WorldWideScience

Sample records for automated enforcement

  1. Feasibility of Using Video Camera for Automated Enforcement on Red-Light Running and Managed Lanes.

    Science.gov (United States)

    2009-12-25

    The overall objective of this study is to evaluate the feasibility, effectiveness, legality, and public acceptance aspects of automated enforcement on red light running and HOV occupancy requirement using video cameras in Nevada. This objective was a...

  2. Feasibility of Using Video Cameras for Automated Enforcement on Red-Light Running and Managed Lanes.

    Science.gov (United States)

    2009-12-01

    The overall objective of this study is to evaluate the feasibility, effectiveness, legality, and public acceptance aspects of automated enforcement on red light running and high occupancy vehicle (HOV) occupancy requirement using video cameras in Nev...

  3. Survey about pedestrian safety and attitudes toward automated traffic enforcement in Washington, D.C.

    Science.gov (United States)

    Cicchino, Jessica B; Wells, Joann K; McCartt, Anne T

    2014-01-01

    Pedestrians represent more than one third of all traffic deaths in Washington, D.C. The District plans to expand its long-standing automated traffic enforcement program in 2013 from speed and red light cameras to cameras to enforce pedestrian right-of-way laws at crosswalks and stop sign laws. This study collected information on the opinions, behaviors, and knowledge of D.C. residents related to camera enforcement and pedestrian safety issues. A telephone survey of 801 adult D.C. residents was conducted in November 2012 with approximately equal numbers of respondents in each of D.C.'s eight wards. Quotas were used to ensure that the sample was representative of the demographic characteristics of adults in each ward. For analyses combining responses across the wards, data were weighted to correspond with the demographic characteristics of adults in the city. Most respondents believed that drivers speeding, running red lights, running stop signs, and not stopping for pedestrians are serious threats to their safety. Respondents strongly supported the speed and red light camera programs, with 76 percent of respondents favoring speed cameras and 87 percent favoring red light cameras. Support was more limited for the camera enforcement that was not yet in place at the time of the survey, with 50 percent of respondents favoring stop sign cameras and 47 percent of respondents favoring crosswalk cameras. Twenty-four percent of respondents had not driven a car in D.C. in the past month, and higher proportions of these nondrivers favored speed cameras (90%), stop sign cameras (67%), and crosswalk cameras (59%) than respondents who drove in D.C. in the past month. Respondents who supported camera enforcement cited safety as their main reason. More than 9 in 10 respondents knew that D.C. law requires drivers to stop for pedestrians crossing the street in marked crosswalks at intersections without traffic signals and midblock, but only 54 percent knew that drivers must stop for

  4. Feasibility study for automating the analytical laboratories of the Chemistry Branch, National Enforcement Investigation Center, Environmental Protection Agency

    International Nuclear Information System (INIS)

    Morris, W.F.; Fisher, E.R.; Barton, G.W. Jr.

    1978-01-01

    The feasibility of automating the analytical laboratories of the Chemistry Branch of the National Enforcement Investigation Center, Environmental Protection Agency, Denver, Colorado, is explored. The goals of the chemistry laboratory are defined, and instrumental methods and other tasks to be automated are described. Five optional automation systems are proposed to meet these goals and the options are evaluated in terms of cost effectiveness and other specified criteria. The instruments to be automated include (1) a Perkin-Elmer AA spectrophotometer 403, (2) Perkin-Elmer AA spectrophotometer 306, (3) Technicon AutoAnalyzer II, (4) Mettler electronic balance, and a (5) Jarrell-Ash ICP emission spectrometer

  5. Effects of automated speed enforcement in Montgomery County, Maryland, on vehicle speeds, public opinion, and crashes.

    Science.gov (United States)

    Hu, Wen; McCartt, Anne T

    2016-09-01

    In May 2007, Montgomery County, Maryland, implemented an automated speed enforcement program, with cameras allowed on residential streets with speed limits of 35 mph or lower and in school zones. In 2009, the state speed camera law increased the enforcement threshold from 11 to 12 mph over the speed limit and restricted school zone enforcement hours. In 2012, the county began using a corridor approach, in which cameras were periodically moved along the length of a roadway segment. The long-term effects of the speed camera program on travel speeds, public attitudes, and crashes were evaluated. Changes in travel speeds at camera sites from 6 months before the program began to 7½ years after were compared with changes in speeds at control sites in the nearby Virginia counties of Fairfax and Arlington. A telephone survey of Montgomery County drivers was conducted in Fall 2014 to examine attitudes and experiences related to automated speed enforcement. Using data on crashes during 2004-2013, logistic regression models examined the program's effects on the likelihood that a crash involved an incapacitating or fatal injury on camera-eligible roads and on potential spillover roads in Montgomery County, using crashes in Fairfax County on similar roads as controls. About 7½ years after the program began, speed cameras were associated with a 10% reduction in mean speeds and a 62% reduction in the likelihood that a vehicle was traveling more than 10 mph above the speed limit at camera sites. When interviewed in Fall 2014, 95% of drivers were aware of the camera program, 62% favored it, and most had received a camera ticket or knew someone else who had. The overall effect of the camera program in its modified form, including both the law change and the corridor approach, was a 39% reduction in the likelihood that a crash resulted in an incapacitating or fatal injury. Speed cameras alone were associated with a 19% reduction in the likelihood that a crash resulted in an

  6. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  7. Enforcement Information System

    Data.gov (United States)

    Department of Transportation — EIS is an automated management information system that tracks the FAA’s enforcement actions on a nationwide basis. EIS is the FAA’s primary database for tracking...

  8. Weight enforcement and evasion : Oregon case study: final report.

    Science.gov (United States)

    2002-03-01

    This study examines the incidence of overweight trucks and its relation to regulatory enforcement activity. Addressed are questions of scale operations in relation to weight violations and the effectiveness of enforcement levels, automated preclearan...

  9. Enforcement Reports

    Data.gov (United States)

    U.S. Department of Health & Human Services — Whereas not all recalls are announced in the media or on our Recalls press release page, all recalls montiored by FDA are included in FDA's weekly Enforcement Report...

  10. Law Enforcement Locations

    Data.gov (United States)

    Kansas Data Access and Support Center — Law Enforcement Locations in Kansas Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law enforcement agencies "are...

  11. Enforcement and illegal migration

    OpenAIRE

    Orrenius, Pia

    2014-01-01

    Border enforcement of immigration laws attempts to raise the costs of illegal immigration, while interior enforcement also lowers the benefits. Border and interior enforcement therefore reduce the net benefits of illegal immigration and should lower the probability that an individual will decide to migrate. While some empirical studies find that border and interior enforcement serve as significant deterrents to illegal immigration, immigration enforcement is costly and carries significant uni...

  12. Financial Reporting Enforcement

    DEFF Research Database (Denmark)

    Olsen, Carsten

    This dissertation explores how financial reporting enforcement differs in Europe and how these differences influence the materiality assessment and disclosure decisions made by the preparers of the financial statement. Furthermore, it analyses how financial reporting enforcement influences...... al. 2013, Brown et al. 2014). This heterogeneous enforcement has created a particular need to understand how enforcement influences financial reporting if the primary users must be able to use it as a reliable source of information. This issue is investigated in the following three papers...

  13. Regulatory Enforcement and Compliance

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    1999-01-01

    This study of municipal enforcement of agro-environmental regulations in Denmark provides an empirical understanding of how enforcement affects compliance. A key contribution is sorting out the relative influence of inspectors' different styles of enforcement and choices made by enforcement...... agencies. The latter are shown to be more important in bringing about compliance than are inspectors' enforcement styles. Municipal agencies are shown to increase compliance through the use of third parties, more frequent inspection, and setting priorities for inspection of major items. The findings about...

  14. Speed enforcement in Norway

    DEFF Research Database (Denmark)

    Elvik, Rune

    2015-01-01

    and the police. This model makes predictions both about how drivers will adapt to changes in the amount of enforcement (the more enforcement, the less violations) as well as how the police will adapt to changes in the rate of violations (the less violations, the less enforcement). The paper attempts to test...... in the amount of enforcement. The predictions of the game-theoretic model were supported, although the results were not statistically significant in the model of how the police adapt enforcement to changes in the rate of violations....

  15. Enforcement and judicial review

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    The 1990 Amendments to the enforcement provisions of the Clean Air Act generally give the Administrator and the courts broader powers to enforce the substantive provisions of the Act. The changes include wider applicability of civil sanctions, increased criminal penalties, broader emergency powers, broader inspection powers, and increased citizen involvement in enforcement and administrative decisionmaking. Another significant change is the addition of an administrative penalty scheme that would allow EPA to use streamlined procedures to assess administrative penalties of up to $200,000 (or more, in some cases). Furthermore, the Amendments extend the prohibition against entering into government contracts with violators to other facilities owned or operated by the convicted person. This chapter summarizes the statutory enforcement provisions of the Clean Air Act. It covers the new civil and criminal enforcement provisions, the new administrative penalty scheme, and the new provisions allowing broader public involvement in enforcement proceedings

  16. Environmental Enforcement Districts

    Data.gov (United States)

    Vermont Center for Geographic Information — Current statewide map of the geographic territories of Environmental Enforcement Officers. Part of a dataset that contains administrative boundaries for Vermont's...

  17. Significant NRC Enforcement Actions

    Data.gov (United States)

    Nuclear Regulatory Commission — This dataset provides a list of Nuclear Regulartory Commission (NRC) issued significant enforcement actions. These actions, referred to as "escalated", are issued by...

  18. Women in Law Enforcement.

    Science.gov (United States)

    Jones, Regina

    1991-01-01

    The lack of roles for African-American female police officers has not stopped black women from gaining momentum in law enforcement. Women still comprise less than 10 percent of all police officers, but growing numbers of black women are finding meaningful work in law enforcement. (SLD)

  19. Distributed Enforcement of Service Choreographies

    Directory of Open Access Journals (Sweden)

    Marco Autili

    2015-02-01

    Full Text Available Modern service-oriented systems are often built by reusing, and composing together, existing services distributed over the Internet. Service choreography is a possible form of service composition whose goal is to specify the interactions among participant services from a global perspective. In this paper, we formalize a method for the distributed and automated enforcement of service choreographies, and prove its correctness with respect to the realization of the specified choreography. The formalized method is implemented as part of a model-based tool chain released to support the development of choreography-based systems within the EU CHOReOS project. We illustrate our method at work on a distributed social proximity network scenario.

