WorldWideScience

Sample records for automated enforcement

  1. Enforcement Information System

    Data.gov (United States)

    Department of Transportation — EIS is an automated management information system that tracks the FAA’s enforcement actions on a nationwide basis. EIS is the FAA’s primary database for tracking...

  2. Enforcement Reports

    Data.gov (United States)

    U.S. Department of Health & Human Services — Whereas not all recalls are announced in the media or on our Recalls press release page, all recalls montiored by FDA are included in FDA's weekly Enforcement...

  3. Law Enforcement Locations

    Data.gov (United States)

    Kansas Data Access and Support Center — Law Enforcement Locations in Kansas Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law enforcement agencies "are...

  4. Enforcement and illegal migration

    OpenAIRE

    Orrenius, Pia

    2014-01-01

    Border enforcement of immigration laws attempts to raise the costs of illegal immigration, while interior enforcement also lowers the benefits. Border and interior enforcement therefore reduce the net benefits of illegal immigration and should lower the probability that an individual will decide to migrate. While some empirical studies find that border and interior enforcement serve as significant deterrents to illegal immigration, immigration enforcement is costly and carries significant uni...

  5. Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Union Slough National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  6. Enforcement and judicial review

    International Nuclear Information System (INIS)

    The 1990 Amendments to the enforcement provisions of the Clean Air Act generally give the Administrator and the courts broader powers to enforce the substantive provisions of the Act. The changes include wider applicability of civil sanctions, increased criminal penalties, broader emergency powers, broader inspection powers, and increased citizen involvement in enforcement and administrative decisionmaking. Another significant change is the addition of an administrative penalty scheme that would allow EPA to use streamlined procedures to assess administrative penalties of up to $200,000 (or more, in some cases). Furthermore, the Amendments extend the prohibition against entering into government contracts with violators to other facilities owned or operated by the convicted person. This chapter summarizes the statutory enforcement provisions of the Clean Air Act. It covers the new civil and criminal enforcement provisions, the new administrative penalty scheme, and the new provisions allowing broader public involvement in enforcement proceedings

  7. EPA Administrative Enforcement Dockets

    Data.gov (United States)

    U.S. Environmental Protection Agency — The EPA Administrative Enforcement Dockets database contains the electronic dockets for administrative penalty cases filed by EPA Regions and Headquarters. Visitors...

  8. Immigration Enforcement and Crime

    OpenAIRE

    Paolo Pinotti

    2015-01-01

    Immigration enforcement has ambiguous implications for the crime rate of undocumented immigrants. On the one hand, expulsions reduce the pool of immigrants at risk of committing crimes, on the other they lower the opportunity cost of crime for those who are not expelled. We estimate the effect of expulsions on the crime rate of undocumented immigrants in Italy exploiting variation in enforcement toward immigrants of different nationality, due to the existence of bilateral agreements for the c...

  9. Speed enforcement in Norway

    DEFF Research Database (Denmark)

    Elvik, Rune

    2015-01-01

    This paper probes the relationship between changes in the risk of apprehension for speeding in Norway and changes in the amount of speeding. The paper is based on a game-theoretic model of how the rate of violations and the amount of enforcement is determined by the interaction between drivers...

  10. Selective enforcement of regulation

    Institute of Scientific and Technical Information of China (English)

    Donghua; Chen; Dequan; Jiang; Shangkun; Liang; Fangping; Wang

    2011-01-01

    Regulatory agencies may,whether outside of set rules or within their discretion,depart from the original goals or principles set for enforcing the rules,which we term selective enforcement.Taking China,a country in transition,as an example,and using cases and large-sample tests,we present empirical evidence of selective enforcement.The results show that the China Securities Regulatory Commission(CSRC) takes into account whether companies violating the rules have a state-owned background and the strength of that background when investigating and punishing non-compliance.After controlling for the degree of violation,state-owned-enterprises(SOEs) are punished less severely than private companies;and the higher the hierarchy of the SOE in question,the less severe the punishment.It also takes longer for SOEs to be punished.We also find that companies that violate the rules less seriously have a greater tendency to apply for refinancing than those that violate the rules more seriously.This may be because the severity of the violation can affect listed companies’ expectations of obtaining refinancing.The analysis and conclusions of this study prove useful in understanding the causes and consequences of selective enforcement in transition economies.

  11. Enforcement response policy. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Levenstein, D.

    1987-12-01

    The directive discusses the policy which updates guidance on classifying violations, selecting appropriate enforcement action in response to various RCRA violators, and taking Federal enforcement action in States with authorized programs.

  12. Quota enforcement in resource industries

    DEFF Research Database (Denmark)

    Hansen, Lars Gårn; Jensen, Frank; Nøstbakken, Linda

    cant non-compliance and exogenous constraints on nes and enforcement budget. We propose a new enforcement system based on self-reporting of excess extraction and explicit di erentiation of inspection rates based on compliance history. In particular, we use state-dependent enforcement to induce rms...

  13. Certification/enforcement analysis

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    Industry compliance with minimum energy efficiency standards will be assured through a two-part program approach of certification and enforcement activities. The technical support document (TSD) presents the analyses upon which the proposed rule for assuring that consumer product comply with applicable energy efficiency standards is based. Much of the TSD is based upon support provided DOE by Vitro Laboratories. The OAO Corporation provided additional support in the development of the sampling plan incorporated in the proposed rule. Vitro's recommended approach to appliance certification and enforcement, developed after consideration of various program options, benefits, and impacts, establishes the C/E program framework, general criteria, and procedures for assuring a specified level of energy efficiency performance of covered consumer products. The results of the OAO analysis are given in Volume II of the TSD.

  14. Enforcement handbook: Enforcement of DOE nuclear safety requirements

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    This Handbook provides detailed guidance and procedures to implement the General Statement of DOE Enforcement Policy (Enforcement Policy or Policy). A copy of this Enforcement Policy is included for ready reference in Appendix D. The guidance provided in this Handbook is qualified, however, by the admonishment to exercise discretion in determining the proper disposition of each potential enforcement action. As discussed in subsequent chapters, the Enforcement and Investigation Staff will apply a number of factors in assessing each potential enforcement situation. Enforcement sanctions are imposed in accordance with the Enforcement Policy for the purpose of promoting public and worker health and safety in the performance of activities at DOE facilities by DOE contractors (and their subcontractors and suppliers) who are indemnified under the Price-Anderson Amendments Act. These indemnified contractors, and their suppliers and subcontractors, will be referred to in this Handbook collectively as DOE contractors. It should be remembered that the purpose of the Department`s enforcement policy is to improve nuclear safety for the workers and the public, and this goal should be the prime consideration in exercising enforcement discretion.

  15. Home Automation

    OpenAIRE

    Ahmed, Zeeshan

    2010-01-01

    In this paper I briefly discuss the importance of home automation system. Going in to the details I briefly present a real time designed and implemented software and hardware oriented house automation research project, capable of automating house's electricity and providing a security system to detect the presence of unexpected behavior.

  16. ENFORCEMENT OF MORTGAGE CONTRACT

    Directory of Open Access Journals (Sweden)

    Alisa A. BELU

    2016-07-01

    Full Text Available A chattel mortgage contract is the expression of a real guarantee that gives the creditor precedence over other creditors, in addition to the general pledge upon the belongings of the debtor. It refers to the sale of mortgaged movable assets, exclusively or prioritized in favor of the mortgaging creditor, in case the debtor does not comply with his / her commitments, under the signed mortgage contract. Beginning from this purpose, shared by both sides (as the chattel mortgage contract is synallagmatic, in case the debtor is unable to fulfill his / her commitments, the sides reach a situation of enforcement of the signed chattel mortgage contract. Given the legal status of the chattel mortgage contract [Art. 2387-2477 Noul Cod Civil , Universul Juridic, Bucureşti, 2016, ISBN 978-606-673-792-0], the principle of binding force of the contract and the principle according to which signed legal conventions will entail legal effects, the Romanian law maker developed the proper legal framework for the enforcement of the chattel mortgage contract. [art. 622 si urm. Noul Cod de Procedură Civilă, ed. Hamangiu, Bucureşti, 2016, ISBN 978-606-27-0459-9].

  17. Trade Expansion and Contract Enforcement

    OpenAIRE

    Avinash Dixit

    2003-01-01

    Consider a world of traders separated in geographic, economic, or social space. Honest trade offers larger gains for more distant traders, but frequencies of meetings, and information flows about cheating, have local bias. Honesty is self-enforcing only between pairs of sufficiently close neighbors. Global honesty prevails only in a sufficiently small world. The extent of self-enforcing honesty is likely to decrease when the world expands beyond this size. Costly external enforcement is usefu...

  18. Immigration Enforcement Actions - Annual Report

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  19. Stable and Enforceable

    DEFF Research Database (Denmark)

    Hallett, Andrew Hughes; Hougaard Jensen, Svend E.

    2011-01-01

    Since the great financial crash, the need for new fiscal rules to prevent unsustainable fiscal policies is universally recognised. In practice such rules, including those in the Stability and Growth Pact, have proved to be impossible to enforce. Thus, to avoid unsustainable fiscal policies...... reappearing, and to prevent monetary policy from being undermined by undisciplined governments, there is a need for a framework capable of imposing fiscal discipline. This paper considers an intertemporal assignment, where fiscal policy focuses on long-term objectives and monetary policy on short...... which the debt targeting regime should operate. Making these factors explicit would both improve the credibility of planned fiscal policies and reduce risk premia on borrowing costs. We finally show how Europe’s competitiveness pact, and debt restructuring operations, can be used to maximise...

  20. Police enforcement : theory and practice.

    NARCIS (Netherlands)

    Goldenbeld, C.

    1995-01-01

    The police enforcement of traffic violations in The Netherlands is discussed. Strategies of enforcement are described with respect to four spearheads of national road safety policy: drinking and driving, speeding, seat belt use and young moped riders. Each strategy constitutes a set of recommendatio

  1. Oversight and enforcement at DOE

    International Nuclear Information System (INIS)

    This paper addresses recent changes to the independent oversight and enforcement programs within the U.S. Department of Energy (DOE) and applications to criticality safety. DOE's Office of Oversight (Oversight hereafter), in the Office of Environment, Safety, and Health (EH), independently evaluates whether management systems ensure adequate protection of the worker, public, and environment. Oversight has adopted a new approach to performing evaluations based on the guiding principles for safety management identified by the Secretary of Energy. The principles Oversight evaluates are line management responsibility for safety and health, comprehensive requirements, and competence commensurate with responsibilities. Recently, the DOE codified the implementation of integrated safety management, further expounding on these basic guiding principles and Oversight's role. The Office of Enforcement and Investigations in EH (Enforcement hereafter) is responsible for enforcement, and relevant documents describe its role. This paper briefly discusses criticality safety aspects of the twin initiatives of Oversight and Enforcement

  2. Library Automation

    OpenAIRE

    Dhakne, B. N.; Giri, V. V; Waghmode, S. S.

    2010-01-01

    New technologies library provides several new materials, media and mode of storing and communicating the information. Library Automation reduces the drudgery of repeated manual efforts in library routine. By use of library automation collection, Storage, Administration, Processing, Preservation and communication etc.

  3. HSIP Law Enforcement Locations in New Mexico

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — Law Enforcement Locations Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law Enforcement agencies "are publicly...

  4. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. Also included are a number of enforcement actions that had been previously resolved but not published in this NUREG. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  5. Quota enforcement in resource industries

    DEFF Research Database (Denmark)

    Hansen, Lars Gårn; Jensen, Frank; Nøstbakken, Linda

    2014-01-01

    Quotas are frequently used in the management of renewable resources and emissions. However, in many industries there is concern about their basic effectiveness due to non-compliance. We develop an enforcement model of a quota-regulated resource and focus on a situation with significant non......-compliance and exogenous constraints on fines and enforcement budget. We propose a new enforcement system based on self-reporting of excess extraction and explicit differentiation of inspection rates depending on compliance history. We use differentiated inspections to induce firms to self-report excess extraction...

  6. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1990) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. Also included are a number of enforcement actions that had been previously resolved but not published in this NUREG. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  7. Process automation

    International Nuclear Information System (INIS)

    Process automation technology has been pursued in the chemical processing industries and to a very limited extent in nuclear fuel reprocessing. Its effective use has been restricted in the past by the lack of diverse and reliable process instrumentation and the unavailability of sophisticated software designed for process control. The Integrated Equipment Test (IET) facility was developed by the Consolidated Fuel Reprocessing Program (CFRP) in part to demonstrate new concepts for control of advanced nuclear fuel reprocessing plants. A demonstration of fuel reprocessing equipment automation using advanced instrumentation and a modern, microprocessor-based control system is nearing completion in the facility. This facility provides for the synergistic testing of all chemical process features of a prototypical fuel reprocessing plant that can be attained with unirradiated uranium-bearing feed materials. The unique equipment and mission of the IET facility make it an ideal test bed for automation studies. This effort will provide for the demonstration of the plant automation concept and for the development of techniques for similar applications in a full-scale plant. A set of preliminary recommendations for implementing process automation has been compiled. Some of these concepts are not generally recognized or accepted. The automation work now under way in the IET facility should be useful to others in helping avoid costly mistakes because of the underutilization or misapplication of process automation. 6 figs

  8. Hydrologic enforcement of lidar DEMs

    Science.gov (United States)

    Poppenga, Sandra K.; Worstell, Bruce B.; Danielson, Jeffrey J.; Brock, John C.; Evans, Gayla A.; Heidemann, H. Karl

    2014-01-01

    Hydrologic-enforcement (hydro-enforcement) of light detection and ranging (lidar)-derived digital elevation models (DEMs) modifies the elevations of artificial impediments (such as road fills or railroad grades) to simulate how man-made drainage structures such as culverts or bridges allow continuous downslope flow. Lidar-derived DEMs contain an extremely high level of topographic detail; thus, hydro-enforced lidar-derived DEMs are essential to the U.S. Geological Survey (USGS) for complex modeling of riverine flow. The USGS Coastal and Marine Geology Program (CMGP) is integrating hydro-enforced lidar-derived DEMs (land elevation) and lidar-derived bathymetry (water depth) to enhance storm surge modeling in vulnerable coastal zones.

  9. Game animals & hunting : Law enforcement

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This is a summary of hunting activities, game mammal surveys, and law enforcement on Neal Smith National Wildlife Refuge between 1992 and 2009. For each year, a...

  10. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October - December 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  11. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July - September 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  12. Financial Private Regulation and Enforcement

    OpenAIRE

    Miller, Geoffrey

    2011-01-01

    This paper has been delivered within the context of the research project "Transnational Private Regulatory Regimes: Constitutional foundations and governance design". This paper considers the topic of private regulation and enforcement for internationally active financial services firms. The paper documents the following types of regulation and enforcement that involve significant private input: house rules, contracts, internal compliance, management-based regulation, private standard-sett...

  13. Automating Spreadsheet Discovery & Risk Assessment

    CERN Document Server

    Perry, Eric

    2008-01-01

    There have been many articles and mishaps published about the risks of uncontrolled spreadsheets in today's business environment, including non-compliance, operational risk, errors, and fraud all leading to significant loss events. Spreadsheets fall into the realm of end user developed applications and are often absent the proper safeguards and controls an IT organization would enforce for enterprise applications. There is also an overall lack of software programming discipline enforced in how spreadsheets are developed. However, before an organization can apply proper controls and discipline to critical spreadsheets, an accurate and living inventory of spreadsheets across the enterprise must be created, and all critical spreadsheets must be identified. As such, this paper proposes an automated approach to the initial stages of the spreadsheet management lifecycle - discovery, inventory and risk assessment. Without the use of technology, these phases are often treated as a one-off project. By leveraging techn...

  14. 29 CFR 42.6 - Enforcement strategy.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Enforcement strategy. 42.6 Section 42.6 Labor Office of the Secretary of Labor COORDINATED ENFORCEMENT § 42.6 Enforcement strategy. (a) Each Regional Farm Labor... enforcement strategy for each protective statute pursuant to § 42.20(c)(3). The National Committee...

  15. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1990) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  16. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  17. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  18. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April-June 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  19. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  20. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  1. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  2. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1990) and includes copies of letters, notices, and orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  3. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  4. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1990) and includes copies of letters, notices, and orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  5. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  6. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  7. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  8. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  9. Automating Finance

    Science.gov (United States)

    Moore, John

    2007-01-01

    In past years, higher education's financial management side has been riddled with manual processes and aging mainframe applications. This article discusses schools which had taken advantage of an array of technologies that automate billing, payment processing, and refund processing in the case of overpayment. The investments are well worth it:…

  10. Optimal enforcement of competition law

    NARCIS (Netherlands)

    Motchenkova, E.

    2005-01-01

    Despite the recent theoretical developments in the field of antitrust law enforcement, much still needs to be done in order to prevent collusion and price-fixing in the major indiustries. Although penalties were recently increased considerably and new instruments of cartel deterrence such as lenienc

  11. Police enforcement and driving speed.

    NARCIS (Netherlands)

    2008-01-01

    Speed limits are violated frequently in the Netherlands. As speed is an important factor in road crashes, the surveillance of driving speeds is one of the spearheads in the policy plans of the Dutch police. Different methods of speed enforcement have proved to be effective in reducing speed and cras

  12. Law Enforcement Plan: Sherburne National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Sherburne NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  13. Law Enforcement Plan : Agassiz National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Agassiz Law Enforcement Plan clarifies Fish and Wildlife enforcement policies as they apply to Agassiz Refuge. It provides information about problems,...

  14. Chautauqua National Wildlife Refuge : Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Chautauqua National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  15. Law Enforcement Plan : Ottawa National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Ottawa NWR Complex Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about...

  16. Law Enforcement Plan: Horicon National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Horicon NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  17. Law Enforcement Plan : Necedah National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Necedah NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  18. Automation Security

    OpenAIRE

    Mirzoev, Dr. Timur

    2014-01-01

    Web-based Automated Process Control systems are a new type of applications that use the Internet to control industrial processes with the access to the real-time data. Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation s critical infrastructu...

  19. 76 FR 48919 - NRC Enforcement Policy

    Science.gov (United States)

    2011-08-09

    ...), approved a major revision to its Enforcement Policy. The NRC published a notice (75 FR 60485) announcing an... COMMISSION NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Solicitation of comments on... Commission paper that will include recommended revisions to the NRC Enforcement Policy. As such, this...

  20. 20 CFR 655.50 - Enforcement process.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Enforcement process. 655.50 Section 655.50... FOREIGN WORKERS IN THE UNITED STATES Labor Certification Process and Enforcement of Attestations for... Workers) § 655.50 Enforcement process. (a) Authority of the WHD Administrator. The WHD Administrator...

  1. 29 CFR 502.15 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR REGULATIONS ENFORCEMENT OF... AND NATIONALITY ACT (SUSPENDED 6-29-2009) Enforcement of Work Contracts § 502.15 Enforcement. The... work contract provisions as defined in § 501.10(a). The work contract also includes those...

  2. 45 CFR 1608.8 - Enforcement.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Enforcement. 1608.8 Section 1608.8 Public Welfare Regulations Relating to Public Welfare (Continued) LEGAL SERVICES CORPORATION PROHIBITED POLITICAL ACTIVITIES § 1608.8 Enforcement. This part shall be enforced according to the procedures set forth in §...

  3. CONSIDERATIONS REGARDING THE SUSPENSION OF THE ENFORCEMENT

    Directory of Open Access Journals (Sweden)

    Nicolae-Horia ŢIŢ

    2016-05-01

    Full Text Available The enforcement procedure is conducted from the time the enforcement body is seized by the enforcement officer, in order to comply with the provisions of the enforcement order, until the completion of the claim, with its accessoriesthereto, and the recovery of the costs of enforcement. The procedure involves a succession of acts, carried mostly by the enforcement officer. The continuity of the procedure may be affected by certain incidents leading to his timing. Among them, the situations ofenforcement suspension are generally determined by reference to their causes, respectively to the provisions of the law (in relation to specific acts or legal facts that occurred during the enforcement, the will of the creditor or the disposal of the court, at the request of the interested party. The analysis of the causes of suspension is important, in order to establish how they operate in concrete, as well for determining the effects that they produce.

  4. Taser as an Enforcement Tool

    OpenAIRE

    Árni Sigurgeirsson

    2009-01-01

    The enforcement tool Taser is used by police officers in United States, United Kingdom, France and Canada. The Icelandic Police Union has approved a request for police officers to carry and use Taser when they are on duty. Increasing violence against police officers is the main reason behind the request but according to the National Commissioner of the Police Assistant, Mrs. Sigríður Björk Guðjónsdóttir, police work is becoming more hostile for officers. The request has been taken under c...

  5. Enforcement as a Fundamental Right

    OpenAIRE

    Kinsch, Patrick

    2014-01-01

    There is, under the case law of the European Court of Human Rights, a right to the enforcement of judgments obtained abroad. The nature of that right can be substantive and founded on the right to recognition of the underlying situation. It can also be procedural and derive from the fair trial guarantee of Article 6 of the Convention which includes a right to the effectiveness of judgments rendered by ‘any court,’ a concept considered – without, in the author’s opinion, a cogent justificati...

  6. Automated Budget System

    Data.gov (United States)

    Department of Transportation — The Automated Budget System (ABS) automates management and planning of the Mike Monroney Aeronautical Center (MMAC) budget by providing enhanced capability to plan,...

  7. An economic view on environmental law enforcement..

    OpenAIRE

    Blondiau, Thomas

    2013-01-01

    In this PhD thesis, we study the enforcement of environmental law using an economic perspective. Environmental law enforcement is an important topic for two reasons. Firstly, regulatory initiatives are important drivers for demand for environmental goods and services, for producing in a more environmentally-friendly way and for internalizing possible external costsof economic activities. Thus, enforcement of environmental regulation is a tool for going to a more sustainable economy. Secondly,...

  8. Immigration Enforcement Actions: Fiscal Year 2011

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  9. Immigration Enforcement Actions: Fiscal Year 2008

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  10. Immigration Enforcement Actions: Fiscal Year 2007

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  11. Immigration Enforcement Actions: Fiscal Year 2005

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  12. Immigration Enforcement Actions: Fiscal Year 2006

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  13. Immigration Enforcement Actions: Fiscal Year 2004

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  14. Immigration Enforcement Actions: Fiscal Year 2012

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  15. Immigration Enforcement Actions: Fiscal Year 2009

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  16. Immigration Enforcement Actions: Fiscal Year 2010

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  17. 76 FR 76192 - NRC Enforcement Policy

    Science.gov (United States)

    2011-12-06

    ..., 2010 (75 FR 60485), revisions to the Policy. The intent of this request for comment is to assist the... the Federal Register on August 9, 2011 (76 FR 48919), and September 6, 2011 (76 FR 54986). It was the... COMMISSION NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Proposed enforcement...

  18. 7 CFR 1145.3 - Enforcement.

    Science.gov (United States)

    2010-01-01

    ... Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Milk), DEPARTMENT OF AGRICULTURE DAIRY FORWARD PRICING PROGRAM Enforcement § 1145.3 Enforcement. A handler may not require participation in a forward pricing contract as a condition of...

  19. 19 CFR 12.104i - Enforcement.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Enforcement. 12.104i Section 12.104i Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY SPECIAL CLASSES OF MERCHANDISE Cultural Property § 12.104i Enforcement. In the customs territory of...

  20. 17 CFR 8.05 - Enforcement staff.

    Science.gov (United States)

    2010-04-01

    ... staff shall consist of employees of the exchange and/or persons hired on a contract basis. It may not... within its disciplinary jurisdiction, regardless of whether its enforcement staff consists of employees... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Enforcement staff....

  1. 78 FR 69133 - Drug Enforcement Administration

    Science.gov (United States)

    2013-11-18

    ... Enforcement Administration Manufacturer of Controlled Substances; Notice of Registration; Lin Zhi International, Inc. By Notice dated May 14, 2013, and published in the Federal Register on May 22, 2013, 78 FR... renewal to the Drug Enforcement Administration (DEA) to be registered as a bulk manufacturer of...

  2. 41 CFR 60-50.4 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Enforcement. 60-50.4 Section 60-50.4 Public Contracts and Property Management Other Provisions Relating to Public Contracts... this part are subject to the general enforcement, compliance review, and complaint procedures set...

  3. Defensive Enforcement: Human Rights in Indonesia

    NARCIS (Netherlands)

    Hadiprayitno, I.

    2010-01-01

    The objective of the article is to examine the human rights enforcement in Indonesian legal and political system. This is done by studying the legal basis of human rights, the process of proliferation of human rights discourse, and the actual controversies of human rights enforcement. The study has

  4. Assessment of the NRC Enforcement Program

    International Nuclear Information System (INIS)

    On May 12, 1994, the Executive Director for Operations (EDO) established a Review Team composed of senior NRC managers to re-examine the NRC enforcement program. A copy of the Review Team's charter is enclosed as Appendix A. This report presents the Team's assessment. The purpose of this review effort are: (1) to perform an assessment of the NRC's enforcement program to determine whether the defined purposes of the enforcement program are appropriate; (2) to determine whether the NRC's enforcement practices and procedures for issuing enforcement actions are consistent with those purposes; and (3) to provide recommendations on any changes the Review Team believes advisable. In accordance with its charter, the Review Team considered the following principal issues in conducting its assessment of the enforcement program: the balance between providing deterrence and incentives (both positive and negative) for the identification and correction of violations; the appropriateness of NRC sanctions; whether the commission should seek statutory authority to increase the amount of civil penalties; whether the NRC should use different enforcement policies and practices for different licensees (e.g., materials licensees in contrast to power reactors or large fuel facilities); and whether the commission should establish open enforcement conferences as the normal practice

  5. The false enforcement of unpopular norms.

    Science.gov (United States)

    Willer, Robb; Kuwabara, Ko; Macy, Michael W

    2009-09-01

    Prevailing theory assumes that people enforce norms in order to pressure others to act in ways that they approve. Yet there are numerous examples of "unpopular norms" in which people compel each other to do things that they privately disapprove. While peer sanctioning suggests a ready explanation for why people conform to unpopular norms, it is harder to understand why they would enforce a norm they privately oppose. The authors argue that people enforce unpopular norms to show that they have complied out of genuine conviction and not because of social pressure. They use laboratory experiments to demonstrate this "false enforcement" in the context of a wine tasting and an academic text evaluation. Both studies find that participants who conformed to a norm due to social pressure then falsely enforced the norm by publicly criticizing a lone deviant. A third study shows that enforcement of a norm effectively signals the enforcer's genuine support for the norm. These results demonstrate the potential for a vicious cycle in which perceived pressures to conform to and falsely enforce an unpopular norm reinforce one another. PMID:20614762

  6. 75 FR 69573 - Export Enforcement Coordination Center

    Science.gov (United States)

    2010-11-15

    ..., employees, or agents, or any other person. (Presidential Sig.) THE WHITE HOUSE, November 9, 2010. [FR Doc... Documents#0;#0; ] Executive Order 13558 of November 9, 2010 Export Enforcement Coordination Center By the... Homeland Security for administrative purposes, an interagency Federal Export Enforcement...

  7. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    This document includes the US Nuclear Regulatory Commission`s (NRC`s or Commission`s) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC`s policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees` health and safety, the common defense and security, and the environment.

  8. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    International Nuclear Information System (INIS)

    This document includes the US Nuclear Regulatory Commission's (NRC's or Commission's) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC's policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees' health and safety, the common defense and security, and the environment

  9. Speed enforcement in China: National, provincial and city initiatives and their success.

    Science.gov (United States)

    He, Jie; King, Mark; Watson, Barry; Rakotonirainy, Andry; Fleiter, Judy

    2013-01-01

    China is motorizing rapidly, with associated urban road development and extensive construction of motorways. Speeding accounts for about 10% of fatalities, which represents a large decrease from a peak of 17.2% in 2004. Speeding has been addressed at a national level through the introduction of laws and procedural requirements in 2004, in provinces either across all road types or on motorways, and at city level. Typically, documentation of speed enforcement programmes has taken place when new technology (i.e. speed cameras) is introduced, and it is likely that many programmes have not been documented or widely reported. In particular, the national legislation of 2004 and its implementation was associated with a large reduction in fatalities attributed to speeding. In Guangdong Province, after using speed detection equipment, motorway fatalities due to speeding in 2005 decreased by 32.5% comparing with 2004. In Beijing, the number of traffic monitoring units which were used to photograph illegal traffic activities such as traffic light violations, speeding and using bus lanes illegally increased to 1958 by April 1, 2009, and in the future such automated enforcement will become the main means of enforcement, expected to account for 60% of all traffic enforcement in Beijing. This paper provides a brief overview of the speeding enforcement programmes in China which have been documented and their successes.

  10. Manufacturing and automation

    Directory of Open Access Journals (Sweden)

    Ernesto Córdoba Nieto

    2010-04-01

    Full Text Available The article presents concepts and definitions from different sources concerning automation. The work approaches automation by virtue of the author’s experience in manufacturing production; why and how automation prolects are embarked upon is considered. Technological reflection regarding the progressive advances or stages of automation in the production area is stressed. Coriat and Freyssenet’s thoughts about and approaches to the problem of automation and its current state are taken and examined, especially that referring to the problem’s relationship with reconciling the level of automation with the flexibility and productivity demanded by competitive, worldwide manufacturing.

  11. Recent Trends in Antitrust Enforcement

    Directory of Open Access Journals (Sweden)

    Mario Siragusa

    2015-10-01

    Full Text Available This article intends to discuss a selection of the most relevant features of the most recent trends in antitrust enforcement. Firstly, anticompetitive signalling will be addressed: its assessment depends on the kind of information provided. Where such information is of public knowledge or is very well known by the market participants, signalling should not be deemed as anticompetitive. Secondly, the Power Cable case has raised for the first time various problematic issues, such as the possibility to impose parental liability on a purely financial investor, even where the presumed direct infringer would have been able to pay the fine. This appears to be irreconcilable with the objectives for which the case law on parental liability has been elaborated. Thirdly, as to the concept of restriction of competition by object, it is argued that the Intel case does not disavow the principles established in Cartes Bancaires. Indeed, the finding of a violation and the different methodology applied in the first case are only due to its specific factual circumstances. Finally, the nouvelle vague of the case law on the anticompetitive abuse of rights has led to two opposite approaches, one at the EU and the other at the Italian level. The first one, based on the finding of objective circumstances, is perfectly consistent with existing EU case law, while the second, exclusively focused on the exclusionary intent, seems to be in sharp contrast with it. The hope is that the Court of Justice will intervene to resolve this contradiction.

  12. A law enforcement perspective of electricity deregulation

    International Nuclear Information System (INIS)

    In April 2004, the California Attorney General's (AG) office issued a white paper that provided a 'law enforcement perspective of the California energy crisis.' To complete this special issue's coverage, I summarize three aspects of that paper: notably, the deficiencies in market oversight and enforcement that left the deregulated market prone to potential abuse, the principal modus operandi that some market agents used to exploit those deficiencies without fear of retribution, and the AG's 'recommendations for improving enforcement and protecting consumers in deregulated energy markets.'. (author)

  13. Effective enforcement in a conservation area.

    Science.gov (United States)

    Hilborn, Ray; Arcese, Peter; Borner, Markus; Hando, Justin; Hopcraft, Grant; Loibooki, Martin; Mduma, Simon; Sinclair, Anthony R E

    2006-11-24

    Wildlife within protected areas is under increasing threat from bushmeat and illegal trophy trades, and many argue that enforcement within protected areas is not sufficient to protect wildlife. We examined 50 years of records from Serengeti National Park in Tanzania and calculated the history of illegal harvest and enforcement by park authorities. We show that a precipitous decline in enforcement in 1977 resulted in a large increase in poaching and decline of many species. Conversely, expanded budgets and antipoaching patrols since the mid-1980s have greatly reduced poaching and allowed populations of buffalo, elephants, and rhinoceros to rebuild.

  14. Configuration Management Automation (CMA)

    Data.gov (United States)

    Department of Transportation — Configuration Management Automation (CMA) will provide an automated, integrated enterprise solution to support CM of FAA NAS and Non-NAS assets and investments. CMA...

  15. DNR Division of Enforcement Officer Patrol Areas

    Data.gov (United States)

    Minnesota Department of Natural Resources — This theme shows the DNR Division of Enforcement Office Patrol Areas as of January 1, 2003. Patrol areas were defined and verified by Patrol Officers during the...

  16. Law Enforcement : St. Vincent National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of the Law Enforcement Management Plan is to provide a ready reference to Service, Regional, and Station policies, procedures, and programs concerning...

  17. Enforcement and Compliance History Online (ECHO) Widget

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Enforcement and Compliance History Online (ECHO) widget displays the compliance records of larger facilities within a user-specified area of interest as...

  18. Enforcement and Compliance History Online (ECHO) Facilities

    Data.gov (United States)

    U.S. Environmental Protection Agency — ECHO provides integrated compliance and enforcement information for about 800,000 regulated facilities nationwide. Its features range from simple to advanced,...

  19. Refuge Law Enforcement : Memorandum of Understanding

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This agreement, a reciprocal law enforcement and assistance agreement, is made between the U.S. Fish and Wildlife Service and the County Sheriff's Department. The...

  20. Workflow automation architecture standard

    Energy Technology Data Exchange (ETDEWEB)

    Moshofsky, R.P.; Rohen, W.T. [Boeing Computer Services Co., Richland, WA (United States)

    1994-11-14

    This document presents an architectural standard for application of workflow automation technology. The standard includes a functional architecture, process for developing an automated workflow system for a work group, functional and collateral specifications for workflow automation, and results of a proof of concept prototype.

  1. Defensive Enforcement: Human Rights in Indonesia

    OpenAIRE

    Hadiprayitno, I.

    2010-01-01

    The objective of the article is to examine the human rights enforcement in Indonesian legal and political system. This is done by studying the legal basis of human rights, the process of proliferation of human rights discourse, and the actual controversies of human rights enforcement. The study has the effect of highlighting some of the immense deficits in ensuring that violations are treated under judicial procedure and the protection of human rights is available and accessible for victims. ...

  2. Citizen enforcement and the smoking gun

    International Nuclear Information System (INIS)

    This article addresses the provisions for private citizens to bring lawsuits in federal court against regulated parties violating federal air pollution-control laws and the steps that operators of facilities subject to air pollution-control laws need to take to help avoid significant enforcement liabilities. The topics of the article include a look at citizen enforcement since 1970, the 1990 amendments to the Clean Air Act, construction and management with these regulations

  3. Flow enforcement algorithms for ATM networks

    DEFF Research Database (Denmark)

    Dittmann, Lars; Jacobsen, Søren B.; Moth, Klaus

    1991-01-01

    Four measurement algorithms for flow enforcement in asynchronous transfer mode (ATM) networks are presented. The algorithms are the leaky bucket, the rectangular sliding window, the triangular sliding window, and the exponentially weighted moving average. A comparison, based partly on teletraffic....... Implementations are proposed on the block diagram level, and dimensioning examples are carried out when flow enforcing a renewal-type connection using the four algorithms. The corresponding hardware demands are estimated aid compared...

  4. Strengthened enforcement enhances marine sanctuary performance

    Directory of Open Access Journals (Sweden)

    Brendan P. Kelaher

    2015-01-01

    Full Text Available Marine sanctuaries are areas where the extraction of biota is not permitted. Although most marine sanctuaries have a positive influence on biotic communities, not all sanctuaries are meeting their conservation objectives. Amidst possible explanations (e.g., size, age and isolation, insufficient enforcement is often speculated to be a key driver of marine sanctuary underperformance. Despite this, there are few studies directly linking quantitative enforcement data to changes in biotic communities within marine sanctuaries. Here, we used an asymmetrical-BACI experimental design from 2006–2012 to test whether new enforcement initiatives enhanced abundances of target fishes and threatened species in an existing large sub-tropical marine sanctuary relative to areas open to fishing. Implementation of the new enforcement initiatives in 2010 was associated with a 201% increase in annual fine rate and a significant increase in target fish and elasmobranch abundance, as well as sightings of a critically-endangered shark, in the marine sanctuary relative to areas open to fishing. Overall, these results demonstrate that strengthening enforcement can have a rapid positive influence on target fish and perhaps threatened species in a subtropical marine sanctuary. From this, we contend that increased enforcement guided by risk-based compliance planning and operations may be a useful first step for improving underperforming marine sanctuaries.

  5. Shoe-String Automation

    Energy Technology Data Exchange (ETDEWEB)

    Duncan, M.L.

    2001-07-30

    Faced with a downsizing organization, serious budget reductions and retirement of key metrology personnel, maintaining capabilities to provide necessary services to our customers was becoming increasingly difficult. It appeared that the only solution was to automate some of our more personnel-intensive processes; however, it was crucial that the most personnel-intensive candidate process be automated, at the lowest price possible and with the lowest risk of failure. This discussion relates factors in the selection of the Standard Leak Calibration System for automation, the methods of automation used to provide the lowest-cost solution and the benefits realized as a result of the automation.

  6. 28 CFR 0.102 - Drug enforcement policy coordination.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Drug enforcement policy coordination. 0... JUSTICE Drug Enforcement Administration § 0.102 Drug enforcement policy coordination. The Administrator of the Drug Enforcement Administration shall report to the Attorney General, through the Deputy...

  7. Enforcement Matters : Enforcement and Compliance of European Directives in Four Member States

    NARCIS (Netherlands)

    Versluis, E.

    2003-01-01

    The dissertation 'Enforcement Matters' is a comparative analysis of the transposition and enforcement of, and compliance with, two directives regulating dangerous chemical substances (the Seveso II and Safety Data Sheets directives) in four member states (the Netherlands, Germany, United Kingdom and

  8. Three Essays on the Enforcement of Accounting Standards in Germany

    OpenAIRE

    Strohmenger, Manuel

    2014-01-01

    The dissertation at hand focuses on the enforcement of accounting standards in Germany. The legal basis of the external enforcement of accounting standards in Germany was created by the „Bilanzkontrollgesetz” (Financial Reporting Enforcement Act) at the end of 2004. An enforcement mechanism was installed to enforce accounting standard compliance by regular reviews of disclosed financial statements. The system was established as implementation of EU guidelines. Since 2005, International Financ...

  9. 77 FR 30297 - Privacy Act of 1974; U.S. Customs and Border Protection, DHS/CBP-006-Automated Targeting System...

    Science.gov (United States)

    2012-05-22

    ... criminals, as well as the broader expertise of the law enforcement and intelligence communities. It is well... titled, U.S. Customs and Border Protection, DHS/CBP-006--Automated Targeting System (ATS) 72 FR 43650.... Customs and Border Protection, DHS/CBP-006--Automated Targeting System (ATS) 72 FR 43650, August 6,...

  10. Human Trafficking in Indonesia: Law Enforcement Problems

    Directory of Open Access Journals (Sweden)

    Nathalina Naibaho

    2011-01-01

    Full Text Available Human trafficking is considered as a crime against humanity. To conduct the due process of law towards cases related with human trafficking, the law enforcement officers cannot work by themselves. They really need assistance from many parties – such as active report from the society – as a valuable information to disclose such cases. Law enforcement conducted towards woman and child trafficking is still ineffective. It is proven by many existing cases, that low number of processed cases before the court and minimum sanction convicted to the perpetrators is clearly evident. Factors which are deemed to have correlation with low attempt of law enforcement towards legal case on this case, among others are: Lack of the Government’s commitment to fight against the crime of human trafficking, in the event that the ineffectiveness in utilization of prevailing laws and regulation; Lack of capacity of professionalism of law enforcement agency (and relevant parties in handling women and child trafficking at the field. This may be caused by lack of knowledge on infringed regulation. For that matter, those law enforcement agency shall be given socialization and an SOP (standardized operational procedure, so that there will be no inconsistency in handling the existing cases.

  11. Law Enforcement of Cyber Terorism in Indonesia

    Directory of Open Access Journals (Sweden)

    Sri Ayu Astuti

    2015-12-01

    Full Text Available Cyber terrorism is one of the category of crimes that cross border organized and has been established as an extraordinary crime. This crime is becoming a serious threat to countries in the world. In this regard, the Government's attitude of firmness needed to enforce cyber laws against the freedom development in social media. The development of the immeasurable it in the country of Indonesia required the limitations by doing legal liability over the behavior of law which deviates towards the use of technology tools. Strict law enforcement efforts as a clear attitude to stop actively moving massive terrorism, by enacting the provisions of the law on information and electronic transactions as well as the law of terrorism effectively. How To Cite: Astuti, S. (2015. Law Enforcement of Cyber Terorism in Indonesia. Rechtsidee, 2(2, 157-178. doi:http://dx.doi.org/10.21070/jihr.v2i2.82

  12. Automated visual inspection of imprinted pharmaceutical tablets

    Science.gov (United States)

    Bukovec, Marko; Špiclin, Žiga; Pernuš, Franjo; Likar, Boštjan

    2007-09-01

    This paper is on automated visual inspection of tablets that may, in contrast to manual tablet sorting, provide objective and reproducible tablet quality assurance. Visual inspection of the ever-increasing numbers of produced imprinted tablets, regulatory enforced for unambiguous identification of active ingredients and dosage strength of each tablet, is especially demanding. The problem becomes more tractable by incorporating some a priori knowledge of the imprint shape and/or appearance. For this purpose, we consider two alternative automated tablet defect detection methods. The geometrical method, incorporating geometrical a priori knowledge of the imprint shape, enables specific inspection of the imprinted and non-imprinted tablet surface, while the statistical method exploits statistical a priori knowledge of tablet surface appearance, derived from a training image database. The two methods were evaluated on a large tablet image database, consisting of 3445 images of four types of imprinted tablets, with and without typical production defects. A 'gold standard' for testing the performances of the two inspection methods was established by manually classifying the tablets into good and five defective classes. The results, obtained by ROC (receiver operating characteristics) analysis, indicate that the statistical method yields better defect detection sensitivity and specificity than the geometrical method. Both presented image analysis methods are quite general and promising tools for automated visual inspection of imprinted pharmaceutical tablets.

  13. Performance-Driven Interface Contract Enforcement for Scientific Components

    Energy Technology Data Exchange (ETDEWEB)

    Dahlgren, T

    2007-02-22

    Several performance-driven approaches to selectively enforce interface contracts for scientific components are investigated. The goal is to facilitate debugging deployed applications built from plug-and-play components while keeping the cost of enforcement within acceptable overhead limits. This paper describes a study of global enforcement using a priori execution cost estimates obtained from traces. Thirteen trials are formed from five, single-component programs. Enforcement experiments conducted using twenty-three enforcement policies are used to determine the nature of exercised contracts and the impact of a variety of sampling strategies. Performance-driven enforcement appears to be best suited to programs that exercise moderately expensive contracts.

  14. 24 CFR 3500.19 - Enforcement.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Enforcement. 3500.19 Section 3500.19 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued) OFFICE OF ASSISTANT SECRETARY FOR HOUSING-FEDERAL HOUSING COMMISSIONER, DEPARTMENT OF HOUSING AND...

  15. 76 FR 54986 - NRC Enforcement Policy

    Science.gov (United States)

    2011-09-06

    ..., 2010, the NRC published a notice (75 FR 60485) to announce an effective date of September 30, 2010, for... violation. 5. Civil Penalties for Loss of Control of Regulated Material On December 18, 2000 (65 FR 79139... COMMISSION 10 CFR Chapter I NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION:...

  16. 78 FR 5838 - NRC Enforcement Policy

    Science.gov (United States)

    2013-01-28

    ... September 30, 2010 (75 FR 60485), the NRC published the revised Policy in the Federal Register. In addition... Register on September 6, 2011 (76 FR 54986), and December 6, 2011 (76 FR 76192). III. Summary of... COMMISSION NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Policy revision;...

  17. Optimal contracts under imperfect enforcement revisited

    OpenAIRE

    Hans K. Hvide

    2005-01-01

    We consider a financing game with costly enforcement based on Townsend (1979), but where monitoring is non-contractible and allowed to be stochastic. Debt is the optimal contract. Moreover, the debt contract induces creditor leniency and strategic defaults by the borrower on the equilibrium path, consistent with empirical evidence on repayment and monitoring behavior in credit markets.

  18. Optimal Debt Contracts under Costly Enforcement

    OpenAIRE

    Hvide, Hans K.; Leite, Tore

    2007-01-01

    We consider a financing game with costly enforcement based on Townsend (1979), but where monitoring is non-contractible and allowed to be stochastic. Debt is the optimal contract. Moreover, the debt contract induces creditor leniency and strategic defaults by the borrower on the equilibrium path, consistent with empirical evidence on repayment and monitoring behaviour in credit markets.

  19. Risk sharing relations and enforcement mechanisms

    NARCIS (Netherlands)

    Barr, A.; Dekker, M.; Fafchamps, M

    2008-01-01

    We investigate whether the set of available enforcement mechanisms affects the formation of risk sharing relations by applying dyadic regression analysis to data from a specifically designed behavioural experiment, two surveys and a genealogical mapping exercise. During the experiment participants a

  20. 76 FR 80846 - Definition of Enforcement Action

    Science.gov (United States)

    2011-12-27

    ... to make revisions. 75 FR 70680 (Nov. 18, 2010). On April 4, 2011, after holding eight consultations... consultation schedule and process for review. 76 FR 18457. The Commission's regulatory review process... National Indian Gaming Commission 25 CFR Part 502 RIN 3141-AA43 Definition of Enforcement Action...

  1. 12 CFR 370.11 - Enforcement mechanisms.

    Science.gov (United States)

    2010-01-01

    ... institution-affiliated parties to enforcement actions under Section 8 of the FDI Act (12 U.S.C. 1818), including, for example, assessment of civil money penalties under section 8(i) of the FDI Act (12 U.S.C. 1818(i)), removal and prohibition orders under section 8(e) of the FDI Act (12 U.S.C. 1818(e)),...

  2. Influencing speeding behaviour through preventative police enforcement.

    NARCIS (Netherlands)

    Wesemann, P.

    1997-01-01

    This paper considers the effect of speed on road safety and how to influence speeding behaviour. The results that can be achieved through police enforcement combined with information campaigns are discussed with reference to projects carried out in the Netherlands. The cost implications are consider

  3. 28 CFR 54.605 - Enforcement procedures.

    Science.gov (United States)

    2010-07-01

    ... regulations. These procedures may be found at 28 CFR 42.106 through 42.111. ....605 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) NONDISCRIMINATION ON THE BASIS OF SEX IN... procedures. The investigative, compliance, and enforcement procedural provisions of Title VI of the...

  4. 31 CFR 31.218 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... Conflicts of Interest § 31.218 Enforcement. (a) Compliance with these rules concerning conflicts of interest... interest or a personal conflict of interest and denial of payment for that work. (2) Termination of the..., referral to the Department of Justice for prosecution of the retained entity and/or its officers...

  5. 76 FR 9357 - Enforcement Actions Summary

    Science.gov (United States)

    2011-02-17

    ....gpoaccess.gov/fr/index.html ; or (2) Visiting TSA's Security Regulations web page at http://www.tsa.gov and... Administration, DHS. ACTION: Notice of Availability. SUMMARY: The Transportation Security Administration (TSA) is providing notice that it has issued an annual summary of all enforcement actions taken by TSA under...

  6. Automate functional testing

    Directory of Open Access Journals (Sweden)

    Ramesh Kalindri

    2014-06-01

    Full Text Available Currently, software engineers are increasingly turning to the option of automating functional tests, but not always have successful in this endeavor. Reasons range from low planning until over cost in the process. Some principles that can guide teams in automating these tests are described in this article.

  7. Automation in Warehouse Development

    NARCIS (Netherlands)

    Hamberg, R.; Verriet, J.

    2012-01-01

    The warehouses of the future will come in a variety of forms, but with a few common ingredients. Firstly, human operational handling of items in warehouses is increasingly being replaced by automated item handling. Extended warehouse automation counteracts the scarcity of human operators and support

  8. Work and Programmable Automation.

    Science.gov (United States)

    DeVore, Paul W.

    A new industrial era based on electronics and the microprocessor has arrived, an era that is being called intelligent automation. Intelligent automation, in the form of robots, replaces workers, and the new products, using microelectronic devices, require significantly less labor to produce than the goods they replace. The microprocessor thus…

  9. Library Automation Style Guide.

    Science.gov (United States)

    Gaylord Bros., Liverpool, NY.

    This library automation style guide lists specific terms and names often used in the library automation industry. The terms and/or acronyms are listed alphabetically and each is followed by a brief definition. The guide refers to the "Chicago Manual of Style" for general rules, and a notes section is included for the convenience of individual…

  10. Automation in immunohematology.

    Science.gov (United States)

    Bajpai, Meenu; Kaur, Ravneet; Gupta, Ekta

    2012-07-01

    There have been rapid technological advances in blood banking in South Asian region over the past decade with an increasing emphasis on quality and safety of blood products. The conventional test tube technique has given way to newer techniques such as column agglutination technique, solid phase red cell adherence assay, and erythrocyte-magnetized technique. These new technologies are adaptable to automation and major manufacturers in this field have come up with semi and fully automated equipments for immunohematology tests in the blood bank. Automation improves the objectivity and reproducibility of tests. It reduces human errors in patient identification and transcription errors. Documentation and traceability of tests, reagents and processes and archiving of results is another major advantage of automation. Shifting from manual methods to automation is a major undertaking for any transfusion service to provide quality patient care with lesser turnaround time for their ever increasing workload. This article discusses the various issues involved in the process.

  11. Automation in Immunohematology

    Directory of Open Access Journals (Sweden)

    Meenu Bajpai

    2012-01-01

    Full Text Available There have been rapid technological advances in blood banking in South Asian region over the past decade with an increasing emphasis on quality and safety of blood products. The conventional test tube technique has given way to newer techniques such as column agglutination technique, solid phase red cell adherence assay, and erythrocyte-magnetized technique. These new technologies are adaptable to automation and major manufacturers in this field have come up with semi and fully automated equipments for immunohematology tests in the blood bank. Automation improves the objectivity and reproducibility of tests. It reduces human errors in patient identification and transcription errors. Documentation and traceability of tests, reagents and processes and archiving of results is another major advantage of automation. Shifting from manual methods to automation is a major undertaking for any transfusion service to provide quality patient care with lesser turnaround time for their ever increasing workload. This article discusses the various issues involved in the process.

  12. Automation in immunohematology.

    Science.gov (United States)

    Bajpai, Meenu; Kaur, Ravneet; Gupta, Ekta

    2012-07-01

    There have been rapid technological advances in blood banking in South Asian region over the past decade with an increasing emphasis on quality and safety of blood products. The conventional test tube technique has given way to newer techniques such as column agglutination technique, solid phase red cell adherence assay, and erythrocyte-magnetized technique. These new technologies are adaptable to automation and major manufacturers in this field have come up with semi and fully automated equipments for immunohematology tests in the blood bank. Automation improves the objectivity and reproducibility of tests. It reduces human errors in patient identification and transcription errors. Documentation and traceability of tests, reagents and processes and archiving of results is another major advantage of automation. Shifting from manual methods to automation is a major undertaking for any transfusion service to provide quality patient care with lesser turnaround time for their ever increasing workload. This article discusses the various issues involved in the process. PMID:22988378

  13. Automation in Warehouse Development

    CERN Document Server

    Verriet, Jacques

    2012-01-01

    The warehouses of the future will come in a variety of forms, but with a few common ingredients. Firstly, human operational handling of items in warehouses is increasingly being replaced by automated item handling. Extended warehouse automation counteracts the scarcity of human operators and supports the quality of picking processes. Secondly, the development of models to simulate and analyse warehouse designs and their components facilitates the challenging task of developing warehouses that take into account each customer’s individual requirements and logistic processes. Automation in Warehouse Development addresses both types of automation from the innovative perspective of applied science. In particular, it describes the outcomes of the Falcon project, a joint endeavour by a consortium of industrial and academic partners. The results include a model-based approach to automate warehouse control design, analysis models for warehouse design, concepts for robotic item handling and computer vision, and auton...

  14. Advances in inspection automation

    Science.gov (United States)

    Weber, Walter H.; Mair, H. Douglas; Jansen, Dion; Lombardi, Luciano

    2013-01-01

    This new session at QNDE reflects the growing interest in inspection automation. Our paper describes a newly developed platform that makes the complex NDE automation possible without the need for software programmers. Inspection tasks that are tedious, error-prone or impossible for humans to perform can now be automated using a form of drag and drop visual scripting. Our work attempts to rectify the problem that NDE is not keeping pace with the rest of factory automation. Outside of NDE, robots routinely and autonomously machine parts, assemble components, weld structures and report progress to corporate databases. By contrast, components arriving in the NDT department typically require manual part handling, calibrations and analysis. The automation examples in this paper cover the development of robotic thickness gauging and the use of adaptive contour following on the NRU reactor inspection at Chalk River.

  15. Automated model building

    CERN Document Server

    Caferra, Ricardo; Peltier, Nicholas

    2004-01-01

    This is the first book on automated model building, a discipline of automated deduction that is of growing importance Although models and their construction are important per se, automated model building has appeared as a natural enrichment of automated deduction, especially in the attempt to capture the human way of reasoning The book provides an historical overview of the field of automated deduction, and presents the foundations of different existing approaches to model construction, in particular those developed by the authors Finite and infinite model building techniques are presented The main emphasis is on calculi-based methods, and relevant practical results are provided The book is of interest to researchers and graduate students in computer science, computational logic and artificial intelligence It can also be used as a textbook in advanced undergraduate courses

  16. EPA Enforcement and Compliance History Online: EPA Enforcement Action Data Set

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Enforcement and Compliance History Online (ECHO) data sets have been compiled for access to larger sets of national data to ensure that ECHO meets your data...

  17. Mark Twain National Wildlife Refuge: Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Mark Twain NWR (including Clarence Cannon, Louisa, and Calhoun NWRs) Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to...

  18. Law Enforcement Plan Swan Lake National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Swan Lake National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  19. Crab Orchard National Wildlife Refuge : Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Crab Orchard National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  20. 48 CFR 1222.406 - Administration and enforcement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Administration and enforcement. 1222.406 Section 1222.406 Federal Acquisition Regulations System DEPARTMENT OF TRANSPORTATION... Involving Construction 1222.406 Administration and enforcement....

  1. 48 CFR 1322.406 - Administration and enforcement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Administration and enforcement. 1322.406 Section 1322.406 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE... Involving Construction 1322.406 Administration and enforcement....

  2. Child Support Enforcement Annual Data Report Form 157

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  3. Child Support Enforcement Annual Data Reports Form 157 - YR 2013

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  4. Law Enforcement Plan: Minnesota Valley National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Minnesota Valley NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about...

  5. 78 FR 44165 - Nuclear Regulatory Commission Enforcement Policy

    Science.gov (United States)

    2013-07-23

    ... From the Federal Register Online via the Government Publishing Office NUCLEAR REGULATORY COMMISSION Nuclear Regulatory Commission Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Enforcement policy; request for comment. SUMMARY: The U.S. Nuclear Regulatory Commission (NRC) is...

  6. 41 CFR 60-250.65 - Enforcement proceedings.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Enforcement proceedings. 60-250.65 Section 60-250.65 Public Contracts and Property Management Other Provisions Relating to... PROTECTED VETERANS General Enforcement and Complaint Procedures § 60-250.65 Enforcement proceedings....

  7. 41 CFR 60-300.65 - Enforcement proceedings.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Enforcement proceedings. 60-300.65 Section 60-300.65 Public Contracts and Property Management Other Provisions Relating to... MEDAL VETERANS General Enforcement and Complaint Procedures § 60-300.65 Enforcement proceedings....

  8. 47 CFR 68.414 - Hearing aid-compatibility: Enforcement.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Hearing aid-compatibility: Enforcement. 68.414... (CONTINUED) CONNECTION OF TERMINAL EQUIPMENT TO THE TELEPHONE NETWORK Complaint Procedures § 68.414 Hearing aid-compatibility: Enforcement. Enforcement of §§ 68.4 and 68.112 is hereby delegated to those...

  9. 50 CFR 10.22 - Law enforcement offices.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 1 2010-10-01 2010-10-01 false Law enforcement offices. 10.22 Section 10... GENERAL PROVISIONS Addresses § 10.22 Law enforcement offices. Service law enforcement offices and their areas of responsibility follow. Mail should be addressed: “Assistant Regional Director, Division of...

  10. 20 CFR 638.805 - Security and law enforcement.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Security and law enforcement. 638.805 Section... and law enforcement. (a) The Job Corps Director shall provide guidelines to protect the security of... jurisdiction with the appropriate State and locality with respect to criminal law enforcement as long as...

  11. 49 CFR 1542.219 - Supplementing law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Supplementing law enforcement personnel. 1542.219... Operations § 1542.219 Supplementing law enforcement personnel. (a) When TSA decides, after being notified by... private law enforcement personnel are available to carry out the requirements of § 1542.215, TSA...

  12. 49 CFR 1542.217 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1542.217 Section 1542... Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used... the criminal laws of the State and local jurisdictions in which the airport is located— (1) A...

  13. 49 CFR 1544.217 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1544.217 Section 1544... AND COMMERCIAL OPERATORS Operations § 1544.217 Law enforcement personnel. (a) The following applies to... for law enforcement personnel meeting the qualifications and standards specified in §§ 1542.215...

  14. 32 CFR 634.26 - Traffic law enforcement principles.

    Science.gov (United States)

    2010-07-01

    ... applies proper enforcement measures to traffic congestion and focuses on selected time periods, conditions... 32 National Defense 4 2010-07-01 2010-07-01 true Traffic law enforcement principles. 634.26... ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.26...

  15. An empirical investigation of compliance and enforcement problems

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Jensen, Frank

    2011-01-01

    Compliance and enforcement are important issues from an economic point of view because management measures are useless without a certain level of enforcement. These conclusions come from the well-established theoretical literature on compliance and enforcement problems within fisheries. This pape...

  16. 45 CFR 164.412 - Law enforcement delay.

    Science.gov (United States)

    2010-10-01

    ... § 164.412 Law enforcement delay. If a law enforcement official states to a covered entity or business... 45 Public Welfare 1 2010-10-01 2010-10-01 false Law enforcement delay. 164.412 Section 164.412... investigation or cause damage to national security, a covered entity or business associate shall: (a) If...

  17. 40 CFR 158.355 - Enforcement analytical method.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Enforcement analytical method. 158.355... DATA REQUIREMENTS FOR PESTICIDES Product Chemistry § 158.355 Enforcement analytical method. An analytical method suitable for enforcement purposes must be provided for each active ingredient in...

  18. 40 CFR 161.180 - Enforcement analytical method.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Enforcement analytical method. 161.180 Section 161.180 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS... § 161.180 Enforcement analytical method. An analytical method suitable for enforcement purposes must...

  19. 10 CFR 431.198 - Enforcement testing for distribution transformers.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Enforcement testing for distribution transformers. 431.198... COMMERCIAL AND INDUSTRIAL EQUIPMENT Distribution Transformers Compliance and Enforcement § 431.198 Enforcement testing for distribution transformers. (a) Test notice. Upon receiving information in...

  20. Chef infrastructure automation cookbook

    CERN Document Server

    Marschall, Matthias

    2013-01-01

    Chef Infrastructure Automation Cookbook contains practical recipes on everything you will need to automate your infrastructure using Chef. The book is packed with illustrated code examples to automate your server and cloud infrastructure.The book first shows you the simplest way to achieve a certain task. Then it explains every step in detail, so that you can build your knowledge about how things work. Eventually, the book shows you additional things to consider for each approach. That way, you can learn step-by-step and build profound knowledge on how to go about your configuration management

  1. Forensic imaging tools for law enforcement

    Energy Technology Data Exchange (ETDEWEB)

    SMITHPETER,COLIN L.; SANDISON,DAVID R.; VARGO,TIMOTHY D.

    2000-01-01

    Conventional methods of gathering forensic evidence at crime scenes are encumbered by difficulties that limit local law enforcement efforts to apprehend offenders and bring them to justice. Working with a local law-enforcement agency, Sandia National Laboratories has developed a prototype multispectral imaging system that can speed up the investigative search task and provide additional and more accurate evidence. The system, called the Criminalistics Light-imaging Unit (CLU), has demonstrated the capabilities of locating fluorescing evidence at crime scenes under normal lighting conditions and of imaging other types of evidence, such as untreated fingerprints, by direct white-light reflectance. CLU employs state of the art technology that provides for viewing and recording of the entire search process on videotape. This report describes the work performed by Sandia to design, build, evaluate, and commercialize CLU.

  2. Law Enforcement of Cyber Terorism in Indonesia

    OpenAIRE

    Sri Ayu Astuti

    2015-01-01

    Cyber terrorism is one of the category of crimes that cross border organized and has been established as an extraordinary crime. This crime is becoming a serious threat to countries in the world. In this regard, the Government's attitude of firmness needed to enforce cyber laws against the freedom development in social media. The development of the immeasurable it in the country of Indonesia required the limitations by doing legal liability over the behavior of law which deviates towards the ...

  3. Illegal Migration, Enforcement and Minimum Wage

    OpenAIRE

    Epstein, Gil S.; Heizler (Cohen), Odelia

    2007-01-01

    This paper examines the connection between illegal migration, minimum wages and enforcement policy. We first explore the employers' decision regarding the employment of illegal migrants in the presence of an effective minimum wage. We show that the employers' decision depends on the wage gap between those of the legal and illegal workers and on the penalty for employing illegal workers. We consider the effects a change in the minimum wage has on the employment of illegal immigrants and local ...

  4. Injunctive Relief and Private Antitrust Enforcement

    OpenAIRE

    Peyer, Sebastian

    2011-01-01

    The paper analyses the role of injunctions in the private enforcement of competition law. Most commentators deal predominantly with damages actions and the European policy proposals only discuss the conditions for successful compensation claims. However, damages claims are likely to be the most expensive and time consuming remedy available. In many cases injunctive relief may be cheaper and, thus, be preferred by the victim. Asking the court to order the perpetrator to either cease from certa...

  5. Nuclear forensics in law enforcement applications

    International Nuclear Information System (INIS)

    Over the past several years, the Livermore Forensic Science Center has conducted analyses of nuclear-related samples in conjunction with domestic and international criminal investigations. Law enforcement officials have sought conventional and nuclear-forensic analyses of questioned specimens that have typically consisted of miscellaneous metal species or actinide salts. The investigated activities have included nuclear smuggling and the proliferation of alleged fissionable materials, nonradioactive hoaxes such as 'Red Mercury', and the interdiction of illegal laboratories engaged in methamphetamine synthesis. (author)

  6. I-94 Automation FAQs

    Data.gov (United States)

    Department of Homeland Security — In order to increase efficiency, reduce operating costs and streamline the admissions process, U.S. Customs and Border Protection has automated Form I-94 at air and...

  7. Hydrometeorological Automated Data System

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Office of Hydrologic Development of the National Weather Service operates HADS, the Hydrometeorological Automated Data System. This data set contains the last...

  8. Automated Vehicles Symposium 2015

    CERN Document Server

    Beiker, Sven

    2016-01-01

    This edited book comprises papers about the impacts, benefits and challenges of connected and automated cars. It is the third volume of the LNMOB series dealing with Road Vehicle Automation. The book comprises contributions from researchers, industry practitioners and policy makers, covering perspectives from the U.S., Europe and Japan. It is based on the Automated Vehicles Symposium 2015 which was jointly organized by the Association of Unmanned Vehicle Systems International (AUVSI) and the Transportation Research Board (TRB) in Ann Arbor, Michigan, in July 2015. The topical spectrum includes, but is not limited to, public sector activities, human factors, ethical and business aspects, energy and technological perspectives, vehicle systems and transportation infrastructure. This book is an indispensable source of information for academic researchers, industrial engineers and policy makers interested in the topic of road vehicle automation.

  9. Automated Vehicles Symposium 2014

    CERN Document Server

    Beiker, Sven; Road Vehicle Automation 2

    2015-01-01

    This paper collection is the second volume of the LNMOB series on Road Vehicle Automation. The book contains a comprehensive review of current technical, socio-economic, and legal perspectives written by experts coming from public authorities, companies and universities in the U.S., Europe and Japan. It originates from the Automated Vehicle Symposium 2014, which was jointly organized by the Association for Unmanned Vehicle Systems International (AUVSI) and the Transportation Research Board (TRB) in Burlingame, CA, in July 2014. The contributions discuss the challenges arising from the integration of highly automated and self-driving vehicles into the transportation system, with a focus on human factors and different deployment scenarios. This book is an indispensable source of information for academic researchers, industrial engineers, and policy makers interested in the topic of road vehicle automation.

  10. Disassembly automation automated systems with cognitive abilities

    CERN Document Server

    Vongbunyong, Supachai

    2015-01-01

    This book presents a number of aspects to be considered in the development of disassembly automation, including the mechanical system, vision system and intelligent planner. The implementation of cognitive robotics increases the flexibility and degree of autonomy of the disassembly system. Disassembly, as a step in the treatment of end-of-life products, can allow the recovery of embodied value left within disposed products, as well as the appropriate separation of potentially-hazardous components. In the end-of-life treatment industry, disassembly has largely been limited to manual labor, which is expensive in developed countries. Automation is one possible solution for economic feasibility. The target audience primarily comprises researchers and experts in the field, but the book may also be beneficial for graduate students.

  11. Instant Sikuli test automation

    CERN Document Server

    Lau, Ben

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A concise guide written in an easy-to follow style using the Starter guide approach.This book is aimed at automation and testing professionals who want to use Sikuli to automate GUI. Some Python programming experience is assumed.

  12. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  13. Automated Lattice Perturbation Theory

    Energy Technology Data Exchange (ETDEWEB)

    Monahan, Christopher

    2014-11-01

    I review recent developments in automated lattice perturbation theory. Starting with an overview of lattice perturbation theory, I focus on the three automation packages currently "on the market": HiPPy/HPsrc, Pastor and PhySyCAl. I highlight some recent applications of these methods, particularly in B physics. In the final section I briefly discuss the related, but distinct, approach of numerical stochastic perturbation theory.

  14. Task automation in a successful industrial telerobot

    Energy Technology Data Exchange (ETDEWEB)

    Spelt, P.F. [Oak Ridge National Lab., TN (United States); Jones, S.L. [REMOTEC, Inc., Oak Ridge, TN (United States)

    1994-01-01

    In this paper, we discuss cooperative work by Oak Ridge National Laboratory and Remotec{trademark}, Inc., to automate components of the operator`s workload using Remotec`s Andros telerobot, thereby providing an enhanced user interface which can be retroll to existing fielded units as well as being incorporated into now production units. Remotec`s Andros robots are presently used by numerous electric utilities to perform tasks in reactors where substantial exposure to radiation exists, as well as by the armed forces and numerous law enforcement agencies. The automation of task components, as well as the video graphics display of the robot`s position in the environment, will enhance all tasks performed by these users, as well as enabling performance in terrain where the robots cannot presently perform due to lack of knowledge about, for instance, the degree of tilt of the robot. Enhanced performance of a successful industrial mobile robot leads to increased safety and efficiency of performances in hazardous environments. The addition of these capabilities will greatly enhance the utility of the robot, as well as its marketability.

  15. Task automation in a successful industrial telerobot

    Science.gov (United States)

    Spelt, Philip F.; Jones, Sammy L.

    1994-01-01

    In this paper, we discuss cooperative work by Oak Ridge National Laboratory and Remotec, Inc., to automate components of the operator's workload using Remotec's Andros telerobot, thereby providing an enhanced user interface which can be retrofit to existing fielded units as well as being incorporated into new production units. Remotec's Andros robots are presently used by numerous electric utilities to perform tasks in reactors where substantial exposure to radiation exists, as well as by the armed forces and numerous law enforcement agencies. The automation of task components, as well as the video graphics display of the robot's position in the environment, will enhance all tasks performed by these users, as well as enabling performance in terrain where the robots cannot presently perform due to lack of knowledge about, for instance, the degree of tilt of the robot. Enhanced performance of a successful industrial mobile robot leads to increased safety and efficiency of performance in hazardous environments. The addition of these capabilities will greatly enhance the utility of the robot, as well as its marketability.

  16. Computational infrastructure for law enforcement. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Lades, M.; Kunz, C.; Strikos, I.

    1997-02-01

    This project planned to demonstrate the leverage of enhanced computational infrastructure for law enforcement by demonstrating the face recognition capability at LLNL. The project implemented a face finder module extending the segmentation capabilities of the current face recognition so it was capable of processing different image formats and sizes and create the pilot of a network-accessible image database for the demonstration of face recognition capabilities. The project was funded at $40k (2 man-months) for a feasibility study. It investigated several essential components of a networked face recognition system which could help identify, apprehend, and convict criminals.

  17. The law enforcement agencies in Turkey

    International Nuclear Information System (INIS)

    Full text: In Turkey, the law enforcement agencies are gathered into two main authorities. These are as below. 1. Under the Ministry of Interior: General Commander of Gendarmarie; General Directorate of National Police; General Commandery of Coast Guard; 2. Within the Undersecretariat of Customs there are two main service units to combat smuggling. These are: General Directorate of Customs Enforcement (GDCE) and General Directorate of Customs. The responsible areas of these administrations are legally as below: The region of Gendarmarie: It covers rural areas. In that region, Gendarmarie is responsible, inter alia, combating smuggling; The region of police: General Directorate of National Police has performed its tasks, one of which is to combat smuggling in the city areas; The region of Territorial Waters: Coast Guard is related authority in territorial water for, among other things, fighting smuggling. The region of Customs: General Directorate of Customs Enforcement fulfills in these regions as the authority and responsible law enforcement agent. The main difference between GDCE and other law enforcement agencies are: GDCE is the only Administration whose main aim is to struggle against smuggling; Generally, all units conduct their operations in their responsible region, however, if it is necessary, depending on the case, an operation can be performed jointly only in another region in cooperation with the relevant agent. In that context, as far as General Directorate of Customs Enforcement is concerned, fulfilling an operation in other regions is not a legal necessity. Any units of GDCE can seize and do operation all over Turkey by itself, without any regional limitations from legislation. Organizational Structure of the Customs Administration in Turkey - The principle functions of the General Directorate of Customs are: implementation of customs policies, collection of customs taxes, inspection of passengers and goods, also, investigation of smuggling

  18. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  19. Materials Testing and Automation

    Science.gov (United States)

    Cooper, Wayne D.; Zweigoron, Ronald B.

    1980-07-01

    The advent of automation in materials testing has been in large part responsible for recent radical changes in the materials testing field: Tests virtually impossible to perform without a computer have become more straightforward to conduct. In addition, standardized tests may be performed with enhanced efficiency and repeatability. A typical automated system is described in terms of its primary subsystems — an analog station, a digital computer, and a processor interface. The processor interface links the analog functions with the digital computer; it includes data acquisition, command function generation, and test control functions. Features of automated testing are described with emphasis on calculated variable control, control of a variable that is computed by the processor and cannot be read directly from a transducer. Three calculated variable tests are described: a yield surface probe test, a thermomechanical fatigue test, and a constant-stress-intensity range crack-growth test. Future developments are discussed.

  20. Commercial-vehicle enforcement: a guide for law-enforcement managers

    Energy Technology Data Exchange (ETDEWEB)

    1987-01-01

    The purpose of the document is to provide a resource for law enforcement agencies to evaluate their programs, and to promote the uniform application of concepts already shown to be effective in other jurisdictions, which identify and address commercial-vehicle traffic safety needs.

  1. Automating the CMS DAQ

    Energy Technology Data Exchange (ETDEWEB)

    Bauer, G.; et al.

    2014-01-01

    We present the automation mechanisms that have been added to the Data Acquisition and Run Control systems of the Compact Muon Solenoid (CMS) experiment during Run 1 of the LHC, ranging from the automation of routine tasks to automatic error recovery and context-sensitive guidance to the operator. These mechanisms helped CMS to maintain a data taking efficiency above 90% and to even improve it to 95% towards the end of Run 1, despite an increase in the occurrence of single-event upsets in sub-detector electronics at high LHC luminosity.

  2. Automated phantom assay system

    International Nuclear Information System (INIS)

    This paper describes an automated phantom assay system developed for assaying phantoms spiked with minute quantities of radionuclides. The system includes a computer-controlled linear-translation table that positions the phantom at exact distances from a spectrometer. A multichannel analyzer (MCA) interfaces with a computer to collect gamma spectral data. Signals transmitted between the controller and MCA synchronize data collection and phantom positioning. Measured data are then stored on disk for subsequent analysis. The automated system allows continuous unattended operation and ensures reproducible results

  3. Automated gas chromatography

    Science.gov (United States)

    Mowry, Curtis D.; Blair, Dianna S.; Rodacy, Philip J.; Reber, Stephen D.

    1999-01-01

    An apparatus and process for the continuous, near real-time monitoring of low-level concentrations of organic compounds in a liquid, and, more particularly, a water stream. A small liquid volume of flow from a liquid process stream containing organic compounds is diverted by an automated process to a heated vaporization capillary where the liquid volume is vaporized to a gas that flows to an automated gas chromatograph separation column to chromatographically separate the organic compounds. Organic compounds are detected and the information transmitted to a control system for use in process control. Concentrations of organic compounds less than one part per million are detected in less than one minute.

  4. The influence of the elements of procedural justice and speed camera enforcement on young novice driver self-reported speeding.

    Science.gov (United States)

    Bates, Lyndel; Allen, Siobhan; Watson, Barry

    2016-07-01

    Road policing is an important tool used to modify road user behaviour. While other theories, such as deterrence theory, are significant in road policing, there may be a role for using procedural justice as a framework to improve outcomes in common police citizen interactions such as traffic law enforcement. This study, using a sample of 237 young novice drivers, considered how the four elements of procedural justice (voice, neutrality, respect and trustworthiness) were perceived in relation to two forms of speed enforcement: point-to-point (or average) speed and mobile speed cameras. Only neutrality was related to both speed camera types suggesting that it may be possible to influence behaviour by emphasising one or more elements, rather than using all components of procedural justice. This study is important as it indicates that including at least some elements of procedural justice in more automated policing encounters can encourage citizen compliance.

  5. The influence of the elements of procedural justice and speed camera enforcement on young novice driver self-reported speeding.

    Science.gov (United States)

    Bates, Lyndel; Allen, Siobhan; Watson, Barry

    2016-07-01

    Road policing is an important tool used to modify road user behaviour. While other theories, such as deterrence theory, are significant in road policing, there may be a role for using procedural justice as a framework to improve outcomes in common police citizen interactions such as traffic law enforcement. This study, using a sample of 237 young novice drivers, considered how the four elements of procedural justice (voice, neutrality, respect and trustworthiness) were perceived in relation to two forms of speed enforcement: point-to-point (or average) speed and mobile speed cameras. Only neutrality was related to both speed camera types suggesting that it may be possible to influence behaviour by emphasising one or more elements, rather than using all components of procedural justice. This study is important as it indicates that including at least some elements of procedural justice in more automated policing encounters can encourage citizen compliance. PMID:27038499

  6. REGULATION AND ENFORCEMENT OF COMPETITION POLICY

    Directory of Open Access Journals (Sweden)

    Liviana Andreea Niminet

    2014-12-01

    Full Text Available Competition policy starts by shaping a legislative framework. This is aimed to establish boundaries for conducting competition and also sets limits of licit and illicit demarcation, for competitive and anticompetitive practices. The Romanian Competition Law has a divalent approach and it aims to provide specific behavioral conditions in order to stimulate and protect free-market competition, with the ultimate goal of developing a balanced, efficient and competitive economy. Our country’s Competition policy is based on punishing the behavior. There are three such types of anti-competitive behavior, namely: agreements between undertakings, abuse of dominant position and mergers and other concentrations between undertakings. Recent Practice proved that this “enforcement-conduct-punishment” structure is not necessary the best way to address competition and it is high time for authorities to switch both regulation and enforcement of competition from the “classical perspective” towards concepts like “competition advocacy” and “soft power” and give competition policy a new, reshaped face.

  7. Sex Trafficking, Law Enforcement and Perpetrator Accountability

    Directory of Open Access Journals (Sweden)

    Holly Burkhalter

    2012-09-01

    Full Text Available In theory, everyone – except for criminals involved in their exploitation - agrees that children must not be in the sex industry and further, that those who prey on them must be prosecuted and punished. Virtually every country in the world has adopted national laws prohibiting the commercial sexual exploitation of children. International law is clear on this point, as well. Yet, when governments – and NGOs working with them – take action to extract children from commercial sex venues, common ground on protecting children from abuse can quickly erode with concerns about the efficacy of police intervention, the possibility of collateral harm to consenting adult sex workers or a decrease in access to HIV-prevention and related health services. The author argues that healing this divide must come through the reform of local police – and that, without the participation of law enforcement, there can be no long-term protection for children vulnerable to trafficking and related exploitation. In this article, human rights practitioner Holly Burkhalter argues that healing this divide must be accomplished through the reform of local police – and that human rights advocates, local governments and others seeking to combat trafficking cannot achieve long-term, sustainable protection for children without the involvement of law enforcement.

  8. NRC Enforcement Policy Review, July 1995-July 1997

    International Nuclear Information System (INIS)

    On June 30, 1995, the Nuclear Regulatory Commission (NRC) issued a complete revision of its General Statement of Policy and Procedure for Enforcement Action (Enforcement Policy) (60 FR 34381). In approving the 1995 revision to the Enforcement Policy, the Commission directed the staff to perform a review of its implementation of the Policy after approximately 2 years of experience and to consider public comments. This report represents the results of that review

  9. NRC Enforcement Policy Review, July 1995-July 1997

    Energy Technology Data Exchange (ETDEWEB)

    Lieberman, J.; Pedersen, R.M.

    1998-04-01

    On June 30, 1995, the Nuclear Regulatory Commission (NRC) issued a complete revision of its General Statement of Policy and Procedure for Enforcement Action (Enforcement Policy) (60 FR 34381). In approving the 1995 revision to the Enforcement Policy, the Commission directed the staff to perform a review of its implementation of the Policy after approximately 2 years of experience and to consider public comments. This report represents the results of that review.

  10. Automated solvent concentrator

    Science.gov (United States)

    Griffith, J. S.; Stuart, J. L.

    1976-01-01

    Designed for automated drug identification system (AUDRI), device increases concentration by 100. Sample is first filtered, removing particulate contaminants and reducing water content of sample. Sample is extracted from filtered residue by specific solvent. Concentrator provides input material to analysis subsystem.

  11. Protokoller til Home Automation

    DEFF Research Database (Denmark)

    Kjær, Kristian Ellebæk

    2008-01-01

    computer, der kan skifte mellem foruddefinerede indstillinger. Nogle gange kan computeren fjernstyres over internettet, så man kan se hjemmets status fra en computer eller måske endda fra en mobiltelefon. Mens nævnte anvendelser er klassiske indenfor home automation, er yderligere funktionalitet dukket op...

  12. ELECTROPNEUMATIC AUTOMATION EDUCATIONAL LABORATORY

    OpenAIRE

    Dolgorukov, S. O.; National Aviation University; Roman, B. V.; National Aviation University

    2013-01-01

    The article reflects current situation in education regarding mechatronics learning difficulties. Com-plex of laboratory test benches on electropneumatic automation are considered as a tool in advancing through technical science. Course of laboratory works developed to meet the requirement of efficient and reliable way of practical skills acquisition is regarded the simplest way for students to learn the ba-sics of mechatronics.

  13. Building Automation Systems.

    Science.gov (United States)

    Honeywell, Inc., Minneapolis, Minn.

    A number of different automation systems for use in monitoring and controlling building equipment are described in this brochure. The system functions include--(1) collection of information, (2) processing and display of data at a central panel, and (3) taking corrective action by sounding alarms, making adjustments, or automatically starting and…

  14. Test Construction: Automated

    NARCIS (Netherlands)

    Veldkamp, Bernard P.

    2014-01-01

    Optimal test construction deals with automated assembly of tests for educational and psychological measurement. Items are selected from an item bank to meet a predefined set of test specifications. Several models for optimal test construction are presented, and two algorithms for optimal test assemb

  15. Test Construction: Automated

    NARCIS (Netherlands)

    Veldkamp, Bernard P.

    2016-01-01

    Optimal test construction deals with automated assembly of tests for educational and psychological measurement. Items are selected from an item bank to meet a predefined set of test specifications. Several models for optimal test construction are presented, and two algorithms for optimal test assemb

  16. Automated Web Applications Testing

    Directory of Open Access Journals (Sweden)

    Alexandru Dan CĂPRIŢĂ

    2009-01-01

    Full Text Available Unit tests are a vital part of several software development practicesand processes such as Test-First Programming, Extreme Programming andTest-Driven Development. This article shortly presents the software quality andtesting concepts as well as an introduction to an automated unit testingframework for PHP web based applications.

  17. Automated Student Model Improvement

    Science.gov (United States)

    Koedinger, Kenneth R.; McLaughlin, Elizabeth A.; Stamper, John C.

    2012-01-01

    Student modeling plays a critical role in developing and improving instruction and instructional technologies. We present a technique for automated improvement of student models that leverages the DataShop repository, crowd sourcing, and a version of the Learning Factors Analysis algorithm. We demonstrate this method on eleven educational…

  18. Myths in test automation

    Directory of Open Access Journals (Sweden)

    Jazmine Francis

    2015-01-01

    Full Text Available Myths in automation of software testing is an issue of discussion that echoes about the areas of service in validation of software industry. Probably, the first though that appears in knowledgeable reader would be Why this old topic again? What's New to discuss the matter? But, for the first time everyone agrees that undoubtedly automation testing today is not today what it used to be ten or fifteen years ago, because it has evolved in scope and magnitude. What began as a simple linear scripts for web applications today has a complex architecture and a hybrid framework to facilitate the implementation of testing applications developed with various platforms and technologies. Undoubtedly automation has advanced, but so did the myths associated with it. The change in perspective and knowledge of people on automation has altered the terrain. This article reflects the points of views and experience of the author in what has to do with the transformation of the original myths in new versions, and how they are derived; also provides his thoughts on the new generation of myths.

  19. Automating spectral measurements

    Science.gov (United States)

    Goldstein, Fred T.

    2008-09-01

    This paper discusses the architecture of software utilized in spectroscopic measurements. As optical coatings become more sophisticated, there is mounting need to automate data acquisition (DAQ) from spectrophotometers. Such need is exacerbated when 100% inspection is required, ancillary devices are utilized, cost reduction is crucial, or security is vital. While instrument manufacturers normally provide point-and-click DAQ software, an application programming interface (API) may be missing. In such cases automation is impossible or expensive. An API is typically provided in libraries (*.dll, *.ocx) which may be embedded in user-developed applications. Users can thereby implement DAQ automation in several Windows languages. Another possibility, developed by FTG as an alternative to instrument manufacturers' software, is the ActiveX application (*.exe). ActiveX, a component of many Windows applications, provides means for programming and interoperability. This architecture permits a point-and-click program to act as automation client and server. Excel, for example, can control and be controlled by DAQ applications. Most importantly, ActiveX permits ancillary devices such as barcode readers and XY-stages to be easily and economically integrated into scanning procedures. Since an ActiveX application has its own user-interface, it can be independently tested. The ActiveX application then runs (visibly or invisibly) under DAQ software control. Automation capabilities are accessed via a built-in spectro-BASIC language with industry-standard (VBA-compatible) syntax. Supplementing ActiveX, spectro-BASIC also includes auxiliary serial port commands for interfacing programmable logic controllers (PLC). A typical application is automatic filter handling.

  20. Explaining the enforcement gap in China: local government support and internal agency obstacles as predictors of enforcement actions in Guangzhou.

    Science.gov (United States)

    Lo, Carlos Wing-Hung; Fryxell, Gerald E; van Rooij, Benjamin; Wang, Wei; Honying Li, Pansy

    2012-11-30

    This study investigates how local government support for enforcement and internal agency obstacles explain the enforcement gap in Guangzhou, China. It was found that agency obstacles associated with insufficient resources and job ambiguity, in particular, affect enforcement officials' perceptions of enforcement difficulty. Somewhat more surprisingly, however, local government support was not found to be a significant predictor of these perceptions. In addition, this study identified four significant relationships associated with specific enforcement actions. First and second, perceptions of enforcement difficulty appear to lead to fewer inspections, but also have a weak positive effect on the frequency of fines levied. Third, poor coordination within the bureau was found to be associated with fewer violations being processed. Fourth, and contrary to expectations, local government support was found to suppress the frequency of inspections while having no significant effect on violations or fines. Overall, these findings suggest that increased local government support for the enforcement of environmental regulation in China may not necessarily lead to more rigorous enforcement, at least if enforcement rigor is measured in terms of inspections, citations and fines.

  1. Sparsity-enforcing regularisation and ISTA revisited

    Science.gov (United States)

    Daubechies, Ingrid; Defrise, Michel; De Mol, Christine

    2016-10-01

    About two decades ago, the concept of sparsity emerged in different disciplines such as statistics, imaging, signal processing and inverse problems, and proved to be useful for several applications. Sparsity-enforcing constraints or penalties were then shown to provide a viable alternative to the usual quadratic ones for the regularisation of ill-posed problems. To compute the corresponding regularised solutions, a simple, iterative and provably convergent algorithm was proposed and later on referred to as the iterative soft-thresholding algorithm. This paper provides a brief review of these early results as well as that of the subsequent literature, albeit from the authors’ limited perspective. It also presents the previously unpublished proof of an extension of the original framework.

  2. Dynamic Enforcement of the Strict Integrity Policy

    Institute of Scientific and Technical Information of China (English)

    ZHANGXiangfeng; LIANGHongliang; SUNYufang

    2005-01-01

    The Strict integrity policy (SIP) in Biba's integrity model is widely used in protecting information integrity, but the static integrity labels of both subjects and objects increase compatibility cost of applications and might prevent some operations that are indeed harmless.In order to improve compatibility, Dynamic enforcement of the Strict integrity policy (DESIP) is put forward. The current integrity label attribute of a subject in SIP is replaced with two attributes in DESIP, which are used to confine dynamically the range of objects a subject could be allowed to access. The new rules of access control in DESIP are given for each kind of access mode (observe,modify and invoke) together with the proofs of their valid-ity. Comparison between SIP and DESIP shows that after a sequence of operations, a subject controlled by DESIP tends to behave in a similar way as it is controlled by SIP and DESIP is more compatible than SIP.

  3. [The protection of health in law enforcement].

    Science.gov (United States)

    Pira, Enrico

    2014-01-01

    Herein the question of health protection/safety and well being in the Law Enforcement is introduced and includes examples of some particular risk conditions that may be multiple and polymorphous. Not only the "traditional" sources are involved in these risks, like chemical, physical and biological agents, but other issues emerge in these "new scenarios" connected to risk factors involving organization and/or psychosocial elements. From this, we may deduce that there is a specific need for all the operators involved in prevention/care in this particular sector to be well versed on the highest possible updated specialized knowledge along with having a complete and thorough mastery of the best practices in Occupational Medicine to face this task in the correct manner: PMID:25558739

  4. 41 CFR 60-741.65 - Enforcement proceedings.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Enforcement proceedings. 60-741.65 Section 60-741.65 Public Contracts and Property Management Other Provisions Relating to... REGARDING INDIVIDUALS WITH DISABILITIES General Enforcement and Complaint Procedures § 60-741.65...

  5. 28 CFR 55.23 - Enforcement by the Attorney General.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Enforcement by the Attorney General. 55.23 Section 55.23 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) IMPLEMENTATION OF THE PROVISIONS OF THE VOTING RIGHTS ACT REGARDING LANGUAGE MINORITY GROUPS Sanctions § 55.23 Enforcement by...

  6. 29 CFR 1908.7 - Relationship to enforcement.

    Science.gov (United States)

    2010-07-01

    ... officer, except to the extent that disclosure of information contained in the report is required by 29 CFR... CONSULTATION AGREEMENTS § 1908.7 Relationship to enforcement. (a) Independence. (1) Consultative activity by a... initially seeks entry to the workplace to the end of the closing conference. An enforcement inspection...

  7. Role of Enforcement in Prevention. Issues in Prevention

    Science.gov (United States)

    Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2012

    2012-01-01

    This issue of "Issues in Prevention" focuses on the role of enforcement in prevention. This issue contains the following articles: (1) What the Evidence Tells Us about the Role of Enforcement in Prevention; (2) Campus Briefs; (3) Q&A with Charles Cychosz; and (4) Higher Education Center Resources.

  8. 49 CFR 1542.215 - Law enforcement support.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement support. 1542.215 Section 1542.215..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.215 Law... program under § 1542.103(a) or (b) must provide: (1) Law enforcement personnel in the number and...

  9. 49 CFR 1546.211 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1546.211 Section 1546... § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...) When using a screening system required by § 1546.101(a), (b), or (c), provide for law...

  10. Decentralized enforcement, sequential bargaining, and the clean development mechanism

    Energy Technology Data Exchange (ETDEWEB)

    Hovi, Jon

    2001-07-01

    While there is a vast literature both on international bargaining and on how international agreements can be enforced, very little work has been done on how bargaining and enforcement interact. An important exception is Fearon (1998), who models international cooperation as a two-stage process in which the bargaining process is constrained by a need for decentralized enforcement (meaning that the agreement must be enforced by the parties themselves rather than a third party, such as a court). Using the Clean Development Mechanism as an example, the present paper proposes a different model of this kind of interaction. The model follows Fearon's in so far as we both use the infinitely repeated Prisoners' Dilemma to capture the enforcement phase of the game. However, while Fearon depicts the bargaining stage as a War of Attrition, the present model sees that stage as a sequential bargaining game of the Staahl-Rubinstein type. The implications of the present model are compared both to those of the Staahl-Rubinstein model and to those of the Fearon model. A surprising conclusion is that a need for decentralized enforcement tends to make the bargaining outcome more symmetrical than otherwise. Thus, the impact of bargaining power is actually smaller when the resulting agreement must be enforced by the parties themselves than it is if enforcement is taken care of by a third party. (author)

  11. 48 CFR 822.406 - Administration and enforcement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Administration and enforcement. 822.406 Section 822.406 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS... Involving Construction 822.406 Administration and enforcement....

  12. Task force on compliance and enforcement. Final report. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    1978-03-01

    Recommendations for measures to strengthen the FEA enforcement program in the area of petroleum price regulation are presented. Results of task force efforts are presented in report and recommendations sections concerned with pending cases, compliance program organization, enforcement powers, compliance strategy, and audit staffing and techniques. (JRD)

  13. 29 CFR 775.0 - General enforcement policy.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false General enforcement policy. 775.0 Section 775.0 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR STATEMENTS OF GENERAL POLICY OR INTERPRETATION NOT DIRECTLY RELATED TO REGULATIONS GENERAL § 775.0 General enforcement...

  14. The effect of enforcement on speed behaviour : a literature review.

    NARCIS (Netherlands)

    Oei, H.-l.

    1998-01-01

    The objective of this literature study is to give an overview of research on speed enforcement and its effect on speed behaviour and safety. This study will be used to find new strategies and tactics to enhance the efficiency and effectiveness of speed enforcement by the police in terms of behaviour

  15. 41 CFR 60-1.26 - Enforcement proceedings.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Enforcement proceedings. 60-1.26 Section 60-1.26 Public Contracts and Property Management Other Provisions Relating to Public... 1-OBLIGATIONS OF CONTRACTORS AND SUBCONTRACTORS General Enforcement; Compliance Review and...

  16. 12 CFR Appendix B to Part 205 - Federal Enforcement Agencies

    Science.gov (United States)

    2010-01-01

    ... ELECTRONIC FUND TRANSFERS (REGULATION E) Pt. 205, App. B Appendix B to Part 205—Federal Enforcement Agencies The following list indicates which Federal agency enforces Regulation E (12 CFR part 205) for... above Federal Trade Commission, Electronic Fund Transfers, Washington, D.C. 20580....

  17. 40 CFR 35.6145 - Eligibility for enforcement Cooperative Agreements.

    Science.gov (United States)

    2010-07-01

    ... OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Cooperative Agreements and Superfund State Contracts for Superfund Response Actions Enforcement Cooperative Agreements § 35.6145 Eligibility for... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Eligibility for enforcement...

  18. 40 CFR 204.57 - Selective enforcement auditing.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing. 204.57 Section 204.57 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT Portable Air Compressors § 204.57 Selective enforcement...

  19. 40 CFR 205.171 - Selective enforcement auditing (SEA) requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing (SEA) requirements. 205.171 Section 205.171 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Motorcycle Exhaust Systems § 205.171 Selective enforcement auditing...

  20. 40 CFR 205.160 - Selective enforcement auditing (SEA) requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing (SEA) requirements. 205.160 Section 205.160 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Motorcycles § 205.160 Selective enforcement auditing...

  1. Improving Law Enforcement Cross Cultural Competencies through Continued Education

    Science.gov (United States)

    Sereni-Massinger, Christine; Wood, Nancy

    2016-01-01

    Over the last thirty years Community Oriented Policing (COP) has spawned advancements in creating community partnerships with law enforcement agencies. Agencies that focus on such partnerships have served to reduce crime and resolve conflict. However, community opinions towards law enforcement have become increasingly negative due to recent civil…

  2. Cassini Attitude Control Operations Flight Rules and How They are Enforced

    Science.gov (United States)

    Burk, Thomas; Bates, David

    2008-01-01

    The Cassini spacecraft was launched on October 15, 1997 and arrived at Saturn on June 30, 2004. It has performed detailed observations and remote sensing of Saturn, its rings, and its satellites since that time. Cassini deployed the European-built Huygens probe which descended through the Titan atmosphere and landed on its surface on January 14, 2005. Operating the Cassini spacecraft is a complex scientific, engineering, and management job. In order to safely operate the spacecraft, a large number of flight rules were developed. These flight rules must be enforced throughout the lifetime of the Cassini spacecraft. Flight rules are defined as any operational limitation imposed by the spacecraft system design, hardware, and software, violation of which would result in spacecraft damage, loss of consumables, loss of mission objectives, loss and/or degradation of science, and less than optimal performance. Flight rules require clear description and rationale. Detailed automated methods have been developed to insure the spacecraft is continuously operated within these flight rules. An overview of all the flight rules allocated to the Cassini Attitude Control and Articulation Subsystem and how they are enforced is presented in this paper.

  3. Rapid automated nuclear chemistry

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, R.A.

    1979-05-31

    Rapid Automated Nuclear Chemistry (RANC) can be thought of as the Z-separation of Neutron-rich Isotopes by Automated Methods. The range of RANC studies of fission and its products is large. In a sense, the studies can be categorized into various energy ranges from the highest where the fission process and particle emission are considered, to low energies where nuclear dynamics are being explored. This paper presents a table which gives examples of current research using RANC on fission and fission products. The remainder of this text is divided into three parts. The first contains a discussion of the chemical methods available for the fission product elements, the second describes the major techniques, and in the last section, examples of recent results are discussed as illustrations of the use of RANC.

  4. Automated theorem proving.

    Science.gov (United States)

    Plaisted, David A

    2014-03-01

    Automated theorem proving is the use of computers to prove or disprove mathematical or logical statements. Such statements can express properties of hardware or software systems, or facts about the world that are relevant for applications such as natural language processing and planning. A brief introduction to propositional and first-order logic is given, along with some of the main methods of automated theorem proving in these logics. These methods of theorem proving include resolution, Davis and Putnam-style approaches, and others. Methods for handling the equality axioms are also presented. Methods of theorem proving in propositional logic are presented first, and then methods for first-order logic. WIREs Cogn Sci 2014, 5:115-128. doi: 10.1002/wcs.1269 CONFLICT OF INTEREST: The authors has declared no conflicts of interest for this article. For further resources related to this article, please visit the WIREs website. PMID:26304304

  5. ATLAS Distributed Computing Automation

    CERN Document Server

    Schovancova, J; The ATLAS collaboration; Borrego, C; Campana, S; Di Girolamo, A; Elmsheuser, J; Hejbal, J; Kouba, T; Legger, F; Magradze, E; Medrano Llamas, R; Negri, G; Rinaldi, L; Sciacca, G; Serfon, C; Van Der Ster, D C

    2012-01-01

    The ATLAS Experiment benefits from computing resources distributed worldwide at more than 100 WLCG sites. The ATLAS Grid sites provide over 100k CPU job slots, over 100 PB of storage space on disk or tape. Monitoring of status of such a complex infrastructure is essential. The ATLAS Grid infrastructure is monitored 24/7 by two teams of shifters distributed world-wide, by the ATLAS Distributed Computing experts, and by site administrators. In this paper we summarize automation efforts performed within the ATLAS Distributed Computing team in order to reduce manpower costs and improve the reliability of the system. Different aspects of the automation process are described: from the ATLAS Grid site topology provided by the ATLAS Grid Information System, via automatic site testing by the HammerCloud, to automatic exclusion from production or analysis activities.

  6. Rapid automated nuclear chemistry

    International Nuclear Information System (INIS)

    Rapid Automated Nuclear Chemistry (RANC) can be thought of as the Z-separation of Neutron-rich Isotopes by Automated Methods. The range of RANC studies of fission and its products is large. In a sense, the studies can be categorized into various energy ranges from the highest where the fission process and particle emission are considered, to low energies where nuclear dynamics are being explored. This paper presents a table which gives examples of current research using RANC on fission and fission products. The remainder of this text is divided into three parts. The first contains a discussion of the chemical methods available for the fission product elements, the second describes the major techniques, and in the last section, examples of recent results are discussed as illustrations of the use of RANC

  7. The Automated Medical Office

    OpenAIRE

    Petreman, Mel

    1990-01-01

    With shock and surprise many physicians learned in the 1980s that they must change the way they do business. Competition for patients, increasing government regulation, and the rapidly escalating risk of litigation forces physicians to seek modern remedies in office management. The author describes a medical clinic that strives to be paperless using electronic innovation to solve the problems of medical practice management. A computer software program to automate information management in a c...

  8. Automation in biological crystallization.

    Science.gov (United States)

    Stewart, Patrick Shaw; Mueller-Dieckmann, Jochen

    2014-06-01

    Crystallization remains the bottleneck in the crystallographic process leading from a gene to a three-dimensional model of the encoded protein or RNA. Automation of the individual steps of a crystallization experiment, from the preparation of crystallization cocktails for initial or optimization screens to the imaging of the experiments, has been the response to address this issue. Today, large high-throughput crystallization facilities, many of them open to the general user community, are capable of setting up thousands of crystallization trials per day. It is thus possible to test multiple constructs of each target for their ability to form crystals on a production-line basis. This has improved success rates and made crystallization much more convenient. High-throughput crystallization, however, cannot relieve users of the task of producing samples of high quality. Moreover, the time gained from eliminating manual preparations must now be invested in the careful evaluation of the increased number of experiments. The latter requires a sophisticated data and laboratory information-management system. A review of the current state of automation at the individual steps of crystallization with specific attention to the automation of optimization is given.

  9. Speed limits and enforcement : speed limits and enforcement by police supervision : objective and subjective risk of detection.

    NARCIS (Netherlands)

    Kraay, J.H. & Mattie, P.C.

    1973-01-01

    This brochure on speed limits and enforcement sets out two closely related studies. The first report is based on a literature study concerning studies of the effect of police supervision on the enforcement of speed limits. The second report sets out a framework of concepts based on the chance of det

  10. Decoding Nonverbal Communication in Law Enforcement

    Directory of Open Access Journals (Sweden)

    Noel Otu

    2015-06-01

    Full Text Available This analytical study examined the importance of nonverbal communication in law enforcement work. In many encounters between police and citizens, the primary focus is always on suspects’/citizens’ verbal statements, rather than on how and what their body is conveying while telling the story. This study argues for an integrated approach in which the police officers need to realise that they, too, are communicating nonverbally with suspects. This study reveals that nonverbal communication, also known as body language, proxemic, and kinesics behavior, in many cases tends to constitute a much larger fraction of the police communication model than verbal communication, which should help officers to establish authority and dominance and ensure their safety. Nonverbal communication is not something added onto criminal justice, but rather it is the essence of criminal justice. This results suggest that nonverbal communication is the foundation of a successful relationship/encounter between criminal justice personnel and suspects or criminals, as well as being a powerful method that cannot be feigned.

  11. Self-enforcing regional vaccination agreements.

    Science.gov (United States)

    Klepac, Petra; Megiddo, Itamar; Grenfell, Bryan T; Laxminarayan, Ramanan

    2016-01-01

    In a highly interconnected world, immunizing infections are a transboundary problem, and their control and elimination require international cooperation and coordination. In the absence of a global or regional body that can impose a universal vaccination strategy, each individual country sets its own strategy. Mobility of populations across borders can promote free-riding, because a country can benefit from the vaccination efforts of its neighbours, which can result in vaccination coverage lower than the global optimum. Here we explore whether voluntary coalitions that reward countries that join by cooperatively increasing vaccination coverage can solve this problem. We use dynamic epidemiological models embedded in a game-theoretic framework in order to identify conditions in which coalitions are self-enforcing and therefore stable, and thus successful at promoting a cooperative vaccination strategy. We find that countries can achieve significantly greater vaccination coverage at a lower cost by forming coalitions than when acting independently, provided a coalition has the tools to deter free-riding. Furthermore, when economically or epidemiologically asymmetric countries form coalitions, realized coverage is regionally more consistent than in the absence of coalitions.

  12. ENFORCING ARBITRAL AWARDS IN ROMANIA - ALWAYS A CHALLENGE

    Directory of Open Access Journals (Sweden)

    Paul COMŞA

    2015-07-01

    Full Text Available Securing a favourable award from a foreign or domestic arbitral court proves to be in many cases only half the battle. As a rule, Romanian law and courts acknowledge the final, binding and enforceable nature of arbitration awards and state the principle that arbitration awards shall be freely implemented by parties. However, there are instances where the unsuccessful party does not voluntarily perform the obligations arising from the arbitral award. In these cases, before incurring legal expenses on formal enforcement procedures, it is worth attempting several informal or indirect means of persuading the other party to honour its duties. If the opposing party still refuses to comply with the award, one may resort to an ordinary enforcement procedure. In Romania, enforcement procedures may be conducted by judicial executors only after the arbitral award is rendered enforceable by a domestic court of law. As in most developed states, the vast majority of Romanian courts have enforced both domestic and foreign arbitral awards. Although there are certain instances when arbitral awards have been denied enforcement, these are the exception rather than the rule because under Romanian law the right of refusal to comply with the arbitral award shall be exerted only through an action of annulment for limited reasons.

  13. Prospects of development of the court decrees enforcement system

    Directory of Open Access Journals (Sweden)

    Kristina Sergeyevna Morkovskaya

    2015-06-01

    Full Text Available Objective the relevance of the topic the insufficient level of its scientific elaboration predetermined the research objectives which consist in the analysis of the institution of enforcement proceedings the identification of key challenges trends and ways to improve the current system of court decrees enforcement. Methods the methodological basis of the undertaken research is scientific method of cognition in conjunction with certain specific scientific methods the laws of formal logic historical method comparative legal method and systematic analysis of theoretical works studied in this work. Results the emerging trends in the enforcement proceedings reform in the country cannot be considered to be satisfactory in general although some initiatives seem quite appropriate in case of the proper performance. If you the situation cannot be rectified with the execution of judicial decrees basing on own experience only it is necessary to pay attention to foreign practices and to provide citizens with the right to an effective judicial protection. Of all approaches to reforming of the enforcement institution analyzed in the article the preferred for the Russian legal reality is modernization of the existing nonjudicial system of enforcement through civil procedural means. Scientific novelty at present neither the civil procedure nor the general theory of law has not developed a unified understanding of the civil procedural tools for improving the efficiency of enforcement proceedings. Practical value the main provisions and conclusions of the article can be used in research and teaching when viewing the issues of the effectiveness of enforcement proceedings. nbsp

  14. Automation in organizations: Eternal conflict

    Science.gov (United States)

    Dieterly, D. L.

    1981-01-01

    Some ideas on and insights into the problems associated with automation in organizations are presented with emphasis on the concept of automation, its relationship to the individual, and its impact on system performance. An analogy is drawn, based on an American folk hero, to emphasize the extent of the problems encountered when dealing with automation within an organization. A model is proposed to focus attention on a set of appropriate dimensions. The function allocation process becomes a prominent aspect of the model. The current state of automation research is mentioned in relation to the ideas introduced. Proposed directions for an improved understanding of automation's effect on the individual's efficiency are discussed. The importance of understanding the individual's perception of the system in terms of the degree of automation is highlighted.

  15. Automated Assessment, Face to Face

    OpenAIRE

    Rizik M. H. Al-Sayyed; Amjad Hudaib; Muhannad AL-Shboul; Yousef Majdalawi; Mohammed Bataineh

    2010-01-01

    This research paper evaluates the usability of automated exams and compares them with the paper-and-pencil traditional ones. It presents the results of a detailed study conducted at The University of Jordan (UoJ) that comprised students from 15 faculties. A set of 613 students were asked about their opinions concerning automated exams; and their opinions were deeply analyzed. The results indicate that most students reported that they are satisfied with using automated exams but they have sugg...

  16. Automation System Products and Research

    OpenAIRE

    Rintala, Mikko; Sormunen, Jussi; Kuisma, Petri; Rahkala, Matti

    2014-01-01

    Automation systems are used in most buildings nowadays. In the past they were mainly used in industry to control and monitor critical systems. During the past few decades the automation systems have become more common and are used today from big industrial solutions to homes of private customers. With the growing need for ecologic and cost-efficient management systems, home and building automation systems are becoming a standard way of controlling lighting, ventilation, heating etc. Auto...

  17. Test Automation of Online Games

    OpenAIRE

    Schoenfeldt, Alexander

    2015-01-01

    State of the art browser games are increasingly complex pieces of software with extensive code basis. With increasing complexity, a software becomes harder to maintain. Automated regression testing can simplify these maintenance processes and thereby enable developers as well as testers to spend their workforce more efficiently. This thesis addresses the utilization of automated tests in web applications. As a use case test automation is applied to an online-based strategy game for the bro...

  18. Mechatronic Design Automation

    DEFF Research Database (Denmark)

    Fan, Zhun

    This book proposes a novel design method that combines both genetic programming (GP) to automatically explore the open-ended design space and bond graphs (BG) to unify design representations of multi-domain Mechatronic systems. Results show that the method, formally called GPBG method, can...... successfully design analogue filters, vibration absorbers, micro-electro-mechanical systems, and vehicle suspension systems, all in an automatic or semi-automatic way. It also investigates the very important issue of co-designing plant-structures and dynamic controllers in automated design of Mechatronic...

  19. The automated medical office.

    Science.gov (United States)

    Petreman, M

    1990-08-01

    With shock and surprise many physicians learned in the 1980s that they must change the way they do business. Competition for patients, increasing government regulation, and the rapidly escalating risk of litigation forces physicians to seek modern remedies in office management. The author describes a medical clinic that strives to be paperless using electronic innovation to solve the problems of medical practice management. A computer software program to automate information management in a clinic shows that practical thinking linked to advanced technology can greatly improve office efficiency.

  20. AUTOMATED API TESTING APPROACH

    Directory of Open Access Journals (Sweden)

    SUNIL L. BANGARE

    2012-02-01

    Full Text Available Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. With the help of software testing we can verify or validate the software product. Normally testing will be done after development of software but we can perform the software testing at the time of development process also. This paper will give you a brief introduction about Automated API Testing Tool. This tool of testing will reduce lots of headache after the whole development of software. It saves time as well as money. Such type of testing is helpful in the Industries & Colleges also.

  1. World-wide distribution automation systems

    Energy Technology Data Exchange (ETDEWEB)

    Devaney, T.M.

    1994-12-31

    A worldwide power distribution automation system is outlined. Distribution automation is defined and the status of utility automation is discussed. Other topics discussed include a distribution management system, substation feeder, and customer functions, potential benefits, automation costs, planning and engineering considerations, automation trends, databases, system operation, computer modeling of system, and distribution management systems.

  2. Cost and Benefit of Control Strategies - Estimation of Benefit functions, enforcement-probability function and enforcement-cost function

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Jensen, Frank

    levels and 4) the connection between different enforcement levels and costs. The purpose of estimating the functional relationships are for future application in the COBECOS computer modeling in order to carry out an cost-benefit analysis of control strategies and thereby find the optimal mix and level...... on fishery enforcement from the COBECOS project to a specific case. It is done by estimations of functional relationships' for describing 1) the fisheries benefit function 2) the shadow value of biomass 3) the connection between the probability of being detected and apprehended for different enforcement...

  3. Child Support Enforcement Annual Data Report Form 34A - 2007

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  4. Child Support Enforcement Annual Data Report Form 34A - 2009

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  5. Child Support Enforcement Annual Data Report Form 34A - 2003

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  6. Child Support Enforcement Annual Data Report Form 34A - 2006

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains information about collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D...

  7. Child Support Enforcement Annual Data Report Form 157 - YR 2009

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  8. Child Support Enforcement Annual Data Report Form 157 - YR 2005

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  9. Performance-Driven Interface Contract Enforcement for Scientific Components

    Energy Technology Data Exchange (ETDEWEB)

    Dahlgren, T L

    2007-10-01

    Performance-driven interface contract enforcement research aims to improve the quality of programs built from plug-and-play scientific components. Interface contracts make the obligations on the caller and all implementations of the specified methods explicit. Runtime contract enforcement is a well-known technique for enhancing testing and debugging. However, checking all of the associated constraints during deployment is generally considered too costly from a performance stand point. Previous solutions enforced subsets of constraints without explicit consideration of their performance implications. Hence, this research measures the impacts of different interface contract sampling strategies and compares results with new techniques driven by execution time estimates. Results from three studies indicate automatically adjusting the level of checking based on performance constraints improves the likelihood of detecting contract violations under certain circumstances. Specifically, performance-driven enforcement is better suited to programs exercising constraints whose costs are at most moderately expensive relative to normal program execution.

  10. Child Support Enforcement Annual Data Report Form 157 - YR 2007

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  11. Child Support Enforcement Annual Data Report Form 34A - 2004

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  12. Child Support Enforcement Annual Data Report Form 157 - YR 2004

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  13. Child Support Enforcement Annual Data Report Form 157 - YR 2004

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials will use the OCSE-157 to report statistical and some financial information on their Child Support Enforcement (CSE) program to the Department of...

  14. Child Support Enforcement Annual Data Report Form 34A - 2005

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  15. Child Support Enforcement Annual Data Report Form 157 - YR 2008

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  16. Child Support Enforcement Annual Data Report Form 157 - YR 2003

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  17. Child Support Enforcement Annual Data Report Form 157 - YR 2006

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  18. Child Support Enforcement Annual Data Report Form 34A - 2008

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  19. Child Support Enforcement Annual Data Report Form 34A - 2006

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  20. Pesticides and Asbestos Programs and Enforcement Branch Case Tracking System

    Data.gov (United States)

    U.S. Environmental Protection Agency — Tracks the entire life cycle of a regulated site from initial inspection through site response to enforcement actions. Separate site action history is maintained...

  1. Spatial service delivery system for smart licensing & enforcement management

    Science.gov (United States)

    Wahap, N. A.; Ismail, N. M.; Nor, N. M.; Ahmad, N.; Omar, M. F.; Termizi, A. A. A.; Zainal, D.; Noordin, N. M.; Mansor, S.

    2016-06-01

    Spatial information has introduced a new sense of urgency for a better understanding of the public needs in term of what, when and where they need services and through which devices, platform or physical locations they need them. The objective of this project is to value- add existing license management process for business premises which comes under the responsibility of Local Authority (PBT). Manipulation of geospatial and tracing technology via mobile platform allows enforcement officers to work in real-time, use a standardized system, improve service delivery, and optimize operation management. This paper will augment the scope and capabilities of proposed concept namely, Smart Licensing/Enforcement Management (SLEm). It will review the current licensing and enforcement practice of selected PBT in comparison to the enhanced method. As a result, the new enhanced system is expected to offer a total solution for licensing/enforcement management whilst increasing efficiency and transparency for smart city management and governance.

  2. Performance-Driven Interface Contract Enforcement for Scientific Components

    Energy Technology Data Exchange (ETDEWEB)

    Dahlgren, Tamara Lynn [Univ. of California, Davis, CA (United States)

    2008-01-01

    Performance-driven interface contract enforcement research aims to improve the quality of programs built from plug-and-play scientific components. Interface contracts make the obligations on the caller and all implementations of the specified methods explicit. Runtime contract enforcement is a well-known technique for enhancing testing and debugging. However, checking all of the associated constraints during deployment is generally considered too costly from a performance stand point. Previous solutions enforced subsets of constraints without explicit consideration of their performance implications. Hence, this research measures the impacts of different interface contract sampling strategies and compares results with new techniques driven by execution time estimates. Results from three studies indicate automatically adjusting the level of checking based on performance constraints improves the likelihood of detecting contract violations under certain circumstances. Specifically, performance-driven enforcement is better suited to programs exercising constraints whose costs are at most moderately expensive relative to normal program execution.

  3. Price-Anderson Nuclear Safety Enforcement Program. 1997 annual report

    International Nuclear Information System (INIS)

    This report summarizes activities in the Department of Energy's Price-Anderson Amendments Act (PAAA) Enforcement Program in calendar year 1997 and highlights improvements planned for 1998. The DOE Enforcement Program involves the Office of Enforcement and Investigation in the DOE Headquarters Office of Environment, Safety and Health, as well as numerous PAAA Coordinators and technical advisors in DOE Field and Program Offices. The DOE Enforcement Program issued 13 Notices of Violation (NOV's) in 1997 for cases involving significant or potentially significant nuclear safety violations. Six of these included civil penalties totaling $440,000. Highlights of these actions include: (1) Brookhaven National Laboratory Radiological Control Violations / Associated Universities, Inc.; (2) Bioassay Program Violations at Mound / EG ampersand G, Inc.; (3) Savannah River Crane Operator Uptake / Westinghouse Savannah River Company; (4) Waste Calciner Worker Uptake / Lockheed-Martin Idaho Technologies Company; and (5) Reactor Scram and Records Destruction at Sandia / Sandia Corporation (Lockheed-Martin). Sandia / Sandia Corporation (Lockheed-Martin)

  4. Automation from pictures

    International Nuclear Information System (INIS)

    The state transition diagram (STD) model has been helpful in the design of real time software, especially with the emergence of graphical computer aided software engineering (CASE) tools. Nevertheless, the translation of the STD to real time code has in the past been primarily a manual task. At Los Alamos we have automated this process. The designer constructs the STD using a CASE tool (Cadre Teamwork) using a special notation for events and actions. A translator converts the STD into an intermediate state notation language (SNL), and this SNL is compiled directly into C code (a state program). Execution of the state program is driven by external events, allowing multiple state programs to effectively share the resources of the host processor. Since the design and the code are tightly integrated through the CASE tool, the design and code never diverge, and we avoid design obsolescence. Furthermore, the CASE tool automates the production of formal technical documents from the graphic description encapsulated by the CASE tool. (author)

  5. Automated Test Case Generation

    CERN Document Server

    CERN. Geneva

    2015-01-01

    I would like to present the concept of automated test case generation. I work on it as part of my PhD and I think it would be interesting also for other people. It is also the topic of a workshop paper that I am introducing in Paris. (abstract below) Please note that the talk itself would be more general and not about the specifics of my PhD, but about the broad field of Automated Test Case Generation. I would introduce the main approaches (combinatorial testing, symbolic execution, adaptive random testing) and their advantages and problems. (oracle problem, combinatorial explosion, ...) Abstract of the paper: Over the last decade code-based test case generation techniques such as combinatorial testing or dynamic symbolic execution have seen growing research popularity. Most algorithms and tool implementations are based on finding assignments for input parameter values in order to maximise the execution branch coverage. Only few of them consider dependencies from outside the Code Under Test’s scope such...

  6. Automated Postediting of Documents

    CERN Document Server

    Knight, K; Knight, Kevin; Chander, Ishwar

    1994-01-01

    Large amounts of low- to medium-quality English texts are now being produced by machine translation (MT) systems, optical character readers (OCR), and non-native speakers of English. Most of this text must be postedited by hand before it sees the light of day. Improving text quality is tedious work, but its automation has not received much research attention. Anyone who has postedited a technical report or thesis written by a non-native speaker of English knows the potential of an automated postediting system. For the case of MT-generated text, we argue for the construction of postediting modules that are portable across MT systems, as an alternative to hardcoding improvements inside any one system. As an example, we have built a complete self-contained postediting module for the task of article selection (a, an, the) for English noun phrases. This is a notoriously difficult problem for Japanese-English MT. Our system contains over 200,000 rules derived automatically from online text resources. We report on l...

  7. Maneuver Automation Software

    Science.gov (United States)

    Uffelman, Hal; Goodson, Troy; Pellegrin, Michael; Stavert, Lynn; Burk, Thomas; Beach, David; Signorelli, Joel; Jones, Jeremy; Hahn, Yungsun; Attiyah, Ahlam; Illsley, Jeannette

    2009-01-01

    The Maneuver Automation Software (MAS) automates the process of generating commands for maneuvers to keep the spacecraft of the Cassini-Huygens mission on a predetermined prime mission trajectory. Before MAS became available, a team of approximately 10 members had to work about two weeks to design, test, and implement each maneuver in a process that involved running many maneuver-related application programs and then serially handing off data products to other parts of the team. MAS enables a three-member team to design, test, and implement a maneuver in about one-half hour after Navigation has process-tracking data. MAS accepts more than 60 parameters and 22 files as input directly from users. MAS consists of Practical Extraction and Reporting Language (PERL) scripts that link, sequence, and execute the maneuver- related application programs: "Pushing a single button" on a graphical user interface causes MAS to run navigation programs that design a maneuver; programs that create sequences of commands to execute the maneuver on the spacecraft; and a program that generates predictions about maneuver performance and generates reports and other files that enable users to quickly review and verify the maneuver design. MAS can also generate presentation materials, initiate electronic command request forms, and archive all data products for future reference.

  8. Increasing capacity & changing the culture : volunteer management in law enforcement

    OpenAIRE

    Cayson, Donna M.

    2009-01-01

    CHDS State/Local In the post-September 11 world, law enforcement agencies are struggling to protect their communities from the threat of global terrorism, and also preparing for and responding to natural and manmade disasters. The demands on municipal law enforcement agencies have never been greater. Today, more than ever, it is clear that volunteers can play a fundamental role in augmenting a department's homeland security efforts. Are there best practices when incorporating volunteers in...

  9. Central Bank (Supervision and Enforcement) (Amendment) Bill 2016: Legislative Bill

    DEFF Research Database (Denmark)

    Butler, Graham; Rock, Noel

    2016-01-01

    Private Members' Bill (legislation) introduced in Dáil Éireann (House of Deputies), Houses of the Oireachtas (Irish Parliament). An Act to amend sections 49 and 51 of the Central Bank (Supervision and Enforcement) Act 2013 to ensure the powers exercised by the Central Bank of Ireland to make...... regulations, conferred by the Central Bank (Supervision and Enforcement) Act 2013 are fit for purpose; and to provide for related matters....

  10. The effect of enforcement on speed behaviour : a literature review.

    OpenAIRE

    Oei, H.-l.

    1998-01-01

    The objective of this literature study is to give an overview of research on speed enforcement and its effect on speed behaviour and safety. This study will be used to find new strategies and tactics to enhance the efficiency and effectiveness of speed enforcement by the police in terms of behaviour and safety. (For the original MASTER Deliverable 3 report see http://www.vtt.fi/rte/projects/yki6/master/rep212.pdf)

  11. Enforcing Building Energy Codes in China: Progress and Comparative Lessons

    Energy Technology Data Exchange (ETDEWEB)

    Evans, Meredydd; Shui, Bin; Halverson, Mark A.; Delgado, Alison

    2010-08-15

    From 1995 to 2005, building energy use in China increased more rapidly than the world average. China has been adding 0.4 to 1.6 billion square meters of floor space annually , making it the world’s largest market for new construction. In fact, by 2020, China is expected to comprise half of all new construction. In response to this, China has begun to make important steps towards achieving building energy efficiency, including the implementation of building energy standards that requires new buildings to be 65% more efficient than buildings from the early 1980s. Making progress on reducing building energy use requires both a comprehensive code and a robust enforcement system. The latter – the enforcement system – is a particularly critical component for assuring that a building code has an effect. China has dramatically enhanced its enforcement system in the past two years, with more detailed requirements for ensuring enforcement and new penalties for non-compliance. We believe that the U.S. and other developed countries could benefit from learning about the multiple checks and the documentation required in China. Similarly, some of the more user-friendly enforcement approaches developed in the U.S. and elsewhere may be useful for China as it strives to improve enforcement in rural and smaller communities. In this article, we provide context to China’s building codes enforcement system by comparing it to the U.S. Among some of the enforcement mechanisms we look at are testing and rating procedures, compliance software, and training and public information.

  12. Stronger Enforcement of Security Using AOP and Spring AOP

    OpenAIRE

    Sirbi, Kotrappa; Kulkarni, Prakash Jayanth

    2010-01-01

    An application security has two primary goals: first, it is intended to prevent unauthorised personnel from accessing information at higher classification than their authorisation. Second, it is intended to prevent personnel from declassifying information. Using an object oriented approach to implementing application security results not only with the problem of code scattering and code tangling, but also results in weaker enforcement of security. This weaker enforcement of security could be ...

  13. Fighting impunity of enforced disappearances through a regional model

    OpenAIRE

    C.; Genovese; Wilt, de, J.

    2014-01-01

    Grievous moral opprobrium has often been the trigger justifying the recourse to individual criminal responsibility of perpetrators. The process of ‘justice cascade’ initiated by the Nuremberg trials should not come to a halt. Though the current measures of criminal justice enforcement within international tribunals and national courts prove to be necessary mechanisms, they are not always sufficient. Bringing forward the crime of enforced disappearance as an illustration of a phenomenon where ...

  14. Get smart! automate your house!

    NARCIS (Netherlands)

    Van Amstel, P.; Gorter, N.; De Rouw, J.

    2016-01-01

    This "designers' manual" is made during the TIDO-course AR0531 Innovation and Sustainability This manual will help you in reducing both energy usage and costs by automating your home. It gives an introduction to a number of home automation systems that every homeowner can install.

  15. Automated Methods Of Corrosion Measurements

    DEFF Research Database (Denmark)

    Bech-Nielsen, Gregers; Andersen, Jens Enevold Thaulov; Reeve, John Ch;

    1997-01-01

    The chapter describes the following automated measurements: Corrosion Measurements by Titration, Imaging Corrosion by Scanning Probe Microscopy, Critical Pitting Temperature and Application of the Electrochemical Hydrogen Permeation Cell.......The chapter describes the following automated measurements: Corrosion Measurements by Titration, Imaging Corrosion by Scanning Probe Microscopy, Critical Pitting Temperature and Application of the Electrochemical Hydrogen Permeation Cell....

  16. Automated separation for heterogeneous immunoassays

    OpenAIRE

    Truchaud, A.; Barclay, J; Yvert, J. P.; Capolaghi, B.

    1991-01-01

    Beside general requirements for modern automated systems, immunoassay automation involves specific requirements as a separation step for heterogeneous immunoassays. Systems are designed according to the solid phase selected: dedicated or open robots for coated tubes and wells, systems nearly similar to chemistry analysers in the case of magnetic particles, and a completely original design for those using porous and film materials.

  17. Automated Test-Form Generation

    Science.gov (United States)

    van der Linden, Wim J.; Diao, Qi

    2011-01-01

    In automated test assembly (ATA), the methodology of mixed-integer programming is used to select test items from an item bank to meet the specifications for a desired test form and optimize its measurement accuracy. The same methodology can be used to automate the formatting of the set of selected items into the actual test form. Three different…

  18. Translation: Aids, Robots, and Automation.

    Science.gov (United States)

    Andreyewsky, Alexander

    1981-01-01

    Examines electronic aids to translation both as ways to automate it and as an approach to solve problems resulting from shortage of qualified translators. Describes the limitations of robotic MT (Machine Translation) systems, viewing MAT (Machine-Aided Translation) as the only practical solution and the best vehicle for further automation. (MES)

  19. Opening up Library Automation Software

    Science.gov (United States)

    Breeding, Marshall

    2009-01-01

    Throughout the history of library automation, the author has seen a steady advancement toward more open systems. In the early days of library automation, when proprietary systems dominated, the need for standards was paramount since other means of inter-operability and data exchange weren't possible. Today's focus on Application Programming…

  20. U.S. Environmental Protection Agency Office of Enforcement and Compliance Assurance New Mapping Tool for Enforcement Cases

    Data.gov (United States)

    U.S. Environmental Protection Agency — The new mapping tool shows facilities in the United States where the EPA concluded formal environmental enforcement actions between October 1, 2008 and September...

  1. Automated Motivic Analysis

    DEFF Research Database (Denmark)

    Lartillot, Olivier

    2016-01-01

    Motivic analysis provides very detailed understanding of musical composi- tions, but is also particularly difficult to formalize and systematize. A computational automation of the discovery of motivic patterns cannot be reduced to a mere extraction of all possible sequences of descriptions....... The systematic approach inexorably leads to a proliferation of redundant structures that needs to be addressed properly. Global filtering techniques cause a drastic elimination of interesting structures that damages the quality of the analysis. On the other hand, a selection of closed patterns allows...... for lossless compression. The structural complexity resulting from successive repetitions of patterns can be controlled through a simple modelling of cycles. Generally, motivic patterns cannot always be defined solely as sequences of descriptions in a fixed set of dimensions: throughout the descriptions...

  2. Robust automated knowledge capture.

    Energy Technology Data Exchange (ETDEWEB)

    Stevens-Adams, Susan Marie; Abbott, Robert G.; Forsythe, James Chris; Trumbo, Michael Christopher Stefan; Haass, Michael Joseph; Hendrickson, Stacey M. Langfitt

    2011-10-01

    This report summarizes research conducted through the Sandia National Laboratories Robust Automated Knowledge Capture Laboratory Directed Research and Development project. The objective of this project was to advance scientific understanding of the influence of individual cognitive attributes on decision making. The project has developed a quantitative model known as RumRunner that has proven effective in predicting the propensity of an individual to shift strategies on the basis of task and experience related parameters. Three separate studies are described which have validated the basic RumRunner model. This work provides a basis for better understanding human decision making in high consequent national security applications, and in particular, the individual characteristics that underlie adaptive thinking.

  3. Automated Electrostatics Environmental Chamber

    Science.gov (United States)

    Calle, Carlos; Lewis, Dean C.; Buchanan, Randy K.; Buchanan, Aubri

    2005-01-01

    The Mars Electrostatics Chamber (MEC) is an environmental chamber designed primarily to create atmospheric conditions like those at the surface of Mars to support experiments on electrostatic effects in the Martian environment. The chamber is equipped with a vacuum system, a cryogenic cooling system, an atmospheric-gas replenishing and analysis system, and a computerized control system that can be programmed by the user and that provides both automation and options for manual control. The control system can be set to maintain steady Mars-like conditions or to impose temperature and pressure variations of a Mars diurnal cycle at any given season and latitude. In addition, the MEC can be used in other areas of research because it can create steady or varying atmospheric conditions anywhere within the wide temperature, pressure, and composition ranges between the extremes of Mars-like and Earth-like conditions.

  4. Automated Standard Hazard Tool

    Science.gov (United States)

    Stebler, Shane

    2014-01-01

    The current system used to generate standard hazard reports is considered cumbersome and iterative. This study defines a structure for this system's process in a clear, algorithmic way so that standard hazard reports and basic hazard analysis may be completed using a centralized, web-based computer application. To accomplish this task, a test server is used to host a prototype of the tool during development. The prototype is configured to easily integrate into NASA's current server systems with minimal alteration. Additionally, the tool is easily updated and provides NASA with a system that may grow to accommodate future requirements and possibly, different applications. Results of this project's success are outlined in positive, subjective reviews complete by payload providers and NASA Safety and Mission Assurance personnel. Ideally, this prototype will increase interest in the concept of standard hazard automation and lead to the full-scale production of a user-ready application.

  5. Automated synthetic scene generation

    Science.gov (United States)

    Givens, Ryan N.

    Physics-based simulations generate synthetic imagery to help organizations anticipate system performance of proposed remote sensing systems. However, manually constructing synthetic scenes which are sophisticated enough to capture the complexity of real-world sites can take days to months depending on the size of the site and desired fidelity of the scene. This research, sponsored by the Air Force Research Laboratory's Sensors Directorate, successfully developed an automated approach to fuse high-resolution RGB imagery, lidar data, and hyperspectral imagery and then extract the necessary scene components. The method greatly reduces the time and money required to generate realistic synthetic scenes and developed new approaches to improve material identification using information from all three of the input datasets.

  6. Sub-Federal Enforcement of Immigration Law: An Introduction to the Problem of Pretextual Enforcement and Inadequate Remedies

    Directory of Open Access Journals (Sweden)

    Carrie Rosenbaum

    2014-01-01

    Full Text Available Sub-federal enforcement of immigration law has expanded significantly in the last decade raising questions concerning policing, rights violations, and remedies. While the Fourth Amendment has historically provided an avenue for potentially suppressing evidence obtained in violation of a criminal defendant’s civil rights, its applicability in the immigration removal context has been circumscribed. Thus, the avenues to protect the rights of unauthorized noncitizens in immigration removal proceedings are less clear where sub-federal agents act outside of their authorization, particularly in the context of Secure Communities, and enforce immigration law. In the context of immigration exceptionalism, racial profiling has historically played a unique role in immigration law. The lack of adequate measures to deter rights violations where sub-federal agents enforce immigration law raises questions concerning the relationship between criminal and immigration law, and the importance of deterring civil rights violations such as racial profiling, in immigration enforcement. This article will examine the problem of sub-federal law enforcement agents’ use of criminal law violations as a pretext to enforce immigration law and the lack of adequate deterrence of civil rights violations.

  7. Automated security response robot

    Science.gov (United States)

    Ciccimaro, Dominic A.; Everett, Hobart R.; Gilbreath, Gary A.; Tran, Tien T.

    1999-01-01

    ROBART III is intended as an advance demonstration platform for non-lethal response measures, extending the concepts of reflexive teleoperation into the realm of coordinated weapons control in law enforcement and urban warfare scenarios. A rich mix of ultrasonic and optical proximity and range sensors facilitates remote operation in unstructured and unexplored buildings with minimal operator supervision. Autonomous navigation and mapping of interior spaces is significantly enhanced by an innovative algorithm which exploits the fact that the majority of man-made structures are characterized by parallel and orthogonal walls. Extremely robust intruder detection and assessment capabilities are achieved through intelligent fusion of a multitude of inputs form various onboard motion sensors. Intruder detection is addressed by a 360-degree staring array of passive-IR motion detectors, augmented by a number of positionable head-mounted sensors. Automatic camera tracking of a moving target is accomplished using a video line digitizer. Non-lethal response systems include a six- barrelled pneumatically-powered Gatling gun, high-powered strobe lights, and three ear-piercing 103-decibel sirens.

  8. Automated Essay Scoring

    Directory of Open Access Journals (Sweden)

    Semire DIKLI

    2006-01-01

    Full Text Available Automated Essay Scoring Semire DIKLI Florida State University Tallahassee, FL, USA ABSTRACT The impacts of computers on writing have been widely studied for three decades. Even basic computers functions, i.e. word processing, have been of great assistance to writers in modifying their essays. The research on Automated Essay Scoring (AES has revealed that computers have the capacity to function as a more effective cognitive tool (Attali, 2004. AES is defined as the computer technology that evaluates and scores the written prose (Shermis & Barrera, 2002; Shermis & Burstein, 2003; Shermis, Raymat, & Barrera, 2003. Revision and feedback are essential aspects of the writing process. Students need to receive feedback in order to increase their writing quality. However, responding to student papers can be a burden for teachers. Particularly if they have large number of students and if they assign frequent writing assignments, providing individual feedback to student essays might be quite time consuming. AES systems can be very useful because they can provide the student with a score as well as feedback within seconds (Page, 2003. Four types of AES systems, which are widely used by testing companies, universities, and public schools: Project Essay Grader (PEG, Intelligent Essay Assessor (IEA, E-rater, and IntelliMetric. AES is a developing technology. Many AES systems are used to overcome time, cost, and generalizability issues in writing assessment. The accuracy and reliability of these systems have been proven to be high. The search for excellence in machine scoring of essays is continuing and numerous studies are being conducted to improve the effectiveness of the AES systems.

  9. Automatic enforcement of speed and red light violations : applications, experiences and developments.

    NARCIS (Netherlands)

    Mäkinen, T. & Oei, H.-l.

    1993-01-01

    This paper explains the need for automatic enforcement, and reviews: (1) applications of automatic enforcement. Automatic enforcement has been carried out for about 20 years. Despite this, the number of scientific and experimental studies dealing with the effects of automatic traffic enforcement app

  10. Automating the radiographic NDT process

    International Nuclear Information System (INIS)

    Automation, the removal of the human element in inspection, has not been generally applied to film radiographic NDT. The justication for automating is not only productivity but also reliability of results. Film remains in the automated system of the future because of its extremely high image content, approximately 8 x 109 bits per 14 x 17. The equivalent to 2200 computer floppy discs. Parts handling systems and robotics applied for manufacturing and some NDT modalities, should now be applied to film radiographic NDT systems. Automatic film handling can be achieved with the daylight NDT film handling system. Automatic film processing is becoming the standard in industry and can be coupled to the daylight system. Robots offer the opportunity to automate fully the exposure step. Finally, computer aided interpretation appears on the horizon. A unit which laser scans a 14 x 17 (inch) film in 6 - 8 seconds can digitize film information for further manipulation and possible automatic interrogations (computer aided interpretation). The system called FDRS (for Film Digital Radiography System) is moving toward 50 micron (*approx* 16 lines/mm) resolution. This is believed to meet the need of the majority of image content needs. We expect the automated system to appear first in parts (modules) as certain operations are automated. The future will see it all come together in an automated film radiographic NDT system (author)

  11. Private law enforcement in post-communist Southeastern Europe: An economic analysis of arbitration and execution

    OpenAIRE

    Schoenfelder Bruno

    2004-01-01

    The very idea of private law enforcement is alien in Southeastern Europe and appears there to be perceived as somewhat extravagant. A thoroughgoing search for the reasons of an extremely limited scope of the private law enforcement is undertaken in the paper. Private law enforcement is seen as taking three basic forms: self-enforcement, enforcement through other agents and illegal means and through specialized agents and with reliance on legal means. Particularly extensive is the analysis of ...

  12. Automated Fluid Interface System (AFIS)

    Science.gov (United States)

    1990-01-01

    Automated remote fluid servicing will be necessary for future space missions, as future satellites will be designed for on-orbit consumable replenishment. In order to develop an on-orbit remote servicing capability, a standard interface between a tanker and the receiving satellite is needed. The objective of the Automated Fluid Interface System (AFIS) program is to design, fabricate, and functionally demonstrate compliance with all design requirements for an automated fluid interface system. A description and documentation of the Fairchild AFIS design is provided.

  13. Enforcing the climate regime: Game theory and the Marrakesh Accords

    International Nuclear Information System (INIS)

    The article reviews basic insights about compliance and ''hard'' enforcement that can be derived from various non-cooperative equilibrium concepts and evaluates the Marrakesh Accords in light of these insights. Five different notions of equilibrium are considered - the Nash equilibrium, the sub game perfect equilibrium, the re negotiation proof equilibrium, the coalition proof equilibrium and the perfect Bayesian equilibrium. These various types of equilibrium have number of implications for effective enforcement: 1. Consequences of non-compliance should be more than proportionate. 2. To be credible punishment needs to take place in the Pareto frontier, rather than by reversion to some suboptimal state. 3. An effective enforcement system must be able to curb collective as well as individual incentives to cheat. 4. A fully transparent enforcement regime could in fact turn out to be detrimental for compliance levels. It is concluded that constructing an effective system for ''hard'' enforcement of the Kyoto Protocol is a formidable task that has only partially been accomplished by the Marrakesh Accords. A possible explanation is that the design of a compliance system for the climate regime involved a careful balancing of the desire to minimise non-compliance against other important considerations. (Author)

  14. Enforcing the climate regime: Game theory and the Marrakesh Accords

    Energy Technology Data Exchange (ETDEWEB)

    Hovi, Jon

    2002-07-01

    The article reviews basic insights about compliance and ''hard'' enforcement that can be derived from various non-cooperative equilibrium concepts and evaluates the Marrakesh Accords in light of these insights. Five different notions of equilibrium are considered - the Nash equilibrium, the sub game perfect equilibrium, the re negotiation proof equilibrium, the coalition proof equilibrium and the perfect Bayesian equilibrium. These various types of equilibrium have number of implications for effective enforcement: 1. Consequences of non-compliance should be more than proportionate. 2. To be credible punishment needs to take place in the Pareto frontier, rather than by reversion to some suboptimal state. 3. An effective enforcement system must be able to curb collective as well as individual incentives to cheat. 4. A fully transparent enforcement regime could in fact turn out to be detrimental for compliance levels. It is concluded that constructing an effective system for ''hard'' enforcement of the Kyoto Protocol is a formidable task that has only partially been accomplished by the Marrakesh Accords. A possible explanation is that the design of a compliance system for the climate regime involved a careful balancing of the desire to minimise non-compliance against other important considerations. (Author)

  15. Individual psychological features of law enforcement officers convicted of crimes

    Directory of Open Access Journals (Sweden)

    Lyutykh V.A.

    2016-06-01

    Full Text Available The relevance of this topic is caused by a significant number of crimes committed by law enforcement officers and the necessity of active prevention. The aim of the study was to determine the individual psychological characteristics of law enforcement officers convicted of intentional crimes. The hypothesis was suggested that the main difference of individual psychological characteristics of law enforcement officers convicted of intentional crimes from individual psychological characteristics of law-abiding law enforcement officers is the difference between the principal values of the person both the main motives of activity adopted by an individual and the structure and the hierarchy of these values. This article describes the progress and results of empirical research conducted on the materials of psychodiagnostic examination of: employees who have been convicted of intentional crimes; law-abiding employees; people entering an internal affairs agency. Test subjects - men 18-46 years old, 90 people. Recommendations for practical psychologist of internal affairs agencies on detection of individual psychological personality features typical for law enforcement officers convicted of intentional crimes are formulated based on the obtained results.

  16. National Automated Conformity Inspection Process

    Data.gov (United States)

    Department of Transportation — The National Automated Conformity Inspection Process (NACIP) Application is intended to expedite the workflow process as it pertains to the FAA Form 81 0-10 Request...

  17. Evolution of Home Automation Technology

    Directory of Open Access Journals (Sweden)

    Mohd. Rihan

    2009-01-01

    Full Text Available In modern society home and office automation has becomeincreasingly important, providing ways to interconnectvarious home appliances. This interconnection results infaster transfer of information within home/offices leading tobetter home management and improved user experience.Home Automation, in essence, is a technology thatintegrates various electrical systems of a home to provideenhanced comfort and security. Users are grantedconvenient and complete control over all the electrical homeappliances and they are relieved from the tasks thatpreviously required manual control. This paper tracks thedevelopment of home automation technology over the lasttwo decades. Various home automation technologies havebeen explained briefly, giving a chronological account of theevolution of one of the most talked about technologies ofrecent times.

  18. Automation of antimicrobial activity screening.

    Science.gov (United States)

    Forry, Samuel P; Madonna, Megan C; López-Pérez, Daneli; Lin, Nancy J; Pasco, Madeleine D

    2016-03-01

    Manual and automated methods were compared for routine screening of compounds for antimicrobial activity. Automation generally accelerated assays and required less user intervention while producing comparable results. Automated protocols were validated for planktonic, biofilm, and agar cultures of the oral microbe Streptococcus mutans that is commonly associated with tooth decay. Toxicity assays for the known antimicrobial compound cetylpyridinium chloride (CPC) were validated against planktonic, biofilm forming, and 24 h biofilm culture conditions, and several commonly reported toxicity/antimicrobial activity measures were evaluated: the 50 % inhibitory concentration (IC50), the minimum inhibitory concentration (MIC), and the minimum bactericidal concentration (MBC). Using automated methods, three halide salts of cetylpyridinium (CPC, CPB, CPI) were rapidly screened with no detectable effect of the counter ion on antimicrobial activity. PMID:26970766

  19. Automating the Purple Crow Lidar

    Science.gov (United States)

    Hicks, Shannon; Sica, R. J.; Argall, P. S.

    2016-06-01

    The Purple Crow LiDAR (PCL) was built to measure short and long term coupling between the lower, middle, and upper atmosphere. The initial component of my MSc. project is to automate two key elements of the PCL: the rotating liquid mercury mirror and the Zaber alignment mirror. In addition to the automation of the Zaber alignment mirror, it is also necessary to describe the mirror's movement and positioning errors. Its properties will then be added into the alignment software. Once the alignment software has been completed, we will compare the new alignment method with the previous manual procedure. This is the first among several projects that will culminate in a fully-automated lidar. Eventually, we will be able to work remotely, thereby increasing the amount of data we collect. This paper will describe the motivation for automation, the methods we propose, preliminary results for the Zaber alignment error analysis, and future work.

  20. Home automation with Intel Galileo

    CERN Document Server

    Dundar, Onur

    2015-01-01

    This book is for anyone who wants to learn Intel Galileo for home automation and cross-platform software development. No knowledge of programming with Intel Galileo is assumed, but knowledge of the C programming language is essential.

  1. Towards automated traceability maintenance.

    Science.gov (United States)

    Mäder, Patrick; Gotel, Orlena

    2012-10-01

    Traceability relations support stakeholders in understanding the dependencies between artifacts created during the development of a software system and thus enable many development-related tasks. To ensure that the anticipated benefits of these tasks can be realized, it is necessary to have an up-to-date set of traceability relations between the established artifacts. This goal requires the creation of traceability relations during the initial development process. Furthermore, the goal also requires the maintenance of traceability relations over time as the software system evolves in order to prevent their decay. In this paper, an approach is discussed that supports the (semi-) automated update of traceability relations between requirements, analysis and design models of software systems expressed in the UML. This is made possible by analyzing change events that have been captured while working within a third-party UML modeling tool. Within the captured flow of events, development activities comprised of several events are recognized. These are matched with predefined rules that direct the update of impacted traceability relations. The overall approach is supported by a prototype tool and empirical results on the effectiveness of tool-supported traceability maintenance are provided. PMID:23471308

  2. Automated Gas Distribution System

    Science.gov (United States)

    Starke, Allen; Clark, Henry

    2012-10-01

    The cyclotron of Texas A&M University is one of the few and prized cyclotrons in the country. Behind the scenes of the cyclotron is a confusing, and dangerous setup of the ion sources that supplies the cyclotron with particles for acceleration. To use this machine there is a time consuming, and even wasteful step by step process of switching gases, purging, and other important features that must be done manually to keep the system functioning properly, while also trying to maintain the safety of the working environment. Developing a new gas distribution system to the ion source prevents many of the problems generated by the older manually setup process. This developed system can be controlled manually in an easier fashion than before, but like most of the technology and machines in the cyclotron now, is mainly operated based on software programming developed through graphical coding environment Labview. The automated gas distribution system provides multi-ports for a selection of different gases to decrease the amount of gas wasted through switching gases, and a port for the vacuum to decrease the amount of time spent purging the manifold. The Labview software makes the operation of the cyclotron and ion sources easier, and safer for anyone to use.

  3. Stress intensity and performance capabilities of law enforcement officers

    Directory of Open Access Journals (Sweden)

    Nikolaeva N.V.

    2014-09-01

    Full Text Available We discuss the problem of the stress influence on the performance of law enforcement officers. The importance of the stress connection with psychological and psychophysical functioning is caused by the fact that many professional tasks solving is possible only in case of effective adaptation to the difficult conditions of work. The concepts such as stress and performance, as well as the mechanisms of biological adaptation to stress and the effects of stress on the individual police officer, are considered. Attention is paid to the differences between male and female stress and causes of stress in occupations with a large amount of communication activity. We conducted an empirical study in which we investigated the relationship of stress severity and the performance of law enforcement officers, as well as the differences in law enforcement employees performance depending on stress presence, its level, and gender.

  4. Forensic Speaker Recognition Law Enforcement and Counter-Terrorism

    CERN Document Server

    Patil, Hemant

    2012-01-01

    Forensic Speaker Recognition: Law Enforcement and Counter-Terrorism is an anthology of the research findings of 35 speaker recognition experts from around the world. The volume provides a multidimensional view of the complex science involved in determining whether a suspect’s voice truly matches forensic speech samples, collected by law enforcement and counter-terrorism agencies, that are associated with the commission of a terrorist act or other crimes. While addressing such topics as the challenges of forensic case work, handling speech signal degradation, analyzing features of speaker recognition to optimize voice verification system performance, and designing voice applications that meet the practical needs of law enforcement and counter-terrorism agencies, this material all sounds a common theme: how the rigors of forensic utility are demanding new levels of excellence in all aspects of speaker recognition. The contributors are among the most eminent scientists in speech engineering and signal process...

  5. Enforcement Issues in the Governance of Ships’ Carbon Emissions

    Directory of Open Access Journals (Sweden)

    Michael Bloor

    2015-07-01

    Full Text Available The shipping industry, although relatively carbon-efficient, is projected to produce rising carbon emissions in the future as a consequence of increasing world trade. A number of candidate regulations designed to mitigate these emissions have been canvassed by the UN’s International Maritime Organisation and by the European Commission. Many of these schemes are focussed on the use of market measures—emission trading schemes or fuel levies. This paper draws on observational and interview data gathered to examine enforcement issues associated with the control of ships’ sulphur emissions in order to consider the possible enforcement problems that might be associated with projected market measures to control ships’ carbon emissions. Enforcement problems are shown to be associated with the globalised character of the industry and its polycentric governance structure.

  6. When Reputation Enforces Evolutionary Cooperation in Unreliable MANETs.

    Science.gov (United States)

    Tang, Changbing; Li, Ang; Li, Xiang

    2015-10-01

    In self-organized mobile ad hoc networks (MANETs), network functions rely on cooperation of self-interested nodes, where a challenge is to enforce their mutual cooperation. In this paper, we study cooperative packet forwarding in a one-hop unreliable channel which results from loss of packets and noisy observation of transmissions. We propose an indirect reciprocity framework based on evolutionary game theory, and enforce cooperation of packet forwarding strategies in both structured and unstructured MANETs. Furthermore, we analyze the evolutionary dynamics of cooperative strategies and derive the threshold of benefit-to-cost ratio to guarantee the convergence of cooperation. The numerical simulations verify that the proposed evolutionary game theoretic solution enforces cooperation when the benefit-to-cost ratio of the altruistic exceeds the critical condition. In addition, the network throughput performance of our proposed strategy in structured MANETs is measured, which is in close agreement with that of the full cooperative strategy. PMID:25438334

  7. On the Enforcement of Specific Performance in Civil Law Countries

    DEFF Research Database (Denmark)

    Lando, Henrik; Rose, Caspar

    2003-01-01

    Abstract:Proponents of specific performance as a remedy for breach ofcontract have found support in the alleged use of the remedy inCivil Law countries. However, we provide evidence that specificperformance is in fact a rare remedy in Denmark, Germany andFrance, and under CISG, when performance...... requires actions to beundertaken, and we relate this to costs of enforcement. We arguethat it is administratively costly to run a system of enforcementthat renders specific performance attractive to the aggrieved party,and that the Civil Law countries have (like Common Law countries)chosen not to incur...... these costs of enforcement. This is especiallyclear in the case of Denmark, where specific performance of actionshas been abandoned as a legal remedy.At the normative level, we argue that enforcement costs providesan additional rationale, over and above the rationales of the theoryof efficient breach...

  8. Should AAPL enforce its ethics? Challenges and solutions.

    Science.gov (United States)

    Candilis, Philip J; Dike, Charles C; Meyer, Donald J; Myers, Wade C; Weinstock, Robert

    2014-01-01

    Ethics enforcement in psychiatry occurs at the district branch and American Psychiatric Association (APA) levels under the guidance of American Medical Association (AMA) and APA ethics documents. Subspecialty ethics consequently have no formal role in the enforcement process. This reality challenges practitioners to work according to guidelines that may not be sufficiently relevant and challenges ethics reviewers to apply frameworks not intended for the subspecialties. This article offers the theoretical and practical support to amend APA Procedures to permit formal consideration of subspecialty ethics during ethics complaints and to include forensic practitioners on panels reviewing them. This is the first step toward an integration of two conflicting models of ethics enforcement, regulatory and aspirational, that bring together specialty and subspecialty ethics.

  9. Aprendizaje automático

    OpenAIRE

    Moreno, Antonio

    2006-01-01

    En este libro se introducen los conceptos básicos en una de las ramas más estudiadas actualmente dentro de la inteligencia artificial: el aprendizaje automático. Se estudian temas como el aprendizaje inductivo, el razonamiento analógico, el aprendizaje basado en explicaciones, las redes neuronales, los algoritmos genéticos, el razonamiento basado en casos o las aproximaciones teóricas al aprendizaje automático.

  10. 2015 Chinese Intelligent Automation Conference

    CERN Document Server

    Li, Hongbo

    2015-01-01

    Proceedings of the 2015 Chinese Intelligent Automation Conference presents selected research papers from the CIAC’15, held in Fuzhou, China. The topics include adaptive control, fuzzy control, neural network based control, knowledge based control, hybrid intelligent control, learning control, evolutionary mechanism based control, multi-sensor integration, failure diagnosis, reconfigurable control, etc. Engineers and researchers from academia, industry and the government can gain valuable insights into interdisciplinary solutions in the field of intelligent automation.

  11. Technology modernization assessment flexible automation

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, D.W.; Boyd, D.R.; Hansen, N.H.; Hansen, M.A.; Yount, J.A.

    1990-12-01

    The objectives of this report are: to present technology assessment guidelines to be considered in conjunction with defense regulations before an automation project is developed to give examples showing how assessment guidelines may be applied to a current project to present several potential areas where automation might be applied successfully in the depot system. Depots perform primarily repair and remanufacturing operations, with limited small batch manufacturing runs. While certain activities (such as Management Information Systems and warehousing) are directly applicable to either environment, the majority of applications will require combining existing and emerging technologies in different ways, with the special needs of depot remanufacturing environment. Industry generally enjoys the ability to make revisions to its product lines seasonally, followed by batch runs of thousands or more. Depot batch runs are in the tens, at best the hundreds, of parts with a potential for large variation in product mix; reconfiguration may be required on a week-to-week basis. This need for a higher degree of flexibility suggests a higher level of operator interaction, and, in turn, control systems that go beyond the state of the art for less flexible automation and industry in general. This report investigates the benefits and barriers to automation and concludes that, while significant benefits do exist for automation, depots must be prepared to carefully investigate the technical feasibility of each opportunity and the life-cycle costs associated with implementation. Implementation is suggested in two ways: (1) develop an implementation plan for automation technologies based on results of small demonstration automation projects; (2) use phased implementation for both these and later stage automation projects to allow major technical and administrative risk issues to be addressed. 10 refs., 2 figs., 2 tabs. (JF)

  12. AUTOMATED ANALYSIS OF BREAKERS

    Directory of Open Access Journals (Sweden)

    E. M. Farhadzade

    2014-01-01

    Full Text Available Breakers relate to Electric Power Systems’ equipment, the reliability of which influence, to a great extend, on reliability of Power Plants. In particular, the breakers determine structural reliability of switchgear circuit of Power Stations and network substations. Failure in short-circuit switching off by breaker with further failure of reservation unit or system of long-distance protection lead quite often to system emergency.The problem of breakers’ reliability improvement and the reduction of maintenance expenses is becoming ever more urgent in conditions of systematic increasing of maintenance cost and repair expenses of oil circuit and air-break circuit breakers. The main direction of this problem solution is the improvement of diagnostic control methods and organization of on-condition maintenance. But this demands to use a great amount of statistic information about nameplate data of breakers and their operating conditions, about their failures, testing and repairing, advanced developments (software of computer technologies and specific automated information system (AIS.The new AIS with AISV logo was developed at the department: “Reliability of power equipment” of AzRDSI of Energy. The main features of AISV are:· to provide the security and data base accuracy;· to carry out systematic control of breakers conformity with operating conditions;· to make the estimation of individual  reliability’s value and characteristics of its changing for given combination of characteristics variety;· to provide personnel, who is responsible for technical maintenance of breakers, not only with information but also with methodological support, including recommendations for the given problem solving  and advanced methods for its realization.

  13. Hiring & Retaining More Women: The Advantages to Law Enforcement Agencies.

    Science.gov (United States)

    Lonsway, Kimberly A.

    Hiring and retaining more women provides numerous important advantages to law enforcement agencies. Research conducted in the United States and internationally has clearly documented that following facts: (1) female officers are as competent as their male counterparts and even excel in certain areas of police performance; (2) female officers are…

  14. 32 CFR 505.12 - Privacy Act enforcement actions.

    Science.gov (United States)

    2010-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a... record under false pretenses; or (iii) Maintaining a system of records without first meeting the public notice requirements of the Act. (b) Litigation Status Sheet. (1) When a complaint citing the Privacy...

  15. 12 CFR 263.84 - Enforcement of directive.

    Science.gov (United States)

    2010-01-01

    ... or adhere to a capital adequacy plan as required by such directive, the Board may seek enforcement of the directive, including the capital adequacy plan, in the appropriate United State district court... any subsidiary thereof in adhering to any directive or capital adequacy plan required by the...

  16. The Role of Law Enforcement in Prevention. Prevention Update

    Science.gov (United States)

    Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2011

    2011-01-01

    As campuses and communities across the country grapple with problems related to unruly house parties, neighborhood disruptions, and alcohol-fueled "celebratory" incidents, they are developing partnerships with law enforcement agencies to implement strategies to reduce such problems and protect the health and safety of students and residents alike.…

  17. The right to be forgotten – private law enforcement

    NARCIS (Netherlands)

    Tjong Tjin Tai, Eric

    2016-01-01

    Private law enforcement of the right to be forgotten should be considered in light of the general characteristics of private law. This highlights advantages and limitations, and underlines the need to explicate the actual interests involved in the right to be forgotten. As case law and real-life exa

  18. 40 CFR 205.57 - Selective enforcement auditing requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing requirements. 205.57 Section 205.57 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Medium and Heavy Trucks §...

  19. An Enforceable Code of Ethics: What Do Practitioners Think?

    Science.gov (United States)

    Pollnitz, Lois

    1997-01-01

    As part of a larger project begun three years after the adoption of the Australian Early Childhood Association (AECA) Code of Ethics, this study sought practitioners' views about formal enforcement of a code of ethics for early childhood personnel. Questionnaires were sent to directors of 200 early childhood services in New South Wales; about 225…

  20. 19 CFR 12.62 - Enforcement; duties of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Enforcement; duties of Customs officers. 12.62 Section 12.62 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...; duties of Customs officers. (a) In accordance with the authority contained in sections 10 and 12 of...

  1. The Animal Welfare Act: from enactment to enforcement.

    Science.gov (United States)

    Cardon, Andrew D; Bailey, Matthew R; Bennett, B Taylor

    2012-05-01

    Originally enacted in 1966, the Laboratory Animal Welfare Act has been amended several times and renamed the Animal Welfare Act. Responsibility for administering the Animal Welfare Act was delegated within the United States Department of Agriculture to the Administrator of the Animal and Plant Health Inspection Service, and regulations and standards have been developed to implement the intent of Congress conveyed in the language of the Act. In our opinion, the key to compliance with the Animal Welfare Act and its regulations and standards is to have in place a proactive, progressive Animal Care and Use Program that uses the semiannual inspection and programmatic review process to improve the day-to-day management of the program. Successfully managing the inspection process has taken on new meaning in what has recently become known as the 'Age of Enforcement.' As part of this approach, the Animal and Plant Health Inspection Service made changes to the inspection process and issued an Enhanced Animal Welfare Enforcement Plan, which included the development of an Inspection Requirements Handbook. The Inspection Requirements Handbook provides inspectors with information on conducting inspections and includes as an attachment a flow chart for Enforcement Action Guidance. The chart describes 4 types of actions that may occur as part of the enforcement process and the steps that will be followed if noncompliant items are documented during an inspection.

  2. Filtering for Copyright Enforcement in Europe after the Sabam cases

    NARCIS (Netherlands)

    S. Kulk; F. Zuiderveen Borgesius

    2012-01-01

    Sabam, a Belgian collective rights management organisation, wanted an internet access provider and a social network site to install a filter system to enforce copyrights. In two recent judgments, the Court of Justice of the European Union decided that the social network site and the internet access

  3. 12 CFR 570.5 - Enforcement of orders.

    Science.gov (United States)

    2010-01-01

    ... association fails to comply with an order issued under section 39 of the FDI Act, the OTS may seek enforcement of the order in the appropriate United States district court pursuant to section 8(i)(1) of the FDI Act. (b) Administrative remedies. Pursuant to section 8(i)(2)(A) of the FDI Act, the OTS may assess...

  4. Law enforcement tools available at the Savannah River Site

    Energy Technology Data Exchange (ETDEWEB)

    Hofstetter, K.J.

    2000-03-29

    A number of nuclear technologies developed and applied at the Savannah River Site in support of nuclear weapons material production and environmental remediation can be applied to problems in law enforcement. Techniques and equipment for high-sensitivity analyses of samples are available to identify and quantify trace elements and establish origins and histories of forensic evidence removed from crime scenes. While some of theses capabilities are available at local crime laboratories, state-of-the-art equipment and breakthroughs in analytical techniques are continually being developed at DOE laboratories. Extensive experience with the handling of radioactive samples at the DOE labs minimizes the chances of cross-contamination of evidence received from law enforcement. In addition to high-sensitivity analyses, many of the field techniques developed for use in a nuclear facility can assist law enforcement personnel in detecting illicit materials and operations, in retrieving of pertinent evidence and in surveying crime scenes. Some of these tools include chemical sniffers, hand-held detectors, thermal imaging, etc. In addition, mobile laboratories can be deployed to a crime scene to provide field screening of potential evidence. A variety of portable sensors can be deployed on vehicle, aerial, surface or submersible platforms to assist in the location of pertinent evidence or illicit operations. Several specific nuclear technologies available to law enforcement and their potential uses are discussed.

  5. Assessment of Law Enforcement Candidates: Peer Evaluations and the MMPI.

    Science.gov (United States)

    Schumacher, Joseph E.; Scogin, Forrest

    Screening and evaluating law enforcement candidates for employment as police officers is a complex task. It has been recommended that a clinical interview and comprehensive battery of psychological tests may aid in evaluation. The Minnesota Multiphasic Personality Inventory (MMPI) is often used for this type of psychological screening. Peer…

  6. 20 CFR 725.609 - Enforcement against other persons.

    Science.gov (United States)

    2010-04-01

    ... was a subsidiary of a parent company or a product of a joint venture, or was substantially owned or controlled by another business entity, against such parent entity, any member of such joint venture, or such... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Enforcement against other persons....

  7. 3PAC: Enforcing Access Policies for Web Services

    NARCIS (Netherlands)

    Bemmel, van J.; Wegdam, M.; Lagerberg, K.

    2005-01-01

    Web services fail to deliver on the promise of ubiquitous deployment and seamless interoperability due to the lack of a uniform, standards-based approach to all aspects of security. In particular, the enforcement of access policies in a service oriented architecture is not addressed adequately. We p

  8. Building enforcement capacity : Evidence from the Mexican civil service reform

    NARCIS (Netherlands)

    Nieto Morales, Fernando; Heyse, Liesbet; del Carmen Pardo, María; Wittek, Rafael

    2014-01-01

    Building enforcement capacity, that is, attaining and sustaining control in order to implement changes, is crucial for the success of public management reforms. However, this aspect of public management reform does not receive much theoretical or empirical attention. This paper analyzes the process

  9. 21 CFR 1316.31 - Authority for enforcement proceeding.

    Science.gov (United States)

    2010-04-01

    ... Section 1316.31 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE ADMINISTRATIVE... and Export Act (84 Stat. 1285; 21 U.S.C. 951) an opportunity to present his views and his proposals... show cause why prosecution should not be instituted, or to present his views on the...

  10. 40 CFR 80.81 - Enforcement exemptions for California gasoline.

    Science.gov (United States)

    2010-07-01

    ... gasoline. 80.81 Section 80.81 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) REGULATION OF FUELS AND FUEL ADDITIVES Reformulated Gasoline § 80.81 Enforcement exemptions for California gasoline. (a)(1) The requirements of subparts D, E, F, and J of this part...

  11. Codes of conduct and copyright enforcement in Cyberspace

    NARCIS (Netherlands)

    P.B. Hugenholtz

    2010-01-01

    This chapter critically examines the rise of codes of conduct that deal with copyright enforcement. Its focus will be on codes binding ISPs and other online intermediaries offering similar services, such as providers of user-generated content (UGC) platforms. While solutions in the United States and

  12. 7 CFR 1530.111 - Enforcement and penalties.

    Science.gov (United States)

    2010-01-01

    ... the Licensing Authority. Suspension of a license will be governed by 7 CFR part 3017, subpart D and... OF AGRICULTURE THE REFINED SUGAR RE-EXPORT PROGRAM, THE SUGAR CONTAINING PRODUCTS RE-EXPORT PROGRAM, AND THE POLYHYDRIC ALCOHOL PROGRAM § 1530.111 Enforcement and penalties. (a) The Licensing...

  13. 40 CFR 35.6760 - Enforcement and termination for convenience.

    Science.gov (United States)

    2010-07-01

    ... OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Cooperative Agreements and Superfund State Contracts for Superfund Response Actions Other Administrative Requirements for Cooperative Agreements § 35.6760... Cooperative Agreement, and is subject to the requirements regarding enforcement of the terms of an award...

  14. Measuring the economic effects of competition law enforcement

    NARCIS (Netherlands)

    Don, H.; Kemp, R.G.M.; Sinderen, J.

    2008-01-01

    Together with a move from a rules-based legal approach to a more economic approach in competition cases, the economic effects of competition law enforcement have received increasing attention. Measuring these effects is important for external accountability of the Competition Authority, for quality

  15. 77 FR 32901 - State Enforcement of Household Goods Consumer Protection

    Science.gov (United States)

    2012-06-04

    ... Household Goods Consumer Protection AGENCY: Federal Motor Carrier Safety Administration (FMCSA), DOT. ACTION... SAFETEA-LU. The Agency amended its household goods regulations on November 29, 2010 (75 FR 72987). States... goods regulatory authorities and State attorneys general may enforce certain consumer...

  16. 29 CFR 553.211 - Law enforcement activities.

    Science.gov (United States)

    2010-07-01

    ... includes physical training, self-defense, firearm proficiency, criminal and civil law principles... they are elected officials and if they are not subject to the civil service laws of their particular... 29 Labor 3 2010-07-01 2010-07-01 false Law enforcement activities. 553.211 Section 553.211...

  17. ASSESSING PEAK AEROBIC CAPACITY IN DUTCH LAW ENFORCEMENT OFFICERS

    NARCIS (Netherlands)

    Wittink, Harriet; Takken, Tim; de Groot, Janke; Reneman, Michiel; Peters, Roelof; Vanhees, Luc

    2015-01-01

    Objectives: To cross-validate the existing peak rate of oxygen consumption (VO2peak) prediction equations in Dutch law enforcement officers and to determine whether these prediction equations can be used to predict VO2peak for groups and in a single individual. A further objective was to report norm

  18. Cultural Competency, Education, and Training among Campus Law Enforcement

    Science.gov (United States)

    Anderson, Ashley; Hendricks, James E.

    2011-01-01

    Enforcement agencies have developed an acute understanding of the importance of cultural competency among officers given the historically diverse nature of societies and communities. However, it has only been in the recent past that departments have begun ongoing training in this area. Training in cultural competency benefits departments in many…

  19. 76 FR 43569 - Identification of Enforceable Rules and Orders

    Science.gov (United States)

    2011-07-21

    ...-Frank Wall Street Reform and Consumer Protection Act, Public Law 111-203. FOR FURTHER INFORMATION... consumer laws.\\4\\ The CFPB will also have authority to enforce in some circumstances the Federal Trade... subparagraph (A) collectively.'' \\4\\ ``Enumerated consumer laws'' is defined in section 1002(12) of the Act...

  20. 45 CFR 5.68 - Exemption seven: Law enforcement.

    Science.gov (United States)

    2010-10-01

    ... category. In certain cases—such as when a fraud investigation is likely—we may refuse to confirm or deny... prejudicial publicity. (c) Personal privacy. We are careful not to disclose information that could reasonably..., has been compiled by a criminal law enforcement authority conducting a criminal investigation,......

  1. Programmable automation systems in PSA

    International Nuclear Information System (INIS)

    The Finnish safety authority (STUK) requires plant specific PSAs, and quantitative safety goals are set on different levels. The reliability analysis is more problematic when critical safety functions are realized by applying programmable automation systems. Conventional modeling techniques do not necessarily apply to the analysis of these systems, and the quantification seems to be impossible. However, it is important to analyze contribution of programmable automation systems to the plant safety and PSA is the only method with system analytical view over the safety. This report discusses the applicability of PSA methodology (fault tree analyses, failure modes and effects analyses) in the analysis of programmable automation systems. The problem of how to decompose programmable automation systems for reliability modeling purposes is discussed. In addition to the qualitative analysis and structural reliability modeling issues, the possibility to evaluate failure probabilities of programmable automation systems is considered. One solution to the quantification issue is the use of expert judgements, and the principles to apply expert judgements is discussed in the paper. A framework to apply expert judgements is outlined. Further, the impacts of subjective estimates on the interpretation of PSA results are discussed. (orig.) (13 refs.)

  2. International Conference Automation : Challenges in Automation, Robotics and Measurement Techniques

    CERN Document Server

    Zieliński, Cezary; Kaliczyńska, Małgorzata

    2016-01-01

    This book presents the set of papers accepted for presentation at the International Conference Automation, held in Warsaw, 2-4 March of 2016. It presents the research results presented by top experts in the fields of industrial automation, control, robotics and measurement techniques. Each chapter presents a thorough analysis of a specific technical problem which is usually followed by numerical analysis, simulation, and description of results of implementation of the solution of a real world problem. The presented theoretical results, practical solutions and guidelines will be valuable for both researchers working in the area of engineering sciences and for practitioners solving industrial problems. .

  3. Automated power management and control

    Science.gov (United States)

    Dolce, James L.

    1991-01-01

    A comprehensive automation design is being developed for Space Station Freedom's electric power system. A joint effort between NASA's Office of Aeronautics and Exploration Technology and NASA's Office of Space Station Freedom, it strives to increase station productivity by applying expert systems and conventional algorithms to automate power system operation. The initial station operation will use ground-based dispatches to perform the necessary command and control tasks. These tasks constitute planning and decision-making activities that strive to eliminate unplanned outages. We perceive an opportunity to help these dispatchers make fast and consistent on-line decisions by automating three key tasks: failure detection and diagnosis, resource scheduling, and security analysis. Expert systems will be used for the diagnostics and for the security analysis; conventional algorithms will be used for the resource scheduling.

  4. Computer automation and artificial intelligence

    International Nuclear Information System (INIS)

    Rapid advances in computing, resulting from micro chip revolution has increased its application manifold particularly for computer automation. Yet the level of automation available, has limited its application to more complex and dynamic systems which require an intelligent computer control. In this paper a review of Artificial intelligence techniques used to augment automation is presented. The current sequential processing approach usually adopted in artificial intelligence has succeeded in emulating the symbolic processing part of intelligence, but the processing power required to get more elusive aspects of intelligence leads towards parallel processing. An overview of parallel processing with emphasis on transputer is also provided. A Fuzzy knowledge based controller for amination drug delivery in muscle relaxant anesthesia on transputer is described. 4 figs. (author)

  5. Unmet needs in automated cytogenetics

    International Nuclear Information System (INIS)

    Though some, at least, of the goals of automation systems for analysis of clinical cytogenetic material seem either at hand, like automatic metaphase finding, or at least likely to be met in the near future, like operator-assisted semi-automatic analysis of banded metaphase spreads, important areas of cytogenetic analsis, most importantly the determination of chromosomal aberration frequencies in populations of cells or in samples of cells from people exposed to environmental mutagens, await practical methods of automation. Important as are the clinical diagnostic applications, it is apparent that increasing concern over the clastogenic effects of the multitude of potentially clastogenic chemical and physical agents to which human populations are being increasingly exposed, and the resulting emergence of extensive cytogenetic testing protocols, makes the development of automation not only economically feasible but almost mandatory. The nature of the problems involved, and acutal of possible approaches to their solution, are discussed

  6. Manual versus automated blood sampling

    DEFF Research Database (Denmark)

    Teilmann, A C; Kalliokoski, Otto; Sørensen, Dorte B;

    2014-01-01

    corticosterone metabolites, and expressed more anxious behavior than did the mice of the other groups. Plasma corticosterone levels of mice subjected to tail blood sampling were also elevated, although less significantly. Mice subjected to automated blood sampling were less affected with regard to the parameters......Facial vein (cheek blood) and caudal vein (tail blood) phlebotomy are two commonly used techniques for obtaining blood samples from laboratory mice, while automated blood sampling through a permanent catheter is a relatively new technique in mice. The present study compared physiological parameters......, glucocorticoid dynamics as well as the behavior of mice sampled repeatedly for 24 h by cheek blood, tail blood or automated blood sampling from the carotid artery. Mice subjected to cheek blood sampling lost significantly more body weight, had elevated levels of plasma corticosterone, excreted more fecal...

  7. Network based automation for SMEs

    DEFF Research Database (Denmark)

    Shahabeddini Parizi, Mohammad; Radziwon, Agnieszka

    2016-01-01

    The implementation of appropriate automation concepts which increase productivity in Small and Medium Sized Enterprises (SMEs) requires a lot of effort, due to their limited resources. Therefore, it is strongly recommended for small firms to open up for the external sources of knowledge, which co......, this paper develops and discusses a set of guidelines for systematic productivity improvement within an innovative collaboration in regards to automation processes in SMEs.......The implementation of appropriate automation concepts which increase productivity in Small and Medium Sized Enterprises (SMEs) requires a lot of effort, due to their limited resources. Therefore, it is strongly recommended for small firms to open up for the external sources of knowledge, which...... could be obtained through network interaction. Based on two extreme cases of SMEs representing low-tech industry and an in-depth analysis of their manufacturing facilities this paper presents how collaboration between firms embedded in a regional ecosystem could result in implementation of new...

  8. Design automation for integrated circuits

    Science.gov (United States)

    Newell, S. B.; de Geus, A. J.; Rohrer, R. A.

    1983-04-01

    Consideration is given to the development status of the use of computers in automated integrated circuit design methods, which promise the minimization of both design time and design error incidence. Integrated circuit design encompasses two major tasks: error specification, in which the goal is a logic diagram that accurately represents the desired electronic function, and physical specification, in which the goal is an exact description of the physical locations of all circuit elements and their interconnections on the chip. Design automation not only saves money by reducing design and fabrication time, but also helps the community of systems and logic designers to work more innovatively. Attention is given to established design automation methodologies, programmable logic arrays, and design shortcuts.

  9. 76 FR 78930 - Guidance for Industry and Food and Drug Administration Staff; Enforcement Policy for Premarket...

    Science.gov (United States)

    2011-12-20

    ... Drug Administration (FDA) is announcing the availability of the guidance entitled ``Enforcement Policy... HUMAN SERVICES Food and Drug Administration Guidance for Industry and Food and Drug Administration Staff; Enforcement Policy for Premarket Notification Requirements for Certain In Vitro Diagnostic and...

  10. Crab Orchard National Wildlife Refuge : Law Enforcement Plan and Station Crowd Control Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Crab Orchard National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  11. Child Support Enforcement Annual Data Report Form 157 – YR 2014

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  12. Child Support Enforcement Annual Data Report Form 157 – YR 2010

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  13. Child Support Enforcement Annual Data Report Form 157 – Yrs. 2012 to 2014

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  14. Child Support Enforcement Annual Data Report Form 157 – YR 2013

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report for fiscal year 2013 from State agencies administering child support enforcement plans under Title IV-D...

  15. Child Support Enforcement Annual Data Report Form 157 – YR 2011

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  16. 76 FR 27355 - Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection and Application...

    Science.gov (United States)

    2011-05-11

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF JUSTICE Office of Justice Programs Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection... public, the ``Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection...

  17. 40 CFR 35.6150 - Activities eligible for funding under enforcement Cooperative Agreements.

    Science.gov (United States)

    2010-07-01

    ... enforcement Cooperative Agreements. 35.6150 Section 35.6150 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Cooperative Agreements and Superfund State Contracts for Superfund Response Actions Enforcement Cooperative Agreements §...

  18. 40 CFR 35.6155 - State, political subdivision or Indian Tribe-lead enforcement Cooperative Agreements.

    Science.gov (United States)

    2010-07-01

    ... Tribe-lead enforcement Cooperative Agreements. 35.6155 Section 35.6155 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Cooperative Agreements and Superfund State Contracts for Superfund Response Actions Enforcement Cooperative...

  19. Automated Podcasting System for Universities

    Directory of Open Access Journals (Sweden)

    Ypatios Grigoriadis

    2013-03-01

    Full Text Available This paper presents the results achieved at Graz University of Technology (TU Graz in the field of automating the process of recording and publishing university lectures in a very new way. It outlines cornerstones of the development and integration of an automated recording system such as the lecture hall setup, the recording hardware and software architecture as well as the development of a text-based search for the final product by method of indexing video podcasts. Furthermore, the paper takes a look at didactical aspects, evaluations done in this context and future outlook.

  20. Agile Data: Automating database refactorings

    Directory of Open Access Journals (Sweden)

    Bruno Xavier

    2014-09-01

    Full Text Available This paper discusses an automated approach to database change management throughout the companies’ development workflow. By using automated tools, companies can avoid common issues related to manual database deployments. This work was motivated by analyzing usual problems within organizations, mostly originated from manual interventions that may result in systems disruptions and production incidents. In addition to practices of continuous integration and continuous delivery, the current paper describes a case study in which a suggested pipeline is implemented in order to reduce the deployment times and decrease incidents due to ineffective data controlling.

  1. Design automation, languages, and simulations

    CERN Document Server

    Chen, Wai-Kai

    2003-01-01

    As the complexity of electronic systems continues to increase, the micro-electronic industry depends upon automation and simulations to adapt quickly to market changes and new technologies. Compiled from chapters contributed to CRC's best-selling VLSI Handbook, this volume covers a broad range of topics relevant to design automation, languages, and simulations. These include a collaborative framework that coordinates distributed design activities through the Internet, an overview of the Verilog hardware description language and its use in a design environment, hardware/software co-design, syst

  2. 2013 Chinese Intelligent Automation Conference

    CERN Document Server

    Deng, Zhidong

    2013-01-01

    Proceedings of the 2013 Chinese Intelligent Automation Conference presents selected research papers from the CIAC’13, held in Yangzhou, China. The topics include e.g. adaptive control, fuzzy control, neural network based control, knowledge based control, hybrid intelligent control, learning control, evolutionary mechanism based control, multi-sensor integration, failure diagnosis, and reconfigurable control. Engineers and researchers from academia, industry, and government can gain an inside view of new solutions combining ideas from multiple disciplines in the field of intelligent automation.   Zengqi Sun and Zhidong Deng are professors at the Department of Computer Science, Tsinghua University, China.

  3. 2013 Chinese Intelligent Automation Conference

    CERN Document Server

    Deng, Zhidong

    2013-01-01

    Proceedings of the 2013 Chinese Intelligent Automation Conference presents selected research papers from the CIAC’13, held in Yangzhou, China. The topics include e.g. adaptive control, fuzzy control, neural network based control, knowledge based control, hybrid intelligent control, learning control, evolutionary mechanism based control, multi-sensor integration, failure diagnosis, and reconfigurable control. Engineers and researchers from academia, industry, and government can gain an inside view of new solutions combining ideas from multiple disciplines in the field of intelligent automation. Zengqi Sun and Zhidong Deng are professors at the Department of Computer Science, Tsinghua University, China.

  4. Automated synthesis of sialylated oligosaccharides

    Directory of Open Access Journals (Sweden)

    Davide Esposito

    2012-09-01

    Full Text Available Sialic acid-containing glycans play a major role in cell-surface interactions with external partners such as cells and viruses. Straightforward access to sialosides is required in order to study their biological functions on a molecular level. Here, automated oligosaccharide synthesis was used to facilitate the preparation of this class of biomolecules. Our strategy relies on novel sialyl α-(2→3 and α-(2→6 galactosyl imidates, which, used in combination with the automated platform, provided rapid access to a small library of conjugation-ready sialosides of biological relevance.

  5. Toward designing for trust in database automation

    International Nuclear Information System (INIS)

    Appropriate reliance on system automation is imperative for safe and productive work, especially in safety-critical systems. It is unsafe to rely on automation beyond its designed use; conversely, it can be both unproductive and unsafe to manually perform tasks that are better relegated to automated tools. Operator trust in automated tools mediates reliance, and trust appears to affect how operators use technology. As automated agents become more complex, the question of trust in automation is increasingly important. In order to achieve proper use of automation, we must engender an appropriate degree of trust that is sensitive to changes in operating functions and context. In this paper, we present research concerning trust in automation in the domain of automated tools for relational databases. Lee and See have provided models of trust in automation. One model developed by Lee and See identifies three key categories of information about the automation that lie along a continuum of attributional abstraction. Purpose-, process-and performance-related information serve, both individually and through inferences between them, to describe automation in such a way as to engender r properly-calibrated trust. Thus, one can look at information from different levels of attributional abstraction as a general requirements analysis for information key to appropriate trust in automation. The model of information necessary to engender appropriate trust in automation [1] is a general one. Although it describes categories of information, it does not provide insight on how to determine the specific information elements required for a given automated tool. We have applied the Abstraction Hierarchy (AH) to this problem in the domain of relational databases. The AH serves as a formal description of the automation at several levels of abstraction, ranging from a very abstract purpose-oriented description to a more concrete description of the resources involved in the automated process

  6. Enforcement of occupational safety and health regulations in Nigeria: An exploration

    OpenAIRE

    Umeokafor, Nnedinma; Isaac, David; Jones, Keith; Umeadi, Boniface

    2014-01-01

    This paper examines the enforcement of occupational safety and health (OSH) regulations; it validates the state of enforcement of OSH regulations by extracting the salient issues that influence enforcement of OSH regulations in Nigeria. It’s the duty of the Federal Ministry of Labour and Productivity (Inspectorate Division) to enforce the Factories Act of 1990, while the Labour, Safety, Health and Welfare Bill of 2012 empowers the National Council for Occupational Safety and Health of Nigeria...

  7. 77 FR 42765 - Request of the U.S. Intellectual Property Enforcement Coordinator for Public Comments...

    Science.gov (United States)

    2012-07-20

    ... BUDGET Request of the U.S. Intellectual Property Enforcement Coordinator for Public Comments: Development of the Joint Strategic Plan on Intellectual Property Enforcement AGENCY: Office of the U.S. Intellectual Property Enforcement Coordinator, Executive Office of the President. ACTION: Request for...

  8. 32 CFR 635.15 - Release of law enforcement information furnished by foreign governments or international...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Release of law enforcement information furnished by foreign governments or international organizations. 635.15 Section 635.15 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Release...

  9. Professional Development: A Six-Year Data Evaluation of HIDTA Law Enforcement Task Force Training Programs

    Science.gov (United States)

    Burnett, Larry D.

    2012-01-01

    This is a nationwide six-year data study of law enforcement training and professional development in relationship to workplace productivity. Why do we care about law enforcement training and professional development? Because the law enforcement environment is not standing still. Unlawful activity, and in particular drug trafficking strategies,…

  10. 13 CFR 120.1400 - Grounds for enforcement actions-SBA Lenders.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Grounds for enforcement actions-SBA Lenders. 120.1400 Section 120.1400 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Enforcement Actions § 120.1400 Grounds for enforcement...

  11. 33 CFR 148.320 - How is a license enforced, suspended, or revoked?

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false How is a license enforced, suspended, or revoked? 148.320 Section 148.320 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF... enforced, suspended, or revoked? MARAD may enforce, suspend, or revoke a license under 33 U.S.C. 1507(c)....

  12. Automated Ply Inspection (API) for AFP Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Automated Ply Inspection (API) system autonomously inspects layups created by high speed automated fiber placement (AFP) machines. API comprises a high accuracy...

  13. Towards Automated System Synthesis Using SCIDUCTION

    OpenAIRE

    Jha, Susmit Kumar

    2011-01-01

    Automated synthesis of systems that are correct by construction has been a long-standing goal of computer science. Synthesis is a creative task and requires human intuition and skill. Its complete automation is currently beyond the capacity of programs that do automated reasoning. However, there is a pressing need for tools and techniques that can automate non-intuitive and error-prone synthesis tasks. This thesis proposes a novel synthesis approach to solve such tasks in the synthesis of pro...

  14. Automated activation-analysis system

    International Nuclear Information System (INIS)

    An automated delayed neutron counting and instrumental neutron activation analysis system has been developed at Los Alamos National Laboratory's Omega West Reactor (OWR) to analyze samples for uranium and 31 additional elements with a maximum throughput of 400 samples per day. The system and its mode of operation for a large reconnaissance survey are described

  15. Automation, Performance and International Competition

    DEFF Research Database (Denmark)

    Kromann, Lene; Sørensen, Anders

    This paper presents new evidence on trade‐induced automation in manufacturing firms using unique data combining a retrospective survey that we have assembled with register data for 2005‐2010. In particular, we establish a causal effect where firms that have specialized in product types for which ...

  16. Feasibility Analysis of Crane Automation

    Institute of Scientific and Technical Information of China (English)

    DONG Ming-xiao; MEI Xue-song; JIANG Ge-dong; ZHANG Gui-qing

    2006-01-01

    This paper summarizes the modeling methods, open-loop control and closed-loop control techniques of various forms of cranes, worldwide, and discusses their feasibilities and limitations in engineering. Then the dynamic behaviors of cranes are analyzed. Finally, we propose applied modeling methods and feasible control techniques and demonstrate the feasibilities of crane automation.

  17. Automation of Feynman diagram evaluations

    International Nuclear Information System (INIS)

    A C-program DIANA (DIagram ANAlyser) for the automation of Feynman diagram evaluations is presented. It consists of two parts: the analyzer of diagrams and the interpreter of a special text manipulating language. This language can be used to create a source code for analytical or numerical evaluations and to keep the control of the process in general

  18. Automated Clustering of Similar Amendments

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The Italian Senate is clogged by computer-generated amendments. This talk will describe a simple strategy to cluster them in an automated fashion, so that the appropriate Senate procedures can be used to get rid of them in one sweep.

  19. Automated visual inspection of textile

    DEFF Research Database (Denmark)

    Jensen, Rune Fisker; Carstensen, Jens Michael

    1997-01-01

    A method for automated inspection of two types of textile is presented. The goal of the inspection is to determine defects in the textile. A prototype is constructed for simulating the textile production line. At the prototype the images of the textile are acquired by a high speed line scan camera...

  20. Distribution system analysis and automation

    CERN Document Server

    Gers, Juan

    2013-01-01

    A comprehensive guide to techniques that allow engineers to simulate, analyse and optimise power distribution systems which combined with automation, underpin the emerging concept of the "smart grid". This book is supported by theoretical concepts with real-world applications and MATLAB exercises.

  1. Teacherbot: Interventions in Automated Teaching

    Science.gov (United States)

    Bayne, Sian

    2015-01-01

    Promises of "teacher-light" tuition and of enhanced "efficiency" via the automation of teaching have been with us since the early days of digital education, sometimes embraced by academics and institutions, and sometimes resisted as a set of moves which are damaging to teacher professionalism and to the humanistic values of…

  2. Automation, Labor Productivity and Employment

    DEFF Research Database (Denmark)

    Kromann, Lene; Rose Skaksen, Jan; Sørensen, Anders

    CEBR fremlægger nu den første rapport i AIM-projektet. Rapporten viser, at der er gode muligheder for yderligere automation i en stor del af de danske fremstillingsvirksomheder. For i dag er gennemsnitligt kun omkring 30 % af virksomhedernes produktionsprocesser automatiserede. Navnlig procesområ...

  3. Adaptation : A Partially Automated Approach

    NARCIS (Netherlands)

    Manjing, Tham; Bukhsh, F.A.; Weigand, H.

    2014-01-01

    This paper showcases the possibility of creating an adaptive auditing system. Adaptation in an audit environment need human intervention at some point. Based on a case study this paper focuses on automation of adaptation process. It is divided into solution design and validation parts. The artifact

  4. Automation of Space Inventory Management

    Science.gov (United States)

    Fink, Patrick W.; Ngo, Phong; Wagner, Raymond; Barton, Richard; Gifford, Kevin

    2009-01-01

    This viewgraph presentation describes the utilization of automated space-based inventory management through handheld RFID readers and BioNet Middleware. The contents include: 1) Space-Based INventory Management; 2) Real-Time RFID Location and Tracking; 3) Surface Acoustic Wave (SAW) RFID; and 4) BioNet Middleware.

  5. Automation; The New Industrial Revolution.

    Science.gov (United States)

    Arnstein, George E.

    Automation is a word that describes the workings of computers and the innovations of automatic transfer machines in the factory. As the hallmark of the new industrial revolution, computers displace workers and create a need for new skills and retraining programs. With improved communication between industry and the educational community to…

  6. Role of professional organizations in setting and enforcing ethical norms.

    Science.gov (United States)

    Perlis, Clifford; Shannon, Noah

    2012-01-01

    Self-regulating professions have historically used codes of conduct and codes of ethics to clarify the responsibilities of members to those they serve and to one another. These codes play an important role in safeguarding the professions' autonomy and in articulating standards for the profession. In medicine, many individual medical specialty associations, including the American Academy of Dermatology, maintain their own codes of ethics. These codes serve multiple purposes, including setting standards for the profession, educating members on their professional obligations, and communicating these standards to the public. They also generally provide a framework for enforcing code violations. The effectiveness of enforcement, however, may vary because of a code's specificity and because of limitations in sanctions available to the code's governing body. PMID:22330658

  7. A Logical Method for Policy Enforcement over Evolving Audit Logs

    CERN Document Server

    Garg, Deepak; Datta, Anupam

    2011-01-01

    We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Privacy Rule. The logic has three features that raise challenges for enforcement --- uninterpreted predicates (used to model subjective concepts in privacy policies), real-time temporal properties, and quantification over infinite domains (such as the set of messages containing personal information). The algorithm operates over audit logs that are inherently incomplete and evolve over time. In each iteration, the algorithm provably checks as much of the policy as possible over the current log and outputs a residual policy that can only be checked when the log is extended with additional information. We prove correctness and termination properties of the algorithm. While these results are developed in a general form, accounting for many different sources of incompleteness in audit logs, we also prove that for the special case of logs that m...

  8. The Changing Role of Women in Twentieth Century Law Enforcement.

    Science.gov (United States)

    Hatteberg, Stephanie Roy; And Others

    A review of 44 studies and references on women in police work showed that for a long time women who had gained access to employment in law enforcement did so only in a very limited sense. It was not until the 1960s that women began to be assimilated fully into the ranks of patrol officers for the first time. With the passage of Title VII of the…

  9. The Patent Troll Business: An Efficient model to enforce IPR?

    OpenAIRE

    Pohlmann, Tim; Opitz, Marieke

    2010-01-01

    Patent trolls have many faces, since the media uses this expression in various ways. The patent troll phenomenon thus seems to be an ambiguous term that is discussed in several directions. This paper reveals that a patent troll as such has no distinct shape or appearance. Our analysis redeems a troll classification solely from firms’ market position, such as being non-practicing, and shows that a patent troll business can only be defined by the respective activities to enforce IPR. Using 1...

  10. Competition Law Enforcement in Malaysia: Some Recent Developments

    OpenAIRE

    Lee, Cassey

    2014-01-01

    The enactment of the Competition Act 2010 represents a significant progress in the implementation of competition policy in Malaysia. The Malaysian Competition Commission has been fairly successful in its enforcement activities especially in price fixing cases involving trade associations. It has also investigated and issued proposed decisions in a number of high profile cases involving Malaysian Airlines, AirAsia, and Megasteel. Future challenges are likely to involve investigation of more co...

  11. (Self-) Enforcement of Joint Implementation and Clean Development Mechanism Contracts

    OpenAIRE

    Josef Janssen

    1999-01-01

    International climate protection investments (Joint Implementation and Clean Development Mechanism projects) are burdened with problems of contract enforcement, which prevent the realisation of efficiency gains associated with these investments. The paper analyses this problem from the perspective of non-cooperative game theory and proposes two different solutions to the co-operation problem. The first analyses the potential role of national environmental authorities in facilitating credible ...

  12. "Contract Enforcement in the Early Transition to a Market Economy."

    OpenAIRE

    Jeffrey B Miller; Kenneth Koford

    2005-01-01

    How were contracts among firms enforced in the early phase of a transition economy when firms lacked experience with commercial contracts or legal procedures? What were their views of their new business environment? We interviewed a sample of Bulgarian firms, including private, state-owned and cooperative firms in 1994. Consistent with Williamson’s (1994) theories, complex contracts were quite limited, sometimes implying the breakdown of important markets, but we also found that even spot-mar...

  13. Study on Game Theory of Social Law Enforcement

    Institute of Scientific and Technical Information of China (English)

    张国臣; 黎志成

    2003-01-01

    Based on the basis of the two-stage dynamic game of complete information and purely tactful perfect equilibrium theory, the non-cooperative gaming between the police department and the criminals is analyzed. Dynamic game can be proved to forecast and explain potential tactful choices of the police department and the criminals at various stages, so as to analyze the essence of the law enforcement by the theoretical models.

  14. Endogenous Enforcement and Effectiveness of China's Pollution Levy System

    OpenAIRE

    WANG Hua; Wheeler, David

    2000-01-01

    The authors investigate two aspects of China's pollution levy system, which was first implemented about 20 years ago. First, they analyze what determines differences in enforcement of the pollution levy in various urban areas. They find that collection of the otherwise uniform pollution levy is sensitive to differences in economic development and environmental quality. Air and water pollution levies are higher in areas that are heavily polluted. Second, they analyze the impact of pollution ch...

  15. Judicial Enforcement of Economic, Social and Cultural Right

    OpenAIRE

    Aulona Haxhiraj

    2013-01-01

    Economic, social and cultural right (“social right”) have historically been viewed as distinct in natyre and scope from civil and political right. Rather than being viewed as judicially enforceable rights of immeadiate application, such rights have widely been considered non-justiciable programmatic goals to be archieved progressively within available resources, through political processes. The purpose of this paper is to provide the legal and analytical tools to understand why this dichotomy...

  16. Requirements Development for Interoperability Simulation Capability for Law Enforcement

    Energy Technology Data Exchange (ETDEWEB)

    Holter, Gregory M.

    2004-05-19

    The National Counterdrug Center (NCC) was initially authorized by Congress in FY 1999 appropriations to create a simulation-based counterdrug interoperability training capability. As the lead organization for Research and Analysis to support the NCC, the Pacific Northwest National Laboratory (PNNL) was responsible for developing the requirements for this interoperability simulation capability. These requirements were structured to address the hardware and software components of the system, as well as the deployment and use of the system. The original set of requirements was developed through a process of conducting a user-based survey of requirements for the simulation capability, coupled with an analysis of similar development efforts. The user-based approach ensured that existing concerns with respect to interoperability within the law enforcement community would be addressed. Law enforcement agencies within the designated pilot area of Cochise County, Arizona, were surveyed using interviews and ride-alongs during actual operations. The results of this survey were then accumulated, organized, and validated with the agencies to ensure the accuracy of the results. These requirements were then supplemented by adapting operational requirements from existing systems to ensure system reliability and operability. The NCC adopted a development approach providing incremental capability through the fielding of a phased series of progressively more capable versions of the system. This allowed for feedback from system users to be incorporated into subsequent revisions of the system requirements, and also allowed the addition of new elements as needed to adapt the system to broader geographic and geopolitical areas, including areas along the southwest and northwest U.S. borders. This paper addresses the processes used to develop and refine requirements for the NCC interoperability simulation capability, as well as the response of the law enforcement community to the use of

  17. Why Enforcing Corporate Social Responsibility (CSR) is Morally Questionable

    OpenAIRE

    Masaka, Dennis

    2008-01-01

    Docketed literature on Corporate Social Responsibility (CSR) exhibits heated contentions on the nature of business-society relations. This paper seeks to explore this contentious issue in the light of contemporary incorporation of CSR in business strategic plans. It notes that enforcing CSR on business might lead to its manipulation to advance corporate organisations’ purely self-interested ends rather than pursuing intrinsic philanthropic activities for the good of society. An insig...

  18. ENFORCING ARBITRAL AWARDS IN ROMANIA - ALWAYS A CHALLENGE

    OpenAIRE

    Paul COMŞA

    2015-01-01

    Securing a favourable award from a foreign or domestic arbitral court proves to be in many cases only half the battle. As a rule, Romanian law and courts acknowledge the final, binding and enforceable nature of arbitration awards and state the principle that arbitration awards shall be freely implemented by parties. However, there are instances where the unsuccessful party does not voluntarily perform the obligations arising from the arbitral award. In these cases, before incurring legal expe...

  19. Exploring and Enforcing Application Security Guarantees vis Program Dependence

    OpenAIRE

    Johnson, Andrew; Waye, Lucas Reed; Moore, Scott David; Chong, Stephen N

    2014-01-01

    We present Pidgin, a program analysis and understanding tool that allows developers to explore the information flows that exist in programs and specify and enforce security policies that restrict these information flows. Pidgin uses program-dependence graphs (PDGs) to precisely capture the information flows within a program. PDGs can be queried using a custom query language to explore and describe information flows in programs. A developer can specify strong information security policies by a...

  20. Policy Enforcing and Revoking Mechanism on Trusted Ad Hoc Networks

    OpenAIRE

    Sujatha J; Mr. Manoj Challa

    2013-01-01

    In ad hoc networking the polices are vulnerable to a wide range of security in network attacks.The design of enforcing and revoking policy mechanisms is a challenging task, especially in comparison tosecuring the ad hoc network. In this paper, the designed and implemented mechanism to provide a trustedcommunication for file sharing in ad-hoc network is explained, where the mechanism has been developedwith the help of polices where each policy is a combination of set of parameters. Simulation ...

  1. How traffic law enforcement can contribute to safer roads.

    OpenAIRE

    Adminaite, D. Jost, G. Stipdonk, H. & Ward, H.

    2016-01-01

    Exceeding speed limits, drink or distracted driving and failure to wear a seat belt are still the leading causes of death and serious injury on European roads. Despite legislation designed to prevent all four, many drivers involved in fatal traffic collisions clearly failed to comply with one or more road traffic laws at the time of their collision. Improvements in traffic law enforcement should be part of an integrated road safety policy and have been shown to lead to rapid reductions in dea...

  2. Enforcing Privacy for Teenagers in Online Inquiry Learning Spaces

    OpenAIRE

    Na LI; Holzer, Adrian; Govaerts, Sten; Gillet, Denis

    2014-01-01

    In the Go-Lab European project, we are investigating an online lab portal that enables students to perform personalized scientific experiments with online labs. To protect sensitive student data, such as user activity data and learning preferences, this paper presents a classroom-like pseudonymity approach that fulfills the specific requirements of the Go-Lab portal: (1) enforcing student privacy, (2) enabling personalization, and (3) providing a teenager-friendly design.

  3. Enforcing patents in the era of 3D printing

    DEFF Research Database (Denmark)

    Ballardini, Rosa Maria; Norrgård, Marcus; Minssen, Timo

    2015-01-01

    This article explores relevant laws and doctrines of patent infringement in Europe with a special emphasis on 3D printing (3DP) technologies. Considering the difficulties that patent owners might face in pursuing direct patent infringement actions in the rapidly evolving era of 3DP, we suggest...... of IP law. Enforcing patents in the era of 3D printing Rosa Maria Ballardini, Marcus Norrgård, and Timo Minssen Journal of Intellectual Property Law & Practice 2015 10: 850-866...

  4. Illinois: Library Automation and Connectivity Initiatives.

    Science.gov (United States)

    Lamont, Bridget L.; Bloomberg, Kathleen L.

    1996-01-01

    Discussion of library automation in Illinois focuses on ILLINET, the Illinois Library and Information Network. Topics include automated resource sharing; ILLINET's online catalog; regional library system automation; community networking and public library technology development; telecommunications initiatives; electronic access to state government…

  5. You're a What? Automation Technician

    Science.gov (United States)

    Mullins, John

    2010-01-01

    Many people think of automation as laborsaving technology, but it sure keeps Jim Duffell busy. Defined simply, automation is a technique for making a device run or a process occur with minimal direct human intervention. But the functions and technologies involved in automated manufacturing are complex. Nearly all functions, from orders coming in…

  6. PROGRESSIVE LAW ENFORCEMENT TOWARDS HUMAN RIGHTS VIOLATION IN KOTA KUPANG

    Directory of Open Access Journals (Sweden)

    Joni Efraim Liunima

    2016-01-01

    Full Text Available Copyright is creator intellectual wealth so it needs to be protected by the State as a form of responsibility. Responding that problem comes into the world Law Number 28 Year 2014 concerning Copyrights and all violations in UUHC is formulated as delict complaint. Consequence of delict complaint is not all of copyright violations can be asked for the responsibility because law agencies are passive and limited by space and time. Answering that jurisdictional problem then researcher used empirical law research method. The result showed that civil servants investigator (PPNS Kanwil Kemenkumham NTT and also Kupang Kota Police Resort have done progressive step such as appealing, warning, calling, making statement, stocktaking and confiscation whereas the obstacle factor of progressive law enforcement is knowledge, mindset and in the formula of UUHC there is no section which formulate what the step can be done if criminal matters happen so the suggestions given is law enforcement agencies need an explanation about progressive law enforcement and it is better if in UUHC need to be formulated a step which will be taken if criminal matters happen

  7. Judicial Enforcement of Economic, Social and Cultural Right

    Directory of Open Access Journals (Sweden)

    Aulona Haxhiraj

    2013-07-01

    Full Text Available Economic, social and cultural right (“social right” have historically been viewed as distinct in natyre and scope from civil and political right. Rather than being viewed as judicially enforceable rights of immeadiate application, such rights have widely been considered non-justiciable programmatic goals to be archieved progressively within available resources, through political processes. The purpose of this paper is to provide the legal and analytical tools to understand why this dichotomy is false. The paper will consider the international normative framework for the legal protection of social rights, the specific content of state obligations under treaties dealing with such rights, how the international social rights monitoring system functions, and the various obstacles and opportunities currently facing the judicial enforceability of social rights. In every society there is violation which implies its citizen not get proper social right, economical right and cultural right. Proper implementation and adoption of judicial enforcement can reduce this violation rate and established social peace. Step mentioned in the above might not perfect but it might be small starting and ensure social, culture & economical right for the people living in the society.

  8. An Overview of Moonlight Applications Test Automation

    Directory of Open Access Journals (Sweden)

    Appasami Govindasamy

    2010-09-01

    Full Text Available Now-a-days web applications are developed by new technologies like Moonlight, Silverlight, JAVAFX, FLEX, etc. Silverlight is Microsoft's cross platform runtime and development technology for running Web-based multimedia applications in windows platform. Moonlight is an open-source implementation of the Silverlight development platform for Linux and other Unix/X11-based operating systems. It is a new technology in .Net 4.0 to develop rich interactive and attractive platform independent web applications. User Interface Test Automation is very essential for Software industries to reduce test time, cost and man power. Moonlight is new .NET technology to develop rich interactive Internet applications with the collaboration of Novel Corporation. Testing these kinds of applications are not so easy to test, especially the User interface test automation is very difficult. Software test automation has the capability to decrease the overall cost of testing and improve software quality, but most testing organizations have not been able to achieve the full potential of test automation. Many groups that implement test automation programs run into a number of common pitfalls. These problems can lead to test automation plans being completely scrapped, with the tools purchased for test automation becoming expensive. Often teams continue their automation effort, burdened with huge costs in maintaining large suites of automated test scripts. This paper will first discuss some of the key benefits of software test automation, and then examine the most common techniques used to implement software test automation of Moonlight Applications Test Automation. It will then discuss test automation and their potential. Finally, it will do test automation.

  9. Automated methods of corrosion measurement

    DEFF Research Database (Denmark)

    Andersen, Jens Enevold Thaulov; Bech-Nielsen, Gregers; Reeve, John Ch;

    1997-01-01

    Measurements of corrosion rates and other parameters connected with corrosion processes are important, first as indicators of the corrosion resistance of metallic materials and second because such measurements are based on general and fundamental physical, chemical, and electrochemical relations....... Hence improvements and innovations in methods applied in corrosion research are likeliy to benefit basic disciplines as well. A method for corrosion measurements can only provide reliable data if the beckground of the method is fully understood. Failure of a method to give correct data indicates a need...... to revise assumptions regarding the basis of the method, which sometimes leads to the discovery of as-yet unnoticed phenomena. The present selection of automated methods for corrosion measurements is not motivated simply by the fact that a certain measurement can be performed automatically. Automation...

  10. CCD characterization and measurements automation

    International Nuclear Information System (INIS)

    Modern mosaic cameras have grown both in size and in number of sensors. The required volume of sensor testing and characterization has grown accordingly. For camera projects as large as the LSST, test automation becomes a necessity. A CCD testing and characterization laboratory was built and is in operation for the LSST project. Characterization of LSST study contract sensors has been performed. The characterization process and its automation are discussed, and results are presented. Our system automatically acquires images, populates a database with metadata information, and runs express analysis. This approach is illustrated on 55Fe data analysis. 55Fe data are used to measure gain, charge transfer efficiency and charge diffusion. Examples of express analysis results are presented and discussed.

  11. Automated nanomanipulation for nanodevice construction

    International Nuclear Information System (INIS)

    Nanowire field-effect transistors (nano-FETs) are nanodevices capable of highly sensitive, label-free sensing of molecules. However, significant variations in sensitivity across devices can result from poor control over device parameters, such as nanowire diameter and the number of electrode-bridging nanowires. This paper presents a fabrication approach that uses wafer-scale nanowire contact printing for throughput and uses automated nanomanipulation for precision control of nanowire number and diameter. The process requires only one photolithography mask. Using nanowire contact printing and post-processing (i.e. nanomanipulation inside a scanning electron microscope), we are able to produce devices all with a single-nanowire and similar diameters at a speed of ∼1 min/device with a success rate of 95% (n = 500). This technology represents a seamless integration of wafer-scale microfabrication and automated nanorobotic manipulation for producing nano-FET sensors with consistent response across devices. (paper)

  12. DOLFIN: Automated Finite Element Computing

    CERN Document Server

    Logg, Anders; 10.1145/1731022.1731030

    2011-01-01

    We describe here a library aimed at automating the solution of partial differential equations using the finite element method. By employing novel techniques for automated code generation, the library combines a high level of expressiveness with efficient computation. Finite element variational forms may be expressed in near mathematical notation, from which low-level code is automatically generated, compiled and seamlessly integrated with efficient implementations of computational meshes and high-performance linear algebra. Easy-to-use object-oriented interfaces to the library are provided in the form of a C++ library and a Python module. This paper discusses the mathematical abstractions and methods used in the design of the library and its implementation. A number of examples are presented to demonstrate the use of the library in application code.

  13. Automated illustration of patients instructions.

    Science.gov (United States)

    Bui, Duy; Nakamura, Carlos; Bray, Bruce E; Zeng-Treitler, Qing

    2012-01-01

    A picture can be a powerful communication tool. However, creating pictures to illustrate patient instructions can be a costly and time-consuming task. Building on our prior research in this area, we developed a computer application that automatically converts text to pictures using natural language processing and computer graphics techniques. After iterative testing, the automated illustration system was evaluated using 49 previously unseen cardiology discharge instructions. The completeness of the system-generated illustrations was assessed by three raters using a three-level scale. The average inter-rater agreement for text correctly represented in the pictograph was about 66 percent. Since illustration in this context is intended to enhance rather than replace text, these results support the feasibility of conducting automated illustration.

  14. Automated medical image segmentation techniques

    OpenAIRE

    Sharma Neeraj; Aggarwal Lalit

    2010-01-01

    Accurate segmentation of medical images is a key step in contouring during radiotherapy planning. Computed topography (CT) and Magnetic resonance (MR) imaging are the most widely used radiographic techniques in diagnosis, clinical studies and treatment planning. This review provides details of automated segmentation methods, specifically discussed in the context of CT and MR images. The motive is to discuss the problems encountered in segmentation of CT and MR images, and the relative merits ...

  15. Automated Periodontal Diseases Classification System

    OpenAIRE

    Aliaa A. A. Youssif; Abeer Saad Gawish,; Mohammed Elsaid Moussa

    2012-01-01

    This paper presents an efficient and innovative system for automated classification of periodontal diseases, The strength of our technique lies in the fact that it incorporates knowledge from the patients' clinical data, along with the features automatically extracted from the Haematoxylin and Eosin (H&E) stained microscopic images. Our system uses image processing techniques based on color deconvolution, morphological operations, and watershed transforms for epithelium & connective tissue se...

  16. Home automation in the workplace.

    Science.gov (United States)

    McCormack, J E; Tello, S F

    1994-01-01

    Environmental control units and home automation devices contribute to the independence and potential of individuals with disabilities, both at work and at home. Devices currently exist that can assist people with physical, cognitive, and sensory disabilities to control lighting, appliances, temperature, security, and telephone communications. This article highlights several possible applications for these technologies and discusses emerging technologies that will increase the benefits these devices offer people with disabilities. PMID:24440955

  17. Small Business Innovations (Automated Information)

    Science.gov (United States)

    1992-01-01

    Bruce G. Jackson & Associates Document Director is an automated tool that combines word processing and database management technologies to offer the flexibility and convenience of text processing with the linking capability of database management. Originally developed for NASA, it provides a means to collect and manage information associated with requirements development. The software system was used by NASA in the design of the Assured Crew Return Vehicle, as well as by other government and commercial organizations including the Southwest Research Institute.

  18. Automated Scheduling Via Artificial Intelligence

    Science.gov (United States)

    Biefeld, Eric W.; Cooper, Lynne P.

    1991-01-01

    Artificial-intelligence software that automates scheduling developed in Operations Mission Planner (OMP) research project. Software used in both generation of new schedules and modification of existing schedules in view of changes in tasks and/or available resources. Approach based on iterative refinement. Although project focused upon scheduling of operations of scientific instruments and other equipment aboard spacecraft, also applicable to such terrestrial problems as scheduling production in factory.

  19. System of automated map design

    International Nuclear Information System (INIS)

    Preprint 'System of automated map design' contains information about the program shell for construction of territory map, performing level line drawing of arbitrary two-dimension field (in particular, the radionuclide concentration field). The work schedule and data structures are supplied, as well as data on system performance. The preprint can become useful for experts in radioecology and for all persons involved in territory pollution mapping or multi-purpose geochemical mapping. (author)

  20. Method development in automated mineralogy

    OpenAIRE

    Sandmann, Dirk

    2015-01-01

    The underlying research that resulted in this doctoral dissertation was performed at the Division of Economic Geology and Petrology of the Department of Mineralogy, TU Bergakademie Freiberg between 2011 and 2014. It was the primary aim of this thesis to develop and test novel applications for the technology of ‘Automated Mineralogy’ in the field of economic geology and geometallurgy. A “Mineral Liberation Analyser” (MLA) instrument of FEI Company was used to conduct most analytical studies. T...

  1. GUI test automation with SWTBot

    OpenAIRE

    Mazurkiewicz, Milosz

    2010-01-01

    In this thesis the author presents theoretical background of GUI test automation as well as technologies, tools and methodologies required to fully understand the test program written in SWTBot. Practical part of the thesis was to implement a program testing File Menu options of Pegasus RCP application developed in Nokia Siemens Networks. Concluding this dissertation, in the author’s opinion test programs written using SWTBot are relatively easy to read and intuitive for people familiar w...

  2. Automated minimax design of networks

    DEFF Research Database (Denmark)

    Madsen, Kaj; Schjær-Jacobsen, Hans; Voldby, J

    1975-01-01

    A new gradient algorithm for the solution of nonlinear minimax problems has been developed. The algorithm is well suited for automated minimax design of networks and it is very simple to use. It compares favorably with recent minimax and leastpth algorithms. General convergence problems related...... to minimax design of networks are discussed. Finally, minimax design of equalization networks for reflectiontype microwave amplifiers is carried out by means of the proposed algorithm....

  3. Adaptation: A Partially Automated Approach

    OpenAIRE

    Manjing, Tham; Bukhsh, F.A.; Weigand, H.

    2014-01-01

    This paper showcases the possibility of creating an adaptive auditing system. Adaptation in an audit environment need human intervention at some point. Based on a case study this paper focuses on automation of adaptation process. It is divided into solution design and validation parts. The artifact design is developed around import procedures of M-company. An overview of the artefact is discussed in detail to fully describes the adaptation mechanism with automatic adjustment for compliance re...

  4. Citizen suit Clean Air Act enforcement: An update

    Energy Technology Data Exchange (ETDEWEB)

    Wright, W.G. Jr.

    1999-07-01

    Almost every federal environmental statute has a provision that allows citizens to sue violators in lieu of governmental enforcement authorities under certain circumstances. Generally, if the relevant governmental enforcement authority was not deemed to be diligently prosecuting enforcement action against an alleged violator and certain procedural requirements were met a citizens suit could be filed in federal court. If a violation was proved penalties could be assessed against the violator and the plaintiff citizen could receive reimbursement of both his or her attorney's fees and other expenses. Historically, however, the only federal statute that has been the subject of significant citizens suit activity has been the federal Clean Water Act (CWA). This paper will explore a variety of events that are expected to significantly increase the number of citizen suits CAA permitted facilities will face over the next ten years. The paper will briefly address the role the Title V operating permit will play. It will also include a discussion of how this permit will now encompass specific emission limitations along with a mandate to report exceedances. Further, and equally important, will be the role of the 1997 federal Environmental Protection Agency any credible evidence rule which potentially broadens the type, amount, and accessibility available to a CAA citizen suit plaintiff. This rule along with the additional monitoring data that will be generated by the Title V periodic and compliance assurance monitoring requirements will be an issue. Two important CAA citizen suits will be discussed which illustrate the potential role of credible evidence. Also, recent citizen suit decisions involving other federal environmental statutes with implications for the CAA will be examined. Further, the paper will provide some thoughts on how facilities can protect themselves to the extent possible against citizen suits.

  5. Forensic drug intelligence: an important tool in law enforcement.

    Science.gov (United States)

    Esseiva, Pierrre; Ioset, Sylvain; Anglada, Frédéric; Gasté, Laëtitia; Ribaux, Olivier; Margot, Pierre; Gallusser, Alain; Biedermann, Alex; Specht, Yves; Ottinger, Edmond

    2007-04-11

    Organised criminality is a great concern for national/international security. The demonstration of complex crimes is increasingly dependant on knowledge distributed within law-enforcement agencies and scientific disciplines. This separation of knowledge creates difficulties in reconstructing and prosecuting such crimes. Basic interdisciplinary research in drug intelligence combined with crime analysis, forensic intelligence, and traditional law enforcement investigation is leading to important advances in crime investigation support. Laboratory results constitute one highly dependable source of information that is both reliable and testable. Their operational use can support investigation and even provide undetected connections or organisation of structure. The foremost difficulties encountered by drug analysts are not principally of a chemical or analytical nature, but methodologies to extract parameters or features that are deemed to be crucial for handling and contextualising drug profiling data. An organised memory has been developed in order to provide accurate, timely, useful and meaningful information for linking spatially and temporally distinct events on a national and international level (including cross-border phenomena). Literature has already pointed out that forensic case data are amenable for use in an intelligence perspective if data and knowledge of specialised actors are appropriately organised, shared and processed. As a particular form of forensic case data, the authors' research focuses on parameters obtained through the systematic physical and chemical profiling of samples of illicit drugs. The procedure is used to infer and characterise links between samples that originate from the same and different seizures. The discussion will not, however, focus on how samples are actually analysed and compared as substantial literature on this topic already exists. Rather, attention is primarily drawn to an active and close collaboration between

  6. Assessing peak aerobic capacity in Dutch law enforcement officers

    Directory of Open Access Journals (Sweden)

    Harriet Wittink

    2015-06-01

    Full Text Available Objectives: To cross-validate the existing peak rate of oxygen consumption (VO2peak prediction equations in Dutch law enforcement officers and to determine whether these prediction equations can be used to predict VO2peak for groups and in a single individual. A further objective was to report normative absolute and relative VO2peak values of a sample of law enforcement officers in the Netherlands. Material and Methods: The peak rate of oxygen consumption (ml×kg–1×min–1 was measured using a maximal incremental bicycle test in 1530 subjects, including 1068 male and 461 female police officers. Validity of the prediction equations for groups was assessed by comparing predicted VO2peak with measured VO2peak using paired t-tests. For individual differences limits of agreement (LoA were calculated. Equations were considered valid for individuals when the difference between measured and predicted VO2peak did not exceed ±1 metabolic equivalent (MET in 95% of individuals. Results: None of the equations met the validity criterion of 95% of individuals having ±1 MET difference or less than the measured value. Limits of agreement (LoAs were large in all predictions. At the individual level, none of the equations were valid predictors of VO2peak (ml×kg–1×min–1. Normative values for Dutch law enforcement officers were presented. Conclusions: Substantial differences between measured and predicted VO2peak (ml×kg–1×min–1 were found. Most tested equations were invalid predictors of VO2peak at group level and all were invalid at individual levels.

  7. Applications for mini VTOL UAV for law enforcement

    Science.gov (United States)

    Murphy, Douglas W.; Cycon, James

    1999-01-01

    Remotely operated vehicle systems, ground and air, have great potential for supporting law enforcement operations. These systems with their onboard sensors, can assist in collecting evidence, performing long-term surveillance or in assessing hazardous situations prior to committing personnel. Remote ground vehicles are presently used by many police departments for ordnance clearing missions. Unmanned ground vehicles (UGVs) typically offer long endurance, and are intuitive to operate, but can be severely limited in where they can go by terrain and obstacles. Unmanned air vehicles (UAVs) have 3-D mobility, but have landing and takeoff restrictions, mission time limitations, and typically are demanding to operate. A new capability has been demonstrated for the U.S. military that shows great promise for aiding police agencies. This concept uses a shrouded rotor, vertical take off and landing (VTOL), an unmanned air vehicle to provide mobility to sensors and other payloads. This system can either perform surveillance from the air or travel to a remote location and land to position onboard sensors to perform long-term surveillance from the ground. This mobility platform concept can also be used to position packages (e.g., communications repeaters) or deliver and deploy non-lethal agents. This paper presents the concept of a small, UAV, VTOL, sensor mobility system for support of law enforcement operations. It then discusses operational feasibility and briefly reviews demonstrations of surveillance and sensor placement operations in military urban terrain scenarios performed by the Space and Naval Warfare (SPAWAR) Systems Center San Diego (SSCSD) and Sikorsky Aircraft with their full-size Cypher UAV. We then discuss the practicality of reducing the size of this capability to a system small enough to be transported in standard police vehicles and which can be easily operated by law enforcement personnel.

  8. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    Science.gov (United States)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  9. Privacy Enforcement in a Cost-Effective Smart Grid

    DEFF Research Database (Denmark)

    Mikkelsen, Søren Aagaard

    In this technical report we present the current state of the research conducted during the first part of the PhD period. The PhD thesis “Privacy Enforcement in a Cost-Effective Smart Grid” focuses on ensuring privacy when generating market for energy service providers that develop web services...... for the residential domain in the envisaged smart grid. The PhD project is funded and associated to the EU project “Energy Demand Aware Open Services for Smart Grid Intelligent Automation” (Smart HG) and therefore introduces the project on a system-level. Based on this, we present some of the integration, security...

  10. REDISAIN FAX COURT IN THE ENFORCEMENT FOR TAX LAW FRAMEWORK

    OpenAIRE

    Muhammad Djafar Saidi; Ruslan Hambali; Muchsin Salnia; Eka Merdekawati Djafar

    2013-01-01

    The research located at legal region of municipality of Jakarta, with considered that tax court include in ministry of finance of Indonesia republic and court of law of Indonesia republic are located in Jakarta. Tax court include in manistry of finance of Indonesia republik and court of law of Indonesia republic were expected to have relation to efforts in design the tax court in the enforcement of tax law framewark. The aim of the research are 1) to identify the position of tax court in Indo...

  11. Averting Regulatory Enforcement: Evidence from New Source Review

    Energy Technology Data Exchange (ETDEWEB)

    Keohane, N.O.; Mansur, E.T.; Voynov, A. [Yale University, New York, NY (USA)

    2009-09-15

    This paper explores firms' response to regulatory enforcement. New Source Review (NSR), a provision of the Clean Air Act, imposes stringent emissions limitations on significantly modified older power plants. In 1999, the Environmental Protection Agency (EPA) sued owners of 46 plants for NSR violations. We study how electricity companies respond to both the perceived threat of future action, and the action itself. A discrete choice model estimates plants likelihood of being named in lawsuits increases with large historic emissions and investments. On the eve of the lawsuits, emissions at plants with a one standard deviation greater probability of being sued fell approximately 10%.

  12. Children's Norm Enforcement in Their Interactions With Peers

    OpenAIRE

    Köymen, Bahar; Lieven, Elena; Denis A Engemann; Rakoczy, Hannes; Warneken, Felix; Tomasello, Michael

    2014-01-01

    This study investigates how children negotiate social norms with peers. In Study 1, 48 pairs of 3- and 5-year-olds (N = 96) and in Study 2, 48 pairs of 5- and 7-year-olds (N = 96) were presented with sorting tasks with conflicting instructions (one child by color, the other by shape) or identical instructions. Three-year-olds differed from older children: They were less selective for the contexts in which they enforced norms, and they (as well as the older children to a lesser extent) used gr...

  13. Enforcing Margin Squeeze Ex Post Across Converging Telecommunications Markets

    DEFF Research Database (Denmark)

    Bergqvist, Christian; Townsend, John

    A margin squeeze is an exclusionary abuse which occurs when a vertically Integrated telecoms operator creates a disparity between upstream and downstream prices with the intention of squeezing an access competitor’s profits. The purpose of such pricing is either to increase the latter’s entry costs...... and innovation present both theoretical and practical difficulties for assessing “muddled margins” on telecoms markets. New and different enforcement approaches to exclusion will have to be formulated within the Article 102 framework and tested in the Courts. This may even require abstaining from applying...

  14. Laboratory automation and LIMS in forensics

    DEFF Research Database (Denmark)

    Stangegaard, Michael; Hansen, Anders Johannes; Morling, Niels

    2013-01-01

    Implementation of laboratory automation and LIMS in a forensic laboratory enables the laboratory, to standardize sample processing. Automated liquid handlers can increase throughput and eliminate manual repetitive pipetting operations, known to result in occupational injuries to the technical staff....... Furthermore, implementation of automated liquid handlers reduces the risk of sample misplacement. A LIMS can efficiently control the sample flow through the laboratory and manage the results of the conducted tests for each sample. Integration of automated liquid handlers with a LIMS provides the laboratory...... with the tools required for setting up automated production lines of complex laboratory processes and monitoring the whole process and the results. Combined, this enables processing of a large number of samples. Selection of the best automated solution for an individual laboratory should be based on user...

  15. Electronic aroma detection technology for forensic and law enforcement applications

    Energy Technology Data Exchange (ETDEWEB)

    Barshick, S.-A.; Griest, W.H.; Vass, A.A.

    1996-12-31

    A major problem hindering criminal investigations is the lack of appropriate tools for proper crime scene investigations. Often locating important pieces of evidence means relying on the ability of trained detection canines. Development of analytical technology to uncover and analyze evidence, potentially at the scene, could serve to expedite criminal investigations, searches, and court proceedings. To address this problem, a new technology based on gas sensor arrays was investigated for its applicability to forensic and law enforcement problems. The technology employs an array of sensors that respond to volatile chemical components yielding a characteristic `fingerprint` pattern representative of the vapor- phase composition of a sample. Sample aromas can be analyzed and identified using artificial neural networks that are trained on known aroma patterns. Several candidate applications based on known technological needs of the forensic and law enforcement communities have been investigated. These applications have included the detection of aromas emanating from cadavers to aid in determining time since death, drug detection for deterring the manufacture, sale, and use of drugs of abuse, and the analysis of fire debris for accelerant identification. The results to date for these applications have been extremely promising and demonstrate the potential applicability of this technology for forensic use.

  16. General considerations on the enforcement (application of law

    Directory of Open Access Journals (Sweden)

    Berlingher Remus Daniel

    2016-06-01

    Full Text Available Law is a system of norms developed and/or recognized by the state as norms guiding human behaviour according to the values of that particular society, establishing rights and obligations, principles and definitions, structures and relationships of social organization and activity that must be obeyed and which, when necessary, are insured by the coercive force of the state. Thus, the development of this system of norms is not an end in itself, but is intended to regulate all social relations, guide human behaviours and achieve the aims of the law. The enforcement of law is the process of translating legal rules into practice, through which the subjects of law obey and execute legal norms, and state authorities apply them, depending on their competence. The enforcement of law depends on a number of factors that shape law, such as its natural framework of existence, the historical context and the ethnic and national particularities of that community’s development, the economic factor or framework, the framework and particularities of the political system, the cultural-ideological framework or factor, the international framework or factor, etc.

  17. Non-iterative distance constraints enforcement for cloth drapes simulation

    Science.gov (United States)

    Hidajat, R. L. L. G.; Wibowo, Arifin, Z.; Suyitno

    2016-03-01

    A cloth simulation represents the behavior of cloth objects such as flag, tablecloth, or even garments has application in clothing animation for games and virtual shops. Elastically deformable models have widely used to provide realistic and efficient simulation, however problem of overstretching is encountered. We introduce a new cloth simulation algorithm that replaces iterative distance constraint enforcement steps with non-iterative ones for preventing over stretching in a spring-mass system for cloth modeling. Our method is based on a simple position correction procedure applied at one end of a spring. In our experiments, we developed a rectangle cloth model which is initially at a horizontal position with one point is fixed, and it is allowed to drape by its own weight. Our simulation is able to achieve a plausible cloth drapes as in reality. This paper aims to demonstrate the reliability of our approach to overcome overstretches while decreasing the computational cost of the constraint enforcement process due to an iterative procedure that is eliminated.

  18. An Overview of the IP Enforcement System in China

    Institute of Scientific and Technical Information of China (English)

    Wu Yuhe

    2005-01-01

    @@ For more than two decades after the Trademark Law of the People's Republic of China entered into force in 1983,China has formulated a series of IP-related laws and regulations, including among other things, the Patent Law, Trademark Law, Copyright Law and Unfair Competition Law. Besides, it has acceded to many international IP treaties and established an adequate system for IP protection. In particular, China has drawn more on the mature practices of the Western countries with respect to the conditions and requirements for grant of the intellectual property rights, which has made the legal system for the protection of the intellectual property rights in China readily understandable and acceptable to foreign interested parties. By contrast, China has mostly followed the existing civil, administrative and criminal liability system in its construction of the IP-related enforcement system, thus rendering it more "characteristic of China". In fact, this "unique"system provides interested parties with more opportunities and approaches for them to enforce their rights.

  19. Body composition and physiological characteristics of law enforcement officers.

    Science.gov (United States)

    Spitler, D L; Jones, G; Hawkins, J; Dudka, L

    1987-12-01

    The physical work capacity, body composition, and physiological characteristics of 12 law enforcement officers (9 males, 3 females) were measured. Subjects included a representative sample from the occupational categories of detective, staff, investigative and patrol officer. Mean maximal oxygen uptake of the men was 42.1 +/- 8.9 ml.kg-1min-1 with mean values of 41.5 +/- 8.7 ml.kg-1min-1 for the women. Measurement of body composition indicated an average of 24.4 +/- 7.1% body fat for the men and 30.9 +/- 1.2% for the women. Muscular power, strength, and endurance as measured by isolated limb flexion-extension movement and fitness test performance was considered average with no excessive bilateral differences. The results of this study were compared with other investigations of law enforcement officers of similar age groups. The officers displayed average or above health and physical fitness scores for their age classification and were able to complete all police task-oriented tests.

  20. LiveWall Operational Evaluation: Seattle Law Enforcement Pilot

    Energy Technology Data Exchange (ETDEWEB)

    Barr, Jonathan L.; Burtner, Edwin R.; Stein, Steven L.

    2013-10-01

    The LiveWall concept envisioned as an outgrowth of the Precision Information Environment (PIE) project allows communications between separate groups using interactive video, audio, and a shared desktop environment; this allows everyone to participate and collaborate in real time, regardless of location. The LiveWall concept provides a virtual window to other locations, where all parties can interact and collaboratively work with each other. This functionality is intended to improve multi-site coordination amongst emergency operations centers (EOC), field operations sites and across organizations and jurisdictions to accommodate communications during routine and emergency events. For the initial LiveWall operational evaluation PNNL partnered with the Seattle Police Department (SPD). This partnership allowed for the creation of an excellent LiveWall test bed specific to law enforcement. This partnership made it possible to test the LiveWall concept with scenarios involving the many facets of the law enforcement work done by SPD. PNNL and SPD agreed that integrating the systems into operations for a real event would be the best test of the technology and give SPD staff greater visibility into the functionality and benefits offered by the LiveWall concept.

  1. Piracy in cyber space: consumer complicity, pirates and enterprise enforcement

    Science.gov (United States)

    Chaudhry, Peggy E.; Chaudhry, Sohail S.; Stumpf, Stephen A.; Sudler, Hasshi

    2011-05-01

    This article presents an overview of the growth of internet piracy in the global marketplace. The ethical perceptions (or lack of) of the younger generation is addressed, in terms of their willingness to consume counterfeit goods on the web. Firms face the task of educating the consumer that downloading music, software, movies and the like, without compensation, is unethical. This awareness is critical for decreasing the demand for counterfeit goods in the virtual marketplace, where a consumer can exhibit a rogue behaviour with a limited fear of prosecution. We address the pyramid of internet piracy, which encompasses sophisticated suppliers/facilitators, such as the Warez group. Recent sting operations, such as Operation Buccaneer, are also depicted to highlight successful tactical manoeuvres of enforcement agencies. An overview of the Digital Millennium Copyright Act and the No Electronic Theft Act is included to debate the controversy surrounding this legislation. A discussion of enterprise enforcement mechanisms and novel anti-piracy technology for cyberspace is provided to reveal some of the tools used to fight the pirates, such as innovations in digital watermarking and NEC's recently announced video content identification technology. Enterprise information systems and its interdependence on the internet are also demanding new technologies that enable internet investigators to rapidly search, verify and potentially remove pirated content using web services. The quality of service of web services designed to efficiently detect pirated content is a growing consideration for new anti-piracy technology.

  2. The effect of enforcing some direct tax law

    Directory of Open Access Journals (Sweden)

    Hassan Ghodrati

    2014-08-01

    Full Text Available Regarding to the role of tax in the economy as the most stable and constant source of income and also due to the fact that there was no success in achieving fiscal goals by the government during its economic and developmental programs, paying attention to and making effort in this domain is regarded as a necessity in any country. The purpose of this study is to evaluate the effect of enforcing Article 181 of Direct Tax Law on extent of taxpayers’ satisfaction, increase of trust, increase of tax compliance or decrease of tax evasion in Isfahan, Iran. The present study consists of a main hypothesis and four sub-hypotheses. Data were collected from 100 companies regarding their performance during 200 years. Article 181 of Direct Tax Code was implemented upon these companies over the period 2006-2011. Hypotheses of the study were evaluated. The results of the study, in survey and post-event pivot, showed that enforcing Article 181 of Direct Tax Law in Isfahan was effective. However, its effect was not significant regarding increase of taxpayers’ familiarity and acquaintance with Tax Office and its functions in Isfahan; it increased tax compliance, decreased tax evasion by the taxpayers, increased taxpayers’ satisfaction and helped them trust on Tax Office and its performance.

  3. Do Reputation Systems Undermine Trust? Divergent Effects of Enforcement Type on Generalized Trust and Trustworthiness.

    Science.gov (United States)

    Kuwabara, Ko

    2015-03-01

    Research shows that enforcing cooperation using contracts or tangible sanctions can backfire, undermining people's intrinsic motivation to cooperate: when the enforcement is removed, people are less trusting or trustworthy than when there is no enforcement to begin with. The author examines whether reputation systems have similar consequences for generalized trust and trustworthiness. Using a web-based experiment simulating online market transactions (studies 1 and 2), he shows that reputation systems can reinforce generalized trust and trustworthiness, unlike contractual enforcement or relational enforcement based on repeated interactions. In a survey experiment (study 3), he finds that recalling their eBay feedback scores made participants more trusting and trustworthy. These results are predicated on the diffuse nature of reputational enforcement to reinforce perceptions of trust and trustworthiness. These results have implications for understanding how different forms of governance affect generalized trust and trustworthiness. PMID:26421343

  4. Modern trends in automation of industrial complexes

    OpenAIRE

    Svjatnyj, Vladimir A.; Brovkina, Daniella Yu.

    2016-01-01

    This paper is dedicated to the study of the transition of manufacturing to a new stage of its development due to the introduction of the latest computer technologies, that have become common in the service sector, into the automation process. One of the characteristic features of the development of modern industry is the integration of the achievements of the theory and practice of automation, information technology, robotics and "human–automated object" systems. "Industry 4.0" was designed a...

  5. DO NON-ENFORCEABLE CONTRACTS MATTER? EVIDENCE FROM AN INTERNATIONAL LAB EXPERIMENT Department

    OpenAIRE

    Alexander W. Cappelen; Hagen, Rune Jansen; Sørensen, Erik Ø.; Tungodden, Bertil

    2012-01-01

    Many verifiable contracts are impossible or difficult to enforce. This applies to contracts among family and friends, contracts regulating market transactions, and sovereign debt contracts. Do such non-enforceable contracts matter? We use a version of the trust game with participants from Norway and Tanzania to study repayment decisions in the presence of non-enforceable loan contracts. Our main finding is that the specific content of the contract has no effect on loan repayment. Rather, the ...

  6. Estimating the Causal Effect of Enforcement on Minimum Wage Compliance : The Case of South Africa

    OpenAIRE

    Haroon Bhorat; Ravi Kanbur; Natasha Mayet

    2011-01-01

    This paper attempts to estimate the causal effect of government enforcement on compliance with minimum wages in South Africa, a country where considerable non-compliance exists. The number of labour inspectors per capita is used as a proxy for enforcement, whilst non-compliance is measured using an index of violation that measures both the proportion of individuals violated, as well as the average depth of individual violation. Due to the potential simultaneity between enforcement and complia...

  7. Challenges to the enforcement of foreign arbitral awards in the states of the Gulf Cooperation Council

    OpenAIRE

    Almutawa, Ahmed

    2014-01-01

    The topic of this thesis is the enforcement of foreign arbitral awards in the GCC states with the aim of offering a proposal for unifying the substantive and procedural rules for enforcing foreign arbitral awards under the ambit of the New York Convention for the Recognition and Enforcement of Foreign Arbitral Awards, the Riyadh Convention, and the ICSID Convention to which all the GCC states are signatories. The significance of this thesis is its comprehensive comparison of the Shari’a, inte...

  8. Infrastructural support for enforcing and managing distributed application-level policies

    OpenAIRE

    Goovaerts, Tom; De Win, Bart; Joosen, Wouter

    2008-01-01

    State-of-the-art security mechanisms are often enforced in isolation from each other, which limits the kinds of policies that can be enforced in distributed and heterogeneous settings. More specifically, it is hard to enforce application-level policies that affect, or use information from multiple distributed components. This paper proposes the concept of a Security Service Bus (SSB), which is a dedicated communication channel between the applications and the different security mechanisms. Th...

  9. Automated Contingency Management for Propulsion Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — Increasing demand for improved reliability and survivability of mission-critical systems is driving the development of health monitoring and Automated Contingency...

  10. Rapid Automated Mission Planning System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed innovation is an automated UAS mission planning system that will rapidly identify emergency (contingency) landing sites, manage contingency routing,...

  11. Smart Home Automation with Linux

    CERN Document Server

    Goodwin, Steven

    2010-01-01

    Linux users can now control their homes remotely! Are you a Linux user who has ever wanted to turn on the lights in your house, or open and close the curtains, while away on holiday? Want to be able to play the same music in every room, controlled from your laptop or mobile phone? Do you want to do these things without an expensive off-the-shelf kit? In Beginning Linux Home Automation, Steven Goodwin will show you how a house can be fully controlled by its occupants, all using open source software. From appliances to kettles to curtains, control your home remotely! What you'll learn* Control a

  12. Ball Bearing Stacking Automation System

    Directory of Open Access Journals (Sweden)

    Shafeequerrahman S . Ahmed

    2013-01-01

    Full Text Available This document is an effort to introduce the concept of automation in small scale industries and or small workshops that are involved in the manufacturing of small objects such as nuts, bolts and ball bearing in this case. This an electromechanical system which includes certain mechanical parts that involves one base stand on which one vertical metallic frame is mounted and hinged to this vertical stand is an in humanized effort seems inadequate in this era making necessary the use of Electronics, Computer in the manufacturing processes leading to the concept of Automated Manufacturing System (AMS.The ball bearing stack automation is an effort in this regard. In our project we go for stack automation for any object for example a ball bearing, be that is still a manual system there. It will be microcontroller based project control system equipped with microcontroller 89C51 from any manufacturer like Atmel or Philips. This could have been easily implemented if a PLC could be used for manufacturing the staking unit but I adopted the microcontroller based system so that some more modification in the system can be effected at will as to use the same hardware .Although a very small object i.e. ball bearig or small nut and fixture will be tried to be stacked, the system with more precision and more power handling capacity could be built for various requirements of the industry. For increasing more control capacity, we can use another module of this series. When the bearing is ready, it will be sent for packing. This is sensed by an inductive sensor. The output will be proceeds by PLC and microcontroller card which will be driving the assembly in order to put it into pads or flaps. This project will also count the total number of bearings to be packed and will display it on a LCD for real time reference and a provision is made using a higher level language using hyper terminal of the computer

  13. Robotium automated testing for Android

    CERN Document Server

    Zadgaonkar, Hrushikesh

    2013-01-01

    This is a step-by-step, example-oriented tutorial aimed at illustrating the various test scenarios and automation capabilities of Robotium.If you are an Android developer who is learning how to create test cases to test their application, and are looking to get a good grounding in different features in Robotium, this book is ideal for you. It's assumed that you have some experience in Android development, as well be familiar with the Android test framework, as Robotium is a wrapper to Android test framework.

  14. AUTOMATED TESTING OF OPC SERVERS

    CERN Document Server

    Farnham, B

    2011-01-01

    CERN relies on OPC Server implementations from 3rd party device vendors to provide a software interface to their respective hardware. Each time a vendor releases a new OPC Server version it is regression tested internally to verify that existing functionality has not been inadvertently broken during the process of adding new features. In addition bugs and problems must be communicated to the vendors in a reliable and portable way. This presentation covers the automated test approach used at CERN to cover both cases: Scripts are written in a domain specific language specifically created for describing OPC tests and executed by a custom software engine driving the OPC Server implementation.

  15. Automated Orientation of Aerial Images

    DEFF Research Database (Denmark)

    Høhle, Joachim

    2002-01-01

    Methods for automated orientation of aerial images are presented. They are based on the use of templates, which are derived from existing databases, and area-based matching. The characteristics of available database information and the accuracy requirements for map compilation and orthoimage...... production are discussed on the example of Denmark. Details on the developed methods for interior and exterior orientation are described. Practical examples like the measurement of réseau images, updating of topographic databases and renewal of orthoimages are used to prove the feasibility of the developed...

  16. Accounting for enforcement costs in the spatial allocation of marine zones.

    Science.gov (United States)

    Davis, Katrina; Kragt, Marit; Gelcich, Stefan; Schilizzi, Steven; Pannell, David

    2015-02-01

    Marine fish stocks are in many cases extracted above sustainable levels, but they may be protected through restricted-use zoning systems. The effectiveness of these systems typically depends on support from coastal fishing communities. High management costs including those of enforcement may, however, deter fishers from supporting marine management. We incorporated enforcement costs into a spatial optimization model that identified how conservation targets can be met while maximizing fishers' revenue. Our model identified the optimal allocation of the study area among different zones: no-take, territorial user rights for fisheries (TURFs), or open access. The analysis demonstrated that enforcing no-take and TURF zones incurs a cost, but results in higher species abundance by preventing poaching and overfishing. We analyzed how different enforcement scenarios affected fishers' revenue. Fisher revenue was approximately 50% higher when territorial user rights were enforced than when they were not. The model preferentially allocated area to the enforced-TURF zone over other zones, demonstrating that the financial benefits of enforcement (derived from higher species abundance) exceeded the costs. These findings were robust to increases in enforcement costs but sensitive to changes in species' market price. We also found that revenue under the existing zoning regime in the study area was 13-30% lower than under an optimal solution. Our results highlight the importance of accounting for both the benefits and costs of enforcement in marine conservation, particularly when incurred by fishers. PMID:25103090

  17. The Impact of Financial Reporting Enforcement and IFRS Adoption on Executive Compensation

    DEFF Research Database (Denmark)

    Banghøj, Jesper; Marton, Jan; Plenborg, Thomas

    This study examines whether both IFRS adoption and the level of financial reporting enforcement impact the contractual usefulness of financial statements, as reflected in payperformance sensitivity. Using a sample of 8,440 executive year observations from 522 firms in 16 European countries we find....... This suggests that the impact of enforcement on pay‐performance sensitivity vanishes after the implementation of IFRS. These results indicate that IFRS dominate enforcement when it comes to the contractual usefulness of financial statements. The findings should be of interest to both enforcement authorities...... and accounting standard setters....

  18. 76 FR 64075 - Request for Comments on Intellectual Property Enforcement in China

    Science.gov (United States)

    2011-10-17

    ... enforcement system, is November 4, 2011. ADDRESSES: Written comments should be sent by electronic mail message... heard from a number of roundtable participants from diverse sources including practitioners,...

  19. 78 FR 44142 - Modification of Two National Customs Automation Program (NCAP) Tests Concerning Automated...

    Science.gov (United States)

    2013-07-23

    ... Automation Program (NCAP) test called the Document Image System (DIS) test. See 77 FR 20835. The DIS test... Automation Program Test of Automated Manifest Capabilities for Ocean and Rail Carriers: 76 FR 42721 (July 19... (SE test). See 76 FR 69755. The SE test established new entry capability to simplify the entry...

  20. Massachusetts Library Automation Survey: A Directory of Automated Operations in Massachusetts Libraries.

    Science.gov (United States)

    Stephens, Eileen; Nijenberg, Caroline

    This directory is designed to provide information on automated systems and/or equipment used in libraries to provide a tool for planning future automation in the context of interlibrary cooperation considerations, and to inform the library and information community of the state of the art of automation in Massachusetts libraries. The main body is…

  1. Automated pipelines for spectroscopic analysis

    Science.gov (United States)

    Allende Prieto, C.

    2016-09-01

    The Gaia mission will have a profound impact on our understanding of the structure and dynamics of the Milky Way. Gaia is providing an exhaustive census of stellar parallaxes, proper motions, positions, colors and radial velocities, but also leaves some glaring holes in an otherwise complete data set. The radial velocities measured with the on-board high-resolution spectrograph will only reach some 10 % of the full sample of stars with astrometry and photometry from the mission, and detailed chemical information will be obtained for less than 1 %. Teams all over the world are organizing large-scale projects to provide complementary radial velocities and chemistry, since this can now be done very efficiently from the ground thanks to large and mid-size telescopes with a wide field-of-view and multi-object spectrographs. As a result, automated data processing is taking an ever increasing relevance, and the concept is applying to many more areas, from targeting to analysis. In this paper, I provide a quick overview of recent, ongoing, and upcoming spectroscopic surveys, and the strategies adopted in their automated analysis pipelines.

  2. Cassini Tour Atlas Automated Generation

    Science.gov (United States)

    Grazier, Kevin R.; Roumeliotis, Chris; Lange, Robert D.

    2011-01-01

    During the Cassini spacecraft s cruise phase and nominal mission, the Cassini Science Planning Team developed and maintained an online database of geometric and timing information called the Cassini Tour Atlas. The Tour Atlas consisted of several hundreds of megabytes of EVENTS mission planning software outputs, tables, plots, and images used by mission scientists for observation planning. Each time the nominal mission trajectory was altered or tweaked, a new Tour Atlas had to be regenerated manually. In the early phases of Cassini s Equinox Mission planning, an a priori estimate suggested that mission tour designers would develop approximately 30 candidate tours within a short period of time. So that Cassini scientists could properly analyze the science opportunities in each candidate tour quickly and thoroughly so that the optimal series of orbits for science return could be selected, a separate Tour Atlas was required for each trajectory. The task of manually generating the number of trajectory analyses in the allotted time would have been impossible, so the entire task was automated using code written in five different programming languages. This software automates the generation of the Cassini Tour Atlas database. It performs with one UNIX command what previously took a day or two of human labor.

  3. Automated Car Park Management System

    Science.gov (United States)

    Fabros, J. P.; Tabañag, D.; Espra, A.; Gerasta, O. J.

    2015-06-01

    This study aims to develop a prototype for an Automated Car Park Management System that will increase the quality of service of parking lots through the integration of a smart system that assists motorist in finding vacant parking lot. The research was based on implementing an operating system and a monitoring system for parking system without the use of manpower. This will include Parking Guidance and Information System concept which will efficiently assist motorists and ensures the safety of the vehicles and the valuables inside the vehicle. For monitoring, Optical Character Recognition was employed to monitor and put into list all the cars entering the parking area. All parking events in this system are visible via MATLAB GUI which contain time-in, time-out, time consumed information and also the lot number where the car parks. To put into reality, this system has a payment method, and it comes via a coin slot operation to control the exit gate. The Automated Car Park Management System was successfully built by utilizing microcontrollers specifically one PIC18f4550 and two PIC16F84s and one PIC16F628A.

  4. The ionizing radiations. Institutional landscape and enforceable regulation

    International Nuclear Information System (INIS)

    The principal actors of radiation protection are listed: international actors, European actors, French actors, the principal institutional actors with the nuclear safety authority (A.S.N.), the institute of radiation protection and nuclear safety (I.R.S.N.), the French surveillance and sanitary safety plan with the sanitary surveillance Institute (I.n.V.S.), the French sanitary safety agency of health products (A.F.S.S.A.P.S.), the French sanitary safety agency of food (A.F.S.S.A.), the French sanitary safety agency of environment (A.F.S.S.E.) the operators. About the legislation and the enforceable regulation we have a general overview, rules coming from the directives transpositions and the new regulations. Some detailed analysis of legislative texts are given with the dispositions of the public health code on the population protection and the dispositions of the employment code on the workers protection. (N.C.)

  5. Cross-Generational Reproductive Fitness Enforced by Microchimeric Maternal Cells.

    Science.gov (United States)

    Kinder, Jeremy M; Jiang, Tony T; Ertelt, James M; Xin, Lijun; Strong, Beverly S; Shaaban, Aimen F; Way, Sing Sing

    2015-07-30

    Exposure to maternal tissue during in utero development imprints tolerance to immunologically foreign non-inherited maternal antigens (NIMA) that persists into adulthood. The biological advantage of this tolerance, conserved across mammalian species, remains unclear. Here, we show maternal cells that establish microchimerism in female offspring during development promote systemic accumulation of immune suppressive regulatory T cells (Tregs) with NIMA specificity. NIMA-specific Tregs expand during pregnancies sired by males expressing alloantigens with overlapping NIMA specificity, thereby averting fetal wastage triggered by prenatal infection and non-infectious disruptions of fetal tolerance. Therefore, exposure to NIMA selectively enhances reproductive success in second-generation females carrying embryos with overlapping paternally inherited antigens. These findings demonstrate that genetic fitness, canonically thought to be restricted to Mendelian inheritance, is enhanced in female placental mammals through vertically transferred maternal cells that promote conservation of NIMA and enforce cross-generational reproductive benefits. PMID:26213383

  6. Carving and adaptive drainage enforcement of grid digital elevation models

    Science.gov (United States)

    Soille, Pierre; Vogt, Jürgen; Colombo, Roberto

    2003-12-01

    An effective and widely used method for removing spurious pits in digital elevation models consists of filling them until they overflow. However, this method sometimes creates large flat regions which in turn pose a problem for the determination of accurate flow directions. In this study, we propose to suppress each pit by creating a descending path from it to the nearest point having a lower elevation value. This is achieved by carving, i.e., lowering, the terrain elevations along the detected path. Carving paths are identified through a flooding simulation starting from the river outlets. The proposed approach allows for adaptive drainage enforcement whereby river networks coming from other data sources are imposed to the digital elevation model only in places where the automatic river network extraction deviates substantially from the known networks. An improvement to methods for routing flow over flat regions is also introduced. Detailed results are presented over test areas of the Danube basin.

  7. Enforcement of social rights - Upholding of obligations in Denmark

    DEFF Research Database (Denmark)

    Jacqueson, Catherine

    2015-01-01

    This paper looks at the Danish system of remedies in order to assess how the social rights of Union citizens are enforced and upheld in Denmark. Decisions in the social field broadly understood - including social assistance, education, housing and health care - are adopted by various bodies and can...... be appealed before different complaints board. Recourse to ordinary courts is nevertheless also always possible (section 1.2) and legal aid might be obtained under strict conditions (section 1.3). Yet, the administrative complaints system is a corner stone in the protection of social rights in Denmark...... (section 1.4). In all the mentioned areas of social law, the Parliamentary Ombudsman can be seized where administrative remedies have been exhausted (section 1.5). Finally, several public bodies are responsible for ensuring supervision of public authorities in the social field (section 1.6)....

  8. Battered police: risk factors for violence against law enforcement officers.

    Science.gov (United States)

    Covington, Michele W; Huff-Corzine, Lin; Corzine, Jay

    2014-01-01

    Although we hear more about violence committed by the police, violence against police officers is also a major problem in the United States. Using data collected from the Orlando, Florida Police Department files, this study examines situational variables, offender characteristics, and officer demographics that may correlate with violence directed at law enforcement officers. Logistic regression results indicate that battery against one or more police officers is significantly more likely when multiple officers are involved, when offenders are women, when offenders are larger than average as measured by body mass index (BMI), and when offenders are known to have recently consumed alcohol. We close with a discussion of policy implications and directions for future research. PMID:24672993

  9. Adapting to regional enforcement: fishing down the governance index.

    Directory of Open Access Journals (Sweden)

    Henrik Osterblom

    Full Text Available BACKGROUND: Illegal, Unreported and Unregulated (IUU fishing is a problem for marine resource managers, leading to depletion of fish stocks and negative impacts on marine ecosystems. These problems are particularly evident in regions with weak governance. Countries responsible for sustainable natural resource management in the Southern Ocean have actively worked to reduce IUU fishing in the region over a period of 15 years, leading to a sequence of three distinct peaks of IUU fishing. METHODOLOGY/PRINCIPAL FINDINGS: We reviewed existing public records relating to IUU fishing in the Southern Ocean between 1995-2009 and related this information to the governance capacity of flag states responsible for IUU vessels. IUU operators used a number of methods to adapt to enforcement actions, resulting in reduced risks of detection, apprehension and sanctioning. They changed fishing locations, vessel names and flag states, and ports for offloading IUU catches. There was a significant decrease in the proportion of IUU vessels flagged to CCAMLR countries, and a significant decrease in the average governance index of flag states. Despite a decreasing trend of IUU fishing, further actions are hampered by the regional scope of CCAMLR and the governance capacity of responsible states. CONCLUSIONS/SIGNIFICANCE: This is the first study of long-term change in the modus operandi of IUU fishing operators, illustrating that IUU operators can adapt to enforcement actions and that such dynamics may lead to new problems elsewhere, where countries have a limited capacity. This outsourcing of problems may have similarities to natural resource extraction in other sectors and in other regions. IUU fishing is the result of a number of factors, and effectively addressing this major challenge to sustainable marine resource extraction will likely require a stronger focus on governance. Highly mobile resource extractors with substantial funds are able to adapt to changing

  10. Do You Automate? Saving Time and Dollars

    Science.gov (United States)

    Carmichael, Christine H.

    2010-01-01

    An automated workforce management strategy can help schools save jobs, improve the job satisfaction of teachers and staff, and free up precious budget dollars for investments in critical learning resources. Automated workforce management systems can help schools control labor costs, minimize compliance risk, and improve employee satisfaction.…

  11. Validation of Automated Scoring of Science Assessments

    Science.gov (United States)

    Liu, Ou Lydia; Rios, Joseph A.; Heilman, Michael; Gerard, Libby; Linn, Marcia C.

    2016-01-01

    Constructed response items can both measure the coherence of student ideas and serve as reflective experiences to strengthen instruction. We report on new automated scoring technologies that can reduce the cost and complexity of scoring constructed-response items. This study explored the accuracy of c-rater-ML, an automated scoring engine…

  12. How to assess sustainability in automated manufacturing

    DEFF Research Database (Denmark)

    Dijkman, Teunis Johannes; Rödger, Jan-Markus; Bey, Niki

    2015-01-01

    The aim of this paper is to describe how sustainability in automation can be assessed. The assessment method is illustrated using a case study of a robot. Three aspects of sustainability assessment in automation are identified. Firstly, we consider automation as part of a larger system that fulfi......The aim of this paper is to describe how sustainability in automation can be assessed. The assessment method is illustrated using a case study of a robot. Three aspects of sustainability assessment in automation are identified. Firstly, we consider automation as part of a larger system......, (sustainability) specifications move top-down, which helps avoiding sub-optimization and problem shifting. From these three aspects, sustainable automation is defined as automation that contributes to products that fulfill a market demand in a more sustainable way. The case study presents the carbon footprints...... of a robot, a production cell, a production line and the final product. The case study results illustrate that, depending on the actor and the level he/she acts at, sustainability and the actions that can be taken to contribute to a more sustainable product are perceived differently: even though the robot...

  13. Ecological Automation Design, Extending Work Domain Analysis

    NARCIS (Netherlands)

    Amelink, M.H.J.

    2010-01-01

    In high–risk domains like aviation, medicine and nuclear power plant control, automation has enabled new capabilities, increased the economy of operation and has greatly contributed to safety. However, automation increases the number of couplings in a system, which can inadvertently lead to more com

  14. Workflow Automation: A Collective Case Study

    Science.gov (United States)

    Harlan, Jennifer

    2013-01-01

    Knowledge management has proven to be a sustainable competitive advantage for many organizations. Knowledge management systems are abundant, with multiple functionalities. The literature reinforces the use of workflow automation with knowledge management systems to benefit organizations; however, it was not known if process automation yielded…

  15. An Automation Interface for Kappa PC

    DEFF Research Database (Denmark)

    Hartvig, Susanne C

    1999-01-01

    The reports documents an automation interface for Kappa PC. The automation interface can be used to embed Kappa applications in 32-bit Windowsapplications.The interface includes functions for initialising Kappa, for loading an application, for settingvalues, for getting values, and for stopping...

  16. Physiological Self-Regulation and Adaptive Automation

    Science.gov (United States)

    Prinzell, Lawrence J.; Pope, Alan T.; Freeman, Frederick G.

    2007-01-01

    Adaptive automation has been proposed as a solution to current problems of human-automation interaction. Past research has shown the potential of this advanced form of automation to enhance pilot engagement and lower cognitive workload. However, there have been concerns voiced regarding issues, such as automation surprises, associated with the use of adaptive automation. This study examined the use of psychophysiological self-regulation training with adaptive automation that may help pilots deal with these problems through the enhancement of cognitive resource management skills. Eighteen participants were assigned to 3 groups (self-regulation training, false feedback, and control) and performed resource management, monitoring, and tracking tasks from the Multiple Attribute Task Battery. The tracking task was cycled between 3 levels of task difficulty (automatic, adaptive aiding, manual) on the basis of the electroencephalogram-derived engagement index. The other two tasks remained in automatic mode that had a single automation failure. Those participants who had received self-regulation training performed significantly better and reported lower National Aeronautics and Space Administration Task Load Index scores than participants in the false feedback and control groups. The theoretical and practical implications of these results for adaptive automation are discussed.

  17. Investing in the Future: Automation Marketplace 2009

    Science.gov (United States)

    Breeding, Marshall

    2009-01-01

    In a year where the general economy presented enormous challenges, libraries continued to make investments in automation, especially in products that help improve what and how they deliver to their end users. Access to electronic content remains a key driver. In response to anticipated needs for new approaches to library automation, many companies…

  18. Working toward Transparency in Library Automation

    Science.gov (United States)

    Breeding, Marshall

    2007-01-01

    In this article, the author argues the need for transparency with regard to the automation systems used in libraries. As librarians make decisions regarding automation software and services, they should have convenient access to information about the organizations it will potentially acquire technology from and about the collective experiences of…

  19. Laboratory automation: trajectory, technology, and tactics.

    Science.gov (United States)

    Markin, R S; Whalen, S A

    2000-05-01

    Laboratory automation is in its infancy, following a path parallel to the development of laboratory information systems in the late 1970s and early 1980s. Changes on the horizon in healthcare and clinical laboratory service that affect the delivery of laboratory results include the increasing age of the population in North America, the implementation of the Balanced Budget Act (1997), and the creation of disease management companies. Major technology drivers include outcomes optimization and phenotypically targeted drugs. Constant cost pressures in the clinical laboratory have forced diagnostic manufacturers into less than optimal profitability states. Laboratory automation can be a tool for the improvement of laboratory services and may decrease costs. The key to improvement of laboratory services is implementation of the correct automation technology. The design of this technology should be driven by required functionality. Automation design issues should be centered on the understanding of the laboratory and its relationship to healthcare delivery and the business and operational processes in the clinical laboratory. Automation design philosophy has evolved from a hardware-based approach to a software-based approach. Process control software to support repeat testing, reflex testing, and transportation management, and overall computer-integrated manufacturing approaches to laboratory automation implementation are rapidly expanding areas. It is clear that hardware and software are functionally interdependent and that the interface between the laboratory automation system and the laboratory information system is a key component. The cost-effectiveness of automation solutions suggested by vendors, however, has been difficult to evaluate because the number of automation installations are few and the precision with which operational data have been collected to determine payback is suboptimal. The trend in automation has moved from total laboratory automation to a

  20. Future Computer, Communication, Control and Automation

    CERN Document Server

    2011 International Conference on Computer, Communication, Control and Automation

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011). 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011) has been held in Zhuhai, China, November 19-20, 2011. This volume topics covered include wireless communications, advances in wireless video, wireless sensors networking, security in wireless networks, network measurement and management, hybrid and discrete-event systems, internet analytics and automation, robotic system and applications, reconfigurable automation systems, machine vision in automation. We hope that researchers, graduate students and other interested readers benefit scientifically from the proceedings and also find it stimulating in the process.

  1. Automation concepts for large space power systems

    Science.gov (United States)

    Imamura, M. S.; Moser, R.; Aichele, D.; Lanier, R., Jr.

    1983-01-01

    A study was undertaken to develop a methodology for analyzing, selecting, and implementing automation functions for multi-hundred-kW photovoltaic power systems intended for manned space station. The study involved identification of generic power system elements and their potential faults, definition of automation functions and their resulting benefits, and partitioning of automation functions between power subsystem, central spacecraft computer, and ground. Automation to a varying degree was concluded to be mandatory to meet the design and operational requirements of the space station. The key drivers are indefinite lifetime, modular growth, high performance flexibility, a need to accommodate different electrical user load equipment, on-orbit assembly/maintenance/servicing, and potentially large number of power subsystem components. Functions that are good candidates for automation via expert system approach includes battery management and electrical consumables management.

  2. Automation literature: A brief review and analysis

    Science.gov (United States)

    Smith, D.; Dieterly, D. L.

    1980-01-01

    Current thought and research positions which may allow for an improved capability to understand the impact of introducing automation to an existing system are established. The orientation was toward the type of studies which may provide some general insight into automation; specifically, the impact of automation in human performance and the resulting system performance. While an extensive number of articles were reviewed, only those that addressed the issue of automation and human performance were selected to be discussed. The literature is organized along two dimensions: time, Pre-1970, Post-1970; and type of approach, Engineering or Behavioral Science. The conclusions reached are not definitive, but do provide the initial stepping stones in an attempt to begin to bridge the concept of automation in a systematic progression.

  3. Sensing for advancing mining automation capability:A review of underground automation technology development

    Institute of Scientific and Technical Information of China (English)

    Ralston Jonathon; Reid David; Hargrave Chad; Hainsworth David

    2014-01-01

    This paper highlights the role of automation technologies for improving the safety, productivity, and environmental sustainability of underground coal mining processes. This is accomplished by reviewing the impact that the introduction of automation technology has made through the longwall shearer auto-mation research program of Longwall Automation Steering Committee (LASC). This result has been achieved through close integration of sensing, processing, and control technologies into the longwall mining process. Key to the success of the automation solution has been the development of new sensing methods to accurately measure the location of longwall equipment and the spatial configuration of coal seam geology. The relevance of system interoperability and open communications standards for facilitat-ing effective automation is also discussed. Importantly, the insights gained through the longwall automa-tion development process are now leading to new technology transfer activity to benefit other underground mining processes.

  4. AUTOMATING GROUNDWATER SAMPLING AT HANFORD

    Energy Technology Data Exchange (ETDEWEB)

    CONNELL CW; HILDEBRAND RD; CONLEY SF; CUNNINGHAM DE

    2009-01-16

    Until this past October, Fluor Hanford managed Hanford's integrated groundwater program for the U.S. Department of Energy (DOE). With the new contract awards at the Site, however, the CH2M HILL Plateau Remediation Company (CHPRC) has assumed responsibility for the groundwater-monitoring programs at the 586-square-mile reservation in southeastern Washington State. These programs are regulated by the Resource Conservation and Recovery Act (RCRA) and the Comprehensive Environmental Response Compensation and Liability Act (CERCLA). The purpose of monitoring is to track existing groundwater contamination from past practices, as well as other potential contamination that might originate from RCRA treatment, storage, and disposal (TSD) facilities. An integral part of the groundwater-monitoring program involves taking samples of the groundwater and measuring the water levels in wells scattered across the site. More than 1,200 wells are sampled each year. Historically, field personnel or 'samplers' have been issued pre-printed forms that have information about the well(s) for a particular sampling evolution. This information is taken from the Hanford Well Information System (HWIS) and the Hanford Environmental Information System (HEIS)--official electronic databases. The samplers used these hardcopy forms to document the groundwater samples and well water-levels. After recording the entries in the field, the samplers turned the forms in at the end of the day and the collected information was posted onto a spreadsheet that was then printed and included in a log book. The log book was then used to make manual entries of the new information into the software application(s) for the HEIS and HWIS databases. This is a pilot project for automating this tedious process by providing an electronic tool for automating water-level measurements and groundwater field-sampling activities. The automation will eliminate the manual forms and associated data entry, improve the

  5. Reload safety analysis automation tools

    International Nuclear Information System (INIS)

    Performing core physics calculations for the sake of reload safety analysis is a very demanding and time consuming process. This process generally begins with the preparation of libraries for the core physics code using a lattice code. The next step involves creating a very large set of calculations with the core physics code. Lastly, the results of the calculations must be interpreted, correctly applying uncertainties and checking whether applicable limits are satisfied. Such a procedure requires three specialized experts. One must understand the lattice code in order to correctly calculate and interpret its results. The next expert must have a good understanding of the physics code in order to create libraries from the lattice code results and to correctly define all the calculations involved. The third expert must have a deep knowledge of the power plant and the reload safety analysis procedure in order to verify, that all the necessary calculations were performed. Such a procedure involves many steps and is very time consuming. At ÚJV Řež, a.s., we have developed a set of tools which can be used to automate and simplify the whole process of performing reload safety analysis. Our application QUADRIGA automates lattice code calculations for library preparation. It removes user interaction with the lattice code and reduces his task to defining fuel pin types, enrichments, assembly maps and operational parameters all through a very nice and user-friendly GUI. The second part in reload safety analysis calculations is done by CycleKit, a code which is linked with our core physics code ANDREA. Through CycleKit large sets of calculations with complicated interdependencies can be performed using simple and convenient notation. CycleKit automates the interaction with ANDREA, organizes all the calculations, collects the results, performs limit verification and displays the output in clickable html format. Using this set of tools for reload safety analysis simplifies

  6. Post-crackdown effectiveness of field-based forest law enforcement in the Brazilian Amazon.

    Directory of Open Access Journals (Sweden)

    Jan Börner

    Full Text Available Regulatory enforcement of forest conservation laws is often dismissed as an ineffective approach to reducing tropical forest loss. Yet, effective enforcement is often a precondition for alternative conservation measures, such as payments for environmental services, to achieve desired outcomes. Fair and efficient policies to reducing emissions from deforestation and forest degradation (REDD will thus crucially depend on understanding the determinants and requirements of enforcement effectiveness. Among potential REDD candidate countries, Brazil is considered to possess the most advanced deforestation monitoring and enforcement infrastructure. This study explores a unique dataset of over 15 thousand point coordinates of enforcement missions in the Brazilian Amazon during 2009 and 2010, after major reductions of deforestation in the region. We study whether local deforestation patterns have been affected by field-based enforcement and to what extent these effects vary across administrative boundaries. Spatial matching and regression techniques are applied at different spatial resolutions. We find that field-based enforcement operations have not been universally effective in deterring deforestation during our observation period. Inspections have been most effective in reducing large-scale deforestation in the states of Mato Grosso and Pará, where average conservation effects were 4.0 and 9.9 hectares per inspection, respectively. Despite regional and actor-specific heterogeneity in inspection effectiveness, field-based law enforcement is highly cost-effective on average and might be enhanced by closer collaboration between national and state-level authorities.

  7. Enforcement actions: Significant actions resolved individual actions. Semiannual progress report, January 1996--June 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-08-01

    This document summarizes significant enforcement actions that have been resolved during the period of January-June 1996. The report includes copies of Orders and Notices of Violations sent by the Nuclear Regulatory Commission to individuals with respect to the enforcement actions.

  8. 76 FR 40777 - Interim Enforcement Policy for Certain Fire Protection Issues

    Science.gov (United States)

    2011-07-12

    ... Register notice Date Brief description 69 FR 33684 June 16, 2004 Describes the initial interim Enforcement Policy on fire protection. 70 FR 2662 January 14, 2005 Revises the submittal date for licensees to receive enforcement discretion for existing identified fire protection program noncompliant issues. 71...

  9. Law enforcement officers' opinions about gun locks: anchors on life jackets?

    OpenAIRE

    Coyne-Beasley, T; Johnson, R

    2001-01-01

    Objectives—One way law enforcement officers support firearm safety is by promoting the use of gun locks. This investigation examined law enforcement officers' willingness to use gun locks on their own guns, as well as their opinions regarding gun locks in general.

  10. Post-crackdown effectiveness of field-based forest law enforcement in the Brazilian Amazon.

    Science.gov (United States)

    Börner, Jan; Kis-Katos, Krisztina; Hargrave, Jorge; König, Konstantin

    2015-01-01

    Regulatory enforcement of forest conservation laws is often dismissed as an ineffective approach to reducing tropical forest loss. Yet, effective enforcement is often a precondition for alternative conservation measures, such as payments for environmental services, to achieve desired outcomes. Fair and efficient policies to reducing emissions from deforestation and forest degradation (REDD) will thus crucially depend on understanding the determinants and requirements of enforcement effectiveness. Among potential REDD candidate countries, Brazil is considered to possess the most advanced deforestation monitoring and enforcement infrastructure. This study explores a unique dataset of over 15 thousand point coordinates of enforcement missions in the Brazilian Amazon during 2009 and 2010, after major reductions of deforestation in the region. We study whether local deforestation patterns have been affected by field-based enforcement and to what extent these effects vary across administrative boundaries. Spatial matching and regression techniques are applied at different spatial resolutions. We find that field-based enforcement operations have not been universally effective in deterring deforestation during our observation period. Inspections have been most effective in reducing large-scale deforestation in the states of Mato Grosso and Pará, where average conservation effects were 4.0 and 9.9 hectares per inspection, respectively. Despite regional and actor-specific heterogeneity in inspection effectiveness, field-based law enforcement is highly cost-effective on average and might be enhanced by closer collaboration between national and state-level authorities. PMID:25875656

  11. Enforcement actions: significant actions resolved. Quarterly progress report, October-December 1985. Volume 4, No. 4

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October - December 1985) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory commission to licensees with respects to these enforcement actions, and the licensees' responses

  12. 78 FR 22451 - Cost Recovery for Permit Processing, Administration, and Enforcement

    Science.gov (United States)

    2013-04-16

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE INTERIOR Office of Surface Mining Reclamation and Enforcement 30 CFR Parts 701, 736, 737, 738, and 750 RIN 1029-AC65 Cost Recovery for Permit Processing, Administration, and Enforcement Correction In proposed...

  13. 21 CFR 201.125 - Drugs for use in teaching, law enforcement, research, and analysis.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Drugs for use in teaching, law enforcement, research, and analysis. 201.125 Section 201.125 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF... § 201.125 Drugs for use in teaching, law enforcement, research, and analysis. A drug subject to §...

  14. Enforcement actions: Significant actions resolved individual actions. Semiannual progress report, January 1996--June 1996

    International Nuclear Information System (INIS)

    This document summarizes significant enforcement actions that have been resolved during the period of January-June 1996. The report includes copies of Orders and Notices of Violations sent by the Nuclear Regulatory Commission to individuals with respect to the enforcement actions

  15. 19 CFR 207.8 - Questionnaires to have the force of subpoenas; subpoena enforcement.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Questionnaires to have the force of subpoenas; subpoena enforcement. 207.8 Section 207.8 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION... Questionnaires to have the force of subpoenas; subpoena enforcement. Any questionnaire issued by the...

  16. 75 FR 51869 - CAFTA-DR Consultation Request Regarding Guatemala's Apparent Failure to Effectively Enforce its...

    Science.gov (United States)

    2010-08-23

    ... Enforce its Labor Laws AGENCY: Office of the United States Trade Representative. ACTION: Notice; request... Government of Guatemala to discuss Guatemala's apparent failure to meet its obligation under Article 16.2.1(a) to effectively enforce its labor laws. The consultations request may be found at...

  17. 28 CFR 16.98 - Exemption of the Drug Enforcement Administration (DEA)-limited access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of the Drug Enforcement Administration (DEA)-limited access. 16.98 Section 16.98 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION... identity of confidential sources, witnesses, and law enforcement personnel; and of information that...

  18. Shotgun Marriage: A Study of Tennessee Law Enforcement, Reporters and Sources.

    Science.gov (United States)

    Grusin, Elinor Kelley

    1990-01-01

    Examines the relationship between police reporters and law enforcement officials in Tennessee. Finds that reporters are far younger than their source counterparts and less likely to have much experience or come from the local community. Finds that law enforcement officials rated reporters slightly higher than the reverse evaluation in such areas…

  19. 75 FR 40867 - Modifications to the HIPAA Privacy, Security, and Enforcement Rules Under the Health Information...

    Science.gov (United States)

    2010-07-14

    ... Enforcement Rules Under the Health Information Technology for Economic and Clinical Health Act; Proposed Rule... Modifications to the HIPAA Privacy, Security, and Enforcement Rules Under the Health Information Technology for... modifications is to implement recent statutory amendments under the Health Information Technology......

  20. How to Enforce Value-Added Tax? The Role of Inter-Sectoral Linkages

    NARCIS (Netherlands)

    Hoseini, M.

    2013-01-01

    Abstract: This paper models and empirically tests a self-enforcing feature of the value added tax (VAT) which is absent in the theory: An incentive that makes formal traders buy from suppliers who pay VAT too. In addition, it explores how the government can deploy this feature to enforce VAT more ef