WorldWideScience

Sample records for aged security guards

  1. Security Guards for the Future Web

    National Research Council Canada - National Science Library

    Reed, Nancy; Bryson, Dave; Garriss, James; Gosnell, Steve; Heaton, Brook; Huber, Gary; Jacobs, David; Pulvermacher, Mary; Semy, Salim; Smith, Chad; Standard, John

    2004-01-01

    .... Guard technology needs to keep pace with the evolving Web environment. The authors conjectured that a family of security guard services would be needed to provide the full range of functionality necessary to support the future Web...

  2. Guarding America: Security Guards and U.S. Critical Infrastructure Protection

    National Research Council Canada - National Science Library

    Parfomak, Paul W

    2004-01-01

    The Bush Administration's 2003 National Strategy for the Physical Protection of Critical Infrastructures and Key Assets indicates that security guards are an important source of protection for critical facilities...

  3. Work-related violence against security guards--who is most at risk?

    Science.gov (United States)

    Leino, Tuula; Selin, Risto; Summala, Heikki; Virtanen, Marianna

    2011-01-01

    Studies on violence in the work of security guards are largely lacking. This study is unique in that it focuses on security guards (n=1,010) in Finland, and assesses the different forms, prevalence, and risk factors of the work-related violence they often face. Information to a survey instrument was obtained by first interviewing 30 volunteers. Then we made a cross-sectional mailed survey that was sent to a randomized group of 2,000 security guards. The response rate was 52. We found the prevalence of verbal aggression, threats of assault, and physical acts against security guards at least once a month to be 39%, 19%, and 15% respectively. As regards risk factors and who is most at risk, our results show that male gender, young age, low work experience, late working hours, and time pressure were associated with all three forms of work-related violence. Unlike other forms of violence, verbal aggression was highly prevalent outside the metropolitan area and directed towards both more and less experienced security guards. In prevention policies for violence, it is important to identify high-risk groups such as those who have less work experience.

  4. 33 CFR 125.11 - Form of Coast Guard Port Security Card.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Form of Coast Guard Port Security... WATERFRONT FACILITIES OR VESSELS § 125.11 Form of Coast Guard Port Security Card. The Coast Guard Port... data. ...

  5. 75 FR 53195 - Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA

    Science.gov (United States)

    2010-08-31

    ... its effects on them and participate in the rulemaking process. Small businesses may send comments on... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0021] RIN 1625-AA87 Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA AGENCY: Coast Guard, DHS. ACTION...

  6. Security Guards and Counter-terrorism: Tourism and Gaps in Terrorism Prevention

    Directory of Open Access Journals (Sweden)

    Luke Howie

    2014-11-01

    Full Text Available Organisation operating in the tourism industry are high priority targets for terrorists. In the aftermath of the 9/11 attacks tourism destinations, hotels and modes of public transportation have regularly been targeted by terrorists seeking to convey their violent message. As such, leaders and managers in the tourism industry carefully plan their security and counter-terrorism responses, often involving the hiring of security guards. It is here that I believe a significant gap in counter-terrorism preparedness exists. I argue that protecting tourism destinations is only possible if consideration is given the effectiveness of security guards and understanding that their well-being will impact upon their ability to deliver security. I want to draw attention to the often ignored social role of security guards. On 9/11, 42 security guards died whilst helping save the lives of thousands. They performed their jobs admirably, despite being low-paid, under-appreciated workers. In this paper I explore the social role of security guards in the context of tourism security. By drawing on representations of security guards in popular culture and reports on the state of the security guard industry. I argue that the lack of attention on the quality and well-being of guards is a significant black-spot in tourism security and terrorism preparedness.

  7. Coast guard : better logistics planning needed to aid operational decisions related to the deployment of the national security cutter and its support assets.

    Science.gov (United States)

    2009-07-01

    As part of its more than $$24 billion Deepwater program to replace aging vessels and aircraft with new or upgraded assets, the Coast Guard is preparing the National Security Cutter (NSC) for service. GAO previously reported on Deepwater assets' deplo...

  8. 76 FR 28795 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary...

    Science.gov (United States)

    2011-05-18

    ... 1974; Department of Homeland Security United States Coast Guard-024 Auxiliary Database System of... Security/United States Coast Guard-024 Auxiliary Database (AUXDATA) System of Records.'' This system of...: United States Coast Guard Auxiliary Database (AUXDATA). Security classification: Unclassified. System...

  9. National Guard Engagement in the Pacific: No Threat to Security

    National Research Council Canada - National Science Library

    Bour, Mark

    2002-01-01

    This thesis evaluates recent decisions to expand the National Guard (NGE) State Partnership Program into the Asia-Pacific region and examines potential effects this expansion will have on the new partners created...

  10. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... This thesis attempts to identify both the susceptibility of Coast Guard information systems to human factors-based security risks and possible means for increasing user awareness of those risks...

  11. The National Guard Meeting Its Obligation to Provide Capable Forces for Homeland Security

    National Research Council Canada - National Science Library

    Sellars, Thomas J

    2006-01-01

    ... (warfighting versus domestic support/homeland security) be harmonized to best posture the Guard to meet both its state obligations and at the same time continue to play a pivotal role in joint warfighting and stability operations...

  12. 33 CFR 165.776 - Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico 165.776 Section 165.776 Navigation and Navigable Waters COAST... Guard District § 165.776 Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico (a...

  13. Work ability and health of security guards at a public University: a cross-sectional study.

    Science.gov (United States)

    Godinho, Marluce Rodrigues; Ferreira, Aldo Pacheco; Greco, Rosangela Maria; Teixeira, Liliane Reis; Teixeira, Maria Teresa Bustamante

    2016-01-01

    to evaluate the work ability and health status of security guards at a public University. a cross-sectional, descriptive, and analytical study was carried with 119 security guards. The following instruments were used: Work Ability Index (WAI), Patient Health Questionnaire (PHQ-9), International Physical Activity Questionnaire (IPAQ, short), Alcohol Use Disorders Identification Test (AUDIT), Medical Outcomes Study (MOS), and Demand-Control-Support (DCS). Descriptive statistics were used to describe the study samples and the Spearman's coefficient correlation was performed to assess the WAI. Significance level was set at 5%. samples were composed by men; the mean age was 54.9 years (SD=5.7); 80% had partners, and 75% had basic education. The majority (95%) had only one job, the average length of service was 24.8 years (SD=11), ranging from 3 to 43 years. 88.9% worked ≤40 hours and 75% did not work at night shift or rotating shifts. The average score given to work ability was good (40.7 points), with significant correlation to social support at work (p-value=0.002), health conditions (p-value=0.094), and depression symptoms (p-value=0.054). this study showed that many characteristics might affect the work ability scores. Considering the results, we note that healthy life habits and a reorganization of work environments should be encouraged.

  14. Overlapping values, mutual prejudices. Empirical research into the ethos of police officers and private security guards

    NARCIS (Netherlands)

    van Steden, R.; van der Wal, Z.; Lasthuizen, K.M.

    2015-01-01

    What determines professional motivations and values of security operatives: sector or profession? Our article aims to answer this question through a survey study among police officers (n = 405) and private security guards (n = 329) in the Netherlands. Our results show that both groups closely

  15. 75 FR 23212 - Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA

    Science.gov (United States)

    2010-05-03

    ... reason: Vessel traffic can pass safely around the security zone. If you think that your business... its effects on them and participate in the rulemaking. If the rule would affect your small business... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0021] RIN 1625...

  16. 33 CFR 165.117 - Regulated Navigation Areas, Safety and Security Zones: Deepwater Ports, First Coast Guard District.

    Science.gov (United States)

    2010-07-01

    ..., Safety and Security Zones: Deepwater Ports, First Coast Guard District. 165.117 Section 165.117... Limited Access Areas First Coast Guard District § 165.117 Regulated Navigation Areas, Safety and Security... section are designated as regulated navigation areas. (2) Safety and security zones. All waters within a...

  17. Don't Drop Your Guard: Securing Nuclear Facilities

    International Nuclear Information System (INIS)

    Lööf, Susanna

    2013-01-01

    You're never quite finished with nuclear security. ''Even the most advanced security system for radioactive or nuclear material needs to be continuously updated to ensure that it remains effective,'' says Arvydas Stadalnikas, an IAEA Senior Nuclear Security Officer. ''Security can always be improved. Even if you think you have the best system for today, it may require enhancements because of the changing environment,'' he said. To help States with this daunting task, the IAEA offers support through its International Physical Protection Advisory Service (IPPAS) which includes in-depth analysis of the physical protection and nuclear security followed by expert advice. The IAEA has carried out 58 missions to 37 countries since the IPPAS programme was launched in 1996, helping States translate international conventions, codes and guidance on nuclear security into practice. Although each mission focuses on improving the security in a specific country, ''the programme has benefits that reach far beyond the recipient State's national borders,'' Stadalnikas noted. ''Each IPPAS mission helps improve global nuclear security because enhanced security in one country means that you improve globally. Deficiencies in one country could open the way for malicious acts, which can have worldwide effects,'' he said

  18. Assessment of private security guards by Suicide Probability Scale and Brief Symptom Inventory.

    Science.gov (United States)

    Dogan, Bulent; Canturk, Gurol; Canturk, Nergis; Guney, Sevgi; Özcan, Ebru

    2016-01-01

    The aim of the present study was to investigate the influence of suicide probability and relevant sociodemographic features and to provide information for preventing suicide in private security guards working under the stressful conditions and continuous exposure to the negative and traumatic life events. 200 private security guards and 200 personnels of Ankara University participated in the study. A sociodemographic information questionnaire, the Suicide Probability Scale (SPS) and the Brief Symptom Inventory (BSI) were used to collect the data. Gender, marital status, income, religious beliefs, experiencing a life-threatening situation, history of a suicide attempt, smoking and not having a chronic disease caused statistically significant differences in the scores for SPS between the private security guards group and the controls. Moreover there was a statistically significant positive correlation between the total scores of the subscales of SPS and the total scores of BSI. Like police officers and gendarmes, private security guards are at high risk of committing and attempting suicide because of being at stressful work settings and also suffering from secondary trauma. It is required that they should be aware of their tendency to commit suicide and have regular psychiatric screenings.

  19. 76 FR 66933 - Privacy Act of 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG-014 Military Pay...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG--014 Military Pay and Personnel System... Security U.S. Coast Guard--014 Military Pay and Personnel System of Records.'' This system of records allows the Department of Homeland Security U.S. Coast Guard to collect and maintain records regarding pay...

  20. Bird guard

    Science.gov (United States)

    Fairchild, Dana M [Armour, SD

    2010-03-02

    The bird guard provides a device to protect electrical insulators comprising a central shaft; a clamp attached to an end of the shaft to secure the device to a transmission tower; a top and bottom cover to shield transmission tower insulators; and bearings to allow the guard to rotate in order to frighten birds away from the insulators.

  1. Use of a "secure room" and a security guard in the management of the violent, aggressive or suicidal patient in a rural hospital: a 3-year audit.

    Science.gov (United States)

    Brock, Gordon; Gurekas, Vydas; Gelinas, Anne-Fredrique; Rollin, Karina

    2009-01-01

    Little has been published on the management of psychiatric crises in rural areas, and little is known of the security needs or use of "secure rooms" in rural hospitals. We conducted a 3-year retrospective chart audit on the use of our secure room/security guard system at a rural hospital in a town of 3500, located 220 km from our psychiatric referral centre. Use of our secure room/security guard system occurred at the rate of 1.1 uses/1000 emergency department visits, with the most common indication being physician perception of risk of patient suicide or self-harm. Concern for staff safety was a factor in 10% of uses. Eighty percent of patients were treated locally, with most being released from the secure room after 2 days or less. Fourteen percent of patients required ultimate transfer to our psychiatric referral centre and 6% to a detoxification centre. The average annual cost of security was $16 259.61. A secure room can provide the opportunity for close observation of a potentially self-harming patient, additional security for staff and early warning if a patient flees the hospital. Most admissions were handled locally, obviating the need for transfer to distant psychiatric referral centres. Most patients who were admitted were already known as having a psychiatric illness and 80% of the patients required the use of the secure room/security guard system for less than a 2-night stay, suggesting that most rural mental health crises pass quickly. Most patients admitted to a rural hospital with a mental health crisis can be managed locally if an adequate secure room/security guard system is available.

  2. National Guard State Partnership Program: Supporting U.S. Southern Command Security Cooperation Program

    National Research Council Canada - National Science Library

    Peart, Raphael G

    2006-01-01

    .... SPP has provided a meaningful extension of U.S. soft power within the region. It accomplished this by establishing strategic partnerships between National Guard units and various newly formed former Soviet countries...

  3. Curriculum for Security in a Nuclear Age.

    Science.gov (United States)

    Carlson, Helen L.

    1984-01-01

    A survey of secondary students after they had completed a course entitled "Security in the Nuclear Age" suggests that instruction can make some impact in the area of security information. However, results also showed that students use media rather than school as information sources. Peace curricula are also discussed. (RM)

  4. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... As such, our ability to ensure the security of those systems is also increasing in import. Traditional information security measures tend to be system-oriented and often fail to address the human element that is critical to system success...

  5. Guns, guards, gates and geeks: Romania strengthens computer security at nuclear installations

    International Nuclear Information System (INIS)

    Gil, Laura

    2016-01-01

    A cyberattack could swipe all the information stored on your computer or even prevent it from working. That’s bad enough. But a cyberattack on a nuclear power plant could lead to sabotage or theft of nuclear material. Computer security, concerned with the protection of digital data and the defence of systems and networks against malicious acts, is a critical component of nuclear security. “The advance of computers and their use in all aspects of nuclear operations has changed the security paradigm,” said Donald Dudenhoeffer, Information Technology Security Officer at the IAEA. “Information and computer security must be considered as components in the overall nuclear security plan.”

  6. DeviceGuard: External Device-Assisted System And Data Security

    OpenAIRE

    Deng, Yipan

    2011-01-01

    This thesis addresses the threat that personal computer faced from malware when the personal computer is connected to the Internet. Traditional host-based security approaches, such as anti-virus scanning protect the host from virus, worms, Trojans and other malwares. One of the issues of the host-based security approaches is that when the operating system is compromised by the malware, the antivirus software also becomes vulnerable. In this thesis, we present a novel approach through usin...

  7. The Need for a Regional Security System Multinational Coast Guard Unit in the Eastern Caribbean

    Science.gov (United States)

    2012-06-08

    the teaching staff of Staff Group 11 A (Mr Matt Bonnott, Dr Thomas Huber, LTC Andrew McIntyre) and Mr William Knight for officiating, my oral...assist me on this journey. Finally, to my wife Vonette, son Isaiah , daughter Makayla, my mother Muriel (this one is for you), and my friends (too...for the implementation of a new security risk management mechanism to enhance the security of the RSS sub-region. According to Thomas Norman in the

  8. Longevity of guard cell chloroplasts in falling leaves: implication for stomatal function and cellular aging.

    Science.gov (United States)

    Zeiger, E; Schwartz, A

    1982-11-12

    Guard cell chloroplasts in senescing leaves from 12 species of perennial trees and three species of annual plants survived considerably longer than their mesophyll counterparts. In Ginkgo biloba, stomata from yellow leaves opened during the day and closed at night; guard cell chloroplasts from these leaves showed fluorescence transients associated with electron transport and photophosphorylation. These findings indicate that guard cell chloroplasts are highly conserved throughout the life-span of the leaf and that leaves retain stomatal control during senescence.

  9. Development of a self-navigating mobile interior robot application as a security guard/sentry

    International Nuclear Information System (INIS)

    Klarer, P.R.; Harrington, J.J.

    1986-07-01

    This paper describes a mobile robot system designed to function as part of an overall security system at a high security facility. The features of this robot system include specialized software and sensors for navigation without the need for external locator beacons or signposts, sensors for remote imaging and intruder detection, and the ability to communicate information either directly to the electronic portion of the security system or to a manned central control center. Other desirable features of the robot system include low weight, compact size, and low power consumption. The robot system can be operated either by remote manual control, or it can operate autonomously where direct human control can be limited to the global command level. The robot can act as a mobile remote sensing platform for alarm assessment or roving patrol, as a point sensor (sentry) in routine security applications, or as an exploratory device in situations potentially hazardous to humans. This robot system may also be used to ''walk-test'' intrusion detection sensors as part of a routine test and maintenance program for an interior intrusion detection system. The hardware, software, and operation of this robot system will be briefly described herein

  10. Coast Guard Acquisitions: Enhanced Oversight of Testing Could Benefit National Security Cutter Program and Future DHS Acquisitions

    Science.gov (United States)

    2016-02-03

    based on our January 2016 report on the NSC’s IOT &E event.2 I will address issues related to (1) the results of the NSC’s IOT &E, (2) the Coast Guard’s...before the testing is complete, meaning that the Coast Guard will be operating 6 NSCs before it has resolved issues from IOT &E and knows the... IOT &E event, the Coast Guard had nearly four years of experience operating the NSCs. The Coast Guard has encountered several issues that require

  11. Collaborative Applications Used in a Wireless Environment at Sea for Use in Coast Guard Law Enforcement and Homeland Security Missions

    National Research Council Canada - National Science Library

    Klopson, Jadon E; Burdian, Stephen V

    2005-01-01

    ... an 802.11 mesh layer architecture and 802.16 Orthogonal Frequency Division Multiplexing, in order to effectively and more efficiently transmit data and create a symbiotic operational picture between Coast Guard Cutters, their boarding teams...

  12. Legal and regulatory aspects of optimization comprehensive support service and combat activity of the Security service of Ukraine and the National guard of Ukraine emergency social situation

    Directory of Open Access Journals (Sweden)

    В. В. Мацюк

    2015-05-01

    Full Text Available Problem setting. The status of comprehensive support of military units in the world’s leading powers is considered to be one of the key factors which defines the success of the social emergency settling operations. The experience of service and military application of the National Guard of Ukraine in the anti-terrorist operation zone on the South-East of Ukraine shows that emergency response tasks are generally carried out in cooperation with other Ukrainian security sector authorities, mostly with the Security Service of Ukraine. However, the forces joint managing authority chiefs usually do not cover the matter of such activities’ comprehensive support, which forces the commanders of the military units to rely on themselves in this question. Recent research and publications analysis. The analysis of research of status and development prospects of the comprehensive support of the Armed Forces of Ukraine, other security authorities, armies of the world’s leading powers, peculiarities of creation and functioning of such systems, application of their means and powers, scientific thought on the problems of service and military application of the National Guard units has shown the problematic tasks of the joint unit comprehensive support system optimization. Therefore, the question of regulatory and legal support of this process is of current importance. Paper objective. The objective of this paper is to define regulatory and legal aspects of comprehensive support optimization of the Security Service of Ukraine and the National Guard of Ukraine service and combat activities during social emergencies. Paper main body. According to the current legislation, comprehensive support comprises of the following types of support: operative (also called military, moral and psychological, materiel (logistical. All other types of support are parts of these three basic ones. Their examination is necessary due to the fact, that there is confusion in the

  13. 76 FR 49494 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard DHS/USCG-027...

    Science.gov (United States)

    2011-08-10

    ... destroyed when two years old (SSIC 1500 Item 17a, (NC1-26-80-4, item 338j(1)) and 17b (NC1-26-80-4, item... for appointment in the Coast Guard Reserve are destroyed when one year old (SSIC 100, Item 3b, NC1-26... performance; Advertising responses; Applicant initiated inquiries; Congressional or special interests...

  14. The Security and Defense of America's Ports: An Assessment of Coast Guard and Navy Roles, Capabilities and Synchronization

    National Research Council Canada - National Science Library

    Richardt, Timothy P

    2006-01-01

    .... The United States must thus act to increase security for seaborne commerce and create depth of enforcement through the assets of the Department of Homeland Security and the Department of Defense...

  15. Commission on the National Guard and Reserves: Strengthening America’s Defenses in the New Security Environment

    Science.gov (United States)

    2007-03-01

    Guard would reduce its ability to respond effectively to state missions.10 Governor Ruth Ann Minner of Delaware testified before the Commission that the...2118 and 2216 Rayburn House Office Building, Washington DC June 15, 2006 9:00 a.m. • The Honorable Ruth Ann Minner, Governor of Delaware and Lead...2006 Arlington, VA Mr. Terrell Parker October 27, 2006 Arlington, VA Lieutenant Colonel Angel Perez October 27, 2006 Arlington, VA Ms. Sallie Shaffer

  16. Effects of over-the-counter jaw-repositioning mouth guards on dynamic balance, flexibility, agility, strength, and power in college-aged male athletes.

    Science.gov (United States)

    Golem, Devon L; Arent, Shawn M

    2015-02-01

    Improvements in muscular power and anaerobic performance have resulted from the use of jaw-repositioning mouth guards designed with advanced dental techniques. The high cost of such techniques has dissuaded the widespread use. Recently, more affordable, over-the-counter (OTC) jaw-repositioning mouth guards have become available. The primary objective of this study was to examine the effects of 2 OTC jaw-repositioning mouth guards on muscular power and strength performance in college-aged male athletes. It was hypothesized that similar to previous observations with advanced dentistry-designed mouth guards, OTC jaw-repositioning mouth guards would impart positive effects on muscular power but not have any effect on muscular strength. Secondary objectives of this study included the examination of the effects of 2 OTC jaw-repositioning mouth guards on other variables related to athletic performance. Male collegiate athletes (N = 20) participated in 4 separate testing sessions that consisted of assessment of muscular power, dynamic balance, flexibility, agility, and muscular strength. The 4 conditions, 1 per testing session, were assigned in a randomized order and consisted of a no-mouth guard control (CON), a placebo mouth guard, a self-adapted jaw-repositioning mouth guard (SA), and a custom-fitted jaw-repositioning mouth guard (CF). No significant differences were observed between conditions in muscular power (p = 0.78), dynamic balance (p = 0.99), agility (p = 0.22), or muscular strength (p = 0.47). The CF had significantly lower hip flexion than the CON (p = 0.014) and had significantly greater lumbar spine lateral flexion compared with the SA condition (p = 0.054). However, these flexibility differences lack practical relevance as the effect sizes remain very small (ES = -0.27 and -0.14, respectively). In conclusion, the jaw-repositioning technique used in the design of these OTC mouth guards did not affect performance. It is important to note that negative

  17. Financial Hardship Before and After Social Security's Early Eligibility Age

    OpenAIRE

    Richard W. Johnson; Gordon B.T. Mermin

    2009-01-01

    Although poverty rates for Americans ages 65 and older have plunged over the past half century, many people continue to fall into poverty in their late fifties and early sixties. This study examines financial hardship rates in the years before qualifying for Social Security retirement benefits at age 62 and investigates how the availability of Social Security improves economic well-being at later ages. The analysis follows a sample of adults from the 1937-39 birth cohort for 14 years, trackin...

  18. An Assessment Of Importance Of Children In Old Age Security ...

    African Journals Online (AJOL)

    ... the male model, in the female model, only religion established similar relationship. The study concludes that the welfare of the elderly requires the strengthening of social security system. Keywords: Welfare, Value of children, Old age security, Extended famil. African Journal for the Psychological Study of Social Issues Vol.

  19. Perceptions of Job Security in Europe's Ageing Workforce

    Science.gov (United States)

    Hank, Karsten; Erlinghagen, Marcel

    2011-01-01

    Using data from the 2004 Survey of Health, Ageing and Retirement in Europe, this paper investigates older workers' perceptions of job security in eleven countries. We describe cross-national patterns and estimate multilevel models to analyse individual and societal determinants of self-perceived job security in the older labour force. While there…

  20. Guard News - The National Guard

    Science.gov (United States)

    operations during chemical attack May 25, 2018 - SWANTON, Ohio - Maintenance is a critical component in Leaders discuss future of National Guard cyber warfare May 21, 2018 - CAMP ATTERBURY, Ind. - While National Guard teams from across the nation tested themselves on their cyber defensive capabilities at

  1. Attachment security and obesity in US preschool-aged children.

    Science.gov (United States)

    Anderson, Sarah E; Whitaker, Robert C

    2011-03-01

    To estimate the association between attachment security in children aged 24 months and their risk for obesity at 4½ years of age. Insecure attachment is associated with unhealthy physiologic and behavioral responses to stress, which could lead to development of obesity. Cohort study. National sample of US children born in 2001. Children and mothers participating in the 2003 and 2005-2006 waves of the Early Childhood Longitudinal Study, Birth Cohort, conducted by the National Center for Education Statistics. Our analytic sample included 6650 children (76.0% of children assessed in both waves). Attachment security at 24 months was assessed by trained interviewers during observation in the child's home. Insecure attachment was defined as lowest quartile of attachment security, based on the security score from the Toddler Attachment Sort-45 Item. Obesity at 4½ years of age (sex-specific body mass index ≥95th percentile for age). The prevalence of obesity was 23.1% in children with insecure attachment and 16.6% in those with secure attachment. For children with insecure attachment, the odds of obesity were 1.30 (95% confidence interval, 1.05-1.62) times higher than for children with secure attachment after controlling for the quality of mother-child interaction during play, parenting practices related to obesity, maternal body mass index, and sociodemographic characteristics. Insecure attachment in early childhood may be a risk factor for obesity. Interventions to increase children's attachment security should examine the effects on children's weight.

  2. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    Science.gov (United States)

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  3. 76 FR 49500 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-020 Substance...

    Science.gov (United States)

    2011-08-10

    ... 7101 Washington, DC 20593. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0053] Privacy Act of... Treatment Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  4. The Coast Guard Proceedings of the Marine Safety and Security Council. Volume 71, Number 3, Fall 2014

    Science.gov (United States)

    2014-01-01

    challenging and undermining the security of the United States and its pri- mary allies in the region (Colombia, Chile , Peru, Panama, and Guatemala...democracy reversal, trade and energy, counterfeiting and contraband, immigration and refugees, hostile states seeking advantage, or alterations in the mili...South are Brazil, Canada, Chile , Columbia, the Dominican Republic, Ecuador, El Salvador, France, Mexico, Panama, Peru, the Netherlands, Spain

  5. 76 FR 69749 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-029 Notice of...

    Science.gov (United States)

    2011-11-09

    ... person making the disclosure. I. To an organization or individual in either the public or private sector... vetting of individuals pursuant to its mission for protecting and securing the maritime sector. The..., date and place of birth, gender, country of citizenship, travel/mariner document type, number and...

  6. Coast Guard

    International Nuclear Information System (INIS)

    1991-09-01

    The 11-million gallon Exxon Valdez oil spill highlighted deficiencies in the nation's ability to contain and recover spilled oil. The Oil Pollution Act of 1990 represents a major effort by Congress to address these deficiencies and to clarify the roles and responsibilities of the private sector and the federal government in preventing, preparing for, and responding to oil spills. This report examines the Coast Guard's efforts to avoid unnecessary and wasteful duplication by coordinating with the private sector and others, including federal and state agencies, its plans to buy oil spill response equipment and the new responsibilities the act places on the private sector and the Coast Guard and if these responsibilities call for a shift in emphasis in Coast Guard oil spill response activities

  7. 30 CFR 77.400 - Mechanical equipment guards.

    Science.gov (United States)

    2010-07-01

    ... shall be guarded. (b) Overhead belts shall be guarded if the whipping action from a broken line would be hazardous to persons below. (c) Guards at conveyor-drive, conveyor-head, and conveyor-tail pulleys shall... between the belt and the pulley. (d) Except when testing the machinery, guards shall be securely in place...

  8. Impact of Population Aging on Military and Security Policy

    Directory of Open Access Journals (Sweden)

    Martina Šimková

    2014-12-01

    Full Text Available Population ageing is among the most important problems of developed European countries and the most frequently discussed social issues. The Czech Republic also faces population ageing and we cannot expect a different trend in the future. Life expectancy has increased due to better health care while current lifestyle often leads to lower natality, resulting in a negative rate of natural increase and a decreasing proportion of young people in population in the future. This problem affects all spheres of life and social and economic development. Population ageing may pose a threat to the security of the population in different ways. The functioning of the security system may be threatened due to decreasing workforce. Population ageing may undercut resources for military budgets. Young recruits represent an important part of military forces and the latter are competing in the labour market with more attractive occupations. Especially ensuring the stability of the personnel needed for securing crisis situations would be a significant problem of near future. This paper presents a demographic perspective on staffing and correct operation of military forces in the context of population ageing. It describes the current situation of human resources in the military policy of the Czech Republic and determines the negative impact of population ageing on recruitment potential. It deals with the sustainability of human resources for security forces.

  9. Age structure of the population in Belgium and social security.

    Science.gov (United States)

    Dooghe, G

    1991-01-01

    The effects of demographic aging and of various socioeconomic factors on the social security system in Belgium are explored. "Special attention is given to the impact of the ageing of the population on the pension problem. Based on a simple formula a series of percentages of taxation have been calculated as a function of shifts in the proportion of retired vs. active population and in the proportion of the average income vs. the average amount of pension. One of the conclusions is that the progressive ageing of the population will become the most significant factor in the growth of social expenditures." excerpt

  10. Building an FTP guard

    Energy Technology Data Exchange (ETDEWEB)

    Sands, P.D.

    1998-08-01

    Classified designs usually include lesser classified (including unclassified) components. An engineer working on such a design needs access to the various sub-designs at lower classification levels. For simplicity, the problem is presented with only two levels: high and low. If the low-classification component designs are stored in the high network, they become inaccessible to persons working on a low network. In order to keep the networks separate, the component designs may be duplicated in all networks, resulting in a synchronization problem. Alternatively, they may be stored in the low network and brought into the high network when needed. The latter solution results in the use of sneaker-net (copying the files from the low system to a tape and carrying the tape to a high system) or a file transfer guard. This paper shows how an FTP Guard was constructed and implemented without degrading the security of the underlying B3 platform. The paper then shows how the guard can be extended to an FTP proxy server or an HTTP proxy server. The extension is accomplished by allowing the high-side user to select among items that already exist on the low-side. No high-side data can be directly compromised by the extension, but a mechanism must be developed to handle the low-bandwidth covert channel that would be introduced by the application.

  11. Exe-Guard Project

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Rhett [Schweitzer Engineering Lab., Inc., Pullman, WA (United States); Marshall, Tim [Dominion Virginia Power, Richmond, VA (United States); Chavez, Adrian [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Bratus, Sergey [Dartmouth College, Hanover, NH (United States)

    2016-01-30

    The exe-Guard Project is an alliance between Dominion Virginia Power (DVP), Sandia National Laboratories (SNL), Dartmouth University, and Schweitzer Engineering Laboratories (SEL). SEL is primary recipient on this project. The exe-Guard project was selected for award under DE-FOA-0000359 with CFDA number 81.122 to address Topic Area of Interest 4: Hardened platforms and Systems. The exe-Guard project developed an antivirus solution for control system embedded devices to prevent the execution of unauthorized code and maintain settings and configuration integrity. This project created a white list antivirus solution for control systems capable of running on embedded Linux® operating systems. White list antivirus methods allow only credible programs to run through the use of digital signatures and hash functions. Once a system’s secure state is baselined, white list antivirus software denies deviations from that state because of the installation of malicious code as this changes hash results. Black list antivirus software has been effective in traditional IT environments but has negative implications for control systems. Black list antivirus uses pattern matching and behavioral analysis to identify system threats while relying on regular updates to the signature file and recurrent system scanning. Black list antivirus is vulnerable to zero day exploits which have not yet been incorporated into a signature file update. System scans hamper the performance of high availability applications, as revealed in NIST special publication 1058 which summarizes the impact of blacklist antivirus on control systems: Manual or “on-demand” scanning has a major effect on control processes in that they take CPU time needed by the control process (Sometimes close to 100% of CPU time). Minimizing the antivirus software throttle setting will reduce but not eliminate this effect. Signature updates can also take up to 100% of CPU time, but for a much shorter period than a typical

  12. The old age security hypothesis and optimal population growth.

    Science.gov (United States)

    Bental, B

    1989-03-01

    The application of the Samuelson-Diamond overlapping generations framework to the old age security hypothesis indicates that government intervention schemes can influence the relationship between population growth and capital accumulation. The most direct means of optimizing population growth is through taxes or subsidies that relate to the intergenerational transfer of wealth. A pay-as-you-go social security scheme, in which payment is predicated on the number of children the receiver has and is financed by taxes levied on the working population, emerges as the most likely intervention to produce the optimal steady state equilibrium. This system is able to correct any distortions the private sector may build into it. In contrast, a child support system, in which the government subsidizes or taxes workers according to their family size, can guarantee the optimal capital:labor ratio but not the optimal population growth rate. Thus, if the government seeks to decrease the population growth rate, the appropriate intervention is to levy a lump-sum social-security tax on workers and transfer the revenues to the old; the direction should be reversed if the goal is to increase population growth. Another alternative, a lump sum social security system, can guarantee optimal population growth but not a desirable capital:labor ratio. Finally, the introduction of money as a valued commodity into an economy with a high capital:labor ratio will also serve to decrease the population growth rate and solve the intergenerational transfer problem through the private sector without any need for government intervention.

  13. U.S. Coast Guard (USCG) Districts

    Data.gov (United States)

    Department of Homeland Security — This layer is a polygonal dataset that represents land and maritime boundaries for each representative United States Coast Guard district, which includes district 1,...

  14. 46 CFR 108.223 - Guards on exposed equipment.

    Science.gov (United States)

    2010-10-01

    ... have hand covers, guards, or rails installed on all belts, gears, shafts, pulleys, sprockets, spindles... 46 Shipping 4 2010-10-01 2010-10-01 false Guards on exposed equipment. 108.223 Section 108.223 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN...

  15. National Guard > About the Guard > Today in Guard History

    Science.gov (United States)

    National Guard About Us By the Numbers Contact Us FAQ Federal Mission History Join Us Leaders Director of Program Training & Technology Battle Lab (T3BL) Civil Support Simulation Exercises Regional Training March Today in Guard History Leadership CNGB VCNGB SEA DANG DARNG Joint Staff J-1 J-2 J-3 J-4 J-5 J-6 J

  16. Under Age 65 Disability Diagnoses of Supplemental Security Income (SSI) Recipients by Census Area, December 2010

    Data.gov (United States)

    Social Security Administration — The Under Age 65 Disability Diagnoses of Supplemental Security Income (SSI) Recipients by Census Area (December 2010) is produced using the data found in Table 38...

  17. Supplemental Security Income (SSI) Recipients in each State by Sex and Age, December 2010

    Data.gov (United States)

    Social Security Administration — The Supplemental Security Income (SSI) Recipients in each State by Sex and Age (December 2010) is produced using the data found in Table 10 from the SSI Report of...

  18. Armed guards on vessels : insurance and liability

    Directory of Open Access Journals (Sweden)

    Mišo Mudrić

    2011-12-01

    Full Text Available The Paper examines the insurance and liability issues resulting from the use of armed guards on board vessels. The study begins with an overview of the available data on key economic fi gures representing the projected overall annual costs of modern piracy. The focus is then shifted to the issue of public versus private security, where possible dangers of private-based security options are discussed in general. After explaining why the Somalia region deserves a closer attention when compared to other pirate-infested waters, a brief summary of the international effort to combat piracy threat is presented, followed by a structured overview of the use of private maritime security options in the maritime sector in general. One security option is the use of armed guards on board vessels. This option is explored both from the political (the acceptance by stakeholders and legal standpoint (legal issues arising from the use of armed guards. An important remedy for the shipping companies/ operators threatened by the piracy hazard is the existence of affordable and effective (specialized marine insurance. A study of available piracy insurance policies is presented, followed by an analysis of case law and other legal issues arising from piracy attacks, which could prove important when considering the legal implications of armed guards employment. Finally, a simplifi ed economic analysis of available security options is presented, followed by the final assessment of benefi ts derived from the use of armed guards.

  19. Security scandals in the Age of Mediated War

    DEFF Research Database (Denmark)

    Ørsten, Mark; Lund, Anker Brink

    2012-01-01

    The writers look into the concept of the security scandal that according to Thompson (2000) is a special form of what defines as a power scandal. The power scandal concerns the disclosure of hidden and illegitimate power practices to the public. In this chapter they focus on three security scandals...... for the military and the political power holders, but also for the news media. Thus, it is not only the hidden practices of the military and the politicias that are axposed by the Danish security scandals, but also the hidden power practices of the news media....

  20. Arctic security in an age of climate change

    Energy Technology Data Exchange (ETDEWEB)

    Kraska, James (ed.)

    2013-03-01

    Publisher review: This book examines Arctic defense policy and military security from the perspective of all eight Arctic states. In light of climate change and melting ice in the Arctic Ocean, Canada, Russia, Denmark (Greenland), Norway and the United States, as well as Iceland, Sweden and Finland, are grappling with an emerging Arctic security paradigm. This volume brings together the world's most seasoned Arctic political-military experts from Europe and North America to analyze how Arctic nations are adapting their security postures to accommodate increased shipping, expanding naval presence, and energy and mineral development in the polar region. The book analyzes the ascent of Russia as the first 'Arctic superpower', the growing importance of polar security for NATO and the Nordic states, and the increasing role of Canada and the United States in the region.(Author)

  1. Guarded Type Promotion

    DEFF Research Database (Denmark)

    Winther, Johnni

    2011-01-01

    conditional using the instanceof operator and thus the cast type is redundantly mentioned twice. We propose a new typing rule for Java called Guarded Type Promotion aimed at eliminating the need for the explicit casts when guarded. This new typing rule is backward compatible and has been fully implemented...... in a Java 6 compiler. Through our extensive testing of real-life code we show that guarded casts account for approximately one fourth of all casts and that Guarded Type Promotion can eliminate the need for 95 percent of these guarded casts....

  2. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  3. Information Security in the Age of Cloud Computing

    Science.gov (United States)

    Sims, J. Eric

    2012-01-01

    Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…

  4. Rethinking Security in the Age of Uncertain Globalisation: NEPAD ...

    African Journals Online (AJOL)

    Globalisation can hardly be said to have caused Africa's contemporary predicaments. However, it is clear that it continues to exacerbate them by posing diverse challenges to local and global governance and security. This paper demonstrates how the New Partnership for Africa's Development (NEPAD), launched in 2003 to ...

  5. [Demographic aging and social security. The insufficiency of old age pensions].

    Science.gov (United States)

    Ham Chande, R

    1993-01-01

    The demographic transition is leading to demographic aging in Mexico, as lower fertility and greater life expectancy combine to produce absolute and percentage increases in the elderly population. Concern is growing about satisfying the material needs of the elderly population. Only a few developed countries are able to furnish adequate pensions to their retired workers through social security systems. In Mexico, class inequity is a greater determinant of the level of pension coverage than is generational solidarity. Mexico's 1990 census showed that the population of 81,250,000 was comprised of 24,517,000 economically active and 56,733,000 inactive persons. Of the 24,517,000 economically active, 7,282,000 mostly lower level employees and laborers were affiliated only with the Mexican Institute of Social Security (IMSS). 2,308,000 were covered by the IMSS and one of the complementary pension systems sponsored by the largest and most organized private companies. 2,629,000 were entitled to pensions through public sector employment and 584,000 through quasipublic employment. The remaining 11,571,000 had no rights to a pension. In other words, 47% of the labor force was not covered by any retirement pension system. 375,000 of the 5,007,000 persons over age 60 in the economically inactive population had some sort of pension from the IMSS. In 1990, 92% received the minimum pension, equivalent to 70% of the minimum salary. 229,000 had an IMSS pension and a complementary private pension. 196,000 pensioners in the public sector received an average pension of 1.5 times the minimum salary. 66,000 retired workers in quasipublic enterprises received pensions with automatic adjustments for inflation that frequently equaled 20 times the minimum salary. The total number of recipients of pensions of all types was 888,000,leaving 4,119,000 persons over 60 with no pension. Because of the deficiencies of the social security system, families must continue to be the institution that aids

  6. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    Science.gov (United States)

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  7. Yearly Data for Spoken Language Preferences of Supplemental Security Income Aged Applicants (2011-Onward)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for SSI Aged benefits from federal fiscal year 2011...

  8. Yearly Data for Asian & Pacific Islander Language Preferences of Supplemental Security Income Aged Applicants (2016 Onward)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for API language preferences at the national level of individuals filing claims for SSI Aged benefits from federal fiscal year...

  9. Quarterly Data for Spoken Language Preferences of Supplemental Security Income Aged Applicants (2014-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for SSI Aged benefits for fiscal years 2014 -...

  10. Coast Guard Compass

    Science.gov (United States)

    looks on as Adm. Charles Ray thanks Adm. Chuck Michel for his service as the 30th vice commandant of the commandant Adm. Charles W. Ray relieved Adm. Charles D. Michel as vice commandant of the U.S. Coast Guard by . Following graduation and commissioning as an officer in the Coast Guard, Wright will be heading to the

  11. Videos - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front 2:17 Always Ready, Always There National Guard Bureau Diversity and Inclusion Play Button 1:04 National Guard Bureau Diversity and Inclusion The ChalleNGe Ep.5 [Graduation] Play Button 3:51 The

  12. Guarded Cubical Type Theory

    DEFF Research Database (Denmark)

    Birkedal, Lars; Bizjak, Aleš; Clouston, Ranald

    2016-01-01

    This paper improves the treatment of equality in guarded dependent type theory (GDTT), by combining it with cubical type theory (CTT). GDTT is an extensional type theory with guarded recursive types, which are useful for building models of program logics, and for programming and reasoning...... with coinductive types. We wish to implement GDTT with decidable type-checking, while still supporting non-trivial equality proofs that reason about the extensions of guarded recursive constructions. CTT is a variation of Martin-L\\"of type theory in which the identity type is replaced by abstract paths between...... terms. CTT provides a computational interpretation of functional extensionality, is conjectured to have decidable type checking, and has an implemented type-checker. Our new type theory, called guarded cubical type theory, provides a computational interpretation of extensionality for guarded recursive...

  13. The old age health security in rural China: where to go?

    Science.gov (United States)

    Dai, Baozhen

    2015-11-04

    The huge number of rural elders and the deepening health problems (e.g. growing threats of infectious diseases and chronic diseases etc.) place enormous pressure on old age health security in rural China. This study aims to provide information for policy-makers to develop effective measures for promoting rural elders' health care service access by examining the current developments and challenges confronted by the old age health security in rural China. Search resources are electronic databases, web pages of the National Bureau of Statistics of China and the National Health and Family Planning Commission of China on the internet, China Population and Employment Statistics Yearbook, China Civil Affairs' Statistical Yearbook and China Health Statistics Yearbooks etc. Articles were identified from Elsevier, Wiley, EBSCO, EMBASE, PubMed, SCI Expanded, ProQuest, and National Knowledge Infrastructure of China (CNKI) which is the most informative database in Chinese. Search terms were "rural", "China", "health security", "cooperative medical scheme", "social medical assistance", "medical insurance" or "community based medical insurance", "old", or "elder", "elderly", or "aged", "aging". Google scholar was searched with the same combination of keywords. The results showed that old age health security in rural China had expanded to all rural elders and substantially improved health care service utilization among rural elders. Increasing chronic disease prevalence rates, pressing public health issues, inefficient rural health care service provision system and lack of sufficient financing challenged the old age health security in rural China. Increasing funds from the central and regional governments for old age health security in rural China will contribute to reducing urban-rural disparities in provision of old age health security and increasing health equity among rural elders between different regions. Meanwhile, initiating provider payment reform may contribute to

  14. Guarded Cubical Type Theory

    DEFF Research Database (Denmark)

    Birkedal, Lars; Bizjak, Aleš; Clouston, Ranald

    2016-01-01

    This paper improves the treatment of equality in guarded dependent type theory (GDTT), by combining it with cubical type theory (CTT). GDTT is an extensional type theory with guarded recursive types, which are useful for building models of program logics, and for programming and reasoning...... with coinductive types. We wish to implement GDTT with decidable type checking, while still supporting non-trivial equality proofs that reason about the extensions of guarded recursive constructions. CTT is a variation of Martin-L\\"of type theory in which the identity type is replaced by abstract paths between...... terms. CTT provides a computational interpretation of functional extensionality, enjoys canonicity for the natural numbers type, and is conjectured to support decidable type-checking. Our new type theory, guarded cubical type theory (GCTT), provides a computational interpretation of extensionality...

  15. Issues related to choosing a guard force structure

    International Nuclear Information System (INIS)

    Averbach, C.; Cusack, J.; Green, L.; Higinbotham, W.; Indusi, J.; Marcuse, W.; Weinstock, E.

    1975-01-01

    The establishment of a federal security force has been suggested as an additional step to protect nuclear material. The force would be given the responsibility for guarding nuclear facilities and shipments of nuclear materials. A study to identify the issues that are relevant to choosing between the private guard forces that are presently employed by industry or a guard force under federal authority is summarized. To examine the issues which would be relevant, three possible types of security force structures were selected for comparison: a federal force under central authority, a private guard force employed by or under contract to a facility, and a private arrangement to employ local police officers similar to the arrangement for armed guards at airports. The issues were divided into seven categories: (1) legal considerations, (2) liability, (3) staffing and operations, (4) costs, (5) relationship to off-site forces, (6) management and control, and (7) transportation. (U.S.)

  16. Issues related to choosing a guard force structure

    International Nuclear Information System (INIS)

    Auerback, C.; Cusack, J.; Green, L.; Higinbotham, W.; Indusi, J.; Marcuse, W.; Weinstock, E.

    1975-01-01

    The establishment of a federal security force has been suggested as an additional step to protect nuclear material. The force would be given the responsibility for guarding nuclear facilities and shipments of nuclear materials. This paper summarizes a study to identify the issues that are relevant to choosing between the private guard forces that are presently employed by industry or a guard force under federal authority. To examine the issues which would be relevant, three possible types of security force structures were selected for comparison: a federal force under central authority, a private guard force employed by or under contract to a facility, and a private arrangement to employ local police officers similar to the arrangement for armed guards at airports. The issues were divided into seven categories: (1) Legal Considerations, (2) Liability, (3) Staffing and Operations, (4) Costs, (5) Relationship to Off-site Forces, (6) Management and Control, (7) Transportation

  17. 78 FR 55214 - Annual Marine Events in the Eighth Coast Guard District, Sabine River; Orange, TX

    Science.gov (United States)

    2013-09-10

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 100 [Docket No. USCG-2013-0723] Annual Marine Events in the Eighth Coast Guard District, Sabine River; Orange, TX AGENCY: Coast Guard, DHS... Neches River in Orange, TX from 3 p.m. on September 20, 2013, through 6 p.m. on September 22, 2013. This...

  18. 77 FR 47519 - Annual Marine Events in the Eighth Coast Guard District, Sabine River; Orange, TX

    Science.gov (United States)

    2012-08-09

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 100 [Docket No. USCG-2012-0656] Annual Marine Events in the Eighth Coast Guard District, Sabine River; Orange, TX AGENCY: Coast Guard, DHS... Regulations for the S.P.O.R.T. Power Boat Neches River in Orange, TX from 3 p.m. on September 21, 2012...

  19. 49 CFR 1520.15 - SSI disclosed by TSA or the Coast Guard.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false SSI disclosed by TSA or the Coast Guard. 1520.15... PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.15 SSI disclosed by TSA or the Coast Guard. (a) In... available for public inspection or copying, nor does TSA or the Coast Guard release such records to persons...

  20. Meeting the Organizational Needs of the National Guard as Part of Transformation to the Future Force

    National Research Council Canada - National Science Library

    Wong, Martha

    2005-01-01

    .... They must build and maintain U.S. defenses beyond challenge. As part of the total military force and to comply with the National Security Strategy, the National Guard also must transform from the Guard of the past to the Guard of the future...

  1. Volume 2. Information Age Anthology: National Security Implications of the Information Age

    Science.gov (United States)

    2000-08-01

    minimal standards of security may become a precondition for Federal regulatory approval (e.g., phone system or power-generation franchises often...technologies suggests that it fundamentally misunderstood them. Information technology especially rewards innovation and entrepreneurship (the proverbial two... entrepreneurship , science, and openness—qualities that are not about to atrophy if the government fails to take charge. Indeed, state-led competition in

  2. National Security in the Nuclear Age. A Proposed Booklist and Public Education Ideas for Libraries.

    Science.gov (United States)

    Dane, Ernest B.

    A bibliography on national security in the nuclear age is divided into three sections. The first section describes a proposal calling for the compilation of a balanced and up-to-date collection of books and other materials on this issue to be included in all U.S. public libraries. Also discussed are selection criteria for the book list, project…

  3. Social Security Reform and Population Ageing in a Two-Sector Growth Model

    NARCIS (Netherlands)

    van Groezen, B.J.A.M.; Meijdam, A.C.; Verbon, H.A.A.

    2002-01-01

    This paper analyses the effects of reducing unfunded social security and population ageing on economic growth and welfare, both for a small open economy and for a closed economy.The economy consists of a service sector and a commodity sector.Productivity growth only occurs in the latter sector and

  4. Social security reform and population ageing in a two-sector growth model

    NARCIS (Netherlands)

    Groezen, Bas van; Meijdam, L.; Verbon, H.

    2002-01-01

    This paper analyses the e¤ects of reducing unfunded social security and population ageing on economic growth and welfare, both for a small open economy and for a closed economy. The economy consists of a service sector and a commodity sector. Productivity growth only occurs in the latter sector

  5. The impact of population ageing on the social security expenditure and economic growth in Japan.

    Science.gov (United States)

    Maruo, N

    1987-05-01

    The author considers the impact of demographic aging in Japan on the social security system and on economic growth. It is argued that "First of all, as the cost of social security (including social services) increases remarkably at the earlier stage of ageing, the disposable (after tax) income and private consumption of the present labour force generation tend to increase at a lower growth rate than that of the GNP....Secondly if pension systems are based on terminal funding schemes, the ageing of the population increases savings (net increase of the amount of the pension funds) at the earlier stage of the ageing of the population. Thirdly, there is a time lag between the increase of social security benefits and the decrease in the personal savings ratio. The high ratio of savings and the shortage of aggregate demand as well as the high pressure for export in...recent Japan can partly be attributed to the above factors." Possible future economic scenarios as demographic ageing in Japan proceeds are described, and policies to avert anticipated problems are outlined. (SUMMARY IN JPN) excerpt

  6. Occupational stress in professionals of public security: a study with military agents of the Republican National Guard / Stress ocupacional em profissionais de segurança pública: um estudo com militares da Guarda Nacional Republicana

    Directory of Open Access Journals (Sweden)

    Jorge M. P. Afonso

    2009-01-01

    Full Text Available This work analyzes occupational stress in 95 Portuguese military agents of the Republican National Guard. We applied an evaluation protocol with measures of global stress, burnout, proactive coping, organizational commitment, satisfaction with life, and professional satisfaction/accomplishment. The fidelity and validity results of the instruments were very acceptable. The results of burnout pointed out a remarkable level of emotional exhaustion (12% followed by cynicism (10% and low professional effectiveness (8% (but we have not found any participant with burnout values in the three dimensions simultaneously, and different variables were observed in the prediction of those three areas. The discriminant analysis among subgroups allowed us to verify two main aspects: (a lower levels of organizational commitment and more use of proactive coping in younger and/or inexperienced military agents and (b higher desire to leave the job/profession and cynicism in older and/or more experienced professionals. At the end, the authors discuss the importance of future research to analyze the effects of a higher tendency to use cynicism as their age increase and the consequences of a lower organizational commitment in terms of professional efficacy of the younger agents.

  7. Irrational Guards are Sometimes Needed

    DEFF Research Database (Denmark)

    Abrahamsen, Mikkel; Adamaszek, Anna; Miltzow, Tillmann

    2017-01-01

    In this paper we study the art gallery problem, which is one of the fundamental problems in computational geometry. The objective is to place a minimum number of guards inside a simple polygon so that the guards together can see the whole polygon. We say that a guard at position x sees a point y...... if the line segment xy is contained in the polygon. Despite an extensive study of the art gallery problem, it remained an open question whether there are polygons given by integer coordinates that require guard positions with irrational coordinates in any optimal solution. We give a positive answer...... to this question by constructing a monotone polygon with integer coordinates that can be guarded by three guards only when we allow to place the guards at points with irrational coordinates. Otherwise, four guards are needed. By extending this example, we show that for every n, there is a polygon which can...

  8. Relating Operational Art to the National Guard State Partnership Program

    Science.gov (United States)

    2014-05-15

    Program Coordinator GEF Global Employment of the Force DSCA Defense Support of Civil Authorities BCA Budget Control Act NATO North Atlantic Treaty...between Florida and the U.S. Virgin Islands are referred to as the Regional Security System (RSS). Florida and the U.S. Virgin Islands partner with... Atlantic Treaty Organization (NATO) in 2004 due, in part, to the mentorship from the Maryland National Guard.54 Not only did the Maryland National Guard

  9. Volunteers in the Danish Home Guard 2011

    DEFF Research Database (Denmark)

    Fridberg, Torben; Damgaard, Malene

    voluntary work than the population as a whole. The report also shows that one in three active members of the Home Guard would like to be deployed on international operations to support the armed forces. The young members are especially willing – and these members have increased in recent years. This report......This report describes the composition of the Home Guard’s volunteer members and their attitudes to and expectations for the Home Guard. A similar survey was carried out in 2007, and the present report therefore also examines the trends from 2007 to 2011. Among other things, the report shows...... that the voluntary members are a stable resource, as on average they have been members of the Home Guard for more than 24 years. There is a clear majority of men aged 25-50. Relatively many have vocational training, and many are employed in the private sector. Members are also relatively more active in other...

  10. 76 FR 70350 - West Oahu Offshore Security Zone

    Science.gov (United States)

    2011-11-14

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1048] RIN 1625-AA87 West Oahu Offshore Security Zone AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone on the navigable waters of Oahu's western...

  11. 33 CFR 103.310 - Responsibilities of the Area Maritime Security (AMS) Committee.

    Science.gov (United States)

    2010-07-01

    ... disseminating appropriate security information to port stakeholders. ... Maritime Security (AMS) Committee. 103.310 Section 103.310 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  12. 46 CFR 159.007-7 - Application for acceptance for production inspections and tests: Coast Guard action.

    Science.gov (United States)

    2010-10-01

    ... and tests: Coast Guard action. 159.007-7 Section 159.007-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL APPROVAL....007-7 Application for acceptance for production inspections and tests: Coast Guard action. (a) From...

  13. Healthcare information privacy and security regulatory compliance and data security in the age of electronic health records

    CERN Document Server

    Robichau, Bernard Peter

    2014-01-01

    Healthcare is a huge market--20% of yearly GDP in the U.S. It employs tens of thousands of computer programmers and IT administrators Regulations mandate electronic health records by 2015 (for anyone dealing with Medicare/Medicaid), which means new concerns for privacy and security Many medical organizations lagging, putting them at risk for government fines and private lawsuits when a breach in security occurs. Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge.

  14. Yearly Data for Spoken Language Preferences of Supplemental Security Income Aged Applicants (FY 2016, including 53rd week)

    Data.gov (United States)

    Social Security Administration — This dataset provides annual volume of SSI Aged initial claims at the national level from federal fiscal year 2016 shown two ways—we base one on a 52-week reporting...

  15. Quarterly Data for Asian & Pacific Islander Languages, Supplemental Security Income Initial Claims (Aged) (FY 2016, including 53rd week)

    Data.gov (United States)

    Social Security Administration — This dataset provides quarterly volumes of SSI Aged initial claims at the national level from federal fiscal year 2016 with quarter 4 shown two ways—we base one on a...

  16. [Disembedding and remoralization. Old age security and intergenerational relations in globalized welfare capitalism].

    Science.gov (United States)

    Leisering, L

    2002-08-01

    The article reconstructs the changes in provision for old age since the 19th century with regard to the ensuing change in intergenerational relationships. The first finding is a broadening of the arenas of provision for old age, a historical cumulation of family (which is still relevant), welfare state and, increasingly, private provision in financial markets, adding up to a 'welfare mix' in old age. This implies a complexification of intergenerational relationships. The second finding is an ambivalent qualitative change: on the one hand relationships between generations become more anonymous and disembedded from primary social relationships; on the other hand they are politicized (they become a public issue) and remoralized. This ambivalence applies to bureaucratic provision for old age in the welfare state, i.e., to social insurance. The main thesis is that--contrary to neoliberal belief--private old-age security in global financial markets cannot be seen as individualistic and moral-free but constitutes an anonymous exchange relationship between generations on financial markets that also raises issues of intergenerational justice. We can expect that these abstract relationships between generations will be politicized and remoralized as a consequence. Welfare state and financial markets offer solutions to problems of previous forms of provision for old age but they also produce new problems of intergenerational relationships.

  17. Social Security Rulings on Federal Old-Age, Survivors, Disability, Health Insurance, Supplemental Security Income, and Black Lung Benefits. Cumulative Bulletin 1976.

    Science.gov (United States)

    Social Security Administration (DHEW), Washington, DC.

    The purpose of this publication is to make available to the public official rulings relating to the Federal old-age, survivors, disability, health insurance, supplemental security income, and miners' benefit programs. The rulings contain precedential case decisions, statements of policy and interpretations of the law and regulations. Included is a…

  18. Social Security for China’s Migrant Workers – Providing for Old Age

    Directory of Open Access Journals (Sweden)

    Andrew Watson

    2009-01-01

    Full Text Available The concept of “migrant workers” derives from the household registration system of China’s planned economy period. The continued existence of that system conflicts with the development of an integrated labour market. The current social security system, based on household registration and a large number of local pools, discriminates against migrant workers because of their mobility and the lack of mechanisms to transfer benefits between pools. As a result, migrants have made major contributions to China’s economic development but do not get the same benefits as urban residents. Faced with this challenge, China’s government has begun to introduce policy reforms to improve social security for migrants. This article explores this development through a focus on old-age insurance. It analyses the special needs of migrants, the obstacles facing policy development and the proposed solutions. It argues that social justice and social equity require the development of a system that treats all citizens equally, and that the logic of an integrated labour market will ultimately require a unified national system of old-age insurance.

  19. Fact Sheets - The National Guard

    Science.gov (United States)

    National Guard About Us By the Numbers Contact Us FAQ Federal Mission History Join Us Leaders Director of March Today in Guard History Leadership CNGB VCNGB SEA DANG DARNG Joint Staff J-1 J-2 J-3 J-4 J-5 J-6 J Marshal Office of the Joint Surgeon PARC Small Business Programs Chaplain Diversity NGB-GOMO Resources

  20. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  1. Truck side guard specifications : recommended standard

    Science.gov (United States)

    2016-09-01

    This document is intended to be used by (1) public or private medium/heavy-duty truck fleets considering adding side guards; (2) jurisdictions or customers that require side guards through policy or procurement; (3) manufacturers of side guards; and ...

  2. Stress ocupacional em profissionais de segurança pública: um estudo com militares da Guarda Nacional Republicana Occupational stress in professionals of public security: a study with military agents of the Republican National Guard

    Directory of Open Access Journals (Sweden)

    Jorge M. P. Afonso

    2009-01-01

    Full Text Available Este trabalho analisa o "stress" ocupacional em 95 militares da Guarda Nacional Republicana Portuguesa. Para tal, utilizámos um protocolo de avaliação com medidas do "stress" global, "burnout", "coping" proactivo, comprometimento organizacional, satisfação com a vida e satisfação/realização profissional. Os indicadores de fidelidade e validade dos instrumentos foram muito aceitáveis. Os resultados de "burnout" por dimensão apontaram níveis apreciáveis de exaustão emocional (12%, seguidos do cinismo (10% e da baixa eficácia profissional (8% (mas nenhum participante registou valores de "burnout" nas três dimensões, em simultâneo, observando-se também variáveis distintas na predição destas três áreas. A análise discriminante entre subgrupos da amostra permitiu verificar dois aspectos principais: (a menores níveis de comprometimento organizacional e maior utilização de "coping" proactivo nos militares mais novos e/ou inexperientes e (b maior desejo de abandonar o emprego/trabalho bem como maior cinismo parecem identificar os profissionais mais velhos e/ou mais experientes. No final, os autores discutem a importância de a investigação futura analisar os efeitos da maior tendência para o cinismo com o aumento da idade dos participantes e os efeitos do menor comprometimento organizacional por parte dos mais novos em termos da sua eficácia profissional.This work analyzes occupational stress in 95 Portuguese military agents of the Republican National Guard. We applied an evaluation protocol with measures of global stress, burnout, proactive coping, organizational commitment, satisfaction with life, and professional satisfaction/accomplishment. The fidelity and validity results of the instruments were very acceptable. The results of burnout pointed out a remarkable level of emotional exhaustion (12% followed by cynicism (10% and low professional effectiveness (8% (but we have not found any participant with burnout values

  3. 76 FR 35169 - Validation of Merchant Mariners' Vital Information and Issuance of Coast Guard Merchant Mariner's...

    Science.gov (United States)

    2011-06-16

    ... locations around the nation before publication of the interim rule. Given the urgency at the time, the Coast... rule because new security requirements make sense in today's world. The Coast Guard thanks the...

  4. U.S. Coast Guard (USCG) Maritime Differential GPS (DGPS) Locations

    Data.gov (United States)

    Department of Homeland Security — NAVCEN operates the Coast Guard Maritime Differential GPS (DGPS) Service and the developing Nationwide DGPS Service (NDGPS), consisting of two control centers and 86...

  5. The Coast Guard’s Critical Role as an Armed Service

    Science.gov (United States)

    2012-03-22

    security authorities. Although the Revenue Cutter Service under the Department of the Treasury was primarily responsible for the enforcement of taxation ...maritime exercises with Brunei, Thailand, Indonesia, Singapore, and Malaysia .15 Coast Guard cutters and Law Enforcement Detachments (LEDETs

  6. 77 FR 51817 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-08-27

    ... the information sharing efforts of the Coast Guard and DHS. (2) Cyber-Security. The Committee will... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0797] National Maritime Security Advisory...: The National Maritime Security Advisory Committee (NMSAC) will meet on September 11-12, 2012 in the...

  7. Security for the digital information age of medicine: Issues, applications, and implementation

    OpenAIRE

    Epstein, Michael A.; Pasieka, Michael S.; Lord, William P.; Mankovich, Nicholas J.

    1997-01-01

    Privacy and integrity of medical records is expected by patients. This privacy and integrity is often mandated by regulations. Traditionally, the security of medical records has been based on physical lock and key. As the storage of patient record information shifts from paper to digital, we find new security concerns. Digital cryptographic methods provide solutions to many of these new concerns. In this paper we discuss the new security concerns, new legislation mandating secure medical reco...

  8. Locus Guard Pilot

    Science.gov (United States)

    Chandrashekar, Varsha; B, Prabadevi

    2017-11-01

    Providing services to user is the main functionality of every search engine. Recently services based on users’ current location has also been enabled with the help of GPS in every smartphone. But how safe are their searches and how trustworthy is the search engine. Why are users tracked even when they turn off the tracking. Where lies the solution. Unless there is a security system to prevent ad trackers from misusing user’ s location, any application which relies on user’ s location will be of no use. We know that location information is highly sensitive personal data. Knowing where a person was at a particular time, one can infer his/her personal activities, political views, health status, and launch unsolicited advertising, physical attacks or harassment. Therefore, mechanisms to preserve users' privacy and anonymity are mandatory in any application that involves users’ location. So there comes the need to hide the location of the users. This proposed application aims to implement some of the features required for preserving users’ privacy and also a secure user login so that services provided to users can be used by them without danger of their searches being misused.

  9. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  10. How We Began - About the Guard - The National Guard

    Science.gov (United States)

    Marshal Office of the Joint Surgeon PARC Small Business Programs Chaplain Diversity NGB-GOMO Resources Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front the organization date of the oldest Army National Guard units is based in law. The Militia Act of May

  11. Chief, National Guard Bureau - Leadership - The National Guard

    Science.gov (United States)

    the ARNG Deputy Director of the ARNG Chief of Staff of the ARNG Command Chief Warrant Officer of the the ANG Chief of Staff of the ARNG CCW Officer of the ARNG CSM of the ARNG Bottom Links National Guard Civic Leader's Guide ARNG Vision 2020 Posture Statement Strategic Direction CNGB ARNG Financial Report

  12. Security of electronic mental health communication and record-keeping in the digital age.

    Science.gov (United States)

    Elhai, Jon D; Frueh, B Christopher

    2016-02-01

    The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others. © Copyright 2015 Physicians Postgraduate Press, Inc.

  13. Maritime Cyber Security University Research

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-06-16 Maritime Cyber Security...Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security University

  14. Triangulating and guarding realistic polygons

    NARCIS (Netherlands)

    Aloupis, G.; Bose, P.; Dujmovic, V.; Gray, C.M.; Langerman, S.; Speckmann, B.

    2008-01-01

    We propose a new model of realistic input: k-guardable objects. An object is k-guardable if its boundary can be seen by k guards in the interior of the object. In this abstract, we describe a simple algorithm for triangulating k-guardable polygons. Our algorithm, which is easily implementable, takes

  15. Triangulating and guarding realistic polygons

    NARCIS (Netherlands)

    Aloupis, G.; Bose, P.; Dujmovic, V.; Gray, C.M.; Langerman, S.; Speckmann, B.

    2014-01-01

    We propose a new model of realistic input: k-guardable objects. An object is k-guardable if its boundary can be seen by k guards. We show that k-guardable polygons generalize two previously identified classes of realistic input. Following this, we give two simple algorithms for triangulating

  16. Household food (in)security and nutritional status of urban poor children aged 6 to 23 months in Kenya.

    Science.gov (United States)

    Mutisya, Maurice; Kandala, Ngianga-Bakwin; Ngware, Moses Waithanji; Kabiru, Caroline W

    2015-10-13

    Millions of people in low and low middle income countries suffer from extreme hunger and malnutrition. Research on the effect of food insecurity on child nutrition is concentrated in high income settings and has produced mixed results. Moreover, the existing evidence on food security and nutrition in children in low and middle income countries is either cross-sectional and/or is based primarily on rural populations. In this paper, we examine the effect of household food security status and its interaction with household wealth status on stunting among children aged between 6 and 23 months in resource-poor urban setting in Kenya. We use longitudinal data collected between 2006 and 2012 from two informal settlements in Nairobi, Kenya. Mothers and their new-borns were recruited into the study at birth and followed prospectively. The analytical sample comprised 6858 children from 6552 households. Household food security was measured as a latent variable derived from a set of questions capturing the main domains of access, availability and affordability. A composite measure of wealth was calculated using asset ownership and amenities. Nutritional status was measured using Height-for-Age (HFA) z-scores. Children whose HFA z-scores were below -2 standard deviation were categorized as stunted. We used Cox regression to analyse the data. The prevalence of stunting was 49 %. The risk of stunting increased by 12 % among children from food insecure households. When the joint effect of food security and wealth status was assessed, the risk of stunting increased significantly by 19 and 22 % among children from moderately food insecure and severely food insecure households and ranked in the middle poor wealth status. Among the poorest and least poor households, food security was not statistically associated with stunting. Our results shed light on the joint effect of food security and wealth status on stunting. Study findings underscore the need for social protection policies to

  17. 33 CFR 165.1407 - Security Zones; Oahu, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Oahu, HI. 165.1407 Section 165.1407 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1407 Security Zones; Oahu, HI...

  18. Imperfect Annuity Markets, Unintended Bequests, and the Optimal Age Structure of Social Security Benefits

    OpenAIRE

    Martin Feldstein

    1989-01-01

    The social security program now provides a constant real benefit throughout each retirees lifetime. This paper examines whether total welfare would rise if benefits were lower in early retirement years (when most individuals have some saving with which to finance consumption) and higher in later years (when the uncertainty of survival and the absence of actuarially fair private annuities makes the availability of social security benefits more important.) The analysis shows that there is a pot...

  19. The Defense Message System and the U.S. Coast Guard

    Science.gov (United States)

    1992-06-01

    these mail services, the Internet also provides a File Transfer Protocol (FTP) and remote login between host computers (TELNET) capabilities. 17 [Ref...the Joint Maritime Intelligence Element (JMIE), Zincdust, and Emerald . [Ref. 27] 4. Secure Data Network The Coast Guard’s Secure Data Network (SDN

  20. 76 FR 3014 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA

    Science.gov (United States)

    2011-01-19

    ... Coast Guard will enforce the Blair Waterway security zone in Commencement Bay, WA for protection of... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0015] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA AGENCY: Coast Guard, DHS...

  1. Response capabilities of the National Guard: a focus on domestic disaster medical response.

    Science.gov (United States)

    Bochicchio, Daniel

    2010-01-01

    The National Guard has a 373-year history of responding to the nation's call to duty for service both at home and abroad (The National Guard Bureau Web site: Available at http://www.ngb.army.mil/default. aspx.). The National Guard (NG) is a constitutionally unique organization (United States Constitution, US Government Printing Office Web site: Available at http://www.gpoaccess.gov/constitution/index.html.). Today's Guard conducts domestic disaster response and civilian assistance missions on a daily basis. Yet, the NG's role, mission, and capabilities are not well-known or understood. The National Response Framework (NRF) places significant responsibility on the local and state disaster planners (Department of Homeland Security: National Response Framework. US Department of Homeland Security, Washington, DC, January 2008). The public health professionals are an integral component of the disaster planning community. It is critical that the public health community be knowledgeable of types and capabilities of all the response assets at their disposal.

  2. Why Does Population Aging Matter So Much for Asia? Population Aging, Economic Growth, and Economic Security in Asia

    OpenAIRE

    Lee, Sang-Hyop; Mason, Andrew; Park, Donghyun

    2011-01-01

    Asia as a whole is experiencing a rapid demographic transition toward older populations, though different countries are at different stages of this region- wide trend. We document Asia's aging population, describe the region's old-age support systems, and highlight the regional socioeconomic implications of the transition for those support systems. Aging populations present two fundamental challenges to Asian policymakers: (1) developing socioeconomic systems that can provide economic securit...

  3. Approximation algorithms for guarding holey polygons ...

    African Journals Online (AJOL)

    Guarding edges of polygons is a version of art gallery problem.The goal is finding the minimum number of guards to cover the edges of a polygon. This problem is NP-hard, and to our knowledge there are approximation algorithms just for simple polygons. In this paper we present two approximation algorithms for guarding ...

  4. Directory - Social Media - The National Guard

    Science.gov (United States)

    Brigade 1st Battalion, 145th Armored Regiment Headquarters and Headquarters Company, 1st Battalion, 145th Florida Air National Guard Florida Guard History Camp Blanding Joint Training Center Wolfpack Company, 1st Force Georgia National Guard Joint Force Headquarters 116th Air Control Wing Flickr Georgia National

  5. Privacy and security in the digital age: Contemporary ethical challenges and future directions

    DEFF Research Database (Denmark)

    Hiranandani, Vanmala Sunder

    2011-01-01

    Privacy is at the core of civil rights from which all other human rights and freedoms flow. Since the twentieth century, and particularly since 9/11, rapid deployment of information and surveillance technologies in the name of national security has grave implications for individual privacy...... and human rights. This article reviews major strands in contemporary privacy-security debate, while critiquing existing conceptualisations of privacy that are inadequate in the context of multifaceted and ubiquitous surveillance technologies post 9/11. Further, this paper contends most privacy...

  6. Realigning Coast Guard Enhanced Maritime Capabilities: A Lesson Learned from the U.S. Special Operations Command

    National Research Council Canada - National Science Library

    Poulin, Steven D

    2005-01-01

    .... The Coast Guard faces major challenges in executing its responsibilities and must leverage the capabilities of its specially trained boarding teams, small boat security forces, and hazardous materials response teams...

  7. 33 CFR 127.705 - Security systems.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...

  8. Space Power: A Theory for Sustaining US Security Through the Information Age

    Science.gov (United States)

    2011-05-19

    between our national security, our national competitiveness, resilience, and moral example. And it reaffirms America’s commitment to pursue our... relativism respectively on the rise and fall of great powers. Their research provides guiding principles which allow nations operating within Vesna

  9. An audit of a specialist old age psychiatry liaison service to a medium and a high secure forensic psychiatry unit.

    Science.gov (United States)

    Shah, Ajit

    2006-04-01

    The elderly prison population is increasing and there is a significant amount of unidentified psychiatric morbidity among elderly prisoners. A sizeable number of elderly subjects are referred to regional forensic units. These units are able to provide advice but are reluctant to admit frail, physically ill and vulnerable elderly into their unit because the ward environment is considered inappropriate for them. A sizeable number of inpatients in medium and high secure units are elderly. This paper is an exploratory audit of referrals from a medium and high secure forensic psychiatry unit to a specialist consultation-only liaison old age psychiatry service, which was specifically developed to service the forensic unit. The demographic and clinical characteristics of the patients seen by this specialist service were similar to elderly inpatients in medium and high secure units. All referrals were judged to be appropriate and new management advice was provided in all cases. Main reasons for referral included diagnostic advice, placement advice and treatment advice. Establishing a diagnosis of dementia was considered important because Alzheimer's disease and Lewy body dementia can be treated with cholinesterase inhibitors. Placement advice was the most difficult to provide because of paucity of residential and nursing homes able and willing to accept patients with a forensic history. There is a need for a comprehensive model of specialist forensic old age psychiatry service at a regional or supraregional level. A consensus needs to be reached on the exact configuration of such a service.

  10. Implementing New-age Authentication Techniques using OpenID for Security Automation

    OpenAIRE

    Dharmendra Choukse; Umesh Kumar Singh; Deepak Sukheja; Rekha Shahapurkar

    2010-01-01

    Security of any software can be enhanced manifolds if multiple factors for authorization and authentication are used .The main aim of this work was to design and implement an Academy Automation Software for IPS Academy which uses OpenID and Windows CardSpace as Authentication Techniques in addition to Role Based Authentication (RBA) System to ensure that only authentic users can access the predefined roles as per their Authorization level. The Automation covers different computing hardware an...

  11. Dreams that do not come true: Re-addressing social security to expand old-age social protection : The case of informal workers in El Salvador

    NARCIS (Netherlands)

    N.E.A. Joya (Nancy)

    2007-01-01

    textabstractThis paper focuses on old-age income security, with the objective to explore obstacles and opportunities to expand social protection for informal workers in El Salvador. It first introduces the main concepts and debates on social security, social protection, coverage and informality, to

  12. 33 CFR 104.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 104.145 Section 104.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.145 Maritime Security (MARSEC...

  13. 33 CFR 105.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 105.145 Section 105.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES General § 105.145 Maritime Security (MARSEC...

  14. Line Heat-Source Guarded Hot Plate

    Data.gov (United States)

    Federal Laboratory Consortium — Description:The 1-meter guarded hot-plate apparatus measures thermal conductivity of building insulation. This facility provides for absolute measurement of thermal...

  15. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-01-31

    ... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry... security, including border protection, civil defense capabilities, and coast guard and maritime...

  16. Security Force Assistance: Building Foreign Security Forces and Joint Doctrine for the Future of U.S. Regional Security

    National Research Council Canada - National Science Library

    Sullivan, Michael D

    2008-01-01

    .... From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S...

  17. National Security in the Nuclear Age. A Conference for State Social Studies Coordinators on Pre-Collegiate National Security Education (Washington, DC, June 26-July 1, 1983).

    Science.gov (United States)

    Trout, B. Thomas; And Others

    This conference report addresses education on national security and international relations in secondary school courses in the social studies. Main conclusions of the conference are: (1) Topics on national security should be added to the secondary school curriculum. (2) Current institutional and instructional settings are open to inclusion of…

  18. Scientific Integrity and Executive National Security Proclamations: A Conflict of the Modern Age

    Science.gov (United States)

    Nelson, R.; Banerdt, B.; Bell, J. L.; Byrnes, D. V.; Carlisle, G. L.; D'Addario, L. R.; Weissman, P. R.; Eisenhardt, P. R.; Foster, S. D.; Golombek, M. P.; Gorjian, V.; Gorjian, Z.; Hale, A. S.; Kulleck, J. G.; Laubach, S. L.; McElrath, T. P.; Penanen, K. I.; Satter, C.; Walker, W. J.

    2010-12-01

    In 2004, in response to the events of September, 11, 2001, President George W. Bush issued Homeland Security Presidential Directive #12, an executive order requiring a uniform means of identification (i.e. identification badge) for all employees and contractors at federal facilities. To comply with this directive NASA ordered that its contract employees at the Jet Propulsion Laboratory 'voluntarily' agree to an open ended, unrestricted, background investigation into the intimate details of their private lives. These employees do not have security clearances and do not work with classified material. Caltech, which employs the JPL personnel under a NASA management contract, informed the employees that if they did not ‘voluntarily’ consent to the background investigation, they would be assumed to have voluntarily resigned and therefore be denied access to JPL (i.e. they would be functionally terminated). In October 2007, twentyeight JPL employees filed suit in Federal District Court. After an initial dismissal by the lowest federal court, the Ninth Circuit Court of Appeals issued an injunction against Caltech and NASA, stopping the background investigations. The Appeals Court found that the investigations were not narrowly tailored to meet the specific needs of NASA and therefore violated the employee’s legitimate expectation of informational privacy. This injunction has been reviewed and upheld several times by various panels of the Ninth Circuit Court of Appeals. In November 2009, the United States Department of Justice petitioned the U.S. Supreme Court requesting that it overturn this injunction. The Supreme Court accepted the case for oral arguments and scheduled them for October 5, 2010. A decision is imminent (if it has not been made already). The case has opened the following questions regarding all research workers under government contract: 1. What impact would such intrusive investigations have on open scientific inquiry and scientific integrity? 2

  19. 46 CFR 10.214 - Security Check.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...

  20. Volunteers in the Danish Home Guard 2016

    DEFF Research Database (Denmark)

    Fridberg, Torben; Larsen, Mona

    This report maps the composition of a group of volunteer members of the Home Guard, as well as their opinions and expectations of the Home Guard and their own voluntary efforts. The report is a follow-up to two previous surveys completed in 2007 and 2011 and it therefore also highlights changes...... from 2007 to 2011 and 2016. Based on a questionnaire survey, the report paints a picture of who the volunteers are, what motivates them and how they perceive their surrounding environment’s view of them as members of the Home Guard. The report also focuses on the volunteers’ view of the Home Guard......’s tasks and activities both in Denmark and abroad. Finally, the report describes the volunteers’ perception of the Home Guards’ communication and campaigns. The report was commissioned and financed by the Danish Home Guard Command....

  1. Social security and growth in an aging economy : the case of acturial fairness

    OpenAIRE

    Gilles Le Garrec

    2012-01-01

    In many European countries, due to population aging, the switch from conventional unfunded public pension systems to notional systems character- ized by individual accounts is in debate. In this article, we develop an OLG model in which endogenous growth is based on an accumulation of knowledge driven by the proportion of skilled workers and the time they have spent to be trained. In such a framework, we show that conventional pension systems, contrary to notional systems, can enhance economi...

  2. Transregional Threats and Maritime Security Cooperation

    Science.gov (United States)

    2017-08-01

    continue to grow. As of 2015, China’s coast guard had 205 ships, more than the combined coast guards of Japan, Vietnam, Indonesia, Malaysia , and the...raised the possibility of China assisting the Philippines in maritime security. • China has maritime security initiatives with Malaysia and...Pakistan. They have also conducted maritime safety drills with their Omani counterparts. In recent years, the IRIN has made efforts to operate well

  3. 77 FR 75017 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2012-12-19

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket Number USCG-2012-1038] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION... to read as follows: Sec. 165.T14-215 Security Zone; On the Waters in Kailua Bay, Oahu, HI. (a...

  4. 33 CFR 165.121 - Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode Island.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: High... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.121 Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode...

  5. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  6. 77 FR 32898 - Safety & Security Zones; OPSAIL 2012 Connecticut, Thames River, New London, CT

    Science.gov (United States)

    2012-06-04

    ... 1625-AA00; AA87 Safety & Security Zones; OPSAIL 2012 Connecticut, Thames River, New London, CT AGENCY... 20, 2012 the Coast Guard published a notice of proposed rulemaking entitled Safety & Security Zones... Homeland Security Delegation No. 0170.1, which collectively authorize the Coast Guard to define safety and...

  7. 33 CFR 165.114 - Safety and Security Zones: Escorted Vessels-Boston Harbor, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.114 Safety and Security Zones: Escorted Vessels—Boston Harbor, Massachusetts. (a...

  8. 78 FR 54588 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound

    Science.gov (United States)

    2013-09-05

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6:00 a.m. on September 2, 2013 through 11:59 p.m...

  9. 78 FR 57485 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound

    Science.gov (United States)

    2013-09-19

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on September 12, 2013 through 11:59 p.m...

  10. 77 FR 9528 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound

    Science.gov (United States)

    2012-02-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound AGENCY: Coast Guard, DHS... Waterway Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on February 17, 2012, through 11...

  11. National Guard Engagement in the Pacific: No Threat to Security

    National Research Council Canada - National Science Library

    Bour, Mark

    2002-01-01

    ... there. It predicts likely responses from non-participants and defends the program against critics who argue that engagement activities draw personnel and resources away from primary war fighting objectives...

  12. Equitably Distributing Quality of Marine Security Guards Using Integer Programming

    Science.gov (United States)

    2013-03-01

    ARB BALMOD COM DoD DoS E HAF HQ 10 IP IQ LP MOS MCESG MSG MSGAT NLP NMC OSAB PCS PP&O Q RSO SAl SD SE SNCO T-ODP LIST OF...and Eurasia 2 Abu Dhabi, United Arab Emirates India and the Middle East 3 Bangkok, Thailand East Asia and Pacific 4 Fort Lauderdale, Florida South...integer, goal, and quadratic programming. LP models and nonlinear programming ( NLP ) models are very similar in model development for both maximizing

  13. 46 CFR 159.005-7 - Preapproval review: Coast Guard action.

    Science.gov (United States)

    2010-10-01

    ... Section 159.005-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT... may be conducted. (2) If the Commandant determines from the application for approval that the... under § 159.005-13 can be taken. (c) An item of equipment or material that does not meet all of the...

  14. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  15. 33 CFR 173.85 - Fees levied by the Coast Guard.

    Science.gov (United States)

    2010-07-01

    .... 173.85 Section 173.85 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY VESSEL NUMBERING AND CASUALTY AND ACCIDENT REPORTING Issue of Certificate of.... (b) Fees are payable by check or money-order made payable to the “U.S. Coast Guard”; by major credit...

  16. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  17. Denotational semantics for guarded dependent type theory

    DEFF Research Database (Denmark)

    Bizjak, Aleš; Møgelberg, Rasmus Ejlers

    2018-01-01

    We present a new model of Guarded Dependent Type Theory (GDTT), a type theory with guarded recursion and multiple clocks in which one can program with, and reason about coinductive types. Productivity of recursively defined coinductive programs and proofs is encoded in types using guarded recursion......, crucial for programming with coinductive types, types must be interpreted as presheaves orthogonal to the object of clocks. In the case of dependent types, this translates to a unique lifting condition similar to the one found in homotopy theoretic models of type theory. Since the universes defined...... by inclusions of clock variable contexts commute on the nose with type operations on the universes....

  18. 33 CFR 103.305 - Composition of an Area Maritime Security (AMS) Committee.

    Science.gov (United States)

    2010-07-01

    ... port stakeholders having a special competence in maritime security; and (7) Port stakeholders affected... Security (AMS) Committee. 103.305 Section 103.305 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...

  19. 75 FR 82039 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2010-12-29

    ... Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public. DATES: The Committee will meet on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-1005] National Maritime Security Advisory...

  20. 75 FR 38536 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2010-07-02

    ... Security Advisory Committee (NMSAC) will meet in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public. DATES: The Committee will meet on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-0586] National Maritime Security Advisory...

  1. 6th Annual Homeland Security and Defense Education Summit, Developing an Adaptive Homeland Security Environment

    OpenAIRE

    2013-01-01

    6th Annual Homeland Security and Defense Education Summit Developing an Adaptive Homeland Security Environment, Burlington, MA, September 26-28, 2013 2013 Summit Agenda Naval Postgraduate School Center for Homeland Defense and Security In Partnership With Northeastern University, Department of Homeland Security, Federal Emergency Management Agency, National Guard Homeland Security Institute, National Homeland Defense Foundation Naval Postgraduate School Center for Homeland Defense and S...

  2. The Digital Divide and Patient Portals: Internet Access Explained Differences in Patient Portal Use for Secure Messaging by Age, Race, and Income.

    Science.gov (United States)

    Graetz, Ilana; Gordon, Nancy; Fung, Vick; Hamity, Courtnee; Reed, Mary E

    2016-08-01

    Online access to health records and the ability to exchange secure messages with physicians can improve patient engagement and outcomes; however, the digital divide could limit access to web-based portals among disadvantaged groups. To understand whether sociodemographic differences in patient portal use for secure messaging can be explained by differences in internet access and care preferences. Cross-sectional survey to examine the association between patient sociodemographic characteristics and internet access and care preferences; then, the association between sociodemographic characteristics and secure message use with and without adjusting for internet access and care preference. One thousand forty-one patients with chronic conditions in a large integrated health care delivery system (76% response rate). Internet access, portal use for secure messaging, preference for in-person or online care, and sociodemographic and health characteristics. Internet access and preference mediated some of the differences in secure message use by age, race, and income. For example, using own computer to access the internet explained 52% of the association between race and secure message use and 60% of the association between income and use (Sobel-Goodman mediation test, Pdifferences in portal use remained statistically significant when controlling for internet access and preference. As the availability and use of patient portals increase, it is important to understand which patients have limited access and the barriers they may face. Improving internet access and making portals available across multiple platforms, including mobile, may reduce some disparities in secure message use.

  3. Connectivity for underway Coast Guard patrol boats

    OpenAIRE

    Busch, Gregory C.

    1997-01-01

    Approved for public release; distribution is unlimited This thesis examines the US Coast Guard patrol boat's ability to effectively exchange operational data while underway. The patrol boat is currently unable to obtain tactical law enforcement information from the central Law Enforcement Information System 2 (LEIS 2) database while on patrol. LEIS 2 provides access to law enforcement information from Coast Guard, FBI, and state and local law enforcement agencies. Availability of this info...

  4. National Guard Forces in the Cyber Domain

    Science.gov (United States)

    2015-05-22

    TITLE AND SUBTITLE National Guard Forces in the Cyber Domain 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...Soldiers. Army Cyber Command (ARCYBER) commander, Lieutenant General Edward Cardon stated that Guard will begin to build combat power with...90 2014 Quadrennial Defense Review, 15. 91 Ibid. 92 Edward C. Cardon , "ARMY.MIL, The Official Homepage of the United

  5. SEADE: Countering the Futility of Network Security

    Science.gov (United States)

    2015-10-01

    guards, and computer cages) and logical security measures (network firewall and intrusion detection). However, no matter how many layers of network...security built-in and with minimal security dependence on network security appliances (e.g., firewalls ). As Secretary of Defense Ashton Carter...based analysis that assumes nothing bad will happen to applications/data if those defenses prevent malware transactions at the entrance. The

  6. The Need to Provide for Security in Old Age in Hierarchy of Needs-An Estimation of Its Ranking within the Polish Population

    Science.gov (United States)

    Roszkiewicz, Malgorzata

    2004-01-01

    The results of studies conducted in the last 5 years in Poland formed the basis for the assumption that amongst many needs an individual or a Polish household seeks to satisfy, the need to provide for security in old age takes a prominent position. Determining the position of this need among other needs as defined in Schrab's classification…

  7. 30 CFR 75.1722 - Mechanical equipment guards.

    Science.gov (United States)

    2010-07-01

    ... may cause injury to persons shall be guarded. (b) Guards at conveyor-drive, conveyor-head, and conveyor-tail pulleys shall extend a distance sufficient to prevent a person from reaching behind the guard and becoming caught between the belt and the pulley. (c) Except when testing the machinery, guards...

  8. 33 CFR 23.10 - Coast Guard emblem.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Coast Guard emblem. 23.10 Section... DISTINCTIVE MARKINGS FOR COAST GUARD VESSELS AND AIRCRAFT § 23.10 Coast Guard emblem. (a) The distinctive emblem of the Coast Guard shall be as follows: On a disc the shield of the Coat of Arms of the United...

  9. 33 CFR 165.169 - Safety and Security Zones: New York Marine Inspection Zone and Captain of the Port Zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: New... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas First Coast Guard District § 165.169 Safety and Security Zones: New York Marine Inspection Zone...

  10. 33 CFR 165.904 - Lake Michigan at Chicago Harbor & Burnham Park Harbor-Safety and Security Zone.

    Science.gov (United States)

    2010-07-01

    ... & Burnham Park Harbor-Safety and Security Zone. 165.904 Section 165.904 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.904 Lake Michigan at Chicago Harbor & Burnham Park Harbor—Safety and Security Zone...

  11. 33 CFR 165.502 - Safety and Security Zone; Cove Point Liquefied Natural Gas Terminal, Chesapeake Bay, Maryland.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone; Cove... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas Fifth Coast Guard District § 165.502 Safety and Security Zone; Cove Point Liquefied Natural Gas...

  12. 33 CFR 165.731 - Safety/Security Zone: Cumberland Sound, Georgia and St. Marys River Entrance Channel.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: Cumberland... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED... Seventh Coast Guard District § 165.731 Safety/Security Zone: Cumberland Sound, Georgia and St. Marys River...

  13. 33 CFR 165.1321 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Protection of... Areas Thirteenth Coast Guard District § 165.1321 Security Zone; Protection of Military Cargo, Captain of... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY...

  14. 78 FR 7265 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA

    Science.gov (United States)

    2013-02-01

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on February 1, 2013, through 11:59 p.m...

  15. 78 FR 11981 - Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA

    Science.gov (United States)

    2013-02-21

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0087] Security Zone; Protection of Military Cargo, Captain of the Port Zone Puget Sound, WA AGENCY: Coast Guard, DHS... Security Zone in Commencement Bay, Tacoma, Washington from 6 a.m. on February 23, 2013, through 11:59 p.m...

  16. Interparental conflict, children's security with parents, and long-term risk of internalizing problems: A longitudinal study from ages 2 to 10.

    Science.gov (United States)

    Brock, Rebecca L; Kochanska, Grazyna

    2016-02-01

    Although the negative impact of marital conflict on children has been amply documented, few studies have examined the process of risk in a long-term, longitudinal design. We examined parent-child attachment security as a mechanism that may account for the impact of interparental conflict on children's long-term risk of internalizing problems. Sixty-two community mothers, fathers, and children were followed from ages 2 to 10. Parents reported on their conflicts when their children were 2. Trained observers produced parent-child attachment security scores (Attachment Q-Set, Waters, 1987), based on lengthy naturalistic observations of the child with each parent. Parents rated children's internalizing problems at age 10. A conditional process model and bootstrap approach were implemented to examine conditional indirect effects of conflict on child internalizing problems through attachment security for girls versus boys. Maladaptive marital conflict (destructive strategies, severity of arguments) increased internalizing problems 8 years later due to the undermined security for girls, whereas negative emotional aftermath of conflict (unresolved, lingering tension) increased internalizing problems for both boys and girls. The emotional aftermath of conflict is often overlooked, yet it appears to be a key dimension influencing emotional security in the family system, with significant consequences for children's development.

  17. Interparental conflict, children’s security with parents, and long-term risk of internalizing problems: A longitudinal study from ages 2 to 10

    Science.gov (United States)

    Brock, Rebecca L.; Kochanska, Grazyna

    2015-01-01

    Although the negative impact of marital conflict on children has been amply documented, few studies have examined the process of risk in a long-term, longitudinal design. We examined parent–child attachment security as a mechanism that may account for the impact of interparental conflict on children’s long-term risk of internalizing problems. Sixty-two community mothers, fathers, and children were followed from ages 2 to 10. Parents reported on their conflicts when their children were 2. Trained observers produced parent–child attachment security scores (Attachment Q-Set, Waters, 1987), based on lengthy naturalistic observations of the child with each parent. Parents rated children’s internalizing problems at age 10. A conditional process model and bootstrap approach were implemented to examine conditional indirect effects of conflict on child internalizing problems through attachment security for girls versus boys. Maladaptive marital conflict (destructive strategies, severity of arguments) increased internalizing problems 8 years later due to the undermined security for girls, whereas negative emotional aftermath of conflict (unresolved, lingering tension) increased internalizing problems for both boys and girls. The emotional aftermath of conflict is often overlooked, yet it appears to be a key dimension influencing emotional security in the family system, with significant consequences for children’s development. PMID:25797703

  18. Genetic Moderation of Stability in Attachment Security from Early Childhood to Age 18 Years: A Replication Study

    Science.gov (United States)

    Raby, K. Lee; Roisman, Glenn I.; Booth-LaForce, Cathryn

    2015-01-01

    A longstanding question for attachment theory and research is whether genetically based characteristics of the child influence the development of attachment security and its stability over time. This study attempted to replicate and extend recent findings indicating that the developmental stability of attachment security is moderated by oxytocin…

  19. 78 FR 11676 - Notice of Inventory Completion: National Guard Bureau/A7AN, Air National Guard, Joint Base...

    Science.gov (United States)

    2013-02-19

    ... Inventory Completion: National Guard Bureau/A7AN, Air National Guard, Joint Base Andrews, MD AGENCY..., Joint Base Andrews, MD, has completed an inventory of human remains and associated funerary objects, in... associated funerary objects may contact National Guard Bureau, Air National Guard, Joint Base Andrews, MD...

  20. Maritime Cyber Security University Research: Phase 1

    Science.gov (United States)

    2016-05-01

    i Classification | CG-926 RDC | author | audience | month year Maritime Cyber Security University Research Phase I - Final Report...Appendices Distribution Statement A: Approved for public release; distribution is unlimited. May 2016 Report No. CG-D-07-16 Maritime ...Macesker Executive Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Maritime Cyber Security

  1. Guarded dependent type theory with coinductive types

    DEFF Research Database (Denmark)

    Bizjak, Aleš; Grathwohl, Hans Bugge; Clouston, Ranald

    2016-01-01

    We present guarded dependent type theory, gDTT, an extensional dependent type theory with a later' modality and clock quantifiers for programming and proving with guarded recursive and coinductive types. The later modality is used to ensure the productivity of recursive definitions in a modular......, type based, way. Clock quantifiers are used for controlled elimination of the later modality and for encoding coinductive types using guarded recursive types. Key to the development of gDTT are novel type and term formers involving what we call delayed substitutions’. These generalise the applicative...... functor rules for the later modality considered in earlier work, and are crucial for programming and proving with dependent types. We show soundness of the type theory with respect to a denotational model....

  2. Radioactive Waste SECURITY

    International Nuclear Information System (INIS)

    Brodowski, R.; Drapalik, M.; Gepp, C.; Gufler, K.; Sholly, S.

    2010-01-01

    The purpose of this work is to investigate the safety requirements for a radioactive waste repository, the fundamental problems involved and the legislative rules and arrangements for doing so. As the title already makes clear, the focus of this work is on aspects that can be assigned to the security sector - ie the security against the influence of third parties - and are to be distinguished from safety measures for the improvement of the technical safety aspects. In this context, mention is made of events such as human intrusion into guarded facilities, whereas e.g. a geological analysis on seismic safety is not discussed. For a variety of reasons, the consideration of security nuclear waste repositories in public discussions is increasingly taking a back seat, as ia. Terrorist threats can be considered as negligible risk or well calculable. Depending on the type of storage, different security aspects still have to be considered. (roessner)

  3. 76 FR 12 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2011-01-03

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-1111] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary..., Oahu, HI. (a) Location. The following area, within the Honolulu Captain of the Port Zone (See 33 CFR 3...

  4. 78 FR 79312 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2013-12-30

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket Number USCG-2013-0934] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION..., Oahu, HI. (a) Location. The following area, within the COTP Honolulu Zone (see 33 CFR 3.70-10), from...

  5. 76 FR 80251 - Security Zone; On the Waters in Kailua Bay, Oahu, HI

    Science.gov (United States)

    2011-12-23

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1142] RIN 1625-AA87 Security Zone; On the Waters in Kailua Bay, Oahu, HI AGENCY: Coast Guard, DHS. ACTION: Temporary..., HI. (a) Location. The following area, within the Honolulu Captain of the Port Zone (See 33 CFR 3.70...

  6. 75 FR 28757 - Security Zone; Potomac River, Washington Channel, Washington, DC

    Science.gov (United States)

    2010-05-24

    ... potential terrorist acts, and enhance public and maritime safety and security. The Coast Guard was unable to...-ranking government officials, mitigating potential terrorist acts and enhancing public and maritime safety... terrorist acts and enhancing public and maritime safety and security. Basis and Purpose The Coast Guard will...

  7. 77 FR 2450 - Security Zone; Potomac and Anacostia Rivers, Washington, DC

    Science.gov (United States)

    2012-01-18

    ... terrorist acts, and enhance public and maritime safety and security. The Coast Guard was unable to publish a... terrorist acts and enhancing public and maritime safety security. Under 5 U.S.C. 553(d)(3), the Coast Guard...-ranking government officials, mitigating potential terrorist acts and enhancing public and maritime safety...

  8. 76 FR 9646 - Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation...

    Science.gov (United States)

    2011-02-22

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Parts 100, 117, 147, and 165 [USCG-2010-0399] Quarterly Listings; Safety Zones, Security Zones, Special Local Regulations, Drawbridge Operation Regulations and Regulated Navigation Areas AGENCY: Coast Guard, DHS. ACTION: Notice of expired temporary rules...

  9. 33 CFR 165.709 - Security Zone; Charleston Harbor, Cooper River, South Carolina.

    Science.gov (United States)

    2010-07-01

    ..., Cooper River, South Carolina. 165.709 Section 165.709 Navigation and Navigable Waters COAST GUARD... § 165.709 Security Zone; Charleston Harbor, Cooper River, South Carolina. (a) Regulated area. The Coast Guard is establishing a fixed security zone on all waters of the Cooper River, bank-to-bank and surface...

  10. PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension.

    Science.gov (United States)

    Chen, Feng; Wang, Chenghong; Dai, Wenrui; Jiang, Xiaoqian; Mohammed, Noman; Al Aziz, Md Momin; Sadat, Md Nazmus; Sahinalp, Cenk; Lauter, Kristin; Wang, Shuang

    2017-07-26

    Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research. However, privacy and security concerns have emerged as a challenge for utilizing cloud computing to handle sensitive genomic data. We present one of the first implementations of Software Guard Extension (SGX) based securely outsourced genetic testing framework, which leverages multiple cryptographic protocols and minimal perfect hash scheme to enable efficient and secure data storage and computation outsourcing. We compared the performance of the proposed PRESAGE framework with the state-of-the-art homomorphic encryption scheme, as well as the plaintext implementation. The experimental results demonstrated significant performance over the homomorphic encryption methods and a small computational overhead in comparison to plaintext implementation. The proposed PRESAGE provides an alternative solution for secure and efficient genomic data outsourcing in an untrusted cloud by using a hybrid framework that combines secure hardware and multiple crypto protocols.

  11. Probabilistic Role Models and the Guarded Fragment

    DEFF Research Database (Denmark)

    Jaeger, Manfred

    2004-01-01

    We propose a uniform semantic framework for interpreting probabilistic concept subsumption and probabilistic role quantification through statistical sampling distributions. This general semantic principle serves as the foundation for the development of a probabilistic version of the guarded fragm...... fragment of first-order logic. A characterization of equivalence in that logic in terms of bisimulations is given....

  12. Probabilistic role models and the guarded fragment

    DEFF Research Database (Denmark)

    Jaeger, Manfred

    2006-01-01

    We propose a uniform semantic framework for interpreting probabilistic concept subsumption and probabilistic role quantification through statistical sampling distributions. This general semantic principle serves as the foundation for the development of a probabilistic version of the guarded fragm...... fragment of first-order logic. A characterization of equivalence in that logic in terms of bisimulations is given....

  13. Personal Staff - Joint Staff - The National Guard

    Science.gov (United States)

    the ARNG Deputy Director of the ARNG Chief of Staff of the ARNG Command Chief Warrant Officer of the Site Maintenance Battle Focused Training Strategy Battle Staff Training Resources News Publications March Today in Guard History Leadership CNGB VCNGB SEA DANG DARNG Joint Staff J-1 J-2 J-3 J-4 J-5 J-6 J

  14. [Burnout Syndrome in Prison Guards, Bucaramanga, Colombia, 2013].

    Science.gov (United States)

    Rodríguez Amaya, Reynaldo Mauricio

    2014-01-01

    Burnout syndrome is defined as a chronic stress response and sustained work environment, characterized by emotional exhaustion, depersonalization and personal accomplishment. Most studies have included teaching and health personnel. However, there are limitations in the development of studies on prison guards to observe this problem. This study provides some characteristics of prison guards and seeks to highlight the behavior of the constructs of burnout according to demographic and occupational profile. This was a descriptive cross-sectional study on 111 prison guards in the city of Bucaramanga. The Maslach Burnout Inventory was applied, as well as taking ethical considerations into account. A univariate and bivariate analysis was performed on the data. The mean age was 35.8 years, 76% had more than 10 years work experience, 24% have some additional academic activities at work. Only 3.7% had burnout syndrome as such. In emotional exhaustion, 25.2% are classified as high risk, 30% in depersonalization, and 16% personal accomplishment. Within the personal achievement, the group with more than 20 years experience were those who had a critical score (ANOVA χ(2), P=.002). Of those who had a risk score for depersonalization, 67% had worked more than 240 extra hours a month, with a crude odds ratio (OR)=4.66 (P=.033) and age-adjusted OR=4.65 (P=.035). Burnout in this occupational group was not as prevalent as in that found in other publications. In turn, of the three constructs, the most significant was depersonalization and no notable emotional burnout was observed. The most significant work variables were the number of hours worked and work experience. Copyright © 2013 Asociación Colombiana de Psiquiatría. Publicado por Elsevier España. All rights reserved.

  15. U.S. Coast Guard Posture Statement With 2009 Budget in Brief

    Science.gov (United States)

    2008-02-01

    projects, new Response Boat- Medium vessels, and improvements to our command, control, communications, and National Distress and Response System. It...to the Guardian Ethos cultivated over 217 years, the Coast Guard responded to over 27,000 Search and Rescue cases and saved over 5,000 lives in 2007...Transportation Security Administration ( TSA ) Visual Intermodal Protection and Response (VIPR) Teams, the Coast Guard’s newly- formed Deployable Operations Group

  16. Communications and Integration Enhancements to Improve Homeland Security

    National Research Council Canada - National Science Library

    Sando, Terrance W

    2007-01-01

    .... Homeland Security responses. These technology enhancements and processes combined with the force capabilities that the National Guard has recently created, when integrated with other national capabilities, will greatly improve...

  17. Extending Mobile Security Robots to Force Protection Missions

    National Research Council Canada - National Science Library

    Carroll, Daniel

    2002-01-01

    ...) sites for physical security and automated inventory missions MDARS was initiated in 1989 to improve the effectiveness of a shrinking guard force, but was quickly expanded to address the intensive...

  18. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Science.gov (United States)

    2012-10-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... comments on the development of a Facility Security Officer training program. The notice contains an inaccurate Internet link to RSVP for the public meeting. DATES: The notice of public meeting; request for...

  19. 77 FR 61771 - Facility Security Officer Training Requirements

    Science.gov (United States)

    2012-10-11

    ... following: (1) Draft model FSO training course; (2) Computer-based training and distance learning; (3... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... Security Officer training program, with the primary focus on developing the curriculum for such a program...

  20. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  1. US Coast Guard Stations in Louisiana, Geographic NAD83, USCG [coast_guard_stations_USCG_1997

    Data.gov (United States)

    Louisiana Geographic Information Center — This is is a point dataset for the locations and attributes of eight US Coast Guard stations in Louisiana. The attributes include name, address, latitude (NAD27),...

  2. 46 CFR 153.15 - Conditions under which the Coast Guard issues a Certificate of Inspection or Certificate of...

    Science.gov (United States)

    2010-10-01

    ... Certificate of Inspection required under § 153.900 for a United States ship to carry a hazardous material or... Certificate of Inspection or Certificate of Compliance. 153.15 Section 153.15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED...

  3. 33 CFR 96.380 - How will the Coast Guard handle compliance and enforcement of these regulations?

    Science.gov (United States)

    2010-07-01

    ... GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS How Will Safety Management Systems Be Certificated and Enforced... safety management system while operating the vessel or transferring cargoes. (b) A foreign vessel that...

  4. Data Leakage Prevention for Secure Cross-Domain Information Exchange

    OpenAIRE

    Nordbotten, Nils Agne; Engelstad, Paal E.; Kongsgård, Kyrre Wahl; Haakseth, Raymond; Mancini, Federico

    2017-01-01

    Cross-domain information exchange is an increasingly important capability for conducting efficient and secure operations, both within coalitions and within single nations. A data guard is a common cross-domain sharing solution that inspects the security labels of exported data objects and validates that they are such that they can be released according to policy. While we see that guard solutions can be implemented with high assurance, we find that obtaining an equivalent level of assurance i...

  5. 33 CFR 165.1182 - Safety/Security Zone: San Francisco Bay, San Pablo Bay, Carquinez Strait, and Suisun Bay, CA.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety/Security Zone: San... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas Eleventh Coast Guard District § 165.1182 Safety/Security Zone: San Francisco Bay, San Pablo Bay...

  6. 33 CFR 165.154 - Safety and Security Zones: Long Island Sound Marine Inspection Zone and Captain of the Port Zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: Long... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY... Areas First Coast Guard District § 165.154 Safety and Security Zones: Long Island Sound Marine...

  7. 33 CFR 165.T09-0073 - Safety and Security Zones; Tall Ships Challenge 2010; Great Lakes; Cleveland, OH; Bay City, MI...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Tall... GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION AREAS... Guard District § 165.T09-0073 Safety and Security Zones; Tall Ships Challenge 2010; Great Lakes...

  8. 46 CFR 50.10-25 - Coast Guard Symbol.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Coast Guard Symbol. 50.10-25 Section 50.10-25 Shipping... Definition of Terms Used in This Subchapter § 50.10-25 Coast Guard Symbol. (a) The term Coast Guard Symbol... impression of the Coast Guard Symbol for stamping nameplates and specimens is shown in Figure 50.10-25(b...

  9. Roles for National Guard Components: Current Thoughts and Future Possibilities

    Science.gov (United States)

    2000-04-01

    Gen Russell C. Davis, chief, National Guard Bureau, remarks at the National Chamber of Commerce , Washington, D.C., June 1999. 5 Moskos and Burk, 176...Lt Gen Russell C. Davis, chief, National Guard Bureau, remarks at the National Chamber of Commerce , Washington, D.C., June 9 1999. 5 National Guard...National Guard Bureau, remarks to the National Chamber of Commerce , Washington, D.C., June 1999, n.p. On-line. Internet, 27 February 2000, available at

  10. 46 CFR 177.940 - Guards in vehicle spaces.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Guards in vehicle spaces. 177.940 Section 177.940... TONS) CONSTRUCTION AND ARRANGEMENT Rails and Guards § 177.940 Guards in vehicle spaces. On a vessel authorized to carry one or more vehicles, suitable chains, cables, or other barriers must be installed at the...

  11. 46 CFR 116.940 - Guards in vehicle spaces.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Guards in vehicle spaces. 116.940 Section 116.940... ARRANGEMENT Rails and Guards § 116.940 Guards in vehicle spaces. On a vessel authorized to carry one or more vehicles, suitable chains, cables, or other barriers must be installed at the end of each vehicle runway...

  12. Denotational semantics in Synthetic Guarded Domain Theory

    DEFF Research Database (Denmark)

    Paviotti, Marco

    In functional programming, features such as recursion, recursive types and general references are central. To define semantics of this kind of languages one needs to come up with certain definitions which may be non-trivial to show well-defined. This is because they are circular. Domain theory has...... been used to solve this kind of problems for specific languages, unfortunately, this technique does not scale for more featureful languages, which prevented it from being widely used. Step-indexing is a more general technique that has been used to break circularity of definitions. The idea is to tweak...... the definition by adding a well- founded structure that gives a handle for recursion. Guarded dependent Type Theory (gDTT) is a type theory which implements step-indexing via a unary modality used to guard recursive definitions. Every circular definition is well-defined as long as the recursive variable...

  13. On semantics and applications of guarded recursion

    DEFF Research Database (Denmark)

    Bizjak, Aleš

    2016-01-01

    denotational model and a logic for reasoning about program equivalence. In the last three chapters we study syntax and semantics of a dependent type theory with a family of later modalities indexed by the set of clocks, and clock quantifiers. In the fourth and fifth chapters we provide two model constructions......In this dissertation we study applications and semantics of guarded recursion, which is a method for ensuring that self-referential descriptions of objects define a unique object. The first two chapters are devoted to applications. We use guarded recursion, first in the form of explicit step......-indexing and then in the form of the internal language of particular sheaf topos, to construct logical relations for reasoning about contextual approximation of probabilistic and nondeterministic programs. These logical relations are sound and complete and useful for showing a range of example equivalences. In the third...

  14. MAPK cascades in guard cell signal transduction

    Directory of Open Access Journals (Sweden)

    Yuree eLee

    2016-02-01

    Full Text Available Guard cells form stomata on the epidermis and continuously respond to endogenous and environmental stimuli to fine-tune the gas exchange and transpirational water loss, processes which involve mitogen-activated protein kinase (MAPK cascades. MAPKs form three-tiered kinase cascades with MAPK kinases and MAPK kinase kinases, by which signals are transduced to the target proteins. MAPK cascade genes are highly conserved in all eukaryotes, and they play crucial roles in myriad developmental and physiological processes. MAPK cascades function during biotic and abiotic stress responses by linking extracellular signals received by receptors to cytosolic events and gene expression. In this review, we highlight recent findings and insights into MAPK-mediated guard cell signaling, including the specificity of MAPK cascades and the remaining questions.

  15. Security careers skills, compensation, and career paths

    CERN Document Server

    Walker, Stephen W

    2014-01-01

    The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, ethics, environmental, health and safety occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushée Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a th

  16. Secure Infant-Mother Attachment Buffers the Effect of Early-Life Stress on Age of Menarche.

    Science.gov (United States)

    Sung, Sooyeon; Simpson, Jeffry A; Griskevicius, Vladas; Kuo, Sally I-Chun; Schlomer, Gabriel L; Belsky, Jay

    2016-05-01

    Prior research indicates that being reared in stressful environments is associated with earlier onset of menarche in girls. In this research, we examined (a) whether these effects are driven by exposure to certain dimensions of stress (harshness or unpredictability) during the first 5 years of life and (b) whether the negative effects of stress on the timing of menarche are buffered by secure infant-mother attachment. Results revealed that (a) exposure to greater harshness (but not unpredictability) during the first 5 years of life predicted earlier menarche and (b) secure infant-mother attachment buffered girls from this effect of harsh environments. By connecting attachment research to its evolutionary foundations, these results illuminate how environmental stressors and relationships early in life jointly affect pubertal timing. © The Author(s) 2016.

  17. Factors influencing resident's decision to reside in gated and guarded community

    Science.gov (United States)

    Shamsudin, Zarina; Shamsudin, Shafiza; Zainal, Rozlin

    2017-10-01

    Gated communities are residential areas developed with restricted access with strictly controlled entrances and surrounded by a close perimeter of wall or fences. Developers, conscious of the need to fulfill the requirement of living in modern and sophisticated lifestyle and gated properties become the trend and mushroomed over the past decade. Nowadays, it is obvious that gated and guarded communities become almost a dominant feature of Malaysia housing development projects. The focus of this paper is to identify the factors contribute resident's decision to reside in gated and guarded community and to study social interaction among gated communities' residents. 150 questionnaires were distributed to the residents of selected gated and guarded community area in order to achieve the objectives and analyzed by using Statistical Package for Social Science (SPSS) and descriptive analysis. The result was tabulated and presented in charts and graphs for a clear and better understanding. The five main factors contribute to resident decision to reside in gated communities were identified and ranked; there are privacy, security, location, lifestyle and prestige. Besides, the residents are feeling neutral towards the facilities and services provided in their gated and guarded residential area. A comprehensive improvement towards the facilities and services is needed to reach higher satisfaction from the residents.

  18. Unraveling the impact of workforce age diversity on labor productivity : The moderating role of firm size and job security

    NARCIS (Netherlands)

    De Meulenaere, Kim; Boone, Christophe; Buyl, T.P.L.

    Previous literature has suggested both positive and negative effects of age diversity on labor productivity: positive because of the potential knowledge complementarities between employees of different ages and negative because of the age-related value differences that might reduce cohesion and

  19. Optimizing a physical security configuration using a highly detailed simulation model

    NARCIS (Netherlands)

    Marechal, T.M.A.; Smith, A.E.; Ustun, V.; Smith, J.S.; Lefeber, A.A.J.; Badiru, A.B.; Thomas, M.U.

    2009-01-01

    This research is focused on using a highly detailed simulation model to create a physical security system to prevent intrusions in a building. Security consists of guards and security cameras. The problem is represented as a binary optimization problem. A new heuristic is proposed to do the security

  20. 16th Department of Energy Computer Security Group Training Conference: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1994-04-01

    Various topic on computer security are presented. Integrity standards, smartcard systems, network firewalls, encryption systems, cryptography, computer security programs, multilevel security guards, electronic mail privacy, the central intelligence agency, internet security, and high-speed ATM networking are typical examples of discussed topics. Individual papers are indexed separately.

  1. 33 CFR 1.05-5 - Marine Safety and Security Council.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine Safety and Security Council, composed of senior Coast Guard officials, acts as policy advisor to the...

  2. THE SECURITY OF CRITICAL ENERGY INFRASTRUCTURE IN THE AGE OF MULTIPLE ATTACK VECTORS: NATO’S MULTI-FACETED APPROACH

    Directory of Open Access Journals (Sweden)

    Sorin Dumitru Ducaru

    2017-06-01

    Full Text Available The current NATO threat landscape is characterized by a combination or “hybrid blend” of unconventional emerging challenges (like cyber and terrorist attacks and re-emerging conventional ones (like Russia’s recent military resurgence and assertiveness, that led to the illegal annexation of Crimea and destabilization in Eastern Ukraine. While the resurgence of the Russian military activity pushed the Alliance in the direction of re-discovering its deterrence and collective defence role, the new, not-traditional, trans-national and essentially non-military treats that generate effects below the threshold of an armed attack require a new paradigm shift with a focus on resilience although the protection of critical energy infrastructure is first and foremost a national responsibility, NATO can contribute to meeting the infrastructure protection challenge on many levels. Given the fact that its core deterrence and defence mandate relies in a great measure on the security of Allies’ energy infrastructure NATO’s role and actions in reducing the vulnerabilities and strengthening the resilience of such infrastructure can only increase. A multi-faceted, multi-stakeholder and networked approach is needed to be able to strengthen defences and resilience of critical infrastructure such as energy. Understanding and defending against cyber or terrorist threat vectors, increased situational awareness, education, training, exercises, trusted partnerships as well as increasing strategic security dialogue and cooperation are key for such a comprehensive/network approach to the challenge.

  3. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  4. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  5. Guard Cell and Tropomyosin Inspired Chemical Sensor

    Directory of Open Access Journals (Sweden)

    Jacquelyn K.S. Nagel

    2013-10-01

    Full Text Available Sensors are an integral part of many engineered products and systems. Biological inspiration has the potential to improve current sensor designs as well as inspire innovative ones. This paper presents the design of an innovative, biologically-inspired chemical sensor that performs “up-front” processing through mechanical means. Inspiration from the physiology (function of the guard cell coupled with the morphology (form and physiology of tropomyosin resulted in two concept variants for the chemical sensor. Applications of the sensor design include environmental monitoring of harmful gases, and a non-invasive approach to detect illnesses including diabetes, liver disease, and cancer on the breath.

  6. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  7. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  8. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  9. Cross-Sectional and Longitudinal Associations between Household Food Security and Child Anthropometry at Ages 5 and 8 Years in Ethiopia, India, Peru, and Vietnam.

    Science.gov (United States)

    Humphries, Debbie L; Dearden, Kirk A; Crookston, Benjamin T; Fernald, Lia C; Stein, Aryeh D; Woldehanna, Tassew; Penny, Mary E; Behrman, Jere R

    2015-08-01

    Poor childhood nutritional status has lifetime effects and food insecurity is associated with dietary practices that can impair nutritional status. We assessed concurrent and subsequent associations between food insecurity and height-for-age z scores (HAZs) and body mass index-for-age z scores (BMI-Zs); evaluated associations with transitory and chronic food insecurity; and tested whether dietary diversity mediates associations between food insecurity and nutritional status. We used data from the Young Lives younger cohort composed of children in Ethiopia (n = 1757), India (n = 1825), Peru (n = 1844), and Vietnam (n = 1828) recruited in 2002 (round 1) at ∼1 y old, with subsequent data collection at 5 y in 2006 (round 2) and 8 y in 2009 (round 3). Children from food-insecure households had significantly lower HAZs in all countries at 5 y (Ethiopia, -0.33; India, -0.53; Peru, -0.31; and Vietnam, -0.68 HAZ; all P Peru, -0.14; and Vietnam, -0.27 HAZ; P Peru. Age 5 y food insecurity predicted the age 8 y BMI-Z even after controlling for the 5 y BMI-Z, although associations were not significant after the inclusion of additional confounding variables (Ethiopia, P = 0.12; India, P = 0.29; Peru, P = 0.16; and Vietnam, P = 0.51). Chronically food-insecure households had significantly lower HAZs than households that were consistently food-secure, although BMI-Zs did not differ by chronic food-insecurity status. Dietary diversity mediated 18.8-30.5% of the association between food security and anthropometry in Vietnam, but mediated to a lesser degree (8.4-19.3%) in other countries. In 4 countries, food insecurity at 5 y of age was associated with both HAZ and BMI-Z at age 8 y, although the association was attenuated after adjusting for other household factors and anthropometry at age 5 y, and remained significant only for the HAZ in Vietnam. © 2015 American Society for Nutrition.

  10. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  11. 27 CFR 19.281 - Security.

    Science.gov (United States)

    2010-04-01

    ... tanks containing spirits, denatured spirits, or wine shall be individually locked or locked within an... wines or the rooms or buildings in which they are housed, shall be equipped so that they may be secured... lights, alarm systems, guard services) or changes in construction, arrangement, or equipment shall be...

  12. 33 CFR 165.1408 - Security Zones; Maui, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Maui, HI. 165... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1408 Security Zones; Maui, HI... Harbor, Maui, HI or within 3 nautical miles seaward of the Kahului Harbor COLREGS DEMARCATION (See 33 CFR...

  13. 33 CFR 165.1409 - Security Zones; Hawaii, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Hawaii, HI. 165... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1409 Security Zones; Hawaii..., Hawaii. All waters extending 100 yards in all directions from each large passenger vessel in Hilo Harbor...

  14. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  15. Small incision guarded hydroaspiration of iris lesions.

    Science.gov (United States)

    Singh, Arun D

    2017-11-01

    To describe the technique and results of a minimally invasive surgical technique for resection of small iris lesions. Consecutive case series of 22 patients with localised, small iris lesions that were resected using the described surgical technique that composed of multiple, small corneal incisions created to allow for internal iris resection with 23-gauge horizontal vitrectomy scissors, followed by guarded tumour aspiration through a clear plastic tubing (diameter 3.5 mm) primed with viscoelastic agent. The mean largest basal diameter was 3.0 mm (range 1.5-5.0 mm; median 3.0 mm) and mean thickness was 1.3 mm (range 0.5-2.5 mm; median 1.0 mm). Use of multiple (2-4) small corneal incisions (range 2.0-3.0 mm; mean 2.8 mm) allowed reduced postoperative morbidity (significant hyphema (0%), hypotony (0%), wound leak (0%), >2 line change in best corrected visual acuity at postoperative 1 week (4.5%) and mean corneal astigmatism of 1.0 D (range 0.14-2.99 D; median 0.8 D) at postoperative 4-12 weeks. The tumour could be resected with clear surgical margins in all neoplastic cases (benign (2), borderline (1) and malignant (16)). Local recurrence or metastases were not observed in any melanoma case over a mean follow-up of 33.0 months (range 1.0-90.0 months; median 33.5 months). Small incision guarded hydroaspiration is a minimally invasive surgical technique for resection of select small iris lesions. Use of multiple small corneal incisions avoids morbidity associated with a single large corneoscleral incision, and use of guarded aspiration may eliminate the risk of wound contamination by the malignant tumour. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  16. Age

    Science.gov (United States)

    ... adults? How can you reduce anesthesia risks in older patients? Age Age may bring wisdom but it also brings ... Ask your physician to conduct a pre-surgery cognitive test — an assessment of your mental function. The physician can use the results as a ...

  17. Radiation guard for x-ray table

    International Nuclear Information System (INIS)

    Collica, C.; Epifano, L.; Farella, R.

    1976-01-01

    A radiation guard suitable for use in conjunction with a diagnostic table and penetrable by the hands of an operator to facilitate moving or examining a patient positioned on a table. In accordance with the invention there is provided a supportive frame mountable at about an edge of the table so as to extend vertically from about the edge, the frame comprising at least a pair of spaced bars. A plurality of strips of flexible radiation shielding material are mounted across the bars in closely spaced relationship, the strips being mounted sufficiently close together to prevent substantial radiation leakage through the frame. The hands of an operator can be inserted between the adjacent strips to manually reposition or examine a patient while protecting most of the operator's body from substantial radiation. 9 claims, 4 drawing figures

  18. The effectiveness of shin guards used by football players.

    Science.gov (United States)

    Tatar, Yasar; Ramazanoglu, Nusret; Camliguney, Asiye Filiz; Saygi, Evrim Karadag; Cotuk, Hasan Birol

    2014-01-01

    In football, injuries from opponent contact occur commonly in the lower extremities. FIFA the world's governing body for football requires players to wear shin guards. The aim of this study was to compare the protective effectiveness of polypropylene based shin guards with custom-made carbon fiber ones. Three commercial polypropylene shin guards (Adidas Predator™, Adidas UCL™, and Nike Mercurial™) and two custom-made carbon fiber shin guards were examined. The experimental setup had the following parts: 1) A pendulum attached a load cell at the tip (CAS Corp., Korea) and a fixed prosthetic foot equipped with a cleat to simulate an attacker's foot. 2) An artificial tibia prepared by condensed foam and reinforced by carbon fibers protected with soft clothing. 3) A multifunctional sensor system (Tekscan Corp., F-Socket System, Turkey) to record the impact on the tibia. In the low impact force trials, only 2.79-9.63 % of the load was transmitted to the sensors. When comparing for mean force, peak force and impulse, both carbon fiber shin guards performed better than the commercial ones (Adidas Predator™, Adidas UCL™, and Nike Mercurial™) (p = 0.000). Based on these same parameters, the Nike Mercurial™ provided better protection than the Adidas Predator™ and the Adidas UCL™ (p = 0.000). In the high impact force trials, only 5.16-10.90 % of the load was transmitted to the sensors. For peak force and impulse, the carbon fiber shin guards provided better protection than all the others. Carbon fiber shin guards possess protective qualities superior to those of commercial polypropylene shin guards. Key PointsShin guards decrease the risk of serious injuries.Carbon shin guards provide sufficient protection against high impact forces.Commercially available Polypropylene based shin guards do not provide sufficient protection against high impact forces.

  19. 76 FR 28315 - Security Zone; Portland Rose Festival on Willamette River

    Science.gov (United States)

    2011-05-17

    ... Zone; Portland Rose Festival on Willamette River AGENCY: Coast Guard, DHS. ACTION: Notice of enforcement of regulation. SUMMARY: The Coast Guard will enforce the Portland Rose Festival Security Zone in... River during the Portland Rose festival. During the enforcement period, no person or vessel may enter or...

  20. 77 FR 44475 - Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2012-07-30

    ...-AA87 Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... temporary rule, call or email Lieutenant Junior Grade Anthony P. LaBoy, Sector Puget Sound, Waterways Management Division, U.S. Coast Guard; telephone 206-217-6323, email SectorPugetSound[email protected] . If you...

  1. Differentials of modern contraceptive methods use by food security status among married women of reproductive age in Wolaita Zone, South Ethiopia.

    Science.gov (United States)

    Feyisso, Mohammed; Belachew, Tefera; Tesfay, Amanuel; Addisu, Yohannes

    2015-01-01

    In spite of the massive spending and extensive family-planning promotion, many poor people in the third world remain reluctant to use modern contraceptive method. Mostly when they use modern contraceptives, their continuation rates are often low. Reproductive health can improve women's nutrition; in return better nutrition can improve reproductive health. Thus addressing the connection between nutrition and reproductive health is critical to ensure population growth that does not overwhelm world resources. A community based cross-sectional study was conducted from March 15-30, 2014 in Soddo Zuria Woreda, Southern Ethiopia. A total of 651 currently married women of reproductive age group were selected using multistage sampling. Probability proportional to the size allocation method was employed to determine the number of households. Multivariable logistic regression was used to assess the association between family planning use and food security status after adjusting for other covariates. Use of modern contraceptive method was significantly low among food insecure women (29.7 %) compared to those who were food secure (52.0 %), (P insecurity is negatively associated with modern contraceptive method use. Thus food insecurity should be considered as one of the barriers in designing family planning services and needs special arrangement.

  2. Aging

    International Nuclear Information System (INIS)

    Sasaki, Hideo; Kodama, Kazunori; Yamada, Michiko

    1991-01-01

    The hypothesis that exposure to ionizing radiation accelerates the aging process has been actively investigated at ABCC-RERF since 1958, when longitudinal cohort studies of the Adult Health Study (AHS) and the Life Span Study (LSS) were initiated. In their 1975 overall review of aging studies related to the atomic bomb (A-bomb) survivors, Finch and Beebe concluded that while most studies had shown no correlation between aging and radiation exposure, they had not involved the large numbers of subjects required to provide strong evidence for or against the hypothesis. Extending LSS mortality data up to 1978 did not alter the earlier conclusion that any observed life-shortening was associated primarily with cancer induction rather than with any nonspecific cause. The results of aging studies conducted during the intervening 15 years using data from the same populations are reviewed in the present paper. Using clinical, epidemiological, and laboratory techniques, a broad spectrum of aging parameters have been studied, such as postmortem morphological changes, tests of functional capacity, physical tests and measurements, laboratory tests, tissue changes, and morbidity. With respect to the aging process, the overall results have not been consistent and are generally thought to show no relation to radiation exposure. Although some preliminary results suggest a possible radiation-induced increase in atherosclerotic diseases and acceleration of aging in the T-cell-related immune system, further study is necessary to confirm these findings. In the future, applying the latest gerontological study techniques to data collected from subjects exposed 45 years ago to A-bomb radiation at relatively young ages will present a new body of data relevant to the study of late radiation effects. (author) 103 refs

  3. Aging

    International Nuclear Information System (INIS)

    Finch, S.C.; Beebe, G.W.

    1975-01-01

    The hypothesis that ionizing radiation accelerates natural aging has been under investigation at the Atomic Bomb Casualty Commission since 1959. Postmortem observations of morphologic and chemical changes, tests of functional capacity, physical tests and measurements, clinical laboratory tests, tissue changes, morbidity, and mortality have all been examined by ABCC investigators interested in this hypothesis. These studies have been beset with conceptual difficulties centered on the definition and measurement of aging. An empirical approach early led to the calculation of an index of physiologic age as a linear combination of age-related tests of various organ systems. Most studies have been negative but have not involved the large numbers that might be required to provide strong evidence for or against the hypothesis. Mortality, however, has been examined on the basis of a large sample and over the period 1950-1972 had provided no support for the hypothesis of radiation-accelerated aging. Ionizing radiation dose, of course shorten human life, but its life-shortening effect appears to be the result of specific radiation-induced disease, especially neoplasms. The hypothesis is now much less attractive than it was 10-20 years ago but still has some value in stimulating research on aging. The experience of the A-bomb survivors provides an unusual opportunity for a definitive test of the hypothesis. (auth.)

  4. Examining Ankle-Joint Laxity Using 2 Knee Positions and With Simulated Muscle Guarding.

    Science.gov (United States)

    Hanlon, Shawn; Caccese, Jaclyn; Knight, Christopher A; Swanik, Charles Buz; Kaminski, Thomas W

    2016-02-01

    Several factors affect the reliability of the anterior drawer and talar tilt tests, including the individual clinician's experience and skill, ankle and knee positioning, and muscle guarding. To compare gastrocnemius activity during the measurement of ankle-complex motion at different knee positions, and secondarily, to compare ankle-complex motion during a simulated trial of muscle guarding. Cross-sectional study. Research laboratory. Thirty-three participants aged 20.2 ± 1.7 years were tested. The ankle was loaded under 2 test conditions (relaxed, simulated muscle guarding) at 2 knee positions (0°, 90° of flexion) while gastrocnemius electromyography (EMG) activity was recorded. Anterior displacement (mm), inversion-eversion motion (°), and peak EMG amplitude values of the gastrocnemius (μV). Anterior displacement did not differ between the positions of 0° and 90° of knee flexion (P = .193). Inversion-eversion motion was greater at 0° of knee flexion compared with 90° (P ankle laxity at the 2 most common knee positions for anterior drawer testing; however, talar tilt testing may be best performed with the knee in 0° of knee flexion. Finally, our outcomes from the simulated muscle-guarding condition suggest that clinicians should use caution and be aware of reduced perceived laxity when performing these clinical examination techniques immediately postinjury.

  5. 30 CFR 77.509 - Transformers; installation and guarding.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Transformers; installation and guarding. 77.509... COAL MINES Electrical Equipment-General § 77.509 Transformers; installation and guarding. (a... feet from any energized parts, casings, or wiring. (b) Transformer stations shall be enclosed to...

  6. 30 CFR 56.7013 - Covering or guarding drill holes.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Covering or guarding drill holes. 56.7013 Section 56.7013 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND... Rotary Jet Piercing Drilling § 56.7013 Covering or guarding drill holes. Drill holes large enough to...

  7. 30 CFR 57.7013 - Covering or guarding drill holes.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Covering or guarding drill holes. 57.7013 Section 57.7013 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND... and Rotary Jet Piercing Drilling-Surface Only § 57.7013 Covering or guarding drill holes. Drill holes...

  8. 30 CFR 77.1011 - Drill holes; guarding.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Drill holes; guarding. 77.1011 Section 77.1011 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR COAL MINE SAFETY AND HEALTH... Control § 77.1011 Drill holes; guarding. Drill holes large enough to constitute a hazard shall be covered...

  9. Integrated Unit Deployments: Rethinking Air National Guard Fighter Mobilizations

    Science.gov (United States)

    2016-06-01

    participation in the homeland defense mission. But they emphasized that homeland defense would not become an exclusive ANG mission. Operation...station that can absorb pilots and maintainers left behind. Few Air National Guard squadrons enjoy this luxury . Only Air Guard squadrons that are part

  10. 76 FR 17782 - Protection for Whistleblowers in the Coast Guard

    Science.gov (United States)

    2011-03-31

    ... ``Keyword'' box, and then clicking ``Search.'' FOR FURTHER INFORMATION CONTACT: If you have questions on..., telephone 202-372-3777, e-mail [email protected] . If you have questions on viewing or submitting... Protection for Whistleblowers in the Coast Guard AGENCY: Coast Guard, DHS. ACTION: Direct final rule...

  11. United States Coast Guard: Officer Corps Military Professional Development Program

    Science.gov (United States)

    2011-06-10

    captain relieved of command after viewing porn on computer,‖ 10 July 2010, http://www.thenewstribune.com/2010/07/ 10/1259108/portland-coast-guard...Coast Guard captain relieved of command after viewing porn on computer,‖ 10 July 2010. http://www.thenewstribune.com/2010/07/ 10/1259108/portland

  12. 30 CFR 77.510 - Resistors; location and guarding.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Resistors; location and guarding. 77.510 Section 77.510 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR COAL MINE... COAL MINES Electrical Equipment-General § 77.510 Resistors; location and guarding. Resistors, heaters...

  13. Coast Guard Proceedings. Volume 70, Number 2, Summer 2013

    Science.gov (United States)

    2013-01-01

    and well-being. Most Inuit are coastal people who rely heavily on resources from the ocean for nutritional and cultural survival. The Inuit are a...defend a soccer ball from a crewmember of the Russian vessel Vorovsky at the Coast Guard gym at Base Kodiak, Alaska. U.S. Coast Guard photo by

  14. 41 CFR 50-204.5 - Machine guarding.

    Science.gov (United States)

    2010-07-01

    ... be such that it does not offer an accident hazard in itself. (c) Point of Operation Guarding. (1) Point of operation is the area on a machine where work is actually performed upon the material being... guarding device shall be so designed and constructed so as to prevent the operator from having any part of...

  15. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  16. A model of PCF in guarded type theory

    DEFF Research Database (Denmark)

    Paviotti, Marco; Møgelberg, Rasmus Ejlers; Birkedal, Lars

    2015-01-01

    Guarded recursion is a form of recursion where recursive calls are guarded by delay modalities. Previous work has shown how guarded recursion is useful for constructing logics for reasoning about programming languages with advanced features, as well as for constructing and reasoning about element...... adequate. The model construction is related to Escardo's metric model for PCF, but here everything is carried out entirely in type theory with guarded recursion, including the formulation of the operational semantics, the model construction and the proof of adequacy...... of coinductive types. In this paper we investigate how type theory with guarded recursion can be used as a metalanguage for denotational semantics useful both for constructing models and for proving properties of these. We do this by constructing a fairly intensional model of PCF and proving it computationally...

  17. Women's Fertility Status Alters Other Women's Jealousy and Mate Guarding.

    Science.gov (United States)

    Hurst, Ashalee C; Alquist, Jessica L; Puts, David A

    2017-02-01

    Across three studies, we tested the hypothesis that women exhibit greater jealousy and mate guarding toward women who are in the high (vs. low) fertility phase of their cycle. Women who imagined their partner with a woman pictured at high fertility reported more jealousy than women who imagined their partner with a woman pictured at low fertility (Studies 1 and 2). A meta-analysis across studies manipulating fertility status of the pictured woman found a significant effect of fertility status on both jealousy and mate guarding. Women with attractive partners viewed fertile-phase women as less trustworthy, which led to increased mate guarding (Study 2). In Study 3, the closer women were to peak fertility, the more instances they reported of other women acting jealously and mate guarding toward them. These studies provide evidence that women selectively exhibit jealousy and mate guarding toward women who are near peak fertility.

  18. A Model of PCF in Guarded Type Theory

    DEFF Research Database (Denmark)

    Paviotti, Marco; Møgelberg, Rasmus Ejlers; Birkedal, Lars

    2015-01-01

    Guarded recursion is a form of recursion where recursive calls are guarded by delay modalities. Previous work has shown how guarded recursion is useful for constructing logics for reasoning about programming languages with advanced features, as well as for constructing and reasoning about element...... adequate. The model construction is related to Escardo's metric model for PCF, but here everything is carried out entirely in type theory with guarded recursion, including the formulation of the operational semantics, the model construction and the proof of adequacy....... of coinductive types. In this paper we investigate how type theory with guarded recursion can be used as a metalanguage for denotational semantics useful both for constructing models and for proving properties of these. We do this by constructing a fairly intensional model of PCF and proving it computationally...

  19. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  20. 76 FR 1521 - Security Zone: Fleet Industrial Supply Center Pier, San Diego, CA

    Science.gov (United States)

    2011-01-11

    ...-AA87 Security Zone: Fleet Industrial Supply Center Pier, San Diego, CA AGENCY: Coast Guard, DHS. ACTION... Diego, CA. The existing security zone is around the former Fleet Industrial Supply Center Pier. The security zone encompasses all navigable waters within 100 feet of the former Fleet Industrial Supply Center...

  1. 33 CFR 165.758 - Security Zone; San Juan, Puerto Rico.

    Science.gov (United States)

    2010-07-01

    ... Security Zone; San Juan, Puerto Rico. (a) Location. Moving and fixed security zones are established 50... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; San Juan, Puerto Rico. 165.758 Section 165.758 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  2. 33 CFR 165.778 - Security Zone; Port of Mayaguez, Puerto Rico.

    Science.gov (United States)

    2010-07-01

    ..., Puerto Rico. 165.778 Section 165.778 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zone; Port of Mayaguez, Puerto Rico. (a) Security zone. A moving and fixed security zone is established around all cruise ships entering, departing, mooring, or anchoring in the Port of Mayaguez, Puerto...

  3. 33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.

    Science.gov (United States)

    2010-07-01

    ... to: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of... substances and devices on structures and port services; (g) Port security requirements; (h) Port business... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD...

  4. 76 FR 27897 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port...

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0342] Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port Columbia River... will enforce the security and safety zone in 33 CFR 165.1318 for large passenger vessels operating in...

  5. Elder care, old-age security and social change in rural Yogyakarta, Indonesia = De zorg voor en bestaanszekerheid van ouderen tegen de achtergrond van sociale veranderingen in ruraal Yogyakarta, Indonesië

    OpenAIRE

    Keasberry, I.N.

    2002-01-01

    This thesis describes the significance of the living conditions and care arrangements of older persons for their old-age security in the villages of Kebonagung (regency of Bantul) and Giriwungu (regency of Gunung Kidul) in the Special Region of Yogyakarta, Indonesia.

    The world population is ageing. The United Nations designated the year 1999 as 'The Year of the Older Person', thereby recognising and reaffirming that the global population is ageing at an unprecedente...

  6. Petrographic Analysis of Portland Cement Concrete Cores from Pease Air National Guard Base, New Hampshire

    Science.gov (United States)

    2016-11-01

    Petrographic Analysis of Portland Cement Concrete Cores from Pease Air National Guard Base, New Hampshire E n g in e e r R e s e a rc h a n d...id, age of the concrete being evaluated and tests performed...4 3 Preface This study was conducted in support of the Air Force Civil Engineer Center (AFCEC) to assess concrete obtained from Pease

  7. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  8. An optimal guarding scheme for thermal conductivity measurement using a guarded cut-bar technique, part 1 experimental study

    International Nuclear Information System (INIS)

    Xing, Changhu

    2014-01-01

    In the guarded cut-bar technique, a guard surrounding the measured sample and reference (meter) bars is temperature controlled to carefully regulate heat losses from the sample and reference bars. Guarding is typically carried out by matching the temperature profiles between the guard and the test stack of sample and meter bars. Problems arise in matching the profiles, especially when the thermal conductivities of the meter bars and of the sample differ, as is usually the case. In a previous numerical study, the applied guarding condition (guard temperature profile) was found to be an important factor in measurement accuracy. Different from the linear-matched or isothermal schemes recommended in literature, the optimal guarding condition is dependent on the system geometry and thermal conductivity ratio of sample to meter bar. To validate the numerical results, an experimental study was performed to investigate the resulting error under different guarding conditions using stainless steel 304 as both the sample and meter bars. The optimal guarding condition was further verified on a certified reference material, pyroceram 9606, and 99.95% pure iron whose thermal conductivities are much smaller and much larger, respectively, than that of the stainless steel meter bars. Additionally, measurements are performed using three different inert gases to show the effect of the insulation effective thermal conductivity on measurement error, revealing low conductivity, argon gas, gives the lowest error sensitivity when deviating from the optimal condition. The result of this study provides a general guideline for the specific measurement method and for methods requiring optimal guarding or insulation

  9. Carbonic anhydrases are upstream regulators of CO2-controlled stomatal movements in guard cells

    KAUST Repository

    Hu, Honghong; Boisson-Dernier, Auré lien; Israelsson-Nordströ m, Maria; Bö hmer, Maik; Xue, Shaowu; Ries, Amber; Godoski, Jan; Kuhn, Josef M.; Schroeder, Julian I.

    2009-01-01

    photosynthesis and can function in guard cells. Furthermore, guard cell betaca-overexpressing plants exhibit instantaneous enhanced water use efficiency. Guard cell expression of mammalian alphaCAII complements the reduced sensitivity of ca1 ca4 plants, showing

  10. Full amenities : the jungle hums with armed guards, planned movements, air-conditioning and cultural realness

    Energy Technology Data Exchange (ETDEWEB)

    Leslie, J.

    2001-06-04

    The working situation of a Canadian consultant asked to work in Ecuador for a one-month period was described. He quickly learned that discretion is an incredibly valuable trait in this country where a number of oil and gas workers have become victims of kidnappings, because the companies that employ them are perceived as having lots of money. Accordingly, the planning for the trip began back in Canada where the worker received inoculations for yellow fever and hepatitis, among others, as well as briefing about personal security while abroad. Upon his arrival, he was met by security guards hired by the company and driven to his hotel in the capital, Quito. He found he was safe to wander inside the hotel at will, as well as just outside. If he wanted to go outside the perimeter, he had to call the company and the guards would meet and escort him, without displaying their weapons. When it came time to travel to the production site deep in the jungle, armed guards were travelling in a vehicle ahead of his, as well as in two vehicles behind him with weapons in full view. All of his movements were planned. The facilities on-site were more than adequate and resembled those found in Canada: flush toilet, air-conditioned sleeping quarters and cafeteria-style food. With air-conditioning available in buildings and in vehicles, it was not too difficult to adjust to the 40 Celsius heat, but one had to be equipped with very dark sunglasses. The high humidity and the heat made it different from conditions experienced in Canada. The people from Ecuador were very friendly and proud to be working on the rigs. Jobs are scarce and the level of poverty high. It was an enjoyable experience overall, as long as one is careful to mitigate risks and take the advice of experts. 3 figs.

  11. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  12. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  13. Preliminary assessment report for National Guard Training Center, Georgia Army National Guard, Fort Stewart, Georgia

    International Nuclear Information System (INIS)

    1993-07-01

    This report presents the results of the preliminary assessment (PA) conducted by Argonne National Laboratory at the Georgia Army National Guard (GAARNG) facility near Hinesville, Georgia, known as the National Guard Training Center (NGTC). Preliminary assessments of federal facilities are being conducted to compile the information necessary for completing preremedial activities and to provide a priority basis for completing corrective actions (where necessary) in response to releases of hazardous substances. The principal objective of the PA is to characterize the site accurately and determine the need for further action by examining previous site activities, types and quantities of hazardous substances utilized, and potential pathways by which contamination could affect public health and the environment. The scope of this assessment is limited to the facilities and past activities contained within the NGTC. Preliminary assessment site score sheet information is also provided for the NGTC. However, this assessment report is intended to be read in conjunction with a previous IRP assessment of Fort Stewart completed in 1992 (USATHAMA 1992) and to provide comprehensive information on the NGTC area for incorporation with information contained in that previous assessment for the entirety of Fort Stewart

  14. Improved Coast Guard Communications Using Commercial Satellites and WWW Technology

    Science.gov (United States)

    1997-06-18

    Information collection and distribution are essential components of most Coast Guard missions. However, information needs have typically outpaced the ability of the installed communications systems to meet those needs. This mismatch leads to reduced ...

  15. Advertisement call and tadpole morphology of the clutch-guarding ...

    African Journals Online (AJOL)

    Advertisement call and tadpole morphology of the clutch-guarding frog Mantidactylus argenteus from eastern ... We provide the first descriptions of the tadpole and advertisement call of Mantidactylus argenteus. ... AJOL African Journals Online.

  16. 46 CFR 50.10-30 - Coast Guard number.

    Science.gov (United States)

    2010-10-01

    ... boilers and pressure vessels. (c) The Coast Guard number is comprised of the following: (1) Three capital... St. Louis. STB Sturgeon Bay. TAM Tampa. TOL Toledo. VAL Valdez. WNC Wilmington, NC. [CGFR 68-82, 33...

  17. EPA Region 1 Coast Guard Jurisdictional Boundary - Polygons

    Data.gov (United States)

    U.S. Environmental Protection Agency — Jurisdictional boundary between EPA and Coast Guard for EPA Region I. Created from 1:100000 USGS DLGs with greater detail drawn from 1:24000 commercial street data...

  18. EPA Region 1 Coast Guard Jurisdictional Boundary - Arcs

    Data.gov (United States)

    U.S. Environmental Protection Agency — Jurisdictional boundary between EPA and Coast Guard for EPA Region I. Created from 1:100000 USGS DLGs with greater detail drawn from 1:24000 commercial street data...

  19. 33 CFR 23.15 - Coast Guard ensign.

    Science.gov (United States)

    2010-07-01

    ... distinctive emblem of the Coast Guard in blue and white is placed with its center on a line with the lower..., the emblem covering a horizontal space of three stripes. [CGFR 57-35, 22 FR 6765, Aug. 22, 1957] ...

  20. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  1. Correlation Investigation as to the Mental Health of the Prison Guard in Xi'an Police Station

    Institute of Scientific and Technical Information of China (English)

    Feng Xue

    2005-01-01

    Based on the symptom check list 90,EPQ scale and the simplified coping style questionaire,the author made a relative study on psychological health,personality character and coping style of 267 prison guard of police bureau in Xi'an city .The study shows this:   ①The mental health,personality character and coping style could be effected by many factors,such as gender,age,educational background,income,origin,satisfactory degree of working enviroment and some others.The mental health,personality character and coping style could effect each other.②The psychological health state of 267 prison guard is much worse than that of domestic common people.③The personality character of 267 prison guard shows much higher hostility and lower nervous than that of domestic common people.④The coping style of 267 prison guard often take positive coping styles.⑤Psychological health,personality character and coping style of prison guard are closely related.

  2. The Effectiveness of Shin Guards Used by Football Players

    Directory of Open Access Journals (Sweden)

    Yasar Tatar

    2013-03-01

    Full Text Available In football, injuries from opponent contact occur commonly in the lower extremities. FIFA the world’s governing body for football requires players to wear shin guards. The aim of this study was to compare the protective effectiveness of polypropylene based shin guards with custom-made carbon fiber ones. Three commercial polypropylene shin guards (Adidas Predator™, Adidas UCL™, and Nike Mercurial™ and two custom-made carbon fiber shin guards were examined. The experimental setup had the following parts: 1 A pendulum attached a load cell at the tip (CAS Corp., Korea and a fixed prosthetic foot equipped with a cleat to simulate an attacker’s foot. 2 An artificial tibia prepared by condensed foam and reinforced by carbon fibers protected with soft clothing. 3 A multifunctional sensor system (Tekscan Corp., F-Socket System, Turkey to record the impact on the tibia. In the low impact force trials, only 2.79-9.63 % of the load was transmitted to the sensors. When comparing for mean force, peak force and impulse, both carbon fiber shin guards performed better than the commercial ones (Adidas Predator™, Adidas UCL™, and Nike Mercurial™ (p = 0.000. Based on these same parameters, the Nike Mercurial™ provided better protection than the Adidas Predator™ and the Adidas UCL™ (p = 0.000. In the high impact force trials, only 5.16-10.90 % of the load was transmitted to the sensors. For peak force and impulse, the carbon fiber shin guards provided better protection than all the others. Carbon fiber shin guards possess protective qualities superior to those of commercial polypropylene shin guards.

  3. Elder care, old-age security and social change in rural Yogyakarta, Indonesia = De zorg voor en bestaanszekerheid van ouderen tegen de achtergrond van sociale veranderingen in ruraal Yogyakarta, Indonesië

    NARCIS (Netherlands)

    Keasberry, I.N.

    2002-01-01

    This thesis describes the significance of the living conditions and care arrangements of older persons for their old-age security in the villages of Kebonagung (regency of Bantul) and Giriwungu (regency of Gunung Kidul) in the Special Region of Yogyakarta, Indonesia.

    The

  4. 14-3-3 Proteins in Guard Cell Signaling.

    Science.gov (United States)

    Cotelle, Valérie; Leonhardt, Nathalie

    2015-01-01

    Guard cells are specialized cells located at the leaf surface delimiting pores which control gas exchanges between the plant and the atmosphere. To optimize the CO2 uptake necessary for photosynthesis while minimizing water loss, guard cells integrate environmental signals to adjust stomatal aperture. The size of the stomatal pore is regulated by movements of the guard cells driven by variations in their volume and turgor. As guard cells perceive and transduce a wide array of environmental cues, they provide an ideal system to elucidate early events of plant signaling. Reversible protein phosphorylation events are known to play a crucial role in the regulation of stomatal movements. However, in some cases, phosphorylation alone is not sufficient to achieve complete protein regulation, but is necessary to mediate the binding of interactors that modulate protein function. Among the phosphopeptide-binding proteins, the 14-3-3 proteins are the best characterized in plants. The 14-3-3s are found as multiple isoforms in eukaryotes and have been shown to be involved in the regulation of stomatal movements. In this review, we describe the current knowledge about 14-3-3 roles in the regulation of their binding partners in guard cells: receptors, ion pumps, channels, protein kinases, and some of their substrates. Regulation of these targets by 14-3-3 proteins is discussed and related to their function in guard cells during stomatal movements in response to abiotic or biotic stresses.

  5. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  6. 75 FR 18451 - Safety and Security Zones; Tall Ships Challenge 2010, Great Lakes; Cleveland, OH; Bay City, MI...

    Science.gov (United States)

    2010-04-12

    ...-AA87 Safety and Security Zones; Tall Ships Challenge 2010, Great Lakes; Cleveland, OH; Bay City, MI.... SUMMARY: The Coast Guard proposes to establish temporary safety and security zones around each Tall Ship visiting the Great Lakes during the Tall Ships Challenge 2010 race series. These safety and security zones...

  7. 33 CFR 165.110 - Safety and Security Zone; Liquefied Natural Gas Carrier Transits and Anchorage Operations, Boston...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone... Limited Access Areas First Coast Guard District § 165.110 Safety and Security Zone; Liquefied Natural Gas.... The following areas are safety and security zones: (1) Vessels underway. All navigable waters of the...

  8. 76 FR 22809 - Safety Zone; Bay Ferry II Maritime Security Exercise; San Francisco Bay, San Francisco, CA

    Science.gov (United States)

    2011-04-25

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0196] RIN 1625-AA00 Safety Zone; Bay Ferry II Maritime Security Exercise; San Francisco Bay, San Francisco, CA AGENCY... Security Exercise; San Francisco Bay, San Francisco, CA. (a) Location. The limits of this safety zone...

  9. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  10. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  11. Exploring emergent properties in cellular homeostasis using OnGuard to model K+ and other ion transport in guard cells.

    Science.gov (United States)

    Blatt, Michael R; Wang, Yizhou; Leonhardt, Nathalie; Hills, Adrian

    2014-05-15

    It is widely recognized that the nature and characteristics of transport across eukaryotic membranes are so complex as to defy intuitive understanding. In these circumstances, quantitative mathematical modeling is an essential tool, both to integrate detailed knowledge of individual transporters and to extract the properties emergent from their interactions. As the first, fully integrated and quantitative modeling environment for the study of ion transport dynamics in a plant cell, OnGuard offers a unique tool for exploring homeostatic properties emerging from the interactions of ion transport, both at the plasma membrane and tonoplast in the guard cell. OnGuard has already yielded detail sufficient to guide phenotypic and mutational studies, and it represents a key step toward 'reverse engineering' of stomatal guard cell physiology, based on rational design and testing in simulation, to improve water use efficiency and carbon assimilation. Its construction from the HoTSig libraries enables translation of the software to other cell types, including growing root hairs and pollen. The problems inherent to transport are nonetheless challenging, and are compounded for those unfamiliar with conceptual 'mindset' of the modeler. Here we set out guidelines for the use of OnGuard and outline a standardized approach that will enable users to advance quickly to its application both in the classroom and laboratory. We also highlight the uncanny and emergent property of OnGuard models to reproduce the 'communication' evident between the plasma membrane and tonoplast of the guard cell. Copyright © 2014 The Authors. Published by Elsevier GmbH.. All rights reserved.

  12. Guarding the Gates: Confronting Social Engineering in Nuclear Power

    International Nuclear Information System (INIS)

    LeClair, Jane

    2014-01-01

    The presentation is structured as follows: Overview; Physical Security; Data Security; Intrusion from the Outside; Intrusion From the Inside; Isolate ‘Protected’ Areas; Social Engineering; Questions?

  13. What is a "good" encoding of guarded choice?

    DEFF Research Database (Denmark)

    Nestmann, Uwe

    2000-01-01

    into the latter that preserves divergence-freedom and symmetries. This paper argues that there are nevertheless "good" encodings between these calculi. In detail, we present a series of encodings for languages with (1) input-guarded choice, (2) both input and output-guarded choice, and (3) mixed-guarded choice......, and investigate them with respect to compositionality and divergence-freedom. The first and second encoding satisfy all of the above criteria, but various "good" candidates for the third encoding-inspired by an existing distributed implementation-invalidate one or the other criterion, While essentially confirming...... Palamidessi's result, our study suggests that the combination of strong compositionality and divergence-freedom is too strong for more practical purposes. (C) 2000 Academic Press....

  14. Safety, security and safeguard

    International Nuclear Information System (INIS)

    Zakariya, Nasiru Imam; Kahn, M.T.E.

    2015-01-01

    Highlights: • The 3S interface in the design of PPS is hereby proposed. • The 3S synergy enhances the reduction in vulnerability and terrorism. • Highlighted were concept of detection, delay and response. - Abstract: A physical protection system (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage and terrorist attacks. Therefore, this paper proposes the use of a systematic and measurable approach to the design of PPS and its emphases on the concept of detection, delay and response. The proposed performance based PPS has the capability of defeating adversaries thereby achieving its targets. Therefore, timely detection of intrusion – based on the use of sensors, signal lines and alarm systems – is a major principle in the proposed system. Also the need for deterrence such as barriers in form of guards, access control, close circuit television (CCTV), strong policy and procedures, then the security culture amongst the facility workers was appropriately discussed. Since nuclear power is considered the only source that can provide large scale electricity with comparatively minimal impact on the environment, the paper also considered base guidelines for the application of PPS in any nuclear and radioactive facilities, followed with the necessity to incorporate inherent safety, security and safeguard (3S) synergy innovation in the physical protection system design and other characteristics that will enhance to reduce the vulnerability of nuclear facilities and materials to theft sabotage and terrorist attacks

  15. Major issues in the training of security personnel

    International Nuclear Information System (INIS)

    Knauf, W.M.; Robertson, L.P.

    1982-01-01

    The effectiveness of the response component of a physical protection system depends greatly upon the training received by the security personnel. The issues and problems in the area of training which were of greatest concern to the attendees of the 1980 and 1981 INMM sponsored Technical Workshops on Guard Training are discussed. The attendees were training supervisors of managers of security personnel and represented a variety of organizations and companies including DOE facilities, NRC licensees, the military, private security contractors, and governmental agencies. Major categories of concern include: professionalism in security, legal constraints and obligations, physical and psychological testing and standards, governmental requirements, morale and motivation, and tactical training techniques

  16. Secure quantum key distribution

    Science.gov (United States)

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  17. 360 PORT MDA - A Strategy to Improve Port Security

    Science.gov (United States)

    2006-09-01

    Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than

  18. PTSD Trajectory, Comorbidity, and Utilization of Mental Health Services Among National Guard Soldiers

    Science.gov (United States)

    2013-10-01

    Reserve), 45 years or older, divorced/separated or never married ( vs . married ), enlisted ( vs . officer), or living in a household with a total income...officers, and those who were married had a lower prevalence of anger than unmarried soldiers. Probable civilian-related PTSD was documented among 4.3% of...between the ages of 18 and 35 (59.9%), and married (53.1%). In our sample, the Army National Guard had the highest representation (43.4%) and the

  19. 33 CFR 165.1192 - Security Zones; Waters surrounding San Francisco International Airport and Oakland International...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Waters..., California. 165.1192 Section 165.1192 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport...

  20. 33 CFR 165.554 - Security Zone; Three Mile Island Generating Station, Susquehanna River, Dauphin County...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Three Mile Island... Areas Fifth Coast Guard District § 165.554 Security Zone; Three Mile Island Generating Station... waters of the Susquehanna River in the vicinity of the Three Mile Island Generating Station bounded by a...

  1. 33 CFR 165.1190 - Security Zone; San Francisco Bay, Oakland Estuary, Alameda, CA.

    Science.gov (United States)

    2010-07-01

    ..., Oakland Estuary, Alameda, CA. 165.1190 Section 165.1190 Navigation and Navigable Waters COAST GUARD... § 165.1190 Security Zone; San Francisco Bay, Oakland Estuary, Alameda, CA. (a) Location. The following area is a security zone: All navigable waters of the Oakland Estuary, California, from the surface to...

  2. 33 CFR 165.1312 - Security Zone; Portland Rose Festival on Willamette River.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Portland Rose Festival on Willamette River. 165.1312 Section 165.1312 Navigation and Navigable Waters COAST GUARD... § 165.1312 Security Zone; Portland Rose Festival on Willamette River. (a) Location. The following area...

  3. 33 CFR 165.1121 - Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA.

    Science.gov (United States)

    2010-07-01

    ... Guard District § 165.1121 Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA. (a... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone: Fleet Supply Center Industrial Pier, San Diego, CA. 165.1121 Section 165.1121 Navigation and Navigable Waters COAST...

  4. 33 CFR 165.1120 - Security Zone; Naval Amphibious Base, San Diego, CA.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Naval Amphibious Base, San Diego, CA. 165.1120 Section 165.1120 Navigation and Navigable Waters COAST GUARD, DEPARTMENT... § 165.1120 Security Zone; Naval Amphibious Base, San Diego, CA. (a) Location. The following area is a...

  5. 33 CFR 165.813 - Security Zones; Ports of Houston and Galveston, TX.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Ports of Houston... Security Zones; Ports of Houston and Galveston, TX. (a) Location. Within the Ports of Houston and Galveston... yards of a cruise ship unless expressly authorized by the Coast Guard Captain of the Port Houston...

  6. 33 CFR 165.814 - Security Zones; Captain of the Port Houston-Galveston Zone.

    Science.gov (United States)

    2010-07-01

    ... Port Houston-Galveston Zone. 165.814 Section 165.814 Navigation and Navigable Waters COAST GUARD... § 165.814 Security Zones; Captain of the Port Houston-Galveston Zone. (a) Location. The following areas are designated as security zones: (1) Houston, Texas. The Houston Ship Channel and all associated...

  7. 33 CFR 165.115 - Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth, Massachusetts. 165.115 Section 165.115 Navigation and Navigable... Coast Guard District § 165.115 Safety and Security Zones; Pilgrim Nuclear Power Plant, Plymouth...

  8. 33 CFR 165.835 - Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL. 165.835 Section 165.835 Navigation and Navigable Waters COAST GUARD... § 165.835 Security Zone; Port of Mobile, Mobile Ship Channel, Mobile, AL. (a) Definition. As used in...

  9. 75 FR 27432 - Security Zone; Golden Guardian 2010 Regional Exercise; San Francisco Bay, San Francisco, CA

    Science.gov (United States)

    2010-05-17

    ... can better evaluate its effects on them and participate in the rulemaking process. Small businesses... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0221] RIN 1625-AA87 Security Zone; Golden Guardian 2010 Regional Exercise; San Francisco Bay, San Francisco, CA AGENCY...

  10. 76 FR 40617 - Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington

    Science.gov (United States)

    2011-07-11

    ... better evaluate its effects on them and participate in the rulemaking process. Small businesses may send... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0505] RIN 1625-AA87 Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington AGENCY...

  11. Minimizing guard ring dead space in silicon detectors with an n-type guard ring at the edge of the detector

    International Nuclear Information System (INIS)

    Palviainen, Tanja; Tuuva, Tuure; Leinonen, Kari

    2007-01-01

    Detectors with n-type silicon with an n + -type guard ring were investigated. In the present work, a new p + /n/n + detector structure with an n + guard ring is described. The guard ring is placed at the edge of the detector. The detector depletion region extends also sideways, allowing for signal collection very close to the n-guard ring. In this kind of detector structure, the dead space of the detector is minimized to be only below the guard ring. This is proved by simulations done using Silvaco/ATLAS software

  12. Minimizing guard ring dead space in silicon detectors with an n-type guard ring at the edge of the detector

    Energy Technology Data Exchange (ETDEWEB)

    Palviainen, Tanja [Lappeenranta University of Technology, P.O. Box 20, FIN-53851 Lappeenranta (Finland)]. E-mail: tanja.palviainen@lut.fi; Tuuva, Tuure [Lappeenranta University of Technology, P.O. Box 20, FIN-53851 Lappeenranta (Finland); Leinonen, Kari [Lappeenranta University of Technology, P.O. Box 20, FIN-53851 Lappeenranta (Finland)

    2007-04-01

    Detectors with n-type silicon with an n{sup +}-type guard ring were investigated. In the present work, a new p{sup +}/n/n{sup +} detector structure with an n{sup +} guard ring is described. The guard ring is placed at the edge of the detector. The detector depletion region extends also sideways, allowing for signal collection very close to the n-guard ring. In this kind of detector structure, the dead space of the detector is minimized to be only below the guard ring. This is proved by simulations done using Silvaco/ATLAS software.

  13. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  14. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  15. Michigan field artillery's 'Blackjacks' training in Latvia > National Guard

    Science.gov (United States)

    Charles Smith, 1st Battalion, 119th Field Artillery, Michigan Army National Guard, set up the M67 GLPS for 24 years. 1st. Lt. Brice Masterson, and Sgt. 1st Class Charles Smith, 1st Battalion, 119th Field , Lithuania and the United States will participate in the exercise. The exercise takes place at Adazi Training

  16. Nitric Oxide (NO) Measurements in Stomatal Guard Cells.

    Science.gov (United States)

    Agurla, Srinivas; Gayatri, Gunja; Raghavendra, Agepati S

    2016-01-01

    The quantitative measurement of nitric oxide (NO) in plant cells acquired great importance, in view of the multifaceted function and involvement of NO as a signal in various plant processes. Monitoring of NO in guard cells is quite simple because of the large size of guard cells and ease of observing the detached epidermis under microscope. Stomatal guard cells therefore provide an excellent model system to study the components of signal transduction. The levels and functions of NO in relation to stomatal closure can be monitored, with the help of an inverted fluorescence or confocal microscope. We can measure the NO in guard cells by using flouroprobes like 4,5-diamino fluorescein diacetate (DAF-2DA). This fluorescent dye, DAF-2DA, is cell permeable and after entry into the cell, the diacetate group is removed by the cellular esterases. The resulting DAF-2 form is membrane impermeable and reacts with NO to generate the highly fluorescent triazole (DAF-2T), with excitation and emission wavelengths of 488 and 530 nm, respectively. If time-course measurements are needed, the epidermis can be adhered to a cover-glass or glass slide and left in a small petri dishes. Fluorescence can then be monitored at required time intervals; with a precaution that excitation is done minimally, only when a fluorescent image is acquired. The present method description is for the epidermis of Arabidopsis thaliana and Pisum sativum and should work with most of the other dicotyledonous plants.

  17. Refining types using type guards in TypeScript

    NARCIS (Netherlands)

    de Wolff, Ivo Gabe; Hage, J.

    2017-01-01

    We discuss two adaptations of the implementation of type guards and narrowing in the TypeScript compiler. The first is an improvement on the original syntax-directed implementation, and has now replaced the original one in the TypeScript compiler. It is specifically suited for the scenario in which

  18. The Modeling of Factors That Influence Coast Guard Manpower Requirements

    Science.gov (United States)

    2014-12-01

    applications, and common data warehouses needed to fully develop an effective and efficient manpower requirements engineering and management program. The... manpower requirements determination ensures a ready force, and safe and effective mission execution. Shortage or excess of manpower is the catalyst...FACTORS THAT INFLUENCE COAST GUARD MANPOWER REQUIREMENTS by Kara M. Lavin December 2014 Thesis Advisor: Ronald E. Giachetti Co-Advisor

  19. 75 FR 79956 - Protection for Whistleblowers in the Coast Guard

    Science.gov (United States)

    2010-12-21

    ... constitutes evidence of sexual harassment and discrimination, among other subjects. Additionally, changes to... (including sexual harassment or discrimination), gross mismanagement, a gross waste of funds or other... Force, Marine Corps, and Coast Guard''). Section 1034 covers allegations and disclosures of sexual...

  20. Special Staff - Joint Staff - Leadership - The National Guard

    Science.gov (United States)

    the ARNG Deputy Director of the ARNG Chief of Staff of the ARNG Command Chief Warrant Officer of the Site Maintenance Battle Focused Training Strategy Battle Staff Training Resources News Publications March Today in Guard History Leadership CNGB VCNGB SEA DANG DARNG Joint Staff J-1 J-2 J-3 J-4 J-5 J-6 J

  1. 76 FR 53329 - Eleventh Coast Guard District Annual Marine Events

    Science.gov (United States)

    2011-08-26

    .... SUMMARY: The Coast Guard is updating and consolidating the list of marine events occurring annually within... not currently reflect changes in actual dates and other required information. The effects of these... location that offers a better vantage point to monitor the event. The location of the PATCOM may also be...

  2. EPA Region 1 Coast Guard Jurisdictional Boundary - Polygons

    Science.gov (United States)

    Jurisdictional boundary between EPA and Coast Guard for EPA Region I. Created from 1:100000 USGS DLGs with greater detail drawn from 1:24000 commercial street data for Region I.This layer is used to determine which agency will be reponsible in the event of an oil spill.

  3. A metric model of lambda calculus with guarded recursion

    DEFF Research Database (Denmark)

    Birkedal, Lars; Schwinghammer, Jan; Støvring, Kristian

    2010-01-01

    We give a model for Nakano’s typed lambda calculus with guarded recursive definitions in a category of metric spaces. By proving a computational adequacy result that relates the interpretation with the operational semantics, we show that the model can be used to reason about contextual equivalence....

  4. 30 CFR 57.12080 - Bare conductor guards.

    Science.gov (United States)

    2010-07-01

    ....12080 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND HEALTH SAFETY AND HEALTH STANDARDS-UNDERGROUND METAL AND NONMETAL MINES Electricity... conductors are less than 7 feet above the rail, they shall be guarded at all points where persons work or...

  5. Suicide in the Army National Guard: An Empirical Inquiry

    Science.gov (United States)

    Griffith, James

    2012-01-01

    Since 2004, suicides in the U.S. military have risen, most notably in the Army National Guard (ARNG). Data used in this study were obtained for suicides occurring from 2007 to 2010 and for a random sample of nonsuicides from the general ARNG population. Of the military-related variables considered, a few showed relationships to suicide. Rather,…

  6. EPA Region 1 Coast Guard Jurisdictional Boundary - Arcs

    Science.gov (United States)

    Jurisdictional boundary between EPA and Coast Guard for EPA Region I. Created from 1:100000 USGS DLGs with greater detail drawn from 1:24000 commercial street data for Region I.This layer is used to determine which agency will be reponsible in the event of an oil spill.

  7. Adaptive guard channel allocation scheme with buffer for mobile ...

    African Journals Online (AJOL)

    The devastating effect congestion has on the quality of service delivery and overall network performance demands an utmost attention. This certainly calls for taking some expedient measures to deal with congestion so as to salvage the network from total collapse. In this paper, an adaptive guard channel allocation scheme ...

  8. Surfing for mouth guards: assessing quality of online information.

    Science.gov (United States)

    Magunacelaya, Macarena B; Glendor, Ulf

    2011-10-01

    The Internet is an easily accessible and commonly used source of health-related information, but evaluations of the quality of this information within the dental trauma field are still lacking. The aims of this study are (i) to present the most current scientific knowledge regarding mouth guards used in sport activities, (ii) to suggest a scoring system to evaluate the quality of information pertaining to mouth guard protection related to World Wide Web sites and (iii) to employ this scoring system when seeking reliable mouth guard-related websites. First, an Internet search using the keywords 'athletic injuries/prevention and control' and 'mouth protector' or 'mouth guards' in English was performed on PubMed, Cochrane, SvedMed+ and Web of Science to identify scientific knowledge about mouth guards. Second, an Internet search using the keywords 'consumer health information Internet', 'Internet information public health' and 'web usage-seeking behaviour' was performed on PubMed and Web of Science to obtain scientific articles seeking to evaluate the quality of health information on the Web. Based on the articles found in the second search, two scoring systems were selected. Then, an Internet search using the keywords 'mouth protector', 'mouth guards' and 'gum shields' in English was performed on the search engines Google, MSN and Yahoo. The websites selected were evaluated for reliability and accuracy. Of the 223 websites retrieved, 39 were designated valid and evaluated. Nine sites scored 22 or higher. The mean total score of the 39 websites was 14.2. Fourteen websites scored higher than the mean total score, and 25 websites scored less. The highest total score, presented by a Public Institution Web site (Health Canada), was 31 from a maximum possible score of 34, and the lowest score was 0. This study shows that there is a high amount of information about mouth guards on the Internet but that the quality of this information varies. It should be the responsibility

  9. TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS

    OpenAIRE

    Sen-Tarng Lai

    2015-01-01

    E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security test and security event detection procedures, this paper proposes the Two-Layer Secure ...

  10. The Impact of Excluding Food Guarding from a Standardized Behavioral Canine Assessment in Animal Shelters

    Science.gov (United States)

    Mohan-Gibbons, Heather; Dolan, Emily D.; Reid, Pamela; Slater, Margaret R.; Mulligan, Hugh; Weiss, Emily

    2018-01-01

    Simple Summary Recent research has called into question the value of the food guarding assessment as a predictive tool for determining the safety of shelter dogs. This study examined the effect of eliminating the food guarding assessment in nine U.S. animal shelters. It was found that when the food guarding assessment was removed, bites or other injuries to staff or adopters did not increase. However, dogs exhibiting food guarding behavior were less likely to be adopted, had a longer shelter stay, and were more likely to be euthanized than dogs in the general population. Based on previous research and this study’s findings, the authors recommend that shelters discontinue the food guarding assessment. Abstract Many shelters euthanize or restrict adoptions for dogs that exhibit food guarding while in the animal shelter. However, previous research showed that only half the dogs exhibiting food guarding during an assessment food guard in the home. So, dogs are often misidentified as future food guarders during shelter assessments. We examined the impact of shelters omitting food guarding assessments. Nine shelters conducted a two-month baseline period of assessing for food guarding followed by a two-month investigative period during which they omitted the food guarding assessment. Dogs that guarded their food during a standardized assessment were less likely to be adopted, had a longer shelter stay, and were more likely to be euthanized. When the shelters stopped assessing for food guarding, there was no significant difference in the rate of returns of food guarding dogs, even though more dogs were adopted because fewer were identified with food guarding behavior. Additionally, the number of injuries to staff, volunteers, and adopters was low (104 incidents from a total of 14,180 dogs) and did not change when the food guarding assessment was omitted. These results support a recommendation that shelters discontinue the food guarding assessment. PMID:29419746

  11. Gone to Fiddler’s Green: Reconnaissance and Security for the Corps

    Science.gov (United States)

    2011-05-01

    based reconnaissance and security organization. A U.S. corps in major combat operations must contend with an enemy’s armored advance guard or...screen, guard, and cover. Andrew D. Goldin, “ Ruminations on Modular Cavalry,” Armor Magazine, (September-October 2006): 14. 22 Goldin, “ Ruminations ...on Modular Cavalry,” 15. 23 Goldin, “ Ruminations on Modular Cavalry,” 16. 10 capabilities compared to modular force brigade combat teams in support

  12. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  13. Conservation science in a terrorist age: the impact of airport security screening on the viability and DNA integrity of frozen felid spermatozoa.

    Science.gov (United States)

    Gloor, Kayleen T; Winget, Doug; Swanson, William F

    2006-09-01

    In response to growing terrorism concerns, the Transportation Security Administration now requires that all checked baggage at U.S. airports be scanned through a cabinet x-ray system, which may increase risk of radiation damage to transported biologic samples and other sensitive genetic material. The objective of this study was to investigate the effect of these new airport security regulations on the viability and DNA integrity of frozen felid spermatozoa. Semen was collected from two domestic cats (Felis silvestris catus) and one fishing cat (Prionailurus viverrinus), cryopreserved in plastic freezing straws, and transferred into liquid nitrogen dry shippers for security screening. Treatment groups included frozen samples from each male scanned once or three times using a Transportation Security Administration-operated cabinet x-ray system, in addition to non-scanned samples (i.e., negative control) and samples previously scanned three times and exposed to five additional high-intensity x-ray bursts (i.e., positive control). Dosimeters placed in empty dry shippers were used to quantify radiation exposure. Following treatment, straws were thawed and spermatozoa analyzed for post-thaw motility (percentage motile and rate of progressive movement), acrosome status, and DNA integrity using single-cell gel electrophoresis (i.e., the comet assay). Dosimeter measurements determined that each airport screening procedure produced approximately 16 mrem of radiation exposure. Our results indicated that all levels of radiation exposure adversely affected (P 0.05) among treatment groups. Results also showed that the amount of double-stranded DNA damage was greater (P cat species scanned three times compared to samples scanned once or negative controls. Findings suggest that new airport security measures may cause radiation-induced damage to frozen spermatozoa and other valuable biologic samples transported on passenger aircraft and that alternative modes of sample

  14. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  15. Security aspects in teleradiology workflow

    Science.gov (United States)

    Soegner, Peter I.; Helweg, Gernot; Holzer, Heimo; zur Nedden, Dieter

    2000-05-01

    The medicolegal necessity of privacy, security and confidentiality was the aim of the attempt to develop a secure teleradiology workflow between the telepartners -- radiologist and the referring physician. To avoid the lack of dataprotection and datasecurity we introduced biometric fingerprint scanners in combination with smart cards to identify the teleradiology partners and communicated over an encrypted TCP/IP satellite link between Innsbruck and Reutte. We used an asymmetric kryptography method to guarantee authentification, integrity of the data-packages and confidentiality of the medical data. It was necessary to use a biometric feature to avoid a case of mistaken identity of persons, who wanted access to the system. Only an invariable electronical identification allowed a legal liability to the final report and only a secure dataconnection allowed the exchange of sensible medical data between different partners of Health Care Networks. In our study we selected the user friendly combination of a smart card and a biometric fingerprint technique, called SkymedTM Double Guard Secure Keyboard (Agfa-Gevaert) to confirm identities and log into the imaging workstations and the electronic patient record. We examined the interoperability of the used software with the existing platforms. Only the WIN-XX operating systems could be protected at the time of our study.

  16. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  17. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  18. ARMY NATIONAL GUARD: Enhanced Brigade Readiness Improved but Personnel and Workload Are Problems

    National Research Council Canada - National Science Library

    2000-01-01

    .... Reserve units such as the National Guard's 15 Enhanced Separate Brigades, the Guard's highest priority combat units, provide fighting forces at about 2530 percent of the cost of active units due...

  19. Great Lakes Surface Ice Reports from U.S. Coast Guard

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Data consist of ice observations from U.S. Coast Guard vessels operating on the Great Lakes, and from Coast Guard shore stations reported via teletype messages and...

  20. An Assessment of the New York State Enhanced Security Guard Training Legislation and Its Efficacy on Security Officer Preparedness

    Science.gov (United States)

    2011-12-01

    ACKNOWLEDGMENTS I would like to begin by thanking my beautiful wife for her support during this program. I could not have completed this journey had it not...also pointed to the web writings of al Qaeda blogger Abu Suleiman Al-Nasser, who recently wrote, “Rush my Muslim brothers to targeting financial sites

  1. The Coast Guard Proceedings of the Marine Safety and Security Council. Waterways. Summer 2016

    Science.gov (United States)

    2016-01-01

    Number of Establishments Employment 2012 Revenues ($1,000) Aquaculture 3,093 5,798 1,371,707 Finsh farming and sh hatcheries #N/A #N/A #N/A Shell sh...farming #N/A #N/A #N/A Other aquaculture #N/A #N/A #N/A Fishing 2,259 5,990 5,118,939 Finsh shing 1,288 3,669 #N/A Shell sh shing 925 2,200 #N/A...described above, whereas renewable diesel is produced via hydrotreating or biomass -to-liquid conversion pro- cesses, the results being a fuel that is

  2. The Coast Guard Proceedings of the Marine Safety & Security Council. Volume 72, Number 3, Fall 2015

    Science.gov (United States)

    2015-01-01

    transportation and storage. Gaseous Fuels Gas is found in naturally occurring pockets of conventional gas, coal bed methane, shale gas, and tight...Institute, 2015. 6. Singapore, Suez, Panama, Hong Kong, Gibraltar, and some English Channel entrance or existing ports meet these criteria. 7. M. King...the U.S. Navy as an aviation electricians’ mate. References: Lewis, Richard J. Sr. “Calcium Oxide.” Hawley’s Condensed Chemical Dictionary , 14th

  3. How to Prepare the National Guard’s Leadership for Successful Venture in Homeland Security

    Science.gov (United States)

    2009-09-01

    Posse Comitatus Act and other support approved by the Sec Def. (DoD JP 3-26, 2005, p. vi) Military Assistance to Civil Authorities ( MACA ) (as per...mission of MACA . MACA mission consist of three mission subsets. These mission subsets consist of: military support to civil authorities (MSCA...Terms) explanation a. Military Assistance to Civil Authorities ( MACA ) include Consequence management, DODD 3025.15 b. Military Support for Civil

  4. The Coast Guard Proceedings of the Marine Safety and Security Council: Spring 2016

    Science.gov (United States)

    2016-04-01

    management system designed to manage safety elements in the workplace . In practice, an operational...winning DuPont family of workplace safety training offerings. Management Buy-In Even if an organization embraces nonconformities as a call to improved...PROCEEDINGS Spring 2016 Vol. 73, Number 1 Safety Management System Objectives 6 Safety Management Facilitates Safe Vessel Operation Vessel

  5. Investigating the Benefits and Drawbacks of Realigning the National Guard Under the Department of Homeland Security

    Science.gov (United States)

    2016-08-01

    and opinions regarding potential drawbacks to date. While the drawbacks noted are significant, we also identified several poten- tial benefits to...defend, as it deals entirely in hypothet- ical situations and is based solely on the opinions and conjecture of those interviewed. Nonetheless, stream...of Staff, Homeland Defense, Joint Publica - tion 3-27, Washington, DC: Joint Chiefs of Staff, July 29, 2013, Ap- pendix A, pp. A-1 – A-6. 9

  6. The National Guard State Partnership Program and Regional Security in the Western Balkans

    Science.gov (United States)

    2014-12-12

    educational system as well as youth movements are separated by ethnicity, which in turn leaves the young people susceptible to indoctrination and political...of the state to respond in natural emergencies.80 A testament of the effectiveness of the program is also its expansion from strictly mil-mil... testament of the friendship, we have deployed together to Afghanistan and continue to look for future military collaborations. Deployments are the

  7. Proposals to Restructure Social Security

    OpenAIRE

    Peter A. Diamond

    1996-01-01

    This paper discusses five proposed changes in Social Security: indexing the normal retirement age to life expectancy (as Sweden is doing); investing part of the trust funds in private securities; partial privatization (as has been proposed by Senators Kerrey and Simpson, Sweden is doing and Mexico has done); replacing Social Security by individually mandated savings (as was done in Chile in 1981); and mandating employer provided retirement savings (as recently legislated in Australia and is e...

  8. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  9. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  10. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  11. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  12. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  13. 5 CFR 831.306 - Service as a National Guard technician before January 1, 1969.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Service as a National Guard technician... National Guard technician before January 1, 1969. (a) Definitions. In this section—(1) Service as a National Guard technician is service performed under section 709 of title 32, United States Code (or under...

  14. 48 CFR 3009.171-3 - Determination of eligibility for award of FPS guard service contracts.

    Science.gov (United States)

    2010-10-01

    ... eligibility for award of FPS guard service contracts. 3009.171-3 Section 3009.171-3 Federal Acquisition... eligibility for award of FPS guard service contracts. (a) Contracting officers shall make a determination of eligibility for award of FPS guard service contracts upon identification of the apparent successful offeror as...

  15. 30 CFR 56.12023 - Guarding electrical connections and resistor grids.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Guarding electrical connections and resistor... MINES Electricity § 56.12023 Guarding electrical connections and resistor grids. Electrical connections and resistor grids that are difficult or impractical to insulate shall be guarded, unless protection...

  16. The Impact of Excluding Food Guarding from a Standardized Behavioral Canine Assessment in Animal Shelters

    Directory of Open Access Journals (Sweden)

    Heather Mohan-Gibbons

    2018-02-01

    Full Text Available Many shelters euthanize or restrict adoptions for dogs that exhibit food guarding while in the animal shelter. However, previous research showed that only half the dogs exhibiting food guarding during an assessment food guard in the home. So, dogs are often misidentified as future food guarders during shelter assessments. We examined the impact of shelters omitting food guarding assessments. Nine shelters conducted a two-month baseline period of assessing for food guarding followed by a two-month investigative period during which they omitted the food guarding assessment. Dogs that guarded their food during a standardized assessment were less likely to be adopted, had a longer shelter stay, and were more likely to be euthanized. When the shelters stopped assessing for food guarding, there was no significant difference in the rate of returns of food guarding dogs, even though more dogs were adopted because fewer were identified with food guarding behavior. Additionally, the number of injuries to staff, volunteers, and adopters was low (104 incidents from a total of 14,180 dogs and did not change when the food guarding assessment was omitted. These results support a recommendation that shelters discontinue the food guarding assessment.

  17. 77 FR 16929 - Safety Zones; Fireworks Displays within the Fifth Coast Guard District

    Science.gov (United States)

    2012-03-23

    ...-AA00 Safety Zones; Fireworks Displays within the Fifth Coast Guard District AGENCY: Coast Guard, DHS... for fireworks displays at various locations within the geographic boundary of the Fifth Coast Guard... by fireworks displays. Entry into or movement within these zones during the enforcement periods is...

  18. Early Intervention to Reduce Alcohol Misuse and Abuse in the Ohio Army National Guard

    Science.gov (United States)

    2017-09-01

    PTSD, depression , 7 suicidality , lowered resilience and work performance.  Studies consistently find that substantial number of Guard members misuse...including PTSD, depression , suicidality , lowered resilience and work performance.  Studies consistently find that substantial number of Guard members misuse...Guard members that contributes to and complicates other problems including PTSD, depression , suicidality , lowered resilience and work performance

  19. Diagnostic double guarded low-volume uterine lavage in mares

    DEFF Research Database (Denmark)

    Christoffersen, Mette; Brandis, Louise; Samuelsson, Julia

    2014-01-01

    Endometritis constitutes a major problem in the management of broodmares; hence diagnostic tests with a high sensitivity and specificity are desired. We hypothesize that a double guarded uterine flush technique for bacterial culture and cytology is comparable to standard diagnostic tests, the end......Endometritis constitutes a major problem in the management of broodmares; hence diagnostic tests with a high sensitivity and specificity are desired. We hypothesize that a double guarded uterine flush technique for bacterial culture and cytology is comparable to standard diagnostic tests...... (lavage: 11%, swab: 8%, biopsy: 7%) (positive bacterial growth > 4 Colony forming units (CFU)). Positive cytology was less likely to occur when E. coli was isolated from the diagnostic tests compared to the growth of β-hemolytic streptococci. Isolation of pathogens from uterine samples was highly...

  20. Tricking the guard: exploiting plant defense for disease susceptibility.

    Science.gov (United States)

    Lorang, J; Kidarsa, T; Bradford, C S; Gilbert, B; Curtis, M; Tzeng, S-C; Maier, C S; Wolpert, T J

    2012-11-02

    Typically, pathogens deploy virulence effectors to disable defense. Plants defeat effectors with resistance proteins that guard effector targets. We found that a pathogen exploits a resistance protein by activating it to confer susceptibility in Arabidopsis. The guard mechanism of plant defense is recapitulated by interactions among victorin (an effector produced by the necrotrophic fungus Cochliobolus victoriae), TRX-h5 (a defense-associated thioredoxin), and LOV1 (an Arabidopsis susceptibility protein). In LOV1's absence, victorin inhibits TRX-h5, resulting in compromised defense but not disease by C. victoriae. In LOV1's presence, victorin binding to TRX-h5 activates LOV1 and elicits a resistance-like response that confers disease susceptibility. We propose that victorin is, or mimics, a conventional pathogen virulence effector that was defeated by LOV1 and confers virulence to C. victoriae solely because it incites defense.

  1. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  2. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  3. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  4. A functional intranet for the United States Coast Guard Unit

    OpenAIRE

    Hannah, Robert Todd.

    1998-01-01

    Approved for public release; distribution in unlimited. This thesis describes the complete development process of a friendly functional Intranet for an operational United States Coast Guard (USCG) electronic Support Unit (ESU) in Alameda, California. The final product is suitable for immediate use. It may also be used as a prototype for future Intranet development efforts. The methodology used to develop a finished, working product provides the core subject matter for this thesis. The disc...

  5. Risk, Resiliency and Coping in National Guard Families

    Science.gov (United States)

    2015-10-01

    deployment, to National Guard in second deployment to civilian employment. Couple said they were careful with their finances and worked hard to save money ...were very helpful in providing rent money when the couple was struggling and their children were able to get healthcare through a government subsidized...is examining risk and resilience factors for various family types ( couples , families with children, single NG with and without parental support

  6. Coast Guard Proceedings. Volume 71, Number 1, Spring 2014

    Science.gov (United States)

    2014-01-01

    Canada. Rescue aircrew from Coast Guard Air Station Traverse City, Mich., conduct helicopter hoist training with the crew of the Canadian Coast...barge about 70-feet forward of the towing vessel — causing the barge to split nearly in half and dump thousands of gallons of oil into the...on the impeller B. double the liquid velocity through the pump when compared to a single volute C. reduce the hydraulic end thrust D. provide the

  7. Architectural Survey of Laramie Armory, Wyoming Army National Guard

    Science.gov (United States)

    2016-07-30

    Militia Act of 1903 and the National Defense Acts of June 16, 1916, and June 4, 1920. These acts essentially pulled the National Guard of each of the...environment. If the various materials, features, and spaces that give a building its visual character are not recognized and preserved, then essential ...individual classrooms and offices, a kitchen , supply rooms, storage rooms, boiler room, rifle range, and a latrine with adjacent locker rooms. All of

  8. TrustGuard: A Containment Architecture with Verified Output

    Science.gov (United States)

    2017-01-01

    that the TrustGuard system has minimal performance decline, despite restrictions such as high communication latency and limited available bandwidth...design are the availability of high bandwidth and low delays between the host and the monitoring chip. 3-D integration provides an alternate way of...TRUSTGUARD: A CONTAINMENT ARCHITECTURE WITH VERIFIED OUTPUT SOUMYADEEP GHOSH A DISSERTATION PRESENTED TO THE FACULTY OF PRINCETON UNIVERSITY IN

  9. Inter-Symbol Guard Time for Synchronizing Optical PPM

    Science.gov (United States)

    Far, William; Gin, Jonathan; Srinivasan, Meera; Quirk, Kevin

    2009-01-01

    An inter-symbol guard time has been proposed as a means of synchronizing the symbol and slot clocks of an optical pulse-position modulation (PPM) receiver with the symbol and slot periods of an incoming optical PPM signal.The proposal is applicable to the low-flux case in which the receiver photodetector operates in a photon-counting mode and the count can include contributions from incidental light sources and dark current.

  10. Organizing the National Guard to Provide Effective Domestic Operations

    Science.gov (United States)

    2011-12-01

    Secretary of Defense PA Public Affairs PJ Pararescueman QDR Quadrennial Defense Review RAMZ Rigging Alternate Method – Zodiac (Inflatable Boat...National Guard Bureau, 2010, p. 12). This area has increased over the years with this being the most common status of all NG forces. As a sign of...safety of U.S. citizens and U.S. persons  Protecting critical U.S. infrastructure  Providing humanitarian assistance during disaster response and

  11. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  12. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  13. Finding Their Way Back In: Family Reintegration Following Guard Deployment.

    Science.gov (United States)

    Messecar, Deborah C

    2017-03-01

    The aim of this study was to describe deployed National Guard members' and their families' perceptions of their experience with family reintegration, and the causes and conditions of challenges reintegration presents after deployment. A total of 26 National Guard members and 19 family members participated in individual (n = 22), couples (n = 6), or focus group (n = 17) interviews. In-depth interviews were used to assess needs and maximize input from military families regarding deployment-related experiences and reintegration issues. Qualitative coding and analysis of data were completed using NVivo. Finding their way back in is the key process that the military members must complete to successfully reestablish their desired social connections with the family and reclaim their place within the family. Several conditions shape the degree of challenges with reintegration that veterans and their family will encounter. These include preparation for deployment, length and type of deployment, communication during deployment, and finally, awareness of how deployment changes the military member and the family. Support resources dedicated to providing National Guard members and their families with assistance in preparing for deployments and educating them about the importance of communication during deployment should be maintained and expanded. Broader educational efforts that increase awareness of what to expect regarding how deployment changes the military member and the family are needed. Reprint & Copyright © 2017 Association of Military Surgeons of the U.S.

  14. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  15. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  16. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  17. Social Security and Medicare Benefits

    Data.gov (United States)

    Social Security Administration — Cash benefits and rehabilitation benefits paid in each year from the Old-Age and Survivors Insurance, and Disability Insurance Trust Funds, and benefits paid from...

  18. Oracle Data Guard 11gR2 administration beginner's guide

    CERN Document Server

    Baransel, Emre

    2013-01-01

    Using real-world examples and hands-on tasks, Oracle Data Guard 11gR2 Administration Beginner's Guide will give you a solid foundation in Oracle Data Guard. It has been designed to teach you everything you need to know to successfully create and operate Data Guard environments with maximum flexibility, compatibility, and effectiveness.If you are an Oracle database administrator who wants to configure and administer Data Guard configurations, then ""Oracle Data Guard 11gR2 Administration Beginner's Guide"" is for you. With a basic understanding of Oracle database administration, you'll be able

  19. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  20. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  1. 33 CFR 165.552 - Security Zone; Oyster Creek Generation Station, Forked River, Ocean County, New Jersey.

    Science.gov (United States)

    2010-07-01

    ... Generation Station, Forked River, Ocean County, New Jersey. 165.552 Section 165.552 Navigation and Navigable... Coast Guard District § 165.552 Security Zone; Oyster Creek Generation Station, Forked River, Ocean... part. (2) No person or vessel may enter or navigate within this security zone unless authorized to do...

  2. 33 CFR 165.820 - Security Zone; Ohio River Mile, 34.6 to 35.1, Shippingport, Pennsylvania.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Ohio River Mile, 34.6 to 35.1, Shippingport, Pennsylvania. 165.820 Section 165.820 Navigation and Navigable Waters... Guard District § 165.820 Security Zone; Ohio River Mile, 34.6 to 35.1, Shippingport, Pennsylvania. (a...

  3. 33 CFR 165.505 - Security Zone; Calvert Cliffs Nuclear Power Plant, Chesapeake Bay, Calvert County, Maryland.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Calvert Cliffs Nuclear Power Plant, Chesapeake Bay, Calvert County, Maryland. 165.505 Section 165.505 Navigation and... Areas Fifth Coast Guard District § 165.505 Security Zone; Calvert Cliffs Nuclear Power Plant, Chesapeake...

  4. 33 CFR 165.553 - Security Zone; Salem and Hope Creek Generation Stations, Delaware River, Salem County, New Jersey.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Salem and Hope... Limited Access Areas Fifth Coast Guard District § 165.553 Security Zone; Salem and Hope Creek Generation...: the waters of the Delaware River in the vicinity of the Salem and Hope Creek Generation Stations...

  5. 33 CFR 165.1313 - Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington

    Science.gov (United States)

    2010-07-01

    ... Areas Thirteenth Coast Guard District § 165.1313 Security zone regulations, tank ship protection, Puget... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone regulations, tank ship protection, Puget Sound and adjacent waters, Washington 165.1313 Section 165.1313 Navigation and...

  6. 33 CFR 165.1324 - Safety and Security Zone; Cruise Ship Protection, Elliott Bay and Pier-91, Seattle, Washington.

    Science.gov (United States)

    2010-07-01

    ... Areas Thirteenth Coast Guard District § 165.1324 Safety and Security Zone; Cruise Ship Protection... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zone; Cruise Ship Protection, Elliott Bay and Pier-91, Seattle, Washington. 165.1324 Section 165.1324 Navigation and...

  7. 33 CFR 165.1317 - Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters, Washington. 165.1317 Section 165.1317 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS...

  8. 33 CFR 165.1318 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of the Port Zone 165.1318 Section 165.1318 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND...

  9. 76 FR 28315 - Security Zone; Vessels Carrying Hazardous Cargo, Sector Columbia River Captain of the Port Zone

    Science.gov (United States)

    2011-05-17

    ... determination based on the fact that the security zones created by this rule will only be in effect during the... its effects on them and participate in the rulemaking process. Small businesses may send comments on... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2009-1134] RIN 1625...

  10. Design and evaluation of a low thermal electromotive force guarded scanner for resistance measurements

    Science.gov (United States)

    Jarrett, Dean G.; Marshall, James A.; Marshall, Thomas A.; Dziuba, Ronald F.

    1999-06-01

    The design and testing of a low thermal electromotive force guarded scanner, developed to provide completely guarded switching when used with actively guarded resistance bridge networks, is described. The design provides a continuous guard circuit trace on the scanner circuit boards that surrounds the relay contacts and protects the measurement circuit from leakages to ground. Modification to the circuit boards and relays of the guarded scanner are explained. Several tests were developed to evaluate the guarding effectiveness, including isolating sections of the guard circuit to create a potential drop between the main and guard circuits. Calibration of standard resistors using the guarded scanner has shown relative differences less than 1×10-6, 30×10-6, and 150×10-6 for measurements made with and without the guarded scanner at nominal resistances of 1, 10, and 100 GΩ, respectively. The substitution method was used to significantly reduce the relative differences between channels to less than 0.5×10-6, 3×10-6, and 30×10-6 for nominal resistances of 1, 10, and 100 GΩ, respectively. Applications for the guarded scanner in automated direct current measurement systems are presented.

  11. Who Guards the Guards? Understanding Deviance and Corruption of Law Enforcement Officials

    Directory of Open Access Journals (Sweden)

    Ercan BALCIOĞLU

    2015-12-01

    Full Text Available Law enforcement officials must be honest in performing both their judicial and administrative responsibilities and duties within the criminal justice system to maintain public tranquility, social trust and order, and securing the justice. There are, however, different kinds phenomena in which several kinds of deviance from acceptable norms of behavior is existing among the law enforcement professionals. Studies dealing with deviance of law enforcement officials have been limited in the Turkish context. This study, first, categorize the kinds of deviant behavior among the law enforcement officials as pointed out by numerous scientific studies. Etiology of these types of behavior, than, is examined based on the existing literature. First of all, as a kind of white collar crime which observing among deviant behavior of police personal will be categorized according to international literature. Finally, this study brings the general consensus on the preventive measures as applied in several countries on law enforcement officials’ deviant behaviors to the attention of the Turkish reader

  12. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  13. Isolation of a strong Arabidopsis guard cell promoter and its potential as a research tool

    Directory of Open Access Journals (Sweden)

    Siegel Robert S

    2008-02-01

    Full Text Available Abstract Background A common limitation in guard cell signaling research is that it is difficult to obtain consistent high expression of transgenes of interest in Arabidopsis guard cells using known guard cell promoters or the constitutive 35S cauliflower mosaic virus promoter. An additional drawback of the 35S promoter is that ectopically expressing a gene throughout the organism could cause pleiotropic effects. To improve available methods for targeted gene expression in guard cells, we isolated strong guard cell promoter candidates based on new guard cell-specific microarray analyses of 23,000 genes that are made available together with this report. Results A promoter, pGC1(At1g22690, drove strong and relatively specific reporter gene expression in guard cells including GUS (beta-glucuronidase and yellow cameleon YC3.60 (GFP-based calcium FRET reporter. Reporter gene expression was weaker in immature guard cells. The expression of YC3.60 was sufficiently strong to image intracellular Ca2+ dynamics in guard cells of intact plants and resolved spontaneous calcium transients in guard cells. The GC1 promoter also mediated strong reporter expression in clustered stomata in the stomatal development mutant too-many-mouths (tmm. Furthermore, the same promoter::reporter constructs also drove guard cell specific reporter expression in tobacco, illustrating the potential of this promoter as a method for high level expression in guard cells. A serial deletion of the promoter defined a guard cell expression promoter region. In addition, anti-sense repression using pGC1 was powerful for reducing specific GFP gene expression in guard cells while expression in leaf epidermal cells was not repressed, demonstrating strong cell-type preferential gene repression. Conclusion The pGC1 promoter described here drives strong reporter expression in guard cells of Arabidopsis and tobacco plants. It provides a potent research tool for targeted guard cell expression or

  14. Isolation of a strong Arabidopsis guard cell promoter and its potential as a research tool

    Science.gov (United States)

    Yang, Yingzhen; Costa, Alex; Leonhardt, Nathalie; Siegel, Robert S; Schroeder, Julian I

    2008-01-01

    Background A common limitation in guard cell signaling research is that it is difficult to obtain consistent high expression of transgenes of interest in Arabidopsis guard cells using known guard cell promoters or the constitutive 35S cauliflower mosaic virus promoter. An additional drawback of the 35S promoter is that ectopically expressing a gene throughout the organism could cause pleiotropic effects. To improve available methods for targeted gene expression in guard cells, we isolated strong guard cell promoter candidates based on new guard cell-specific microarray analyses of 23,000 genes that are made available together with this report. Results A promoter, pGC1(At1g22690), drove strong and relatively specific reporter gene expression in guard cells including GUS (beta-glucuronidase) and yellow cameleon YC3.60 (GFP-based calcium FRET reporter). Reporter gene expression was weaker in immature guard cells. The expression of YC3.60 was sufficiently strong to image intracellular Ca2+ dynamics in guard cells of intact plants and resolved spontaneous calcium transients in guard cells. The GC1 promoter also mediated strong reporter expression in clustered stomata in the stomatal development mutant too-many-mouths (tmm). Furthermore, the same promoter::reporter constructs also drove guard cell specific reporter expression in tobacco, illustrating the potential of this promoter as a method for high level expression in guard cells. A serial deletion of the promoter defined a guard cell expression promoter region. In addition, anti-sense repression using pGC1 was powerful for reducing specific GFP gene expression in guard cells while expression in leaf epidermal cells was not repressed, demonstrating strong cell-type preferential gene repression. Conclusion The pGC1 promoter described here drives strong reporter expression in guard cells of Arabidopsis and tobacco plants. It provides a potent research tool for targeted guard cell expression or gene silencing. It is also

  15. Elastic-plastic dynamic behavior of guard pipes due to sudden opening of longitudinal cracks in the inner pipe and crash to the guard pipe wall

    International Nuclear Information System (INIS)

    Theuer, E.; Heller, M.

    1979-01-01

    Integrity of guard pipes is an important parameter in the design of nuclear steam supply systems. A guard pipe shall withstand all kinds of postulated inner pipe breaks without failure. Sudden opening of a crack in the inner pipe and crash of crack borders to the guard pipe wall represent a shock problem where complex phenomena of dynamic plastification as well as dynamic behavior of the entire system have to be taken in consideration. The problem was analyzed by means of Finite Element computation using the general purpose program MARC. Equation of motion was resolved by direct integration using the Newmark β-operator. Analysis shows that after 1,2 m sec crack borders touch the guard pipe wall for the first time. At this moment a considerable amount of local plastification appears in the inner pipe wall, while the guard pipe is nearly unstressed. After initial touching, the crack borders begin to slip along the guard pipe wall. Subsequently, a short withdrawal of the crack borders and a new crash occur, while the inner pipe rolls along the guard pipe wall. The analysis procedure described is suitable for designing numerous guard pipe geometries as well as U-Bolt restraint systems which have to withstand high-energy pipe rupture impact. (orig.)

  16. 29 CFR Appendix B to Subpart B of... - Reprint of U.S. Coast Guard Regulations Referenced in Subpart B, for Determination of Coast Guard...

    Science.gov (United States)

    2010-07-01

    ... Subpart B, for Determination of Coast Guard Authorized Persons B Appendix B to Subpart B of Part 1915... Enclosed Spaces and Other Dangerous Atmospheres in Shipyard Employment Pt. 1915, Subpt. B, App. B Appendix B to Subpart B of Part 1915—Reprint of U.S. Coast Guard Regulations Referenced in Subpart B, for...

  17. 75 FR 18755 - Security Zone; Calcasieu River and Ship Channel, LA

    Science.gov (United States)

    2010-04-13

    ...The Coast Guard is disestablishing the permanent safety zone at Trunkline LNG in Lake Charles, LA and replacing it with a security zone with new boundaries. The Coast Guard is also establishing two additional permanent security zones on the waters of the Calcasieu River for the mooring basins at Cameron LNG in Hackberry, LA and PPG Industries in Lake Charles, LA. The Coast Guard is also disestablishing the Calcasieu River ship channel moving safety zone and replacing it with a moving security zone. The revised moving security zone extends channel edge to channel edge on the Calcasieu Channel and shoreline to shoreline on the Calcasieu River, 2 miles ahead and 1 mile astern of certain designated vessels while in transit on the Calcasieu Channel or Calcasieu River. Meeting, crossing or overtaking situations are not permitted within the security zone unless specifically authorized by the Captain of the Port. The moving security zone may commence at any point while certain vessels are transiting the Calcasieu Channel or Calcasieu River on U.S. territorial waters (12 nautical miles) in the Captain of the Port (COTP) Port Arthur zone. These security zones are needed to protect vessels, waterfront facilities, the public, and other surrounding areas from destruction, loss, or injury caused by sabotage, subversive acts, accidents, or other actions of a similar nature. Unless exempted under this rule, entry into or movement within these security zones is prohibited without permission from the Captain of the Port or a designated representative.

  18. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  19. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    Science.gov (United States)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  20. US Coast Guard national spill response resource inventory

    International Nuclear Information System (INIS)

    Giraitis, D.M.

    1993-01-01

    The Oil Pollution Act of 1990 (OPA 90) mandated the establishment of a National Response Unit, now renamed the National Strike Force Coordination Center (NSFCC). Among the duties OPA 90 assigned to this new Coast Guard unit was to compile and maintain a comprehensive list of spill removal resources, personnel, and equipment that is available to Federal and State agencies and to the public. The Coast Guard's Research and Development Center has been developing this project, the Response Resource Inventory (RRI), for one year. The RRI is expected to be operational, with resource data from industry in the data base, by the time of the International Oil Spill Conference in March 1993. The RRI will contain data on skimmers, specialized oil recovery vessels, oil/water separators, dispersants and delivery systems, etc. Previous attempts to maintain a national data base of these response resources, including an earlier Coast Guard system called the Spill Cleanup Equipment Inventory System (SKIM), fell into disuse for a number of reasons. Inaccuracies caused by inadvertent double counting of equipment and outdated information coupled with difficulties in accessing the information were common shortfalls of early systems. During the development of the RRI, user-group meetings were held to determine system requirements and study the failures of previous systems. Methods of obtaining and entering data were a major concern during RRI development. A data collection system that supplies the resource holder with a DOS-formatted diskette containing a collection program will be used. The program will make extensive use of pick lists to minimize the data entry burden on the resource holder and maintain standard entries. When the program is completed, the diskette will be mailed to the NSFCC, where the data will be transferred quickly to the RRI data base. Easy access to the data for the public and industry will be afforded mainly through a computer bulletin board

  1. A model of guarded recursion with clock synchronisation

    DEFF Research Database (Denmark)

    Bizjak, Aleš; Møgelberg, Rasmus Ejlers

    2015-01-01

    productivity to be captured in types. The calculus uses clocks representing time streams and clock quantifiers which allow limited and controlled elimination of modalities. The calculus has since been extended to dependent types by Møgelberg. Both works give denotational semantics but no rewrite semantics....... In previous versions of this calculus, different clocks represented separate time streams and clock synchronisation was prohibited. In this paper we show that allowing clock synchronisation is safe by constructing a new model of guarded recursion and clocks. This result will greatly simplify the type theory...... by removing freshness restrictions from typing rules, and is a necessary step towards defining rewrite semantics, and ultimately implementing the calculus....

  2. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  3. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  4. A novel wireless local positioning system for airport (indoor) security

    Science.gov (United States)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  5. Master planning for successful safeguard/security systems engineering

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1987-01-01

    The development and phased implementation of an overall master plan for weapons systems and facilities engaged in the complexities of high technology provides a logical road map for system accomplishment. An essential factor in such a comprehensive plan is development of an integrated systems security engineering plan. Some DOD programs use new military regulations and policy directives to mandate consideration of the safeguard/security disciplines be considered for weapons systems and facilities during the entire life cycle of the program. The emphasis is to make certain the weapon system and applicable facilities have complementary security features. Together they must meet the needs of the operational mission and, at the same time, provide the security forces practical solutions to their requirements. This paper discusses the process of meshing the safe- guards/security requirements with an overall the master plan and the challenges attendant to this activity

  6. Behind the scenes of GS: security affects us all

    CERN Multimedia

    Antonella Del Rosso

    2014-01-01

    A CERN manager, supported by two outside companies, manages the three entities in the GS Department that are in charge of various aspects of security. In total, about 80 people, 300 cameras, a surveillance centre (CSA) and 22 kilometres of fences are responsible for ensuring that the Organization is secure. But in spite of these significant resources, the best strategy for maintaining a good level of security at CERN is the active support of its users.   CERN’s security service covers three main areas: access control, comprising the security guards and a patrol service that ensures the site is secure and monitors compliance with traffic and parking rules; registration; and locks and keys. The 22 guards on the day shift and the seven on the night shift, who constantly monitor access, are spread across the two main sites and the four experiment sites. “The guards’ main job is to check that only those who are authorised to do so enter the site,” explains...

  7. Multiserver Queue with Guard Channel for Priority and Retrial Customers

    Directory of Open Access Journals (Sweden)

    Kazuki Kajiwara

    2016-01-01

    Full Text Available This paper considers a retrial queueing model where a group of guard channels is reserved for priority and retrial customers. Priority and normal customers arrive at the system according to two distinct Poisson processes. Priority customers are accepted if there is an idle channel upon arrival while normal customers are accepted if and only if the number of idle channels is larger than the number of guard channels. Blocked customers (priority or normal join a virtual orbit and repeat their attempts in a later time. Customers from the orbit (retrial customers are accepted if there is an idle channel available upon arrival. We formulate the queueing system using a level dependent quasi-birth-and-death (QBD process. We obtain a Taylor series expansion for the nonzero elements of the rate matrices of the level dependent QBD process. Using the expansion results, we obtain an asymptotic upper bound for the joint stationary distribution of the number of busy channels and that of customers in the orbit. Furthermore, we develop an efficient numerical algorithm to calculate the joint stationary distribution.

  8. CYBER SECURITY FOR AIRPORTS

    OpenAIRE

    Kasthurirangan Gopalakrishnan; Manimaran Govindarasu; Doug W. Jacobson; Brent M. Phares

    2013-01-01

    In today’s information age, government organizations and business enterprises are heavily relying on interconnected computer systems to manage a variety of public services including energy, transportation, water, etc. While this increased connectivity has many operational advantages benefitting the public, they have also become vulnerable to cyber attacks such as Corporate Security Breaches, Spear Phishing, and Social Media Fraud. The aviation sector is one the critical infrastructure systems...

  9. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  10. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  11. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  12. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  13. Revolutionary Intelligence: The Expanding Intelligence Role of the Iranian Revolutionary Guard Corps

    Directory of Open Access Journals (Sweden)

    Udit Banerjea

    2015-09-01

    Full Text Available The Iranian Revolutionary Guard Corps (IRGC is a military and paramilitary organization that is meant to defend the ideals of the Iranian Islamic Revolution in 1979. Since its formation, the IRGC has grown in influence and its intelligence role has expanded. This paper examines the role of the IRGC in Iran’s intelligence system through a comprehensive analysis of the organization of the IRGC’s intelligence arm, along with its operations and capabilities. In doing so, the scope, objectives, resources, customers, and sponsors of the IRGC’s intelligence activities are also analyzed. Additionally, this paper explores how the IRGC interacts with the government of Iran, the Ministry of Intelligence and Security (MOIS, other key internal stakeholders, and foreign client organizations. A key focus of this analysis is the evolution of the relationship between the IRGC and the MOIS and the growing influence of the IRGC in Iran’s intelligence community over the last decade. The paper concludes that the IRGC has now eclipsed the MOIS within Iran’s intelligence community and is one of the most powerful institutions in Iranian politics today, using its intelligence activities as its key means of maintaining power and influence within the country.

  14. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  15. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  16. Current Methods for Evaluation of Physical Security System Effectiveness.

    Science.gov (United States)

    1981-05-01

    nuclear fuel system installation in a - articular way. These entities are thereby identified as more or less significant targets for the security...These publications use non-standard definitions for some safe- guards terms, which is an unfortunate distraction . None of the publications we...when the participant reaches his objective. If this requires more than one time step, he may be distracted by changed circumstances before he completes

  17. Maritime Security In South East Asia: Indonesian Perspective

    OpenAIRE

    Ariadno, Melda Kamil Kamil

    2009-01-01

    Maritime security is an important issue particularly for the archipelagic state. As the largest archipelagic state in the world, Indonesia has its own responsibility to guard its waters from any threat. Indonesian waters have been used for centuries to accelerate International trade. In addition, Indonesia needs to address its boundary problems, handling of piracy, combating Transnational Organized Crime, such as, human trafficking, drugs trafficking, and human smuggling. This article explai...

  18. Implementing Strategy in a Budget: A Model of the Coast Guard Reserve

    OpenAIRE

    Bromund, Carl Douglas

    1990-01-01

    Approved for public release; distribution is unlimited. This thesis discusses the managment strategy of the Coast Guard Reserve; it examines the formulation and implmentation of strateqy. A model to develop and implement strategy is proposed, which defines the role of the budget in this strategic management process. The recent strategy of the Coast Guard Reserve is analyzed using this model.. This analysis seems to indicate that the Coast Guard Reserve had no explicit strate...

  19. Modeling and Design Guidelines for P⁺ Guard Rings in Lightly Doped CMOS Substrates

    DEFF Research Database (Denmark)

    Shen, Ming; Mikkelsen, Jan H.; Zhang, Ke

    2013-01-01

    of ${rm P}^{+}$ guard rings in terms of S-parameters, which is useful for substrate noise mitigation in mixed-signal system-on-chips. Validation of the model has been done by both electromagnetic simulation and experimental results from guard rings implemented using a standard 0.18-$mu{rm m}$ CMOS process....... In addition, design guidelines have been drawn for minimizing the guard ring size while maintaining the noise suppression performance....

  20. Social Security and the Equity Premium Puzzle

    OpenAIRE

    Olovsson, Conny

    2004-01-01

    This paper shows that social security may be an important factor in explaining the equity premium puzzle. In the absence of shortselling constraints, the young shortsell bonds to the middle-aged and buy equity. Social security reduces the bond demand of the middle-aged, thereby restricting the possibilities of the young to finance their equity purchases. Their equity demand increases as does the average return to equity. Social security also increases the covariance between future consumption...

  1. 75 FR 58277 - National Employer Support of the Guard and Reserve Week, 2010

    Science.gov (United States)

    2010-09-23

    ... special tribute to the employers of our Guardsmen and Reservists, whose support and flexibility bolster... encourage National Guard and Reserve participation, and by bearing financial and organizational...

  2. Guard cell zeaxanthin tracks photosynthetically active radiation and stomatal apertures in Vicia faba leaves

    International Nuclear Information System (INIS)

    Srivastava, A.; Zeiger, E.

    1995-01-01

    Zeaxanthin, antheraxanthin and violaxanthin concentrations in guard cells from sonicated abaxial epidermal peels of Vicia faba were measured from dawn to dusk, and compared with concentrations in mesophyll tissue of the same leaves. Measured changes in guard cell zeaxanthin and violaxanthin concentrations indicate that guard cells operate the xanthophyll cycle throughout the day. Mesophyll tissue had no detectable zeaxanthin at dawn, whereas guard cells had 30–50 mmol mol −1 chlorophyll a+b. On a chlorophyll basis, maximal zeaxanthin levels were 3–4 fold higher in guard cells than in mesophyll cells. Zeaxanthin concentrations tracked levels of photosynthetically active radiation (PAR) in both mesophyll and guard cells. In the mesophyll, most of the zeaxanthin changes occurred in mid-morning and mid-afternoon. In guard cells, zeaxanthin concentrations changed nearly linearly with PAR in the early morning and late afternoon, and closely tracked PAR levels throughout the day. Guard cell zeaxanthin concentrations were also closely correlated with stomatal apertures. The close relationship between zeaxanthin concentrations and PAR levels in guard cells indicates that zeaxanthin is well suited to function as a molecular photosensor in stomatal movements. (author)

  3. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  4. A Coast Guard Commander's Quick Reference Manual for Legal Issues

    National Research Council Canada - National Science Library

    1997-01-01

    ...). ̂ Following an alcohol incident, review the member's security clearance lAW COMDTlNST M5510.16. ̂ Review the status of members involved in alcohol abuse incidents and take appropriate disciplinary, remedial, educational and I or...

  5. Coast Guard Enterprise Project Management (CG-EPM)

    Data.gov (United States)

    Department of Homeland Security — CG-EPM provides the following capabilities: A Project Center, Portfolio Analysis Tools, Project Planning Tool, Web-based Project Plan Updater, Project Collaboration...

  6. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  7. Cyber security of critical infrastructures

    Directory of Open Access Journals (Sweden)

    Leandros A. Maglaras

    2018-03-01

    Full Text Available Modern Supervisory Control and Data Acquisition (SCADA systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to be conventional in addition to new threats. Many security methods can be applied to such systems, having in mind that both high efficiency, real time intrusion identification and low overhead are required. Keywords: SCADA systems, Security

  8. Remote secure observing for the Faulkes Telescopes

    Science.gov (United States)

    Smith, Robert J.; Steele, Iain A.; Marchant, Jonathan M.; Fraser, Stephen N.; Mucke-Herzberg, Dorothea

    2004-09-01

    Since the Faulkes Telescopes are to be used by a wide variety of audiences, both powerful engineering level and simple graphical interfaces exist giving complete remote and robotic control of the telescope over the internet. Security is extremely important to protect the health of both humans and equipment. Data integrity must also be carefully guarded for images being delivered directly into the classroom. The adopted network architecture is described along with the variety of security and intrusion detection software. We use a combination of SSL, proxies, IPSec, and both Linux iptables and Cisco IOS firewalls to ensure only authenticated and safe commands are sent to the telescopes. With an eye to a possible future global network of robotic telescopes, the system implemented is capable of scaling linearly to any moderate (of order ten) number of telescopes.

  9. Securing Mobile Networks in an Operational Setting

    Science.gov (United States)

    Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Paulsen, Phillip E.; Shell, Dan

    2004-01-01

    This paper describes a network demonstration and three month field trial of mobile networking using mobile-IPv4. The network was implemented as part of the US Coast Guard operational network which is a ".mil" network and requires stringent levels of security. The initial demonstrations took place in November 2002 and a three month field trial took place from July through September of 2003. The mobile network utilized encryptors capable of NSA-approved Type 1 algorithms, mobile router from Cisco Systems and 802.11 and satellite wireless links. This paper also describes a conceptual architecture for wide-scale deployment of secure mobile networking in operational environments where both private and public infrastructure is used. Additional issues presented include link costs, placement of encryptors and running routing protocols over layer-3 encryption devices.

  10. Establishing an Information Security System related to Physical Protection

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Yoo, Ho Sik

    2009-01-01

    A physical protection system (PPS) integrates people, procedures and equipment for the protection of assets or facilities against theft, sabotage or other malevolent attacks. In the physical protection field, it is important the maintain confidentiality of PPS related information, such as the alarm system layout, detailed maps of buildings, and guard schedules. In this abstract, we suggest establishing a methodology for an information security system. The first step in this methodology is to determine the information to protect and possible adversaries. Next, system designers should draw all possible paths to the information and arrange appropriate protection elements. Finally he/she should analyze and upgrade their information security system

  11. 33 CFR 165.1151 - Security Zones; liquefied hazardous gas tank vessels, San Pedro Bay, California.

    Science.gov (United States)

    2010-07-01

    ... a tank vessel as liquefied petroleum gas, liquefied natural gas, or similar liquefied gas products... Eleventh Coast Guard District § 165.1151 Security Zones; liquefied hazardous gas tank vessels, San Pedro... the sea floor, within a 500 yard radius around any liquefied hazardous gas (LHG) tank vessel that is...

  12. 77 FR 10960 - Security Zone, East River and Bronx Kill; Randalls and Wards Islands, NY

    Science.gov (United States)

    2012-02-24

    ...'' W (Port Morris Stacks), and all waters of the Bronx Kill southeast of the Bronx Kill Rail Road...-AA87 Security Zone, East River and Bronx Kill; Randalls and Wards Islands, NY AGENCY: Coast Guard, DHS... waters of the East River and Bronx Kill, in the vicinity of Randalls and Wards Islands, New York. This...

  13. 78 FR 37971 - Security Zone; Naval Exercise; Pacific Ocean, Coronado, CA

    Science.gov (United States)

    2013-06-25

    ... Administrative Procedure Act (APA) (5 U.S.C. 553(b)). This provision authorizes an agency to issue a rule without... Security Management Directive 023-01 and Commandant Instruction M16475.lD, which guide the Coast Guard in...

  14. 75 FR 45055 - Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2010-08-02

    ...-AA87 Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... (NCSM 710) which include all waters within 100 yards from the vessels while underway in the Puget Sound... authorized by the COTP, Puget Sound or Designated Representative. DATES: This rule is effective from 8 a.m...

  15. 76 FR 15216 - Security Zones; Cruise Ships, Port of San Diego, CA

    Science.gov (United States)

    2011-03-21

    ... Executive Order 13045, Protection of Children from Environmental Health Risks and Safety Risks. This rule is not an economically significant rule and does not create an environmental risk to health or risk to...-AA87 Security Zones; Cruise Ships, Port of San Diego, CA AGENCY: Coast Guard, DHS. ACTION: Final rule...

  16. 77 FR 21448 - Security Zone; 2012 Fleet Week, Port Everglades, Fort Lauderdale, FL

    Science.gov (United States)

    2012-04-10

    ... Environmental Health Risks and Safety Risks. This rule is not an economically significant rule and does not create an environmental risk to health or risk to safety that may disproportionately affect children...-AA87 Security Zone; 2012 Fleet Week, Port Everglades, Fort Lauderdale, FL AGENCY: Coast Guard, DHS...

  17. 76 FR 79536 - Security Zones; Captain of the Port Lake Michigan; Technical Amendment

    Science.gov (United States)

    2011-12-22

    ... Environmental Health Risks and Safety Risks. This rule is not an economically significant rule and does not create an environmental risk to health or risk to safety that may disproportionately affect children...-AA87 Security Zones; Captain of the Port Lake Michigan; Technical Amendment AGENCY: Coast Guard, DHS...

  18. 33 CFR 165.1155 - Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach, California.

    Science.gov (United States)

    2010-07-01

    ... Nuclear Power Plant, Avila Beach, California. 165.1155 Section 165.1155 Navigation and Navigable Waters... Coast Guard District § 165.1155 Security Zone; Diablo Canyon Nuclear Power Plant, Avila Beach... surface to bottom, within a 2,000 yard radius of Diablo Canyon Nuclear Power Plant centered at position 35...

  19. 33 CFR 165.106 - Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire.

    Science.gov (United States)

    2010-07-01

    ... Guard District § 165.106 Security Zone: Seabrook Nuclear Power Plant, Seabrook, New Hampshire. (a... property boundary of Seabrook Nuclear Power Plant identified as follows: beginning at position 42°53′58″ N, 070°51′06″ W then running along the property boundaries of Seabrook Nuclear Power Plant to position 42...

  20. 33 CFR 165.708 - Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC.

    Science.gov (United States)

    2010-07-01

    ... Harbor and Cooper River, Charleston, SC. 165.708 Section 165.708 Navigation and Navigable Waters COAST... Guard District § 165.708 Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC. (a... Cooper River. All coordinates referenced use datum: NAD 1983. (2) All waters within 100 yards of the...

  1. 33 CFR 165.503 - Security Zone; Captain of the Port Hampton Roads Zone.

    Science.gov (United States)

    2010-07-01

    ... Port Hampton Roads Zone. 165.503 Section 165.503 Navigation and Navigable Waters COAST GUARD... § 165.503 Security Zone; Captain of the Port Hampton Roads Zone. (a) Definitions. As used in this... been authorized by the Captain of the Port (COTP), Hampton Roads, Virginia to act on his or her behalf...

  2. Evolution of the US Coast Guard's oil identification system

    International Nuclear Information System (INIS)

    Hendrick, M.S.; Reilly, T.R.

    1993-01-01

    The U.S. Coast Guard, tasked with the development of open-quotes procedures and techniques to be employed in identifying ... oil and hazardous substances . . . open-quotes by the 1972 Federal Water Pollution Control Act (FWPCA), developed the Oil Identification System (OIS). The OIS was based on four analytical laboratory techniques: infrared (IR) and fluorescence (FL) spectroscopy, gas chromatography (GC), and thin- layer chromatography (TLC). A Central Oil Identification Laboratory (COIL) began operation in 1977, and field laboratories (FOILS) using two of the techniques (FL and TLC) were established in many Marine Safety Offices to screen possible sources. Development of the OIS was documented in two formal reports, in 1974 and 1977. The current implementation of the OIS at COIL is still based on a multimethod approach, but it incorporates today's state-of-the-art technology and responds to the current needs of the Coast Guard. One pervasive force for change has been the affordability of computers. The rapid development of computerized instruments has resulted in improvements in the performance, ruggedness, and prices of analytical laboratory equipment. All the instruments in the authors' laboratory at the present time are interfaced to or have internal computerized data-handling systems. Fourier-transform infrared spectrometers (FTIR) have replaced older mechanically scanning, dispersive IR instruments. High-performance liquid chromatography (HPLC) has replaced TLC completely. A gas chromatography/mass spectrometer (GC/MS), a room-size research tool in 1977, sits on a benchtop in the laboratory today, and a standard method for oil identification is being developed for this technique. Laboratory strategies are now based on finding the most efficient use of resources, as rapid response times are not necessary in all cases. It may also be possible in the near future to resume field testing

  3. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  4. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  5. Variability in the Foraging Distribution and Diet of Cape Gannets between the Guard and Post-guard Phases of the Breeding Cycle

    Directory of Open Access Journals (Sweden)

    Jonathan A. Botha

    2018-02-01

    Full Text Available During breeding, seabirds are central place foragers and are sensitive to changes in local prey availability. As the breeding season progresses, foraging behavior and distribution is expected to change in response to possible changes in local prey availability. In addition, adult gender, and the increasing nutritional demands of a growing chick may also influence the foraging behavior of individuals. At present, relatively few studies have assessed the foraging behavior of adult birds during the late post-guard stages of chick rearing. Through a combination of GPS tracking and diet sampling we investigated the foraging distances, spatial distribution, and prey composition of adult Cape gannets (Morus capensis during the guard and post-guard stages of chick rearing. We found no clear evidence for consistent sex-specific differences in foraging distances and spatial distribution during the guard stage, although marginal differences in the location of core foraging areas during the post-guard stage were apparent. Results, however, revealed a clear increase in foraging range from the early guard to the late post-guard stage of chick rearing. During December the diet was comprised almost exclusively of anchovy (Engraulis encrasicolus, the proportion of which had decreased significantly in the diet by January. This was mirrored by a substantial increase in the proportion of saury (Scomberesox saurus. These results suggest that Cape gannets show flexibility in the foraging behavior and diet, which may be related to changes in the abundance and distribution of prey or may reflect changes in the energetic requirements of the growing offspring. This study provides the first assessment of Cape gannet foraging behavior and spatial distribution during the post-guard stage of chick rearing. The importance of considering intra-annual variability in foraging distribution when using seabird tracking data in trophic and marine spatial planning studies are

  6. QTL-mapping in mink (Neovison vison) shows evidence for QTL for guard hair thickness, guard hair length and skin length

    DEFF Research Database (Denmark)

    Thirstrup, Janne Pia; Labouriau, Rodrigo; Guldbrandtsen, Bernt

    2011-01-01

    Fur quality in mink (Neovison vison) is a composite trait, consisting of e.g. guard hair length, guard hair thickness and density of wool. A genome wide QTL search was performed to detect QTL for fur quality traits in mink. Here we present the results of QTL analyses for guard hair length, guard...... hair thickness and density of wool. Data from an F2-cross was analysed across fourteen chromosomes using 100 microsatellites as markers with a spacing of approximately 20 cM. The two lines used for the F2-cross were Nordic wild mink and American short nap mink. In total 1,083 animals (21 wild type, 25...... short nap, 103 F1 and 934 F2) were marker typed and recorded for the three presented fur quality traits. For the QTL-analyses a regression analysis implemented in QTL Express software was used. Evidence was found for the existence of QTL for guard hair length, guard hair thickness and density of wool...

  7. Securing Retirement at a Young Age. Exploring the Intention to Buy Longevity Annuities through an Extended Version of the Theory of Planned Behavior

    Directory of Open Access Journals (Sweden)

    Costanza Nosi

    2017-06-01

    Full Text Available Since the early 90s, Italy has undergone radical changes in the regulations of the public pension system aimed at mending its main drawbacks and improving sustainability in the long run. The reforms were intended to recover the national economy through a significant reduction of benefits by increasing, particularly for younger people, individual responsibility for the accumulation of retirement wealth. Adopting an enhanced version of the Theory of Planned Behavior (TPB, which includes affective reactions, the present paper aims to understand the factors influencing the intention to enroll in a private pension plan through the purchase of longevity annuity coverage on the part of young adults. A purposive sample of 7480 Italian people aged 25–35 participated in the survey. Collected data were analyzed adopting an ordinal logistic regression (OLR model. The findings confirm the predictive power of the TPB in the financial field of longevity annuity buying, show that anticipated affective reactions increase the predictive power of the TPB model, and reveal that the influence of the investigated constructs varies alongside people’s willingness to purchase. The outcomes provide useful recommendations to the policy maker and private companies to favor the adoption of wide-spread desired behaviors among citizenships.

  8. 77 FR 31183 - Safety Zone, Temporary Change for Recurring Fireworks Display Within the Fifth Coast Guard...

    Science.gov (United States)

    2012-05-25

    ...-AA00 Safety Zone, Temporary Change for Recurring Fireworks Display Within the Fifth Coast Guard District, Pamlico River and Tar River; Washington, NC AGENCY: Coast Guard, DHS. ACTION: Temporary final... is intended to restrict vessel traffic in a portion of the Pamlico River and Tar River near...

  9. 77 FR 35855 - Safety Zone, Temporary Change for Recurring Fifth Coast Guard District Fireworks Displays...

    Science.gov (United States)

    2012-06-15

    ... 1625-AA00 Safety Zone, Temporary Change for Recurring Fifth Coast Guard District Fireworks Displays; Northwest Harbor (East Channel) and Tred Avon River, MD AGENCY: Coast Guard, DHS. ACTION: Temporary final... Channel), Patapsco River, and Tred Avon River during the event. DATES: This rule is effective from 8 p.m...

  10. Elimination of Coast Guard plan review for non-critical engineering systems and cargo barges

    Science.gov (United States)

    1994-06-21

    The purpose of this Circular is to publish policy that provides for the elimination of Coast Guard review and approval of certain engineering system drawings for all vessels as well as structural drawings for Coast Guard inspected non-self propelled ...

  11. Role of guard rings in improving the performance of silicon detectors

    Indian Academy of Sciences (India)

    number of free charge carriers thus produced is proportional to the energy deposited. 259 .... grounding the innermost guard ring of a strip detector of geometry 60 × 60 mm2. ... The guard ring was kept floating with no electrical connection .... ment of maintaining high-quality semiconductor properties during high temperature.

  12. 78 FR 40000 - Eighth Coast Guard District Annual Safety Zones; Riverfront Independence Festival Fireworks; Ohio...

    Science.gov (United States)

    2013-07-03

    ...-AA00 Eighth Coast Guard District Annual Safety Zones; Riverfront Independence Festival Fireworks; Ohio.... SUMMARY: The Coast Guard will enforce a Safety Zone for the Riverfront Independence Festival Fireworks on... navigable waters during the Riverfront Independence Festival Fireworks. During the enforcement period, in...

  13. 29 CFR 1910.23 - Guarding floor and wall openings and holes.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 5 2010-07-01 2010-07-01 false Guarding floor and wall openings and holes. 1910.23 Section... floor and wall openings and holes. (a) Protection for floor openings. (1) Every stairway floor opening... opening and hole shall be guarded by a standard skylight screen or a fixed standard railing on all exposed...

  14. From Darkness to Light: Posttraumatic Growth among Recently Deployed Army National Guard Soldiers

    Science.gov (United States)

    2013-02-14

    Stress and Associated Functioning of Army National Guard Following Exposure to Iraq Warzone Trauma,” Traumatology 14 (2008): 51. 9. Army National...Associated Functioning of Army National Guard Following Exposure to Iraq Warzone Trauma.” Traumatology , 14 (2008): 51–56. Ouimette, Paige, Dawne Vogt

  15. Single guard cell recordings in intact plants : light-induced hyperpolarization of the plasma membrane

    NARCIS (Netherlands)

    Roelfsema, MRG; Steinmeyer, R; Staal, M; Hedrich, R

    Guard cells are electrically isolated from other plant cells and therefore offer the unique possibility to conduct current- and voltage-clamp recordings on single cells in an intact plant. Guard cells in their natural environment were impaled with double-barreled electrodes and found to exhibit

  16. 30 CFR 57.12023 - Guarding electrical connections and resistor grids.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Guarding electrical connections and resistor... NONMETAL MINES Electricity Surface and Underground § 57.12023 Guarding electrical connections and resistor grids. Electrical connections and resistor grids that are difficult or impractical to insulate shall be...

  17. 77 FR 28766 - Eighth Coast Guard District Annual Marine Events and Safety Zones

    Science.gov (United States)

    2012-05-16

    .... SUMMARY: On March 1, 2012, the Coast Guard published a direct final rule, amending and updating its... effect as scheduled. The Coast Guard is also correcting two entries in this rule through technical... event's date, location, and the resulting special local regulation remain the same. The next occurrence...

  18. 78 FR 8027 - Safety Zone, Coast Guard Exercise Area, Hood Canal, Washington

    Science.gov (United States)

    2013-02-05

    ... 5, 2012. The Coast Guard received zero comments submitted via regulations.gov and received zero... zero comments from the Small Business Administration on this rule. The Coast Guard certifies under 5 U... more in any one year. Though this rule will not result in such an expenditure, we do discuss the...

  19. Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus

    DEFF Research Database (Denmark)

    Aguirre, Alejandro; Barthe, Gilles; Birkedal, Lars

    2018-01-01

    We extend the simply-typed guarded $\\lambda$-calculus with discrete probabilities and endow it with a program logic for reasoning about relational properties of guarded probabilistic computations. This provides a framework for programming and reasoning about infinite stochastic processes like...

  20. 33 CFR 165.506 - Safety Zones; Fifth Coast Guard District Fireworks Displays.

    Science.gov (United States)

    2010-07-01

    ... District Fireworks Displays. 165.506 Section 165.506 Navigation and Navigable Waters COAST GUARD... § 165.506 Safety Zones; Fifth Coast Guard District Fireworks Displays. (a) Regulations. The following regulations apply to the fireworks safety zones listed in the Table to § 165.506. (1) The general regulations...

  1. 76 FR 66239 - Safety Zones; Fireworks Displays Within the Fifth Coast Guard District

    Science.gov (United States)

    2011-10-26

    ...-AA00 Safety Zones; Fireworks Displays Within the Fifth Coast Guard District AGENCY: Coast Guard, DHS... safety zones established for fireworks displays at various locations within the geographic boundary of... maritime public from the hazards posed by fireworks displays. Entry into or movement within these proposed...

  2. 76 FR 7131 - Safety Zones; Eleventh Coast Guard District Annual Fireworks Events

    Science.gov (United States)

    2011-02-09

    ...-AA00 Safety Zones; Eleventh Coast Guard District Annual Fireworks Events AGENCY: Coast Guard, DHS... permanent safety zones to ensure public safety during annual firework displays at various locations in the... events, delete events that are no longer occurring, add new unlisted annual fireworks events to the...

  3. 29 CFR 1915.73 - Guarding of deck openings and edges.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Guarding of deck openings and edges. 1915.73 Section 1915.73 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION..., Ladders and Other Working Surfaces § 1915.73 Guarding of deck openings and edges. (a) The provisions of...

  4. Use of Head Guards in AIBA Boxing Tournaments-A Cross-Sectional Observational Study.

    Science.gov (United States)

    Loosemore, Michael P; Butler, Charles F; Khadri, Abdelhamid; McDonagh, David; Patel, Vimal A; Bailes, Julian E

    2017-01-01

    This study looks at the changes in injuries after the implementation of a new rule by the International Boxing Association (AIBA) to remove head guards from its competitions. A cross-sectional observational study performed prospectively. This brief report examines the removal of head guards in 2 different ways. The first was to examine the stoppages due to blows to the head by comparing World Series Boxing (WSB), without head guards, to other AIBA competitions with head guards. Secondly, we examined the last 3 world championships: 2009 and 2011 (with head guards) and 2013 (without head guards). World Series Boxing and AIBA world championship boxing. Boxers from WSB and AIBA world championships. The information was recorded by ringside medical physicians. Stoppages per 10 000 rounds; stoppages per 1000 hours. Both studies show that the number of stoppages due to head blows was significantly decreased without head guards. The studies also showed that there was a notable increase in cuts. Removing head guards may reduce the already small risk of acute brain injury in amateur boxing.

  5. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  6. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  7. The experience of WNTI with Safety and Security Worldwide

    International Nuclear Information System (INIS)

    Neau, Henry-Jacques

    2016-01-01

    This paper gives an industrial perspective on safety and security issues based on the experience of WNTI members. It describes how safety is invested primarily in the package; not how the package is transported. Transport safety is therefore an engineering challenge, and all necessary technical information is available to enable this to be met. Security in transport involves various measures to guard against intentional malicious acts. The paper describes the international instruments relevant to security in the transport of nuclear fuel cycle materials and how both safety and security regulations must be coordinated and simplified to avoid conflicts. It considers potential risks, which must not be underestimated. However, the assessment of risks must be realistic and quantified, and the requirements placed on the industry appropriate. It is important to dispel exaggerated perceptions of danger in the minds of the public, politicians and regulators. (author)

  8. The effect of the guard location in a nuclear facility on performance criteria

    International Nuclear Information System (INIS)

    Lee, Hyun-Chul; Hwang, In-Koo; An, Jin-Soo

    2002-01-01

    Full text: The major functions of a physical protection system (PPS) are detection, delay, and response. Detection function is mainly to sense an adversary's intrusion and assess alarm events, and its physical implementation includes intrusion sensors, alarm communication systems and entry control facilities. Delay function can be accomplished through various passive and active barriers, makes adversary's advance toward his goal slow. Response function is to practically stop adversary actions. There are response guards responsible for the response function in a nuclear facility. They can be located at one or more posts to take action against adversary's progress after alarm occurred. The mostly used quantitative effectiveness measure of a PPS is the probability of interruption (PI) derived from delay time after detection and guard response time. Delay time is a variable dependent on adversary's capabilities and guard response time varies with the distance between a guard post and destination to be dispatched. According to the advanced technology of digital computing, software programs such as SAVI (System Analysis of Vulnerability to Intrusion) provide PI based on user input including adversary capability, protective elements, guard response time, and other PPS information. However guard response time is considered as a constant not a variable. That means same guard response time is always set regardless of the variable guard travel time from a post to a location where guards can interrupt the adversary's action. Since the location of guards may be easily changed in contrast to detection elements or delay elements and can be considered as a flexible mean against temporarily upgraded threat, a trial to investigate the changes of PI and CDP (Critical Detection Point) in case that guard response time is a variable was started. We defined several detection and delay elements along an adversary intrusion path and guard travel times as many as the number of detection

  9. Accelaration of Jamkesda (Regional Health Security Participation and Jamkesda Member Visit based on Age Group Phenomenon in Nganjuk Regency PHC, Year 2012

    Directory of Open Access Journals (Sweden)

    Mugeni Sugiharto

    2015-03-01

    ABSTRACTBackground:Introduction: Jamkesda is pro- poor government policy to fulfill their health care right base on mandate of law. Departemen of Health in Nganjuk Regency run socialization by involving all local power Hence, in 2012 Jamkesda participation would reach highest in East Java. Purpose:This resaerch aimed to identify Jamkesda participation acceleration and Jamkesda member visit based on age group phenomenon in Nganjuk Regency year 2012. Method:Descriptive research with cross sectional design. Population was Nganjuk Regency government Agency with all Jamkesda managing agencies as sample. Analysis unit was institution. Respondents were officials who managed Jamkesda.Result:Jamkesda in Nganjuk Regency was integrate to Sub Divison of Special Service an Health Costing primary task. In 2012 it showed highest Jamkesda participation in East Java. Socialization strengthening in form of social support and advocacy and media use to accelerate local health coverage and to erase Poor Notification Letter to have medication. Medication visit phenomenon was varied in number in every district, the highest was Nganjuk District (11.18%. Women (56.1% who took medication in PHC was higher than men (43,99% particularly those at 15–< 54 years old age group. The commonest disease was hypertension. Conclusion: Participation acceleration through social support and advocacy strategy is able to obtain local public support both formal and non formal for its success. Highest medication visit to PHC was Nganjuk district by women with hypertension as commonest disease they complained. Suggestion:Social support and advocacy socialization strategy can be implemented in other places with similar situation and condition Key words: Jamkesda, Socialization, Social Support, Advocacy

  10. Male songbirds provide indirect parental care by guarding females during incubation

    Science.gov (United States)

    Fedy, B.C.; Martin, T.E.

    2009-01-01

    Across many taxa, guarding of fertile mates is a widespread tactic that enhances paternity assurance. However, guarding of mates can also occur during the nonfertile period, and the fitness benefits of this behavior are unclear. Male songbirds, for example, sometimes guard nonfertile females during foraging recesses from incubation. We hypothesized that guarding postreproductive mates may have important, but unrecognized, benefits by enhancing female foraging efficiency, thereby increasing time spent incubating eggs. We tested the hypothesis in 2 songbird species by examining female behavior during natural and experimentally induced absences of males. Male absence caused increased vigilance in foraging females that decreased their efficiency and resulted in less time spent incubating eggs. Male guarding of nonfertile females can thus provide a previously unrecognized form of indirect parental care.

  11. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  12. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  13. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  14. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  15. 78 FR 74048 - Eleventh Coast Guard District Annual Fireworks Events

    Science.gov (United States)

    2013-12-10

    ... activities so that your message can be received without jeopardizing the safety or security of people, places... from navigable waters of the United States and may have potential for negative impact on the safety or... Laughlin Tourism Committee. Event Description Fireworks Display. Two events over the 4th of July Weekend...

  16. The Coast Guard Intelligence Program Enters the Intelligence Community. A Case Study of Congressional Influence on Intelligence Community Evolution

    National Research Council Canada - National Science Library

    Wirth, Kevin E

    2007-01-01

    .... Although the United States Coast Guard has utilized intelligence capabilities since the service's inception in 1790, the Coast Guard was not included as a formal member of the Intelligence Community until December 2002. Mr...

  17. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  18. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  19. Metabolomic Responses of Guard Cells and Mesophyll Cells to Bicarbonate

    Science.gov (United States)

    Misra, Biswapriya B.; de Armas, Evaldo; Tong, Zhaohui; Chen, Sixue

    2015-01-01

    Anthropogenic CO2 presently at 400 ppm is expected to reach 550 ppm in 2050, an increment expected to affect plant growth and productivity. Paired stomatal guard cells (GCs) are the gate-way for water, CO2, and pathogen, while mesophyll cells (MCs) represent the bulk cell-type of green leaves mainly for photosynthesis. We used the two different cell types, i.e., GCs and MCs from canola (Brassica napus) to profile metabolomic changes upon increased CO2 through supplementation with bicarbonate (HCO3 -). Two metabolomics platforms enabled quantification of 268 metabolites in a time-course study to reveal short-term responses. The HCO3 - responsive metabolomes of the cell types differed in their responsiveness. The MCs demonstrated increased amino acids, phenylpropanoids, redox metabolites, auxins and cytokinins, all of which were decreased in GCs in response to HCO3 -. In addition, the GCs showed differential increases of primary C-metabolites, N-metabolites (e.g., purines and amino acids), and defense-responsive pathways (e.g., alkaloids, phenolics, and flavonoids) as compared to the MCs, indicating differential C/N homeostasis in the cell-types. The metabolomics results provide insights into plant responses and crop productivity under future climatic changes where elevated CO2 conditions are to take center-stage. PMID:26641455

  20. Marital Biography, Social Security Receipt, and Poverty.

    Science.gov (United States)

    Lin, I-Fen; Brown, Susan L; Hammersmith, Anna M

    2017-01-01

    Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social Security and they enjoy relatively high Social Security benefits and very low poverty levels. Among singles, economic well-being varies by marital biography and gender. Gray divorced and never-married women face considerable economic insecurity. Their Social Security benefits are relatively low, and their poverty rates are quite high (over 25%), indicating Social Security alone is not sufficient to prevent these women from falling into poverty. By comparison, gray widoweds are the most advantaged singles.

  1. Efficient parallel implementations of approximation algorithms for guarding 1.5D terrains

    Directory of Open Access Journals (Sweden)

    Goran Martinović

    2015-03-01

    Full Text Available In the 1.5D terrain guarding problem, an x-monotone polygonal line is dened by k vertices and a G set of terrain points, i.e. guards, and a N set of terrain points which guards are to observe (guard. This involves a weighted version of the guarding problem where guards G have weights. The goal is to determine a minimum weight subset of G to cover all the points in N, including a version where points from N have demands. Furthermore, another goal is to determine the smallest subset of G, such that every point in N is observed by the required number of guards. Both problems are NP-hard and have a factor 5 approximation [3, 4]. This paper will show that if the (1+ϵ-approximate solver for the corresponding linear program is a computer, for any ϵ > 0, an extra 1+ϵ factor will appear in the final approximation factor for both problems. A comparison will be carried out the parallel implementation based on GPU and CPU threads with the Gurobi solver, leading to the conclusion that the respective algorithm outperforms the Gurobi solver on large and dense inputs typically by one order of magnitude.

  2. Marital Biography, Social Security Receipt, and Poverty

    OpenAIRE

    Lin, I-Fen; Brown, Susan L.; Hammersmith, Anna M.

    2017-01-01

    Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social S...

  3. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS.

    Science.gov (United States)

    Chen, Feng; Wang, Shuang; Jiang, Xiaoqian; Ding, Sijie; Lu, Yao; Kim, Jihoon; Sahinalp, S Cenk; Shimizu, Chisato; Burns, Jane C; Wright, Victoria J; Png, Eileen; Hibberd, Martin L; Lloyd, David D; Yang, Hai; Telenti, Amalio; Bloss, Cinnamon S; Fox, Dov; Lauter, Kristin; Ohno-Machado, Lucila

    2017-03-15

    We introduce PRINCESS, a privacy-preserving international collaboration framework for analyzing rare disease genetic data that are distributed across different continents. PRINCESS leverages Software Guard Extensions (SGX) and hardware for trustworthy computation. Unlike a traditional international collaboration model, where individual-level patient DNA are physically centralized at a single site, PRINCESS performs a secure and distributed computation over encrypted data, fulfilling institutional policies and regulations for protected health information. To demonstrate PRINCESS' performance and feasibility, we conducted a family-based allelic association study for Kawasaki Disease, with data hosted in three different continents. The experimental results show that PRINCESS provides secure and accurate analyses much faster than alternative solutions, such as homomorphic encryption and garbled circuits (over 40 000× faster). https://github.com/achenfengb/PRINCESS_opensource. shw070@ucsd.edu. Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

  4. 78 FR 33216 - Temporary Change of Dates for Recurring Marine Event in the Fifth Coast Guard District, Mattaponi...

    Science.gov (United States)

    2013-06-04

    ... 1625-AA08 Temporary Change of Dates for Recurring Marine Event in the Fifth Coast Guard District, Mattaponi Drag Boat Race, Mattaponi River; Wakema, VA AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary change to the enforcement period of special local...

  5. 76 FR 30827 - Temporary Change of Dates for Recurring Marine Event in the Fifth Coast Guard District; Elizabeth...

    Science.gov (United States)

    2011-05-27

    ...-AA08 Temporary Change of Dates for Recurring Marine Event in the Fifth Coast Guard District; Elizabeth River, Norfolk, VA AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard will... various river boat races and a parade during the ``35th Annual Norfolk Harborfest Celebration.'' Special...

  6. 20 CFR 1002.306 - Is a National Guard civilian technician considered a State or Federal employee for purposes of...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Is a National Guard civilian technician... a National Guard civilian technician considered a State or Federal employee for purposes of USERRA? A National Guard civilian technician is considered a State employee for USERRA purposes, although he...

  7. Eliminate the Army and Air Force Reserves: Building a Robust National Guard to Meet 21st Century Operational Challenges

    Science.gov (United States)

    2016-04-04

    TITLE AND SUBTITLE ELIMINATE THE ARMY AND AIR FORCE RESERVES: BUILDING A ROBUST NATIONAL GUARD TO MEET 21ST CENTURY OPERATIONAL CHALLENGES 5a...STAFF COLLEGE JOINT ADVANCED WARFIGHTING SCHOOL ELIMINATE THE ARMY AND AIR FORCE RESERVES: BUILDING A ROBUST NATIONAL GUARD TO... ELIMINATE THE ARMY AND AIR FORCE RESERVES: BUILDING A ROBUST NATIONAL GUARD TO MEET 21ST CENTURY OPERATIONAL CHALLENGES by

  8. 78 FR 77359 - Eighth Coast Guard District Annual Safety Zones; New Year's Eve Celebration/City of Mobile...

    Science.gov (United States)

    2013-12-23

    ...-AA00 Eighth Coast Guard District Annual Safety Zones; New Year's Eve Celebration/City of Mobile; Mobile Channel; Mobile, AL AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard will enforce the City of Mobile New Year's Eve Celebration safety zone in the Mobile Channel, Mobile, AL from...

  9. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  10. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  11. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  12. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  13. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  14. Joint FAM/Line Management Assessment Report on LLNL Machine Guarding Safety Program

    Energy Technology Data Exchange (ETDEWEB)

    Armstrong, J. J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-07-19

    The LLNL Safety Program for Machine Guarding is implemented to comply with requirements in the ES&H Manual Document 11.2, "Hazards-General and Miscellaneous," Section 13 Machine Guarding (Rev 18, issued Dec. 15, 2015). The primary goal of this LLNL Safety Program is to ensure that LLNL operations involving machine guarding are managed so that workers, equipment and government property are adequately protected. This means that all such operations are planned and approved using the Integrated Safety Management System to provide the most cost effective and safest means available to support the LLNL mission.

  15. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  16. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  17. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  18. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  19. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  20. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.