  20. Constitutionality of enforcement of claims by private enforcement agents

    Directory of Open Access Journals (Sweden)

    Bodiroga Nikola

    2014-01-01

    Full Text Available The main focus of this paper is legal status of private enforcement agents in Serbia. The 2011 Serbian Law on Enforcement and Security has introduced private enforcement agents as legal professionals in charge mainly for carrying out of the enforcement. Special enforcement procedure for collection of utilities and similar claims has become exclusive competence of private enforcement agents. Since enforcement procedure has always been regarded as a set of coercive measures against enforcement debtor, it became questionable whether this coercion could be exercised by private enforcement agents. It has been argued by legal scholars that enforcement of civil judgments and other enforcement deeds belongs only to the state authority. The author tackles this issue from the standpoint of decisions of constitutional courts and jurisprudence of European Court of Human Rights.

  1. Judicial supervision of enforcement agents

    Directory of Open Access Journals (Sweden)

    Bodiroga Nikola

    2015-01-01

    Full Text Available The main focus of this paper is the supervision of enforcement agents conducted by enforcement courts. Law on Enforcement and Security recognizes three levels of control of enforcement agents. Certain monitoring powers are delegated to the Ministry of Justice and to Chamber of Enforcement Agents. However, for parties and other participants to enforcement proceedings control of enforcement agents implemented by enforcement courts seems to be the most important one. The strongest powers of enforcement agents are related to the special procedure for collection of claims for utilities and other similar services (exclusive competence of enforcement agents and for carrying out the enforcement (if enforcement creditor has requested it. When it comes to special procedure for collection of claims for utilities and other similar services objection can be used in order to control legality of decisions rendered by enforcements agents. However, many procedural issues related to the objection procedure remain unsolved. Motion for correction of irregularities is the only legal remedy that can be used when enforcement is being carried out by enforcement agents. This legal remedy cannot be considered an effective one in the sense of Article 13 European Convention for Protection of Human Rights and Fundamental Liberties. The new proposed Law on Enforcement and Security expected to come into force on July 1, 2016, will delegate the exclusive competence for carrying out the enforcement to enforcement agents (except cases related to family relations and reinstatement, but it will not improve the court supervision of their work.

  2. Drug Enforcement Administration.

    Science.gov (United States)

    Department of Justice, Washington, DC.

    This fact sheet contains information relating to drug abuse and abusers; drug traffic legislation; law enforcement; and descriptions of commonly used narcotics, stimulants, depressants, and hallucinogens. Also included is a short but explicit listing of audiovisual aids, an annotated bibliography, and drug identification pictures. The booklet…

  3. Urban Street Gang Enforcement.

    Science.gov (United States)

    Institute for Law and Justice, Inc., Alexandria, VA.

    Strategies to enhance prosecution of gang-related crimes are presented, with a focus on enforcement and prosecution targeting urban street gangs. The model programs introduced offer strategies largely based on the practical experiences of agencies that participated in a demonstration program, the Urban Street Gang Drug Trafficking Enforcement…

  4. Risk Analysis Based Business Rule Enforcement for Intelligent Decision Support

    Science.gov (United States)

    Vasilecas, Olegas; Smaizys, Aidas; Brazinskas, Ramunas

    Intelligent information systems are acting by structured rules and do not deal with possible impact on the business environment or future consequences. That is the main reason why automated decisions based on such rules cannot take responsibility and requires involvement or approval of dedicated business people. This limits decision automation possibilities in information systems. However, business rules describe business policy and represent business logics. This can be used in intelligent information systems, together with risk assessment model to simulate real business environment and evaluate possible impact of automated decisions, to support intelligent decision automation. The chapter proposes risk and business rule model integration to provide full intelligent decision automation model used for business rule enforcement and implementation into intelligent software systems of information systems.

  5. Certification/enforcement analysis

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    Industry compliance with minimum energy efficiency standards will be assured through a two-part program approach of certification and enforcement activities. The technical support document (TSD) presents the analyses upon which the proposed rule for assuring that consumer product comply with applicable energy efficiency standards is based. Much of the TSD is based upon support provided DOE by Vitro Laboratories. The OAO Corporation provided additional support in the development of the sampling plan incorporated in the proposed rule. Vitro's recommended approach to appliance certification and enforcement, developed after consideration of various program options, benefits, and impacts, establishes the C/E program framework, general criteria, and procedures for assuring a specified level of energy efficiency performance of covered consumer products. The results of the OAO analysis are given in Volume II of the TSD.

  6. Optimizing Web Service Composition While Enforcing Regulations

    Science.gov (United States)

    Sohrabi, Shirin; McIlraith, Sheila A.

    To direct automated Web service composition, it is compelling to provide a template, workflow or scaffolding that dictates the ways in which services can be composed. In this paper we present an approach to Web service composition that builds on work using AI planning, and more specifically Hierarchical Task Networks (HTNs), for Web service composition. A significant advantage of our approach is that it provides much of the how-to knowledge of a choreography while enabling customization and optimization of integrated Web service selection and composition based upon the needs of the specific problem, the preferences of the customer, and the available services. Many customers must also be concerned with enforcement of regulations, perhaps in the form of corporate policies and/or government regulations. Regulations are traditionally enforced at design time by verifying that a workflow or composition adheres to regulations. Our approach supports customization, optimization and regulation enforcement all at composition construction time. To maximize efficiency, we have developed novel search heuristics together with a branch and bound search algorithm that enable the generation of high quality compositions with the performance of state-of-the-art planning systems.

  7. Enforcement handbook: Enforcement of DOE nuclear safety requirements

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    This Handbook provides detailed guidance and procedures to implement the General Statement of DOE Enforcement Policy (Enforcement Policy or Policy). A copy of this Enforcement Policy is included for ready reference in Appendix D. The guidance provided in this Handbook is qualified, however, by the admonishment to exercise discretion in determining the proper disposition of each potential enforcement action. As discussed in subsequent chapters, the Enforcement and Investigation Staff will apply a number of factors in assessing each potential enforcement situation. Enforcement sanctions are imposed in accordance with the Enforcement Policy for the purpose of promoting public and worker health and safety in the performance of activities at DOE facilities by DOE contractors (and their subcontractors and suppliers) who are indemnified under the Price-Anderson Amendments Act. These indemnified contractors, and their suppliers and subcontractors, will be referred to in this Handbook collectively as DOE contractors. It should be remembered that the purpose of the Department`s enforcement policy is to improve nuclear safety for the workers and the public, and this goal should be the prime consideration in exercising enforcement discretion.

  8. Enforcement handbook: Enforcement of DOE nuclear safety requirements

    International Nuclear Information System (INIS)

    1995-06-01

    This Handbook provides detailed guidance and procedures to implement the General Statement of DOE Enforcement Policy (Enforcement Policy or Policy). A copy of this Enforcement Policy is included for ready reference in Appendix D. The guidance provided in this Handbook is qualified, however, by the admonishment to exercise discretion in determining the proper disposition of each potential enforcement action. As discussed in subsequent chapters, the Enforcement and Investigation Staff will apply a number of factors in assessing each potential enforcement situation. Enforcement sanctions are imposed in accordance with the Enforcement Policy for the purpose of promoting public and worker health and safety in the performance of activities at DOE facilities by DOE contractors (and their subcontractors and suppliers) who are indemnified under the Price-Anderson Amendments Act. These indemnified contractors, and their suppliers and subcontractors, will be referred to in this Handbook collectively as DOE contractors. It should be remembered that the purpose of the Department's enforcement policy is to improve nuclear safety for the workers and the public, and this goal should be the prime consideration in exercising enforcement discretion

  9. Forest commons and local enforcement

    OpenAIRE

    Chhatre, Ashwini; Agrawal, Arun

    2008-01-01

    This article examines the relationship between local enforcement and forests used as commons. It uses a unique multicountry dataset, created over the past 15 years by the International Forestry Resources and Institutions Research Program. Drawing on original enforcement and forest commons data from 9 countries, we find that higher levels of local enforcement have a strong and positive but complex relationship to the probability of forest regeneration. This relationship holds even when the inf...

  10. Quota enforcement in resource industries

    DEFF Research Database (Denmark)

    Hansen, Lars Gårn; Jensen, Frank; Nøstbakken, Linda

    Quotas or permits are frequently used in the management of renewable resources and emissions. However, in many industries there is concern about the basic e ectiveness of quotas due to non-compliance. We develop an enforcement model of a quota-regulated resource and focus on a situation with signi...... cant non-compliance and exogenous constraints on nes and enforcement budget. We propose a new enforcement system based on self-reporting of excess extraction and explicit di erentiation of inspection rates based on compliance history. In particular, we use state-dependent enforcement to induce rms...

  11. Immigration Enforcement Actions - Annual Report

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  12. Reconsidering Styles of Regulatory Enforcement

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    2000-01-01

    inspectors’ enforcement styles as consisting of multiple components, rather than a single continuum. We show that inspectors’ enforcement styles comprise the degree of formalism and the degree of coercion that they exercise when carrying out inspections. A second contribution is in showing the relationship...

  13. Reconsidering Styles of Regulatory Enforcement

    DEFF Research Database (Denmark)

    J. May, Peter; Winter, Søren

    2007-01-01

    inspectors’ enforcement styles as consisting of multiple components rather than a single continuum. We show that inspectors’ enforcement styles are comprised of the degree formalism and the degree of coercion that they exercise when carrying out inspections. A second contribution is showing the relationship...

  14. Reconsidering Styles of Regulatory Enforcement

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    2000-01-01

    This study addresses enforcement styles of regulatory inspectors, based on an examination of the municipal enforcement of agro-environmental policies in Denmark. Our findings make three contributions to the regulatory literature. One contribution is to add empirical support for theorizing about...

  15. Oversight and enforcement at DOE

    International Nuclear Information System (INIS)

    Fergus, I.E., Christopher, R.K.

    1996-01-01

    This paper addresses recent changes to the independent oversight and enforcement programs within the U.S. Department of Energy (DOE) and applications to criticality safety. DOE's Office of Oversight (Oversight hereafter), in the Office of Environment, Safety, and Health (EH), independently evaluates whether management systems ensure adequate protection of the worker, public, and environment. Oversight has adopted a new approach to performing evaluations based on the guiding principles for safety management identified by the Secretary of Energy. The principles Oversight evaluates are line management responsibility for safety and health, comprehensive requirements, and competence commensurate with responsibilities. Recently, the DOE codified the implementation of integrated safety management, further expounding on these basic guiding principles and Oversight's role. The Office of Enforcement and Investigations in EH (Enforcement hereafter) is responsible for enforcement, and relevant documents describe its role. This paper briefly discusses criticality safety aspects of the twin initiatives of Oversight and Enforcement

  16. HSIP Law Enforcement Locations in New Mexico

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — Law Enforcement Locations Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law Enforcement agencies "are publicly...

  17. Quota enforcement in resource industries

    DEFF Research Database (Denmark)

    Hansen, Lars Gårn; Jensen, Frank; Nøstbakken, Linda

    2014-01-01

    Quotas are frequently used in the management of renewable resources and emissions. However, in many industries there is concern about their basic effectiveness due to non-compliance. We develop an enforcement model of a quota-regulated resource and focus on a situation with significant non......-compliance and exogenous constraints on fines and enforcement budget. We propose a new enforcement system based on self-reporting of excess extraction and explicit differentiation of inspection rates depending on compliance history. We use differentiated inspections to induce firms to self-report excess extraction...

  18. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1989-06-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. Also included are a number of enforcement actions that had been previously resolved but not published in this NUREG. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  19. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1990-05-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1990) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. Also included are a number of enforcement actions that had been previously resolved but not published in this NUREG. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  20. Report: Compliance with Enforcement Instruments

    Science.gov (United States)

    Report #2001-P-00006, March 29, 2001. OECA cannot provide a completely accurate picture of EPA’s enforcement achievements since OECA is not collecting comprehensive data or using appropriate performance measures.

  1. Antitrust Enforcement and Marginal Deterrence

    NARCIS (Netherlands)

    Houba, H.E.D.; Motchenkova, E.; Wen, Q.

    2011-01-01

    Abstract: We study antitrust enforcement in which the fine must obey four legal principles: punishments should fit the crime, proportionality, bankruptcy considerations, and minimum fines. We integrate these legal principles into an infinitely-repeated oligopoly model. Bankruptcy considerations

  2. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1994-03-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October - December 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  3. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1992-11-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July - September 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  4. Financial Private Regulation and Enforcement

    OpenAIRE

    MILLER, Geoffrey

    2011-01-01

    This paper has been delivered within the context of the research project "Transnational Private Regulatory Regimes: Constitutional foundations and governance design". This paper considers the topic of private regulation and enforcement for internationally active financial services firms. The paper documents the following types of regulation and enforcement that involve significant private input: house rules, contracts, internal compliance, management-based regulation, private standard-sett...

  5. 29 CFR 42.6 - Enforcement strategy.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Enforcement strategy. 42.6 Section 42.6 Labor Office of the Secretary of Labor COORDINATED ENFORCEMENT § 42.6 Enforcement strategy. (a) Each Regional Farm Labor... enforcement strategy for each protective statute pursuant to § 42.20(c)(3). The National Committee shall...

  6. 75 FR 8508 - Computerized Tribal IV-D Systems and Office Automation

    Science.gov (United States)

    2010-02-25

    ... automate Tribal child support enforcement operations. This regulation sets forth requirements for... comprehensive Tribal IV-D program may automate its case processing and record-keeping processes through... may elect to automate its case processing and record-keeping processes through the establishment of...

  7. Forest commons and local enforcement.

    Science.gov (United States)

    Chhatre, Ashwini; Agrawal, Arun

    2008-09-09

    This article examines the relationship between local enforcement and forests used as commons. It uses a unique multicountry dataset, created over the past 15 years by the International Forestry Resources and Institutions Research Program. Drawing on original enforcement and forest commons data from 9 countries, we find that higher levels of local enforcement have a strong and positive but complex relationship to the probability of forest regeneration. This relationship holds even when the influence of a number of other factors such as user group size, subsistence, and commercial importance of forests, size of forest, and collective action for forest improvement activities is taken into account. Although several of the above factors have a statistically significant relationship to changes in the condition of forest commons, differences in levels of local enforcement strongly moderate their link with forest commons outcomes. The research, using data from diverse political, social, and ecological contexts, shows both the importance of enforcement to forest commons and some of the limits of forest governance through commons arrangements.

  8. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1993-03-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  9. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1991-02-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1990) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  10. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1992-08-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  11. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1992-03-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  12. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1991-07-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April-June 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  13. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1993-12-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  14. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1993-06-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  15. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1992-05-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  16. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1990-11-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1990) and includes copies of letters, notices, and orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  17. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1991-11-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  18. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1990-03-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  19. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1989-12-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  20. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1991-05-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  1. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1993-09-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  2. Library Automation

    OpenAIRE

    Dhakne, B. N.; Giri, V. V; Waghmode, S. S.

    2010-01-01

    New technologies library provides several new materials, media and mode of storing and communicating the information. Library Automation reduces the drudgery of repeated manual efforts in library routine. By use of library automation collection, Storage, Administration, Processing, Preservation and communication etc.

  3. Public education and enforcement research study (PEERS).

    Science.gov (United States)

    2013-08-01

    In 2001, the Federal Railroad Administration (FRA) and the Illinois Commerce Commission (ICC) established the Public Education and Enforcement Research Study (PEERS) to test the effectiveness of various education and enforcement (E&E) techniques to i...

  4. Process automation

    International Nuclear Information System (INIS)

    Moser, D.R.

    1986-01-01

    Process automation technology has been pursued in the chemical processing industries and to a very limited extent in nuclear fuel reprocessing. Its effective use has been restricted in the past by the lack of diverse and reliable process instrumentation and the unavailability of sophisticated software designed for process control. The Integrated Equipment Test (IET) facility was developed by the Consolidated Fuel Reprocessing Program (CFRP) in part to demonstrate new concepts for control of advanced nuclear fuel reprocessing plants. A demonstration of fuel reprocessing equipment automation using advanced instrumentation and a modern, microprocessor-based control system is nearing completion in the facility. This facility provides for the synergistic testing of all chemical process features of a prototypical fuel reprocessing plant that can be attained with unirradiated uranium-bearing feed materials. The unique equipment and mission of the IET facility make it an ideal test bed for automation studies. This effort will provide for the demonstration of the plant automation concept and for the development of techniques for similar applications in a full-scale plant. A set of preliminary recommendations for implementing process automation has been compiled. Some of these concepts are not generally recognized or accepted. The automation work now under way in the IET facility should be useful to others in helping avoid costly mistakes because of the underutilization or misapplication of process automation. 6 figs

  5. 20 CFR 655.50 - Enforcement process.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Enforcement process. 655.50 Section 655.50... FOREIGN WORKERS IN THE UNITED STATES Labor Certification Process and Enforcement of Attestations for... Workers) § 655.50 Enforcement process. (a) Authority of the WHD Administrator. The WHD Administrator shall...

  6. 75 FR 69573 - Export Enforcement Coordination Center

    Science.gov (United States)

    2010-11-15

    ... Export Enforcement Coordination Center By the authority vested in me as President by the Constitution and... enforcement of United States export control laws and enhanced intelligence exchange in support of such enforcement efforts, it is hereby ordered as follows: Section 1. Policy. Export controls are critical to...

  7. How Contracts and Enforcement Explain Transaction Outcomes

    NARCIS (Netherlands)

    Mooi, E.A.; Gilliland, D.I.

    2013-01-01

    This study considers the influence of contracts on enforcement and the subsequent performance impact of aligned and misaligned enforcement. We define enforcement as a corrective action aimed at remedying problems occurring in the transaction. First we explain the role of contracts and show that at

  8. 78 FR 69133 - Drug Enforcement Administration

    Science.gov (United States)

    2013-11-18

    ... DEPARTMENT OF JUSTICE Drug Enforcement Administration Manufacturer of Controlled Substances..., California 94085, made application by renewal to the Drug Enforcement Administration (DEA) to be registered... Diversion Control, Drug Enforcement Administration. [FR Doc. 2013-27486 Filed 11-15-13; 8:45 am] BILLING...

  9. How to Enforce European Law

    DEFF Research Database (Denmark)

    Rasmussen, Morten

    2017-01-01

    crisis that had evolved in the late 1970s between France and the ECJ, led to a change in the EC’s case law that limited the direct effect of directives to the vertical relation between citizens and the respective member state and excluded any horizontal effect. The story is an example of how the activist...... of the European Commission and the ECJ to strengthen the enforcement of European law. This threatened the deeper balance of competences between the European Community and its member states and consequently led to a sharp response from the national parliaments and courts. The force of these responses and the deep...

  10. Automated External Defibrillator

    Science.gov (United States)

    ... To Health Topics / Automated External Defibrillator Automated External Defibrillator Also known as What Is An automated external ... in survival. Training To Use an Automated External Defibrillator Learning how to use an AED and taking ...

  11. Criminal Enforcement Case Report Data Dictionary | ECHO ...

    Science.gov (United States)

    ECHO, Enforcement and Compliance History Online, provides compliance and enforcement information for approximately 800,000 EPA-regulated facilities nationwide. ECHO includes permit, inspection, violation, enforcement action, and penalty information about facilities regulated under the Clean Air Act (CAA) Stationary Source Program, Clean Water Act (CWA) National Pollutant Elimination Discharge System (NPDES), and/or Resource Conservation and Recovery Act (RCRA). Information also is provided on surrounding demographics when available.

  12. Civil Enforcement Case Report | ECHO | US EPA

    Science.gov (United States)

    ECHO, Enforcement and Compliance History Online, provides compliance and enforcement information for approximately 800,000 EPA-regulated facilities nationwide. ECHO includes permit, inspection, violation, enforcement action, and penalty information about facilities regulated under the Clean Air Act (CAA) Stationary Source Program, Clean Water Act (CWA) National Pollutant Elimination Discharge System (NPDES), and/or Resource Conservation and Recovery Act (RCRA). Information also is provided on surrounding demographics when available.

  13. OSHA Enforcement, Industrial Compliance and Workplace Injuries

    OpenAIRE

    Ann P. Bartel; Lacy Glenn Thomas

    1982-01-01

    This paper develops and tests a three-equation simultaneous model of OSHA enforcement behavior, industrial compliance and workplace injuries. The enforcement equation is based on the assumption that OSHA acts as a political institution that gains support through the transfer of wealth from firms to employees; the empirical results are largely consistent with this notion. Contrary to previous work, we find that OSHA enforcement efforts have, indeed, had a statistically significant impact on in...

  14. Immigration Enforcement Actions: Fiscal Year 2011

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  15. EPA Enforcement and Compliance History Online

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Environmental Protection Agency's Enforcement and Compliance History Online (ECHO) website provides customizable and downloadable information about environmental...

  16. Immigration Enforcement Actions: Fiscal Year 2004

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  17. Immigration Enforcement Actions: Fiscal Year 2012

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  18. Immigration Enforcement Actions: Fiscal Year 2010

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  19. Library Automation.

    Science.gov (United States)

    Husby, Ole

    1990-01-01

    The challenges and potential benefits of automating university libraries are reviewed, with special attention given to cooperative systems. Aspects discussed include database size, the role of the university computer center, storage modes, multi-institutional systems, resource sharing, cooperative system management, networking, and intelligent…

  20. Perspectives on law enforcement in recreation areas

    Science.gov (United States)

    Lawrence C. Hadley

    1971-01-01

    The nature and scope of law-enforcement problems in the National Park System are of increasing concern to park and recreation area managers. A positive response by management in terms of formulating and executing a fully professional and effective enforcement program is vital for sustaining public confidence that Parks are safe for individual and family use. Law...

  1. Law Enforcement School Programs. Fact Sheet

    Science.gov (United States)

    Arkansas Safe Schools Initiative Division, 2010

    2010-01-01

    The school shooting incidents during the decade of the 1990's prompted an increase of law enforcement presence in schools. The School Violence Resource Center (SVRC) at the Criminal Justice Institute (CJI) University of Arkansas System undertook a project to determine what programs law enforcement agencies currently provide in their local schools…

  2. Effective speed management through automatic enforcement.

    NARCIS (Netherlands)

    Oei, H.-l.

    1994-01-01

    This paper analyses several aspects of the Dutch experience of speed enforcement, and presents the results of some speed management experiments in The Netherlands, using automatic warning of speeders and enforcement of speeding. Traditional approaches to manage speed there have not resulted in

  3. 77 FR 47513 - Definition of Enforcement Action

    Science.gov (United States)

    2012-08-09

    ... National Indian Gaming Commission 25 CFR Part 502 Definition of Enforcement Action AGENCY: National Indian... Commission) is amending its regulation setting out definitions to add a definition of ``enforcement action... comprehensive framework for the regulation of gaming on Indian lands. The purposes of IGRA include providing a...

  4. 28 CFR 97.30 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Enforcement. 97.30 Section 97.30 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) STANDARDS FOR PRIVATE ENTITIES PROVIDING PRISONER OR DETAINEE SERVICES § 97.30 Enforcement. Any person who is found in violation of the regulations in this part will: (a...

  5. Defensive Enforcement: Human Rights in Indonesia

    NARCIS (Netherlands)

    Hadiprayitno, I.

    2010-01-01

    The objective of the article is to examine the human rights enforcement in Indonesian legal and political system. This is done by studying the legal basis of human rights, the process of proliferation of human rights discourse, and the actual controversies of human rights enforcement. The study has

  6. 17 CFR 8.05 - Enforcement staff.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Enforcement staff. 8.05... staff. (a) Each exchange shall establish an adequate enforcement staff which shall be authorized by the... staff shall consist of employees of the exchange and/or persons hired on a contract basis. It may not...

  7. 12 CFR 370.11 - Enforcement mechanisms.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Enforcement mechanisms. 370.11 Section 370.11 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY TEMPORARY LIQUIDITY GUARANTEE PROGRAM § 370.11 Enforcement mechanisms. (a) Termination of Participation. If...

  8. Assessment of the NRC Enforcement Program

    International Nuclear Information System (INIS)

    Lieberman, J.; Coblentz, L.

    1995-04-01

    On May 12, 1994, the Executive Director for Operations (EDO) established a Review Team composed of senior NRC managers to re-examine the NRC enforcement program. A copy of the Review Team's charter is enclosed as Appendix A. This report presents the Team's assessment. The purpose of this review effort are: (1) to perform an assessment of the NRC's enforcement program to determine whether the defined purposes of the enforcement program are appropriate; (2) to determine whether the NRC's enforcement practices and procedures for issuing enforcement actions are consistent with those purposes; and (3) to provide recommendations on any changes the Review Team believes advisable. In accordance with its charter, the Review Team considered the following principal issues in conducting its assessment of the enforcement program: the balance between providing deterrence and incentives (both positive and negative) for the identification and correction of violations; the appropriateness of NRC sanctions; whether the commission should seek statutory authority to increase the amount of civil penalties; whether the NRC should use different enforcement policies and practices for different licensees (e.g., materials licensees in contrast to power reactors or large fuel facilities); and whether the commission should establish open enforcement conferences as the normal practice

  9. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    International Nuclear Information System (INIS)

    1998-05-01

    This document includes the US Nuclear Regulatory Commission's (NRC's or Commission's) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC's policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees' health and safety, the common defense and security, and the environment

  10. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    This document includes the US Nuclear Regulatory Commission`s (NRC`s or Commission`s) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC`s policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees` health and safety, the common defense and security, and the environment.

  11. Recent Trends in Antitrust Enforcement

    Directory of Open Access Journals (Sweden)

    Mario Siragusa

    2015-10-01

    Full Text Available This article intends to discuss a selection of the most relevant features of the most recent trends in antitrust enforcement. Firstly, anticompetitive signalling will be addressed: its assessment depends on the kind of information provided. Where such information is of public knowledge or is very well known by the market participants, signalling should not be deemed as anticompetitive. Secondly, the Power Cable case has raised for the first time various problematic issues, such as the possibility to impose parental liability on a purely financial investor, even where the presumed direct infringer would have been able to pay the fine. This appears to be irreconcilable with the objectives for which the case law on parental liability has been elaborated. Thirdly, as to the concept of restriction of competition by object, it is argued that the Intel case does not disavow the principles established in Cartes Bancaires. Indeed, the finding of a violation and the different methodology applied in the first case are only due to its specific factual circumstances. Finally, the nouvelle vague of the case law on the anticompetitive abuse of rights has led to two opposite approaches, one at the EU and the other at the Italian level. The first one, based on the finding of objective circumstances, is perfectly consistent with existing EU case law, while the second, exclusively focused on the exclusionary intent, seems to be in sharp contrast with it. The hope is that the Court of Justice will intervene to resolve this contradiction.

  12. Autonomous Systems: Habitat Automation

    Data.gov (United States)

    National Aeronautics and Space Administration — The Habitat Automation Project Element within the Autonomous Systems Project is developing software to automate the automation of habitats and other spacecraft. This...

  13. An Automation Planning Primer.

    Science.gov (United States)

    Paynter, Marion

    1988-01-01

    This brief planning guide for library automation incorporates needs assessment and evaluation of options to meet those needs. A bibliography of materials on automation planning and software reviews, library software directories, and library automation journals is included. (CLB)

  14. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2006-01-01

    .... but provides the strong security guarantees of modern languages such as Java. A second avenue of language-based work explored a general class of policy enforcement mechanism based on in-line reference monitors (IRM...

  15. Enforcement and Compliance History Online (ECHO) Facilities

    Data.gov (United States)

    U.S. Environmental Protection Agency — ECHO provides integrated compliance and enforcement information for about 800,000 regulated facilities nationwide. Its features range from simple to advanced,...

  16. DNR Division of Enforcement Officer Patrol Areas

    Data.gov (United States)

    Minnesota Department of Natural Resources — This theme shows the DNR Division of Enforcement Office Patrol Areas as of January 1, 2003. Patrol areas were defined and verified by Patrol Officers during the fall...

  17. 39 CFR 7.7 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Enforcement. 7.7 Section 7.7 Postal Service UNITED STATES POSTAL SERVICE THE BOARD OF GOVERNORS OF THE U.S. POSTAL SERVICE PUBLIC OBSERVATION (ARTICLE VII) § 7.7 Enforcement. (a) Under 5 U.S.C. 552b(g), any person may bring a proceeding in the United States...

  18. Citizen enforcement and the smoking gun

    International Nuclear Information System (INIS)

    Unterberger, G.L.

    1991-01-01

    This article addresses the provisions for private citizens to bring lawsuits in federal court against regulated parties violating federal air pollution-control laws and the steps that operators of facilities subject to air pollution-control laws need to take to help avoid significant enforcement liabilities. The topics of the article include a look at citizen enforcement since 1970, the 1990 amendments to the Clean Air Act, construction and management with these regulations

  19. Strengthened enforcement enhances marine sanctuary performance

    Directory of Open Access Journals (Sweden)

    Brendan P. Kelaher

    2015-01-01

    Full Text Available Marine sanctuaries are areas where the extraction of biota is not permitted. Although most marine sanctuaries have a positive influence on biotic communities, not all sanctuaries are meeting their conservation objectives. Amidst possible explanations (e.g., size, age and isolation, insufficient enforcement is often speculated to be a key driver of marine sanctuary underperformance. Despite this, there are few studies directly linking quantitative enforcement data to changes in biotic communities within marine sanctuaries. Here, we used an asymmetrical-BACI experimental design from 2006–2012 to test whether new enforcement initiatives enhanced abundances of target fishes and threatened species in an existing large sub-tropical marine sanctuary relative to areas open to fishing. Implementation of the new enforcement initiatives in 2010 was associated with a 201% increase in annual fine rate and a significant increase in target fish and elasmobranch abundance, as well as sightings of a critically-endangered shark, in the marine sanctuary relative to areas open to fishing. Overall, these results demonstrate that strengthening enforcement can have a rapid positive influence on target fish and perhaps threatened species in a subtropical marine sanctuary. From this, we contend that increased enforcement guided by risk-based compliance planning and operations may be a useful first step for improving underperforming marine sanctuaries.

  20. Automated Budget System -

    Data.gov (United States)

    Department of Transportation — The Automated Budget System (ABS) automates management and planning of the Mike Monroney Aeronautical Center (MMAC) budget by providing enhanced capability to plan,...

  1. Automation 2017

    CERN Document Server

    Zieliński, Cezary; Kaliczyńska, Małgorzata

    2017-01-01

    This book consists of papers presented at Automation 2017, an international conference held in Warsaw from March 15 to 17, 2017. It discusses research findings associated with the concepts behind INDUSTRY 4.0, with a focus on offering a better understanding of and promoting participation in the Fourth Industrial Revolution. Each chapter presents a detailed analysis of a specific technical problem, in most cases followed by a numerical analysis, simulation and description of the results of implementing the solution in a real-world context. The theoretical results, practical solutions and guidelines presented are valuable for both researchers working in the area of engineering sciences and practitioners looking for solutions to industrial problems. .

  2. Marketing automation

    Directory of Open Access Journals (Sweden)

    TODOR Raluca Dania

    2017-01-01

    Full Text Available The automation of the marketing process seems to be nowadays, the only solution to face the major changes brought by the fast evolution of technology and the continuous increase in supply and demand. In order to achieve the desired marketing results, businessis have to employ digital marketing and communication services. These services are efficient and measurable thanks to the marketing technology used to track, score and implement each campaign. Due to the technical progress, the marketing fragmentation, demand for customized products and services on one side and the need to achieve constructive dialogue with the customers, immediate and flexible response and the necessity to measure the investments and the results on the other side, the classical marketing approached had changed continue to improve substantially.

  3. Powerful subjects of tax law enforcement

    Directory of Open Access Journals (Sweden)

    Igor Dementyev

    2017-01-01

    Full Text Available УДК 342.6The subject. Competence of government bodies and their officials in the sphere of application of the tax law is considered in the article.The purpose of research is to determine the ratio of tax enforcement and application of the tax law, as well as the relationship between the concepts “party of tax enforcement” and “participant of tax legal relations”.Main results and scope of their application. The circle of participants of tax legal relations is broader than the circle of parties of tax law enforcement. The participants of tax legal relations are simultaneously the subjects of tax law, because they realize their tax status when enter into the tax relationships. The tax and customs authorities are the undoubted parties of the tax law enforcement.Although the financial authorities at all levels of government are not mentioned by article 9 of the Tax Code of the Russian Federation as participants of tax relations, they are parties of tax enforcement, because they make the agreement for deferment or installment payment of regional and local taxes.Scope of application. Clarification of participants of tax legal relations and determination of their mutual responsibility is essential to effective law enforcement.Conclusion. It was concluded that the scope tax law enforcement is tax proceedings, not administrative proceedings, civil (arbitration proceedings or enforcement proceedings.The application of the tax law is carried out not only in the form of tax relations, but also in relations of other branches of law.

  4. Both Automation and Paper.

    Science.gov (United States)

    Purcell, Royal

    1988-01-01

    Discusses the concept of a paperless society and the current situation in library automation. Various applications of automation and telecommunications are addressed, and future library automation is considered. Automation at the Monroe County Public Library in Bloomington, Indiana, is described as an example. (MES)

  5. Psychiatric Disability in Law Enforcement Officers.

    Science.gov (United States)

    Price, Marilyn

    2017-03-01

    Law enforcement officers all across the world are exposed to violence, confrontation, and traumatic incidents. They regularly witness death and suffering and are at risk of personal injury. Psychiatric sequelae include an increased risk for trauma-related symptoms, depression, alcohol-use disorders, and stress-related medical conditions. Law enforcement officers have been applying for early disability retirement pensions at an increased rate for stress-related psychiatric and medical conditions. As a result, law enforcement agencies are prematurely losing valuable resources, officers with training and experience. Departments have become proactive in trying to address mental health issues to prevent psychiatric disability by implementing employee wellness plans and stress reduction interventions. Programs have been developed to mitigate the effects of stress on law enforcement personnel. Many law enforcement agencies have developed strategies to encourage early confidential referral for psychiatric treatment. They utilize peer support groups and employee assistance programs and develop alliances with mental health professionals. When these approaches fail, a fitness for duty process can be used to identify impairment in work functioning due to psychiatric factors with the prospect of later returning the officer to full duty. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  6. Human Trafficking in Indonesia: Law Enforcement Problems

    Directory of Open Access Journals (Sweden)

    Nathalina Naibaho

    2011-01-01

    Full Text Available Human trafficking is considered as a crime against humanity. To conduct the due process of law towards cases related with human trafficking, the law enforcement officers cannot work by themselves. They really need assistance from many parties – such as active report from the society – as a valuable information to disclose such cases. Law enforcement conducted towards woman and child trafficking is still ineffective. It is proven by many existing cases, that low number of processed cases before the court and minimum sanction convicted to the perpetrators is clearly evident. Factors which are deemed to have correlation with low attempt of law enforcement towards legal case on this case, among others are: Lack of the Government’s commitment to fight against the crime of human trafficking, in the event that the ineffectiveness in utilization of prevailing laws and regulation; Lack of capacity of professionalism of law enforcement agency (and relevant parties in handling women and child trafficking at the field. This may be caused by lack of knowledge on infringed regulation. For that matter, those law enforcement agency shall be given socialization and an SOP (standardized operational procedure, so that there will be no inconsistency in handling the existing cases.

  7. Flow enforcement algorithms for ATM networks

    DEFF Research Database (Denmark)

    Dittmann, Lars; Jacobsen, Søren B.; Moth, Klaus

    1991-01-01

    Four measurement algorithms for flow enforcement in asynchronous transfer mode (ATM) networks are presented. The algorithms are the leaky bucket, the rectangular sliding window, the triangular sliding window, and the exponentially weighted moving average. A comparison, based partly on teletraffic...... theory and partly on signal processing theory, is carried out. It is seen that the time constant involved increases with the increasing burstiness of the connection. It is suggested that the RMS measurement bandwidth be used to dimension linear algorithms for equal flow enforcement characteristics....... Implementations are proposed on the block diagram level, and dimensioning examples are carried out when flow enforcing a renewal-type connection using the four algorithms. The corresponding hardware demands are estimated aid compared...

  8. Law Enforcement of Cyber Terorism in Indonesia

    Directory of Open Access Journals (Sweden)

    Sri Ayu Astuti

    2015-12-01

    Full Text Available Cyber terrorism is one of the category of crimes that cross border organized and has been established as an extraordinary crime. This crime is becoming a serious threat to countries in the world. In this regard, the Government's attitude of firmness needed to enforce cyber laws against the freedom development in social media. The development of the immeasurable it in the country of Indonesia required the limitations by doing legal liability over the behavior of law which deviates towards the use of technology tools. Strict law enforcement efforts as a clear attitude to stop actively moving massive terrorism, by enacting the provisions of the law on information and electronic transactions as well as the law of terrorism effectively. How To Cite: Astuti, S. (2015. Law Enforcement of Cyber Terorism in Indonesia. Rechtsidee, 2(2, 157-178. doi:http://dx.doi.org/10.21070/jihr.v2i2.82

  9. On avoidance activities in fishery enforcement models

    DEFF Research Database (Denmark)

    Jensen, Frank; Kronbak, Lone Grønbæk; Abildtrup, Jens

    2014-01-01

    Compliance and enforcement in fisheries are important issues from an economic point of view since management measures are useless without a certain level of enforcement. These conclusions come from the well-established theoretical literature on compliance and enforcement problems within fisheries...... the likelihood of being detected when noncomplying. The paper presents a model of fisheries that allows the fishermen to engage in avoidance activities. The conclusions from the model are that, under certain circumstances, fines are costly transfers to society since they not only have a direct positive effect...... offenders. For an externality, that has an exogenous effect on other actors, Malik shows that fines are only costly transfers for conditional deterrence (when one actor is deterred while another actor is not). For fisheries, we show that fines are also costly transfers under no deterrence (when no agents...

  10. 40 CFR 745.118 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Enforcement. 745.118 Section 745.118 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT LEAD-BASED..., together with reasonable attorney fees and any expert witness fees, if that party prevails. (e) Failure or...

  11. Intergroup Bias in Parliamentary Rule Enforcement

    DEFF Research Database (Denmark)

    Hjorth, Frederik Georg

    2016-01-01

    Political actors are often assigned roles requiring them to enforce rules without giving in-groups special treatment. But are such institutional roles likely to be successful? Here, I exploit a special case of exogenously assigned intergroup relations: debates in the Danish Parliament, in which...

  12. 8 CFR 270.2 - Enforcement procedures.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Enforcement procedures. 270.2 Section 270.2 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS PENALTIES FOR DOCUMENT... charges for document fraud committed by refugees at the time of entry. The Service shall not issue a...

  13. Commercial Court and Enforcement Assessment Tool

    OpenAIRE

    Ebeid, Omniah; Gramckow, Heike

    2016-01-01

    An effective and efficient justice system is essential for sustained economic growth. In a well-functioning, independent, and efficient justice system, decisions are taken within a reasonable time and are predictably and effectively enforced, and individual rights, including property rights, are adequately protected. Among other objectives, the efficiency of the judicial system is importan...

  14. 31 CFR 103.56 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... Money and Finance: Treasury Regulations Relating to Money and Finance FINANCIAL RECORDKEEPING AND REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS General Provisions § 103.56 Enforcement. (a) Overall... domestic financial institutions relevant to the recordkeeping or reporting requirements of this part. (g...

  15. Intimate Partner Violence within Law Enforcement Families

    Science.gov (United States)

    Anderson, Anita S.; Lo, Celia C.

    2011-01-01

    Using data from the Baltimore Police Stress and Domestic Violence study, the authors examined how exposure to stressful events on the job affects law enforcement employees' physical aggression toward domestic partners, evaluating the role of negative emotions and authoritarian spillover in mediating the impact of such task-related stress. The…

  16. 77 FR 33786 - NRC Enforcement Policy Revision

    Science.gov (United States)

    2012-06-07

    ..., ``Factors Affecting Assessment of Violations'' The phrase ``onsite or offsite chemical hazard exposures... construction activities, flexibility is needed to factor in the lower risk associated with certain violations... address construction-related topics, including enforcement discretion. DATES: This revision of the NRC...

  17. 16 CFR 1602.1 - Enforcement policy.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Enforcement policy. 1602.1 Section 1602.1 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION FLAMMABLE FABRICS ACT REGULATIONS STATEMENTS OF..., set aside, or repealed by the Consumer Product Safety Commission, by any court of competent...

  18. Price-Anderson Nuclear Safety Enforcement Program. 1996 Annual report

    International Nuclear Information System (INIS)

    1996-01-01

    This first annual report on DOE's Price Anderson Amendments Act enforcement program covers the activities, accomplishments, and planning for calendar year 1996. It also includes the infrastructure development activities of 1995. It encompasses the activities of the headquarters' Office of Enforcement in the Office of Environment, Safety and Health (EH) and Investigation and the coordinators and technical advisors in DOE's Field and Program Offices and other EH Offices. This report includes an overview of the enforcement program; noncompliances, investigations, and enforcement actions; summary of significant enforcement actions; examples where enforcement action was deferred; and changes and improvements to the program

  19. Informed consent: Enforcing pharmaceutical companies' obligations abroad.

    Science.gov (United States)

    Lee, Stacey B

    2010-06-15

    The past several years have seen an evolution in the obligations of pharmaceutical companies conducting clinical trials abroad. Key players, such as international human rights organizations, multinational pharmaceutical companies, the United States government and courts, and the media, have played a significant role in defining these obligations. This article examines how such obligations have developed through the lens of past, present, and future recommendations for informed consent protections. In doing so, this article suggests that, no matter how robust obligations appear, they will continue to fall short of providing meaningful protection until they are accompanied by a substantive enforcement mechanism that holds multinational pharmaceutical companies accountable for their conduct. Issues of national sovereignty, particularly in the United States, will continue to prevent meaningful enforcement by an international tribunal or through one universally adopted code of ethics. This article argues that, rather than continuing to pursue an untenable international approach, the Alien Torts Statute (ATS) offers a viable enforcement mechanism, at least for US-based pharmaceutical companies. Recent federal appellate court precedent interpreting the ATS provides the mechanism for granting victims redress and enforcing accountability of sponsors (usually pharmaceutical companies and research and academic institutions) for informed consent misconduct. Substantive human rights protections are vital in order to ensure that every person can realize the "right to health." This article concludes that by building on the federal appellate court's ATS analysis, which grants foreign trial participants the right to pursue claims of human rights violations in US courts, a mechanism can be created for enforcing not only substantive informed consent, but also human rights protections.

  20. Appendix F. Developmental enforcement algorithm definition document : predictive braking enforcement algorithm definition document.

    Science.gov (United States)

    2012-05-01

    The purpose of this document is to fully define and describe the logic flow and mathematical equations for a predictive braking enforcement algorithm intended for implementation in a Positive Train Control (PTC) system.

  1. EPA Enforcement and Compliance History Online: EPA Enforcement Action Data Set

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Enforcement and Compliance History Online (ECHO) data sets have been compiled for access to larger sets of national data to ensure that ECHO meets your data...

  2. Autonomy and Automation

    Science.gov (United States)

    Shively, Jay

    2017-01-01

    A significant level of debate and confusion has surrounded the meaning of the terms autonomy and automation. Automation is a multi-dimensional concept, and we propose that Remotely Piloted Aircraft Systems (RPAS) automation should be described with reference to the specific system and task that has been automated, the context in which the automation functions, and other relevant dimensions. In this paper, we present definitions of automation, pilot in the loop, pilot on the loop and pilot out of the loop. We further propose that in future, the International Civil Aviation Organization (ICAO) RPAS Panel avoids the use of the terms autonomy and autonomous when referring to automated systems on board RPA. Work Group 7 proposes to develop, in consultation with other workgroups, a taxonomy of Levels of Automation for RPAS.

  3. An automated swimming respirometer

    DEFF Research Database (Denmark)

    STEFFENSEN, JF; JOHANSEN, K; BUSHNELL, PG

    1984-01-01

    An automated respirometer is described that can be used for computerized respirometry of trout and sharks.......An automated respirometer is described that can be used for computerized respirometry of trout and sharks....

  4. Configuration Management Automation (CMA) -

    Data.gov (United States)

    Department of Transportation — Configuration Management Automation (CMA) will provide an automated, integrated enterprise solution to support CM of FAA NAS and Non-NAS assets and investments. CMA...

  5. Law Enforcement Strategies for Preventing Rail Trespassing Risk Factors.

    Science.gov (United States)

    2016-03-01

    The Volpe Center has investigated law enforcement methods that have successfully prevented trespassing along the railroad right of way. The types of law enforcement strategies currently being used and procedures followed in the field are documented, ...

  6. 48 CFR 1322.406 - Administration and enforcement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Administration and enforcement. 1322.406 Section 1322.406 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE... Involving Construction 1322.406 Administration and enforcement. ...

  7. 48 CFR 1222.406 - Administration and enforcement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Administration and enforcement. 1222.406 Section 1222.406 Federal Acquisition Regulations System DEPARTMENT OF TRANSPORTATION... Involving Construction 1222.406 Administration and enforcement. ...

  8. 40 CFR 204.57 - Selective enforcement auditing.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing. 204.57 Section 204.57 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT... enforcement auditing. ...

  9. 40 CFR 205.57 - Selective enforcement auditing requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing requirements. 205.57 Section 205.57 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE... Selective enforcement auditing requirements. ...

  10. 40 CFR 205.160 - Selective enforcement auditing (SEA) requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing (SEA) requirements. 205.160 Section 205.160 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... Selective enforcement auditing (SEA) requirements. ...

  11. Fusing Intelligence With Law Enforcement Information: An Analytic Imperative

    National Research Council Canada - National Science Library

    Thornlow, Christopher C

    2005-01-01

    ... and Law Enforcement Communities to fuse and analyze foreign threat intelligence with domestic law enforcement information in a timely fashion to provide adequate indications and warning of such an...

  12. Child Support Enforcement Annual Data Report Form 157

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  13. Law Enforcement Support Office (LESO) 1999 National Conference

    National Research Council Canada - National Science Library

    Lytle, Michael

    1999-01-01

    The Law Enforcement Support Office (LESO) national conference was a three-day forum to inform and update federal, state and local law enforcement agents, of the DoD role supporting the National Drug Control Strategy...

  14. Child Support Enforcement Annual Data Reports Form 157 - YR 2013

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  15. Automation in College Libraries.

    Science.gov (United States)

    Werking, Richard Hume

    1991-01-01

    Reports the results of a survey of the "Bowdoin List" group of liberal arts colleges. The survey obtained information about (1) automation modules in place and when they had been installed; (2) financing of automation and its impacts on the library budgets; and (3) library director's views on library automation and the nature of the…

  16. Local Immigration Enforcement and Arrests of the Hispanic Population

    OpenAIRE

    Michael Coon

    2017-01-01

    Section 287(g) of the Immigration and Nationality Act (INA), which was added to the INA by the Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (IIRIRA), allows the federal government to enter into voluntary partnerships with state and local law enforcement agencies to enforce immigration law. Upon entering these agreements, law enforcement officers are trained by Immigration and Customs Enforcement (ICE) and receive delegated authority to enquire about an individual’s immi...

  17. A Comparison of Military and Law Enforcement Body Armour

    OpenAIRE

    Robin Orr; Ben Schram; Rodney Pope

    2018-01-01

    Law-enforcement officers increasingly wear body armour for protection; wearing body armour is common practice in military populations. Law-enforcement and military occupational demands are vastly different and military-styled body armour may not be suitable for law-enforcement. This study investigated differences between selected military body armour (MBA: 6.4 kg) and law-enforcement body armour (LEBA: 2.1 kg) in impacts on postural sway, vertical jump, agility, a functional movement screen (...

  18. 12 CFR 908.11 - Jurisdiction and enforcement.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Jurisdiction and enforcement. 908.11 Section... Proceedings § 908.11 Jurisdiction and enforcement. (a) Enforcement. In accordance with sections 2B(a)(5) and... Directors under this part. Such court shall have jurisdiction and power to order and require compliance with...

  19. 10 CFR 431.198 - Enforcement testing for distribution transformers.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Enforcement testing for distribution transformers. 431.198... COMMERCIAL AND INDUSTRIAL EQUIPMENT Distribution Transformers Compliance and Enforcement § 431.198 Enforcement testing for distribution transformers. (a) Test notice. Upon receiving information in writing...

  20. Fisheries Regulation and Enforcement in Indonesia, Malaysia and the Phillipines

    OpenAIRE

    Susilowati, Indah

    1998-01-01

    Non compliance incidence in the fisheries of Indonesia, Malaysia and the Philippines were found relatively high. The fisheries management is effectively applied when compliance is attained. In order to secure the compliance enforcement and surveillance are needed. In fact, enforcement is costly. This paper suggests adopting the ‘cheap' enforcement and surveillance strategy using co-management approach.

  1. 32 CFR 634.26 - Traffic law enforcement principles.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Traffic law enforcement principles. 634.26 Section 634.26 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW... law enforcement principles. (a) Traffic law enforcement should motivate drivers to operate vehicles...

  2. 50 CFR 10.22 - Law enforcement offices.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 1 2010-10-01 2010-10-01 false Law enforcement offices. 10.22 Section 10... GENERAL PROVISIONS Addresses § 10.22 Law enforcement offices. Service law enforcement offices and their areas of responsibility follow. Mail should be addressed: “Assistant Regional Director, Division of Law...

  3. 20 CFR 638.805 - Security and law enforcement.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Security and law enforcement. 638.805 Section... and law enforcement. (a) The Job Corps Director shall provide guidelines to protect the security of... jurisdiction with the appropriate State and locality with respect to criminal law enforcement as long as a...

  4. 45 CFR 5.68 - Exemption seven: Law enforcement.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Exemption seven: Law enforcement. 5.68 Section 5... INFORMATION REGULATIONS Reasons for Withholding Some Records § 5.68 Exemption seven: Law enforcement. We are not required to disclose information or records that the government has compiled for law enforcement...

  5. 77 FR 12981 - Establishment of the Interagency Trade Enforcement Center

    Science.gov (United States)

    2012-03-05

    ... monitoring and enforcement of U.S. rights under international trade agreements, and enforcement of domestic... capacity to monitor and enforce U.S. trade rights and domestic trade laws, and thereby enhance market... our international trade agreements and under domestic trade laws. Sec. 2. Establishment. (a) There is...

  6. 24 CFR 115.305 - Special enforcement effort (SEE) funds.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Special enforcement effort (SEE... Housing Assistance Program § 115.305 Special enforcement effort (SEE) funds. (a) SEE funds are funds that HUD may provide to an agency to enhance enforcement activities of the agency's fair housing law. SEE...

  7. 15 CFR 280.204 - Institution of administrative enforcement proceedings.

    Science.gov (United States)

    2010-01-01

    ... and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE ACCREDITATION... enforcement proceedings. (a) Charging letters. The Director of the Office of Export Enforcement (OEE) may begin administrative enforcement proceedings under this part by issuing a charging letter. The charging...

  8. 10 CFR 431.383 - Enforcement process for electric motors.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Enforcement process for electric motors. 431.383 Section... COMMERCIAL AND INDUSTRIAL EQUIPMENT Enforcement § 431.383 Enforcement process for electric motors. (a) Test... motor sold by a particular manufacturer or private labeler, which indicates that the electric motor may...

  9. Road Transportation and Traffic Law Enforcement in Nigeria: A case ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2014-06-01

    Jun 1, 2014 ... identified these challenges, the study recommended among others, adequate funding of the corps, effective enforcement of existing road traffic laws by all the relevant law enforcement agencies, training of the law enforcement personnel and construction of befitting roads. Key words: Road Transportation, ...

  10. Hybrid static-runtime information flow and declassification enforcement

    NARCIS (Netherlands)

    Rocha, Bruno P.S.; Conti, Mauro; Etalle, Sandro; Crispo, Bruno

    There are different paradigms for enforcing information flow and declassification policies. These approaches can be divided into static analyzers and runtime enforcers. Each class has its own strengths and weaknesses, each being able to enforce a different set of policies. In this paper, we

  11. 47 CFR 68.414 - Hearing aid-compatibility: Enforcement.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Hearing aid-compatibility: Enforcement. 68.414... (CONTINUED) CONNECTION OF TERMINAL EQUIPMENT TO THE TELEPHONE NETWORK Complaint Procedures § 68.414 Hearing aid-compatibility: Enforcement. Enforcement of §§ 68.4 and 68.112 is hereby delegated to those states...

  12. Forensic imaging tools for law enforcement

    Energy Technology Data Exchange (ETDEWEB)

    SMITHPETER,COLIN L.; SANDISON,DAVID R.; VARGO,TIMOTHY D.

    2000-01-01

    Conventional methods of gathering forensic evidence at crime scenes are encumbered by difficulties that limit local law enforcement efforts to apprehend offenders and bring them to justice. Working with a local law-enforcement agency, Sandia National Laboratories has developed a prototype multispectral imaging system that can speed up the investigative search task and provide additional and more accurate evidence. The system, called the Criminalistics Light-imaging Unit (CLU), has demonstrated the capabilities of locating fluorescing evidence at crime scenes under normal lighting conditions and of imaging other types of evidence, such as untreated fingerprints, by direct white-light reflectance. CLU employs state of the art technology that provides for viewing and recording of the entire search process on videotape. This report describes the work performed by Sandia to design, build, evaluate, and commercialize CLU.

  13. Nuclear forensics in law enforcement applications

    International Nuclear Information System (INIS)

    Grant, P.M.; Moody, K.J.; Hutcheon, I.D.; Phinney, D.L.; Whipple, R.E.; Haas, J.S.; Alcaraz, A.; Andrews, J.E.; Klunder, G.L.; Russo, R.E.

    1998-01-01

    Over the past several years, the Livermore Forensic Science Center has conducted analyses of nuclear-related samples in conjunction with domestic and international criminal investigations. Law enforcement officials have sought conventional and nuclear-forensic analyses of questioned specimens that have typically consisted of miscellaneous metal species or actinide salts. The investigated activities have included nuclear smuggling and the proliferation of alleged fissionable materials, nonradioactive hoaxes such as 'Red Mercury', and the interdiction of illegal laboratories engaged in methamphetamine synthesis. (author)

  14. Immigration Enforcement Within the United States

    Science.gov (United States)

    2006-04-06

    interior enforcement lack a border component. For example, fugitive taskforces, investigations of alien slavery and sweatshops , and employer sanctions do...without “reasonable cause .” 53 INA §240(b)(7). Relief includes being able to adjust status, change nonimmigrant classification, or take advantage of the...of cases referred to ICE by CBP, which may cause the agency to miss opportunities to identify and investigate large smuggling operations.120 In

  15. Digital Rights Enforcement for Pervasive Computing Applications

    OpenAIRE

    Dahlem, Dominik

    2005-01-01

    Increasingly, application software is expanding from the desktop into mobile application environments, such as handset devices and embedded systems which are more limited in resources and volatile in their network connectivity. An integrated architecture that can protect intellectual property for both types of environments should offer the promise of reduced software maintenance costs. Software licensing is an existing mechanism by which specific license agreements are enforced be...

  16. Automation in Clinical Microbiology

    Science.gov (United States)

    Ledeboer, Nathan A.

    2013-01-01

    Historically, the trend toward automation in clinical pathology laboratories has largely bypassed the clinical microbiology laboratory. In this article, we review the historical impediments to automation in the microbiology laboratory and offer insight into the reasons why we believe that we are on the cusp of a dramatic change that will sweep a wave of automation into clinical microbiology laboratories. We review the currently available specimen-processing instruments as well as the total laboratory automation solutions. Lastly, we outline the types of studies that will need to be performed to fully assess the benefits of automation in microbiology laboratories. PMID:23515547

  17. Automation of industrial bioprocesses.

    Science.gov (United States)

    Beyeler, W; DaPra, E; Schneider, K

    2000-01-01

    The dramatic development of new electronic devices within the last 25 years has had a substantial influence on the control and automation of industrial bioprocesses. Within this short period of time the method of controlling industrial bioprocesses has changed completely. In this paper, the authors will use a practical approach focusing on the industrial applications of automation systems. From the early attempts to use computers for the automation of biotechnological processes up to the modern process automation systems some milestones are highlighted. Special attention is given to the influence of Standards and Guidelines on the development of automation systems.

  18. Computational infrastructure for law enforcement. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Lades, M.; Kunz, C.; Strikos, I.

    1997-02-01

    This project planned to demonstrate the leverage of enhanced computational infrastructure for law enforcement by demonstrating the face recognition capability at LLNL. The project implemented a face finder module extending the segmentation capabilities of the current face recognition so it was capable of processing different image formats and sizes and create the pilot of a network-accessible image database for the demonstration of face recognition capabilities. The project was funded at $40k (2 man-months) for a feasibility study. It investigated several essential components of a networked face recognition system which could help identify, apprehend, and convict criminals.

  19. The law enforcement agencies in Turkey

    International Nuclear Information System (INIS)

    Aygun, A.

    2001-01-01

    Full text: In Turkey, the law enforcement agencies are gathered into two main authorities. These are as below. 1. Under the Ministry of Interior: General Commander of Gendarmarie; General Directorate of National Police; General Commandery of Coast Guard; 2. Within the Undersecretariat of Customs there are two main service units to combat smuggling. These are: General Directorate of Customs Enforcement (GDCE) and General Directorate of Customs. The responsible areas of these administrations are legally as below: The region of Gendarmarie: It covers rural areas. In that region, Gendarmarie is responsible, inter alia, combating smuggling; The region of police: General Directorate of National Police has performed its tasks, one of which is to combat smuggling in the city areas; The region of Territorial Waters: Coast Guard is related authority in territorial water for, among other things, fighting smuggling. The region of Customs: General Directorate of Customs Enforcement fulfills in these regions as the authority and responsible law enforcement agent. The main difference between GDCE and other law enforcement agencies are: GDCE is the only Administration whose main aim is to struggle against smuggling; Generally, all units conduct their operations in their responsible region, however, if it is necessary, depending on the case, an operation can be performed jointly only in another region in cooperation with the relevant agent. In that context, as far as General Directorate of Customs Enforcement is concerned, fulfilling an operation in other regions is not a legal necessity. Any units of GDCE can seize and do operation all over Turkey by itself, without any regional limitations from legislation. Organizational Structure of the Customs Administration in Turkey - The principle functions of the General Directorate of Customs are: implementation of customs policies, collection of customs taxes, inspection of passengers and goods, also, investigation of smuggling

  20. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  1. Automation systems for radioimmunoassay

    International Nuclear Information System (INIS)

    Yamasaki, Paul

    1974-01-01

    The application of automation systems for radioimmunoassay (RIA) was discussed. Automated systems could be useful in the second step, of the four basic processes in the course of RIA, i.e., preparation of sample for reaction. There were two types of instrumentation, a semi-automatic pipete, and a fully automated pipete station, both providing for fast and accurate dispensing of the reagent or for the diluting of sample with reagent. Illustrations of the instruments were shown. (Mukohata, S.)

  2. Automated stopcock actuator

    OpenAIRE

    Vandehey, N. T.; O\\'Neil, J. P.

    2015-01-01

    Introduction We have developed a low-cost stopcock valve actuator for radiochemistry automation built using a stepper motor and an Arduino, an open-source single-board microcontroller. The con-troller hardware can be programmed to run by serial communication or via two 5–24 V digital lines for simple integration into any automation control system. This valve actuator allows for automated use of a single, disposable stopcock, providing a number of advantages over stopcock manifold systems ...

  3. Automated Analysis of Accountability

    DEFF Research Database (Denmark)

    Bruni, Alessandro; Giustolisi, Rosario; Schürmann, Carsten

    2017-01-01

    that are amenable to automated verification. Our definitions are general enough to be applied to different classes of protocols and different automated security verification tools. Furthermore, we point out formally the relation between verifiability and accountability. We validate our definitions...... with the automatic verification of three protocols: a secure exam protocol, Google’s Certificate Transparency, and an improved version of Bingo Voting. We find through automated verification that all three protocols satisfy verifiability while only the first two protocols meet accountability....

  4. Management Planning for Workplace Automation.

    Science.gov (United States)

    McDole, Thomas L.

    Several factors must be considered when implementing office automation. Included among these are whether or not to automate at all, the effects of automation on employees, requirements imposed by automation on the physical environment, effects of automation on the total organization, and effects on clientele. The reasons behind the success or…

  5. Laboratory Automation and Middleware.

    Science.gov (United States)

    Riben, Michael

    2015-06-01

    The practice of surgical pathology is under constant pressure to deliver the highest quality of service, reduce errors, increase throughput, and decrease turnaround time while at the same time dealing with an aging workforce, increasing financial constraints, and economic uncertainty. Although not able to implement total laboratory automation, great progress continues to be made in workstation automation in all areas of the pathology laboratory. This report highlights the benefits and challenges of pathology automation, reviews middleware and its use to facilitate automation, and reviews the progress so far in the anatomic pathology laboratory. Copyright © 2015 Elsevier Inc. All rights reserved.

  6. Automated cloning methods.; TOPICAL

    International Nuclear Information System (INIS)

    Collart, F.

    2001-01-01

    Argonne has developed a series of automated protocols to generate bacterial expression clones by using a robotic system designed to be used in procedures associated with molecular biology. The system provides plate storage, temperature control from 4 to 37 C at various locations, and Biomek and Multimek pipetting stations. The automated system consists of a robot that transports sources from the active station on the automation system. Protocols for the automated generation of bacterial expression clones can be grouped into three categories (Figure 1). Fragment generation protocols are initiated on day one of the expression cloning procedure and encompass those protocols involved in generating purified coding region (PCR)

  7. Complacency and Automation Bias in the Use of Imperfect Automation.

    Science.gov (United States)

    Wickens, Christopher D; Clegg, Benjamin A; Vieane, Alex Z; Sebok, Angelia L

    2015-08-01

    We examine the effects of two different kinds of decision-aiding automation errors on human-automation interaction (HAI), occurring at the first failure following repeated exposure to correctly functioning automation. The two errors are incorrect advice, triggering the automation bias, and missing advice, reflecting complacency. Contrasts between analogous automation errors in alerting systems, rather than decision aiding, have revealed that alerting false alarms are more problematic to HAI than alerting misses are. Prior research in decision aiding, although contrasting the two aiding errors (incorrect vs. missing), has confounded error expectancy. Participants performed an environmental process control simulation with and without decision aiding. For those with the aid, automation dependence was created through several trials of perfect aiding performance, and an unexpected automation error was then imposed in which automation was either gone (one group) or wrong (a second group). A control group received no automation support. The correct aid supported faster and more accurate diagnosis and lower workload. The aid failure degraded all three variables, but "automation wrong" had a much greater effect on accuracy, reflecting the automation bias, than did "automation gone," reflecting the impact of complacency. Some complacency was manifested for automation gone, by a longer latency and more modest reduction in accuracy. Automation wrong, creating the automation bias, appears to be a more problematic form of automation error than automation gone, reflecting complacency. Decision-aiding automation should indicate its lower degree of confidence in uncertain environments to avoid the automation bias. © 2015, Human Factors and Ergonomics Society.

  8. REGULATION AND ENFORCEMENT OF COMPETITION POLICY

    Directory of Open Access Journals (Sweden)

    Liviana Andreea Niminet

    2014-12-01

    Full Text Available Competition policy starts by shaping a legislative framework. This is aimed to establish boundaries for conducting competition and also sets limits of licit and illicit demarcation, for competitive and anticompetitive practices. The Romanian Competition Law has a divalent approach and it aims to provide specific behavioral conditions in order to stimulate and protect free-market competition, with the ultimate goal of developing a balanced, efficient and competitive economy. Our country’s Competition policy is based on punishing the behavior. There are three such types of anti-competitive behavior, namely: agreements between undertakings, abuse of dominant position and mergers and other concentrations between undertakings. Recent Practice proved that this “enforcement-conduct-punishment” structure is not necessary the best way to address competition and it is high time for authorities to switch both regulation and enforcement of competition from the “classical perspective” towards concepts like “competition advocacy” and “soft power” and give competition policy a new, reshaped face.

  9. Sex Trafficking, Law Enforcement and Perpetrator Accountability

    Directory of Open Access Journals (Sweden)

    Holly Burkhalter

    2012-06-01

    Full Text Available In theory, everyone – except for criminals involved in their exploitation - agrees that children must not be in the sex industry and further, that those who prey on them must be prosecuted and punished. Virtually every country in the world has adopted national laws prohibiting the commercial sexual exploitation of children. International law is clear on this point, as well. Yet, when governments – and NGOs working with them – take action to extract children from commercial sex venues, common ground on protecting children from abuse can quickly erode with concerns about the efficacy of police intervention, the possibility of collateral harm to consenting adult sex workers or a decrease in access to HIV-prevention and related health services. The author argues that healing this divide must come through the reform of local police – and that, without the participation of law enforcement, there can be no long-term protection for children vulnerable to trafficking and related exploitation. In this article, human rights practitioner Holly Burkhalter argues that healing this divide must be accomplished through the reform of local police – and that human rights advocates, local governments and others seeking to combat trafficking cannot achieve long-term, sustainable protection for children without the involvement of law enforcement.

  10. An empirical investigation of compliance and enforcement problems

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Jensen, Frank

    2011-01-01

    Compliance and enforcement are important issues from an economic point of view because management measures are useless without a certain level of enforcement. These conclusions come from the well-established theoretical literature on compliance and enforcement problems within fisheries. This paper...... contributes to the literature by investigating compliance and enforcement in the empirical case of a mixed trawl fishery targeting Norway lobster in Kattegat and Skagerrak located north of Denmark with help from a simulated model. The paper presents results from two simulation models of the case study: one...... at the level of compliance and the private and social benefits of varying enforcement intensities, penalties and management measures as well as combinations thereof. The empirical investigation of the case study indicates the current level of control is too low compared to the optimal level of enforcement...

  11. Towards a High Reliable Enforcement of Safety Regulations - A Workflow Meta Data Model and Probabilistic Failure Management Approach

    Directory of Open Access Journals (Sweden)

    Heiko Henning Thimm

    2016-10-01

    Full Text Available Today’s companies are able to automate the enforcement of Environmental, Health and Safety (EH&S duties through the use of workflow management technology. This approach requires to specify activities that are combined to workflow models for EH&S enforcement duties. In order to meet given safety regulations these activities are to be completed correctly and within given deadlines. Otherwise, activity failures emerge which may lead to breaches against safety regulations. A novel domain-specific workflow meta data model is proposed. The model enables a system to detect and predict activity failures through the use of data about the company, failure statistics, and activity proxies. Since the detection and prediction methods are based on the evaluation of constraints specified on EH&S regulations, a system approach is proposed that builds on the integration of a Workflow Management System (WMS with an EH&S Compliance Information System. Main principles of the failure detection and prediction are described. For EH&S managers the system shall provide insights into the current failure situation. This can help to prevent and mitigate critical situations such as safety enforcement measures that are behind their deadlines. As a result a more reliable enforcement of safety regulations can be achieved.

  12. Criminal Enforcement Case Report Help | ECHO | US EPA

    Science.gov (United States)

    ECHO, Enforcement and Compliance History Online, provides compliance and enforcement information for approximately 800,000 EPA-regulated facilities nationwide. ECHO includes permit, inspection, violation, enforcement action, and penalty information about facilities regulated under the Clean Air Act (CAA) Stationary Source Program, Clean Water Act (CWA) National Pollutant Elimination Discharge System (NPDES), and/or Resource Conservation and Recovery Act (RCRA). Information also is provided on surrounding demographics when available.

  13. Civil Enforcement Case Report Data Dictionary | ECHO | US ...

    Science.gov (United States)

    ECHO, Enforcement and Compliance History Online, provides compliance and enforcement information for approximately 800,000 EPA-regulated facilities nationwide. ECHO includes permit, inspection, violation, enforcement action, and penalty information about facilities regulated under the Clean Air Act (CAA) Stationary Source Program, Clean Water Act (CWA) National Pollutant Elimination Discharge System (NPDES), and/or Resource Conservation and Recovery Act (RCRA). Information also is provided on surrounding demographics when available.

  14. NRC Enforcement Policy Review, July 1995-July 1997

    International Nuclear Information System (INIS)

    Lieberman, J.; Pedersen, R.M.

    1998-04-01

    On June 30, 1995, the Nuclear Regulatory Commission (NRC) issued a complete revision of its General Statement of Policy and Procedure for Enforcement Action (Enforcement Policy) (60 FR 34381). In approving the 1995 revision to the Enforcement Policy, the Commission directed the staff to perform a review of its implementation of the Policy after approximately 2 years of experience and to consider public comments. This report represents the results of that review

  15. Automated System Marketplace 1994.

    Science.gov (United States)

    Griffiths, Jose-Marie; