendix...

  5. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in Appendix...

  6. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to [email protected] or send to: GSA Privacy Act Officer (CIB), General...

  7. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to [email protected] or send to: GSA Privacy Act Officer (CIB), General...

  8. 12 CFR 216.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Delivering privacy and opt out notices. 216.9... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out...

  9. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to [email protected] or send to: GSA Privacy Act Officer (CIB), General...

  10. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in Appendix...

  11. Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection.

    PubMed

    Chen, Hsuan-Ting; Chen, Wenghong

    2015-01-01

    Sampling 515 college students, this study investigates how privacy protection, including profile visibility, self-disclosure, and friending, are influenced by privacy concerns and efficacy regarding one's own ability to manage privacy settings, a factor that researchers have yet to give a great deal of attention to in the context of social networking sites (SNSs). The results of this study indicate an inconsistency in adopting strategies to protect privacy, a disconnect from limiting profile visibility and friending to self-disclosure. More specifically, privacy concerns lead SNS users to limit their profile visibility and discourage them from expanding their network. However, they do not constrain self-disclosure. Similarly, while self-efficacy in privacy management encourages SNS users to limit their profile visibility, it facilitates self-disclosure. This suggests that if users are limiting their profile visibility and constraining their friending behaviors, it does not necessarily mean they will reduce self-disclosure on SNSs because these behaviors are predicted by different factors. In addition, the study finds an interaction effect between privacy concerns and self-efficacy in privacy management on friending. It points to the potential problem of increased risk-taking behaviors resulting from high self-efficacy in privacy management and low privacy concerns.

  12. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-071] Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy... training associated with [[Page 40516

  13. 32 CFR 806b.11 - When to give Privacy Act Statements (PAS).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false When to give Privacy Act Statements (PAS). 806b... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.11 When to give Privacy Act Statements... information. Give a copy of the Privacy Act Statement if asked. Do not ask the person to sign the Privacy Act...

  14. 32 CFR 806b.11 - When to give Privacy Act Statements (PAS).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false When to give Privacy Act Statements (PAS). 806b... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.11 When to give Privacy Act Statements... information. Give a copy of the Privacy Act Statement if asked. Do not ask the person to sign the Privacy Act...

  15. 32 CFR 806b.11 - When to give Privacy Act Statements (PAS).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false When to give Privacy Act Statements (PAS). 806b... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.11 When to give Privacy Act Statements... information. Give a copy of the Privacy Act Statement if asked. Do not ask the person to sign the Privacy Act...

  16. 30 CFR 77.1802 - Insulation of trolley wires, trolley feeder wires and bare signal wires; guarding of trolley...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Insulation of trolley wires, trolley feeder wires and bare signal wires; guarding of trolley wires and trolley feeder wires. 77.1802 Section 77.1802... Wires and Trolley Feeder Wires § 77.1802 Insulation of trolley wires, trolley feeder wires and bare...

  17. 30 CFR 77.1802 - Insulation of trolley wires, trolley feeder wires and bare signal wires; guarding of trolley...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Insulation of trolley wires, trolley feeder wires and bare signal wires; guarding of trolley wires and trolley feeder wires. 77.1802 Section 77.1802... Wires and Trolley Feeder Wires § 77.1802 Insulation of trolley wires, trolley feeder wires and bare...

  18. Investigation of trailing mass in Z-pinch implosions and comparison to experiment

    NASA Astrophysics Data System (ADS)

    Yu, Edmund

    2007-11-01

    Wire-array Z pinches represent efficient, high-power x-ray sources with application to inertial confinement fusion, high energy density plasmas, and laboratory astrophysics. The first stage of a wire-array Z pinch is described by a mass ablation phase, during which stationary wires cook off material, which is then accelerated radially inwards by the JxB force. The mass injection rate varies axially and azimuthally, so that once the ablation phase concludes, the subsequent implosion is highly 3D in nature. In particular, a network of trailing mass and current is left behind the imploding plasma sheath, which can significantly affect pinch performance. In this work we focus on the implosion phase, electing to model the mass ablation via a mass injection scheme. Such a scheme has a number of injection parameters, but this freedom also allows us to gain understanding into the nature of the trailing mass network. For instance, a new result illustrates the role of azimuthal correlation. For an implosion which is 100% azimuthally correlated (corresponding to an azimuthally symmetric 2D r-z problem), current is forced to flow on the imploding plasma sheath, resulting in strong Rayleigh-Taylor (RT) growth. If, however, the implosion is not azimuthally symmetric, the additional azimuthal degree of freedom opens up new conducting paths of lower magnetic energy through the trailing mass network, effectively reducing RT growth. Consequently the 3D implosion experiences lower RT growth than the 2D r-z equivalent, and actually results in a more shell-like implosion. A second major goal of this work is to constrain the injection parameters by comparison to a well-diagnosed experimental data set, in which array mass was varied. In collaboration with R. Lemke, M. Desjarlais, M. Cuneo, C. Jennings, D. Sinars, E. Waisman

  19. Privacy information management for video surveillance

    NASA Astrophysics Data System (ADS)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  20. Somali asylum seekers' perceptions of privacy in healthcare.

    PubMed

    Eklöf, Niina; Abdulkarim, Hibag; Hupli, Maija; Leino-Kilpi, Helena

    2016-08-01

    Privacy has been recognized as a basic human right and a part of quality of care. However, little is known about the privacy of Somali asylum seekers in healthcare, even though they are one of the largest asylum seeker groups in the world. The aim of the study was to describe the content and importance of privacy and its importance in healthcare from the perspective of Somali asylum seekers. The data of this explorative qualitative study were collected by four focus group interviews with 18 Somali asylum seekers with the help of an interpreter. The data were analysed by inductive content analysis. Research permissions were obtained from the director of the reception centre and from the Department of Social Services. Ethical approval was obtained from the Ethics Committee of Turku University. The content of privacy includes visual privacy, physical privacy and informational privacy. All contents can be shared with healthcare professionals. The importance of privacy includes respect, dignity and freedom. Privacy is strongly connected to the collectivism of Somali culture and religion. Unlike the Western cultures, privacy is not important only for the individual; most of all, it is seen to support collectivism. Even though all contents of privacy can be shared with healthcare professionals, it is important to recognize the cultural aspect of privacy especially when using interpreters with Somali background. © The Author(s) 2015.

  1. Context-Aware Generative Adversarial Privacy

    NASA Astrophysics Data System (ADS)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  2. 75 FR 28051 - Public Workshop: Pieces of Privacy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Pieces of Privacy AGENCY: Privacy Office, DHS. ACTION: Notice announcing public workshop. SUMMARY: The Department of Homeland Security Privacy Office will host a public workshop, ``Pieces of Privacy.'' DATES: The workshop will be...

  3. 47 CFR 64.1601 - Delivery requirements and privacy restrictions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 3 2011-10-01 2011-10-01 false Delivery requirements and privacy restrictions... Number; Privacy § 64.1601 Delivery requirements and privacy restrictions. (a) Delivery. Except as... party number (CPN) associated with an interstate call to interconnecting carriers. (b) Privacy. Except...

  4. 75 FR 20298 - Privacy Act Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ... Part 200 RIN 0430-AA03 Privacy Act Regulations AGENCY: Recovery Accountability and Transparency Board... amend the Board's regulations implementing the Privacy Act of 1974 (Privacy Act), as amended. This proposed rule would exempt certain systems of records from certain sections of the Privacy Act. These...

  5. 47 CFR 64.1601 - Delivery requirements and privacy restrictions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Delivery requirements and privacy restrictions... Number; Privacy § 64.1601 Delivery requirements and privacy restrictions. (a) Delivery. Except as... party number (CPN) associated with an interstate call to interconnecting carriers. (b) Privacy. Except...

  6. Privacy Issues of a National Research and Education Network.

    ERIC Educational Resources Information Center

    Katz, James E.; Graveman, Richard F.

    1991-01-01

    Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…

  7. Digital Privacy: Toward a New Politics and Discursive Practice.

    ERIC Educational Resources Information Center

    Doty, Philip

    2001-01-01

    Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…

  8. More Than Defense in Daily Experience of Privacy: The Functions of Privacy in Digital and Physical Environments

    PubMed Central

    Lombardi, Debora Benedetta; Ciceri, Maria Rita

    2016-01-01

    The purpose of the current study was to investigate the experience of privacy, focusing on its functional role in personal well-being. A sample (N = 180) comprised subjects between 18 and 50 years of age were asked to spontaneously provide accounts of their experiences with privacy and answer close-ended questions to acquire a description of a daily experience of privacy. The results showed the importance attributed to the function of privacy related to the “defense from social threats”, and the twofold function of privacy related to an “achieved state of privacy”, in the terms of both “system maintenance” and “system development”. The results also shed light on the role of the environment in shaping one’s experience of privacy. Specifically, the participants recognized more easily the function of defense from threats related to seeking privacy while interacting in digital environments, whereas they seemed to benefit from positive functions related to an achieved state of privacy in physical environments. The findings sustain the notion of privacy as a supportive condition for some psychological processes involved in the positive human functioning and confirm previous studies conducted on the role of privacy in human well-being. PMID:27247696

  9. 32 CFR 318.5 - Designations and responsibilities

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... requirements developed to collect and/or maintain personal data conform to DoD Privacy Act Program standards...) PRIVACY PROGRAM DEFENSE THREAT REDUCTION AGENCY PRIVACY PROGRAM § 318.5 Designations and responsibilities... effective Privacy Program. (2) Appoint a senior official to serve as the Agency Privacy Act Officer. (3...

  10. 32 CFR 318.5 - Designations and responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... requirements developed to collect and/or maintain personal data conform to DoD Privacy Act Program standards...) PRIVACY PROGRAM DEFENSE THREAT REDUCTION AGENCY PRIVACY PROGRAM § 318.5 Designations and responsibilities... effective Privacy Program. (2) Appoint a senior official to serve as the Agency Privacy Act Officer. (3...

  11. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  12. 47 CFR 64.1601 - Delivery requirements and privacy restrictions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 3 2014-10-01 2014-10-01 false Delivery requirements and privacy restrictions... Number; Privacy § 64.1601 Delivery requirements and privacy restrictions. (a) Delivery. Except as... and transmission technology used by the carrier or VoIP provider. (b) Privacy. Except as provided in...

  13. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  14. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  15. 47 CFR 64.1601 - Delivery requirements and privacy restrictions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 3 2012-10-01 2012-10-01 false Delivery requirements and privacy restrictions... Number; Privacy § 64.1601 Delivery requirements and privacy restrictions. (a) Delivery. Except as... and transmission technology used by the carrier or VoIP provider. (b) Privacy. Except as provided in...

  16. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  17. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  18. 47 CFR 64.1601 - Delivery requirements and privacy restrictions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 3 2013-10-01 2013-10-01 false Delivery requirements and privacy restrictions... Number; Privacy § 64.1601 Delivery requirements and privacy restrictions. (a) Delivery. Except as... and transmission technology used by the carrier or VoIP provider. (b) Privacy. Except as provided in...

  19. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  20. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  1. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  2. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  3. A Model Privacy Statement for Ohio Library Web Sites.

    ERIC Educational Resources Information Center

    Monaco, Michael J.

    The purpose of this research was to develop a model privacy policy statement for library World Wide Web sites. First, standards of privacy protection were identified. These standards were culled from the privacy and confidentiality policies of the American Library Association, the Federal Trade Commission's online privacy reports, the guidelines…

  4. 45 CFR 164.534 - Compliance dates for initial implementation of the privacy standards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... privacy standards. 164.534 Section 164.534 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.534 Compliance dates for initial implementation of the privacy standards. (a...

  5. 45 CFR 164.534 - Compliance dates for initial implementation of the privacy standards.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... privacy standards. 164.534 Section 164.534 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.534 Compliance dates for initial implementation of the privacy standards. (a...

  6. 45 CFR 164.534 - Compliance dates for initial implementation of the privacy standards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... privacy standards. 164.534 Section 164.534 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.534 Compliance dates for initial implementation of the privacy standards. (a...

  7. 45 CFR 164.520 - Notice of privacy practices for protected health information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.520 Notice of privacy practices for protected health information. (a) Standard... 45 Public Welfare 1 2014-10-01 2014-10-01 false Notice of privacy practices for protected health...

  8. 32 CFR 310.2 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Privacy Program under 5 U.S.C. 552a and OMB Circular A-130. (b) Authorizes the Defense Privacy Board, the Defense Privacy Board Legal Committee, and the Defense Data Integrity Board. (c) Continues to authorize... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY...

  9. 32 CFR 310.2 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Privacy Program under 5 U.S.C. 552a and OMB Circular A-130. (b) Authorizes the Defense Privacy Board, the Defense Privacy Board Legal Committee, and the Defense Data Integrity Board. (c) Continues to authorize... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY...

  10. 32 CFR 310.2 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Privacy Program under 5 U.S.C. 552a and OMB Circular A-130. (b) Authorizes the Defense Privacy Board, the Defense Privacy Board Legal Committee, and the Defense Data Integrity Board. (c) Continues to authorize... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY...

  11. 76 FR 63896 - Federal Acquisition Regulation; Privacy Training, 2010-013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-14

    ... Acquisition Regulation; Privacy Training, 2010-013 AGENCY: Department of Defense (DoD), General Services... contractors to complete training that addresses the protection of privacy, in accordance with the Privacy Act... Regulation (FAR) to add a new subpart 24.3, entitled ``Privacy Training,'' and related clause to ensure that...

  12. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act. In...

  13. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...

  14. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule. Except...

  15. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  16. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 4 Accounts 1 2014-01-01 2013-01-01 true Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  17. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  18. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  19. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 4 Accounts 1 2013-01-01 2013-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  20. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  1. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act. In...

  2. 48 CFR 52.224-2 - Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act of...

  3. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the following...

  4. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act. In...

  5. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  6. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...

  7. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 4 Accounts 1 2014-01-01 2013-01-01 true Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  8. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 4 Accounts 1 2012-01-01 2012-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  9. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  10. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  11. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 4 Accounts 1 2013-01-01 2013-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  12. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the following...

  13. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  14. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 4 Accounts 1 2011-01-01 2011-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  15. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  16. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  17. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  18. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  19. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  20. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  1. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  2. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the following...

  3. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  4. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  5. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...

  6. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 4 Accounts 1 2012-01-01 2012-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  7. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act. In...

  8. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  9. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  10. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 4 Accounts 1 2011-01-01 2011-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  11. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the following...

  12. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  13. 75 FR 81454 - Privacy Act of 1974; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-28

    ... JOINT BOARD FOR ENROLLMENT OF ACTUARIES 20 CFR Part 903 Privacy Act of 1974; Implementation AGENCY... requirements of the Privacy Act of 1974, as amended, the Joint Board for the Enrollment of Actuaries (Joint... Privacy Act, from certain of the Privacy Act's provisions, to revise language that incorrectly implies...

  14. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  15. 12 CFR 716.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Initial privacy notice to consumers required... CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear and...

  16. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  17. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the following...

  18. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  19. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule. Except...

  20. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  1. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  2. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  3. 77 FR 57015 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2012-OS-0104] 32 CFR Part 319 Privacy... the records in another Privacy Act system of records. DIA is updating the DIA Privacy Act Program by... its Privacy Programs. DoD expects no opposition to the changes and no significant adverse comments...

  4. 77 FR 2721 - Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-19

    ... FEDERAL COMMUNICATIONS COMMISSION Privacy Act System of Records AGENCY: Federal Communications Commission (FCC, Commission, or Agency). ACTION: Notice; one new Privacy Act system of records. SUMMARY: Pursuant to subsection (e)(4) of the Privacy Act of 1974, as amended (``Privacy Act''), 5 U.S.C. 552a, the...

  5. Perspectives on Privacy and Terrorism: All Is not Lost--Yet.

    ERIC Educational Resources Information Center

    Gellman, Robert

    2002-01-01

    Discusses implications of the U.S.A. Patriot Act, antiterrorism legislation that was passed after the September 11 attacks, regarding privacy issues. Highlights include information privacy; privacy and government, including increases in the surveillance powers of government; privacy and the private sector; and future possibilities. (Author/LRW)

  6. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-10

    ... 20472. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management Agency System of Records AGENCY: Privacy Office...

  7. 75 FR 36535 - Freedom of Information Act, Privacy Act of 1974; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ... Freedom of Information Act (FOIA) and its regulations concerning the Privacy Act of 1974 (Privacy Act). It..., Privacy Act of 1974; Implementation AGENCY: Department of the Treasury. ACTION: Final rule; correcting... the Privacy Act. In addition, that document revised the list of Treasury offices and bureaus found...

  8. Employee Privacy Rights: A Management Guide.

    ERIC Educational Resources Information Center

    Shepard, Ira Michael; Olsen, Harry

    Employee privacy rights are considered, along with practical problems and permissible parameters of employer activity. Included is a state-by-state analysis of the status of workplace privacy. Definitions are offered of "invasion of privacy," with attention to four types of privacy invasions: (1) placing someone in a "false light," (2) the public…

  9. Privacy Awareness: A Means to Solve the Privacy Paradox?

    NASA Astrophysics Data System (ADS)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  10. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge.

    PubMed

    Yu, Fei; Ji, Zhanglong

    2014-01-01

    In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu et al. 2014 to the challenge's data and analyze the data utility after the data are perturbed by the privacy-preserving methods. Major contributions of this paper include new interpretation of the χ2 statistic in a GWAS setting and new results about the Hamming distance score, a key component for one of the privacy-preserving methods.

  11. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge

    PubMed Central

    2014-01-01

    In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu et al. 2014 to the challenge's data and analyze the data utility after the data are perturbed by the privacy-preserving methods. Major contributions of this paper include new interpretation of the χ2 statistic in a GWAS setting and new results about the Hamming distance score, a key component for one of the privacy-preserving methods. PMID:25521367

  12. mSieve: Differential Behavioral Privacy in Time Series of Mobile Sensor Data.

    PubMed

    Saleheen, Nazir; Chakraborty, Supriyo; Ali, Nasir; Mahbubur Rahman, Md; Hossain, Syed Monowar; Bari, Rummana; Buder, Eugene; Srivastava, Mani; Kumar, Santosh

    2016-09-01

    Differential privacy concepts have been successfully used to protect anonymity of individuals in population-scale analysis. Sharing of mobile sensor data, especially physiological data, raise different privacy challenges, that of protecting private behaviors that can be revealed from time series of sensor data. Existing privacy mechanisms rely on noise addition and data perturbation. But the accuracy requirement on inferences drawn from physiological data, together with well-established limits within which these data values occur, render traditional privacy mechanisms inapplicable. In this work, we define a new behavioral privacy metric based on differential privacy and propose a novel data substitution mechanism to protect behavioral privacy. We evaluate the efficacy of our scheme using 660 hours of ECG, respiration, and activity data collected from 43 participants and demonstrate that it is possible to retain meaningful utility, in terms of inference accuracy (90%), while simultaneously preserving the privacy of sensitive behaviors.

  13. mSieve: Differential Behavioral Privacy in Time Series of Mobile Sensor Data

    PubMed Central

    Saleheen, Nazir; Chakraborty, Supriyo; Ali, Nasir; Mahbubur Rahman, Md; Hossain, Syed Monowar; Bari, Rummana; Buder, Eugene; Srivastava, Mani; Kumar, Santosh

    2016-01-01

    Differential privacy concepts have been successfully used to protect anonymity of individuals in population-scale analysis. Sharing of mobile sensor data, especially physiological data, raise different privacy challenges, that of protecting private behaviors that can be revealed from time series of sensor data. Existing privacy mechanisms rely on noise addition and data perturbation. But the accuracy requirement on inferences drawn from physiological data, together with well-established limits within which these data values occur, render traditional privacy mechanisms inapplicable. In this work, we define a new behavioral privacy metric based on differential privacy and propose a novel data substitution mechanism to protect behavioral privacy. We evaluate the efficacy of our scheme using 660 hours of ECG, respiration, and activity data collected from 43 participants and demonstrate that it is possible to retain meaningful utility, in terms of inference accuracy (90%), while simultaneously preserving the privacy of sensitive behaviors. PMID:28058408

  14. Will the new Australian health privacy law provide adequate protection?

    PubMed

    Bomba, David; Hallit, George

    2002-01-01

    Amendments to the original Privacy Act (1988) come at a key point in time, as a national medical record system looms on the Australian horizon. Changes to The Privacy Act have the potential to define a level of information privacy prior to the implementation of such a system. We have therefore collected expert opinions on the ability of the Health Privacy Guidelines (enacted in December 2001 under The Privacy Act and hereafter more specifically known as Health Privacy Legislation) to ensure the privacy and security of patient information. We conclude that the legislation is flawed in its capacity to withstand an increasingly corporatised health sector. Deficiencies in consent requirements, together with feeble enforcement capabilities, mean The Legislation cannot effectively ensure that personally identifiable information will not end up in corporate third party hands. To significantly bolster the new legislation, we argue that it should be supplemented with explicit health data legislation and privacy auditing.

  15. Quantifying Differential Privacy under Temporal Correlations.

    PubMed

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-04-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time . We call it temporal privacy leakage . Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective.

  16. Deriving a Set of Privacy Specific Heuristics for the Assessment of PHRs (Personal Health Records).

    PubMed

    Furano, Riccardo F; Kushniruk, Andre; Barnett, Jeff

    2017-01-01

    With the emergence of personal health record (PHR) platforms becoming more widely available, this research focused on the development of privacy heuristics to assess PHRs regarding privacy. Existing sets of heuristics are typically not application specific and do not address patient-centric privacy as a main concern prior to undergoing PHR procurement. A set of privacy specific heuristics were developed based on a scoping review of the literature. An internet-based commercially available, vendor specific PHR application was evaluated using the derived set of privacy specific heuristics. The proposed set of privacy specific derived heuristics is explored in detail in relation to ISO 29100. The assessment of the internet-based commercially available, vendor specific PHR application indicated numerous violations. These violations were noted within the study. It is argued that the new derived privacy heuristics should be used in addition to Nielsen's well-established set of heuristics. Privacy specific heuristics could be used to assess PHR portal system-level privacy mechanisms in the procurement process of a PHR application and may prove to be a beneficial form of assessment to prevent the selection of a PHR platform with a poor privacy specific interface design.

  17. Current-induced domain wall motion in permalloy nanowires with a rectangular cross-section

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ai, J. H.; Miao, B. F.; Sun, L.

    2011-11-01

    We performed micromagnetic simulations of the current-induced domain wall motion in permalloy nanowires with rectangular cross-section. In the absence of the nonadiabatic spin-transfer term, a threshold current, J{sub c} is required to drive the domain wall moving continuously. We find that J{sub c} is proportional to the maximum cross product of the demagnetization field and magnetization orientation of the domain wall and the domain wall width. With varying both the wire thickness and width, a minimum threshold current in the order of 10{sup 6} A/cm{sup 2} is obtained when the thickness is equivalent to the wire width. With the nonadiabaticmore » spin-transfer term, the calculated domain wall velocity {nu} equals to the adiabatic spin transfer velocity u when the current is far above the Walker limit J{sub w}. Below J{sub w}, {nu}=({beta}/{alpha})u, where {beta} is the nonadiabatic parameter and {alpha} is the damping factor. For different {beta}, we find the Walker limit can be scaled as J{sub w}=({alpha}/{beta}-{alpha})J{sub c}. Our simulations agree well with the one dimensional analytical calculation, suggesting the findings are the general behaviors of the systems in this particular geometry.« less

  18. 30 CFR 75.1003 - Insulation of trolley wires, trolley feeder wires and bare signal wires; guarding of trolley...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Insulation of trolley wires, trolley feeder wires and bare signal wires; guarding of trolley wires and trolley feeder wires. 75.1003 Section 75.1003... MANDATORY SAFETY STANDARDS-UNDERGROUND COAL MINES Trolley Wires and Trolley Feeder Wires § 75.1003...

  19. 30 CFR 75.1003 - Insulation of trolley wires, trolley feeder wires and bare signal wires; guarding of trolley...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Insulation of trolley wires, trolley feeder wires and bare signal wires; guarding of trolley wires and trolley feeder wires. 75.1003 Section 75.1003... MANDATORY SAFETY STANDARDS-UNDERGROUND COAL MINES Trolley Wires and Trolley Feeder Wires § 75.1003...

  20. Dual wire welding torch and method

    DOEpatents

    Diez, Fernando Martinez; Stump, Kevin S.; Ludewig, Howard W.; Kilty, Alan L.; Robinson, Matthew M.; Egland, Keith M.

    2009-04-28

    A welding torch includes a nozzle with a first welding wire guide configured to orient a first welding wire in a first welding wire orientation, and a second welding wire guide configured to orient a second welding wire in a second welding wire orientation that is non-coplanar and divergent with respect to the first welding wire orientation. A method of welding includes moving a welding torch with respect to a workpiece joint to be welded. During moving the welding torch, a first welding wire is fed through a first welding wire guide defining a first welding wire orientation and a second welding wire is fed through a second welding wire guide defining a second welding wire orientation that is divergent and non-coplanar with respect to the first welding wire orientation.

  1. One Size Doesn’t Fit All: Measuring Individual Privacy in Aggregate Genomic Data

    PubMed Central

    Simmons, Sean; Berger, Bonnie

    2017-01-01

    Even in the aggregate, genomic data can reveal sensitive information about individuals. We present a new model-based measure, PrivMAF, that provides provable privacy guarantees for aggregate data (namely minor allele frequencies) obtained from genomic studies. Unlike many previous measures that have been designed to measure the total privacy lost by all participants in a study, PrivMAF gives an individual privacy measure for each participant in the study, not just an average measure. These individual measures can then be combined to measure the worst case privacy loss in the study. Our measure also allows us to quantify the privacy gains achieved by perturbing the data, either by adding noise or binning. Our findings demonstrate that both perturbation approaches offer significant privacy gains. Moreover, we see that these privacy gains can be achieved while minimizing perturbation (and thus maximizing the utility) relative to stricter notions of privacy, such as differential privacy. We test PrivMAF using genotype data from the Wellcome Trust Case Control Consortium, providing a more nuanced understanding of the privacy risks involved in an actual genome-wide association studies. Interestingly, our analysis demonstrates that the privacy implications of releasing MAFs from a study can differ greatly from individual to individual. An implementation of our method is available at http://privmaf.csail.mit.edu. PMID:29202050

  2. Privacy in Social Networks: A Survey

    NASA Astrophysics Data System (ADS)

    Zheleva, Elena; Getoor, Lise

    In this chapter, we survey the literature on privacy in social networks. We focus both on online social networks and online affiliation networks. We formally define the possible privacy breaches and describe the privacy attacks that have been studied. We present definitions of privacy in the context of anonymization together with existing anonymization techniques.

  3. Fourteen Reasons Privacy Matters: A Multidisciplinary Review of Scholarly Literature

    ERIC Educational Resources Information Center

    Magi, Trina J.

    2011-01-01

    Librarians have long recognized the importance of privacy to intellectual freedom. As digital technology and its applications advance, however, efforts to protect privacy may become increasingly difficult. With some users behaving in ways that suggest they do not care about privacy and with powerful voices claiming that privacy is dead, librarians…

  4. 12 CFR 1204.2 - What do the terms in this part mean?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... who has primary responsibility for privacy and data protection policy and is authorized to process... Section 1204.2 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ORGANIZATION AND OPERATIONS PRIVACY ACT..., or control. Privacy Act means the Privacy Act of 1974, as amended (5 U.S.C. 552a). Privacy Act...

  5. 32 CFR 806b.51 - Privacy and the Web.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy and the Web. 806b.51 Section 806b.51 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT... security notices at major web site entry points and Privacy Act statements or Privacy Advisories when...

  6. 17 CFR 248.2 - Model privacy form: rule of construction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Model privacy form: rule of... Safeguarding Personal Information § 248.2 Model privacy form: rule of construction. (a) Model privacy form. Use of the model privacy form in Appendix A to Subpart A of this part, consistent with the instructions...

  7. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  8. 17 CFR 160.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Annual privacy notice to... COMMISSION (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.5 Annual privacy notice to customers required. (a)(1) General rule. You...

  9. 12 CFR 1016.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Delivering privacy and opt out notices. 1016.9 Section 1016.9 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.9 Delivering privacy and opt out notices. (a...

  10. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...

  11. 17 CFR 160.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... privacy notices. 160.6 Section 160.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.6 Information to be included in privacy notices. (a) General rule. The initial...

  12. 12 CFR 216.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Initial privacy notice to consumers required... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear and...

  13. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  14. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  15. 12 CFR 573.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Annual privacy notice to customers required. 573.5 Section 573.5 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.5 Annual privacy notice to...

  16. 17 CFR 160.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Annual privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.5 Annual privacy notice to customers required. (a)(1) General rule. You must...

  17. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  18. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...

  19. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  20. 12 CFR 216.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Initial privacy notice to consumers required... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear and...

  1. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  2. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  3. 12 CFR 573.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Delivering privacy and opt out notices. 573.9 Section 573.9 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.9 Delivering privacy and opt out notices...

  4. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  5. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  6. 17 CFR 160.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Initial privacy notice to... COMMISSION (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.4 Initial privacy notice to consumers required. (a) Initial notice...

  7. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P, S-AM, AND S-ID Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except...

  8. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  9. 17 CFR 160.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... privacy notices. 160.6 Section 160.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.6 Information to be included in privacy notices. (a) General rule. The...

  10. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  11. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  12. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  13. 12 CFR 332.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Annual privacy notice to customers required... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.5 Annual privacy notice to customers required. (a)(1) General rule. You must provide a clear and...

  14. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  15. 12 CFR 216.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Annual privacy notice to customers required... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.5 Annual privacy notice to customers required. (a)(1) General rule. You must provide a clear and...

  16. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Model privacy form and examples. 1016.2 Section 1016.2 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  17. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...

  18. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  19. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  20. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 2 2013-04-01 2013-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as that...

  1. 17 CFR 160.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Initial privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.4 Initial privacy notice to consumers required. (a) Initial notice requirement...

  2. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 2 2012-04-01 2012-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as that...

  3. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Model privacy form and examples. 1016.2 Section 1016.2 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  4. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...

  5. 12 CFR 40.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Initial privacy notice to consumers required. 40.4 Section 40.4 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.4 Initial privacy notice to...

  6. 12 CFR 1016.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Annual privacy notice to customers required. 1016.5 Section 1016.5 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.5 Annual privacy notice to customers...

  7. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  8. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  9. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  10. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  11. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  12. 12 CFR 573.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Initial privacy notice to consumers required. 573.4 Section 573.4 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.4 Initial privacy notice to...

  13. 12 CFR 40.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Initial privacy notice to consumers required. 40.4 Section 40.4 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.4 Initial privacy notice to...

  14. 12 CFR 332.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Initial privacy notice to consumers required... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear and...

  15. 12 CFR 40.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Annual privacy notice to customers required. 40.5 Section 40.5 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.5 Annual privacy notice to customers...

  16. 17 CFR 160.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... privacy notices. 160.6 Section 160.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.6 Information to be included in privacy notices. (a) General rule. The initial...

  17. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  18. 12 CFR 1016.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Initial privacy notice to consumers required. 1016.4 Section 1016.4 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.4 Initial privacy notice to...

  19. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  20. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Model privacy form and examples. 1016.2 Section 1016.2 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  1. 17 CFR 160.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Initial privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.4 Initial privacy notice to consumers required. (a) Initial notice requirement...

  2. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 2 2014-04-01 2014-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as that...

  3. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  4. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  5. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  6. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  7. 6 CFR 1002.3 - Privacy Act requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Privacy Act requests. 1002.3 Section 1002.3 Domestic Security PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 1002.3 Privacy Act requests. (a) Requests to determine if you are the subject of a record. You may...

  8. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  9. 12 CFR 40.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Annual privacy notice to customers required. 40.5 Section 40.5 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.5 Annual privacy notice to customers...

  10. 17 CFR 160.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Annual privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.5 Annual privacy notice to customers required. (a)(1) General rule. You must...

  11. 12 CFR 216.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Annual privacy notice to customers required... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.5 Annual privacy notice to customers required. (a)(1) General rule. You must provide a clear and...

  12. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  13. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 2 2011-04-01 2011-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as that...

  14. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  15. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  16. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  17. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  18. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  19. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as that...

  20. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  1. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...

  2. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  3. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  4. 75 FR 50846 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-001...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-18

    ... INFORMATION CONTACT: For general questions and privacy issues please contact: Mary Ellen Callahan (703-235...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--001 Freedom of Information Act and Privacy Act Records System of Records AGENCY: Privacy Office, DHS. ACTION: Final rule...

  5. 75 FR 743 - Freedom of Information Act, Privacy Act of 1974; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-06

    ... of Information Act (FOIA) and its regulations concerning the Privacy Act of 1974 (Privacy Act). It..., Privacy Act of 1974; Implementation AGENCY: Department of the Treasury. ACTION: Final rule. SUMMARY: This... implement the Privacy Act. In addition, the document revises the list of Treasury offices and bureaus found...

  6. Personalized Privacy-Preserving Frequent Itemset Mining Using Randomized Response

    PubMed Central

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy. PMID:25143989

  7. Personalized privacy-preserving frequent itemset mining using randomized response.

    PubMed

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy.

  8. Preserving Institutional Privacy in Distributed binary Logistic Regression.

    PubMed

    Wu, Yuan; Jiang, Xiaoqian; Ohno-Machado, Lucila

    2012-01-01

    Privacy is becoming a major concern when sharing biomedical data across institutions. Although methods for protecting privacy of individual patients have been proposed, it is not clear how to protect the institutional privacy, which is many times a critical concern of data custodians. Built upon our previous work, Grid Binary LOgistic REgression (GLORE)1, we developed an Institutional Privacy-preserving Distributed binary Logistic Regression model (IPDLR) that considers both individual and institutional privacy for building a logistic regression model in a distributed manner. We tested our method using both simulated and clinical data, showing how it is possible to protect the privacy of individuals and of institutions using a distributed strategy.

  9. Achieving Privacy in a Federated Identity Management System

    NASA Astrophysics Data System (ADS)

    Landau, Susan; Le van Gong, Hubert; Wilton, Robin

    Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domains blurs security boundaries and potentially creates privacy risks. We examine privacy risks and fundamental privacy protections of federated identity- management systems. The protections include minimal disclosure and providing PII only on a “need-to-know” basis. We then look at the Liberty Alliance system and analyze previous privacy critiques of that system. We show how law and policy provide privacy protections in federated identity-management systems, and that privacy threats are best handled using a combination of technology and law/policy tools.

  10. Flow-Field Surveys for Rectangular Nozzles. Supplement

    NASA Technical Reports Server (NTRS)

    Zaman, K. B. M. Q.

    2012-01-01

    Flow field survey results for three rectangular nozzles are presented for a low subsonic condition obtained primarily by hot-wire anemometry. The three nozzles have aspect ratios of 2:1, 4:1 and 8:1. A fourth case included has 2:1 aspect ratio with chevrons added to the long edges. Data on mean velocity, turbulent normal and shear stresses as well as streamwise vorticity are presented covering a streamwise distance up to sixteen equivalent diameters from the nozzle exit. These detailed flow properties, including initial boundary layer characteristics, are usually difficult to measure in high speed flows and the primary objective of the study is to aid ongoing and future computational and noise modeling efforts. This supplement contains data files, charts and source code.

  11. Neutral beam dose and sputtering characteristics in an ion implantation system

    NASA Technical Reports Server (NTRS)

    Roberts, A. S., Jr.; Ash, R. L.; Berger, M. H.

    1973-01-01

    A technique and instrument design for calorimetric detection of the neutral atom content of a 60 keV argon ion beam. A beam sampling method is used to measure local heat flux to a small platinum wire at steady state; integration of power density profiles leads to a determination of equivalent neutral beam current. The fast neutral production occurs as a result of charge transfer processes in the region of the beam system between analyzing magnet and beam stop where the pressure remains less than .00001 torr. A description of the neutral beam detector is given in section along with a presentation of results. An elementary analysis of sputter material transport from target to substrate was performed; the analysis relates to semiconductor sputtering.

  12. Gravitational Influences on the Growth of Polydiacetylene Films by Ultraviolet Solution Polymerization

    NASA Technical Reports Server (NTRS)

    Frazier, Donald O.

    2000-01-01

    Technically, the field of integrated optics using organic/polymer materials as a new means of information processing, has emerged as of vital importance to optical computers, optical switching, optical communications, the defense industry, etc. The goal is to replace conventional electronic integrated circuits and wires by equivalent miniaturized optical integrated circuits and fibers, offering larger bandwidths, more compactness and reliability, immunity to electromagnetic interference and less cost. From the Code E perspective, this research area represents an opportunity to marry "front-line" education in science and technology with national scientific and technological interests while maximizing human resources utilization. This can be achieved by the development of untapped resources for scientific research - such as minorities, women, and universities traditionally uninvolved in scientific research.

  13. A low-density boundary-layer wind tunnel facility

    NASA Technical Reports Server (NTRS)

    White, B. R.

    1987-01-01

    This abstract describes a low-density wind-tunnel facility that was established at NASA Ames in order to aid interpretation and understanding of data received from the Mariner and Viking spacecraft through earth-based simulation. The wind tunnel is a boundary-layer type which is capable of operating over a range of air densities ranging from 0.01 to 1.24 kg/cu m, with the lower values being equivalent to the near-surface density of the planet Mars. Although the facility was developed for space and extraterrestrial simulation, it also can serve as a relatively large-scale, low-density aerodynamic test facility. A description of this unique test facility and some Pitot-tube and hot-wire anemometry data acquired in the facility are presented.

  14. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    PubMed

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  15. The study on privacy preserving data mining for information security

    NASA Astrophysics Data System (ADS)

    Li, Xiaohui

    2012-04-01

    Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.

  16. Privacy protection for HealthGrid applications.

    PubMed

    Claerhout, B; De Moor, G J E

    2005-01-01

    This contribution aims at introducing the problem of privacy protection in e-Health and at describing a number of existing privacy enhancing techniques (PETs). The recognition that privacy constitutes a fundamental right is gradually entering public awareness. Because healthcare-related data are susceptible to being abused for many obvious reasons, public apprehension about privacy has focused on medical data. Public authorities have become convinced of the need to enforce privacy protection and make considerable efforts for promoting through privacy protection legislation the deployment of PETs. Based on the study of the specific features of Grid technology, ways in which PET services could be integrated in the HealthGrid are being analyzed. Grid technology aims at removing barriers between local and remote resources. The privacy and legal issues raised by the HealthGrid are caused by the transparent interchange and processing of sensitive medical information. PET technology has already proven its usefulness for privacy protection in health-related marketing and research data collection. While this paper does not describe market-ready solutions for privacy protection in the HealthGrid, it puts forward several cases in which the Grid may benefit from PETs. Early integration of privacy protection services into the HealthGrid can lead to a synergy that is beneficial for the development of the HealthGrid itself.

  17. Quantifying Differential Privacy under Temporal Correlations

    PubMed Central

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-01-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective. PMID:28883711

  18. Protecting Children's Online Privacy.

    ERIC Educational Resources Information Center

    Kresses, Mamie

    2001-01-01

    Discuss provisions of new federal Children's Online Privacy Protection Act that principals should know to protect student privacy on the Internet. Also discusses relevant provisions of the Family Educational Rights and Privacy Act. (PKP)

  19. Student Privacy versus Campus Safety: Has Recent Legislation Compromised Privacy Rights?

    ERIC Educational Resources Information Center

    van der Kaay, Christopher D.

    This study highlights major legislation addressing campus safety and crime reporting and discusses its impact on a student's right to privacy. The 1974 Family Educational Rights and Privacy Act, commonly referred to as the "Buckley Amendment," was among the first pieces of legislation to address the notion of student privacy and confidentiality.…

  20. 75 FR 55335 - Privacy Act of 1974; Privacy Act of 1974: Department of Homeland Security/ALL-031 Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... in a system of records in the possession or under the control of DHS by complying with DHS Privacy... 1974; Privacy Act of 1974: Department of Homeland Security/ALL-031 Information Sharing Environment Suspicious Activity Reporting Initiative System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

Top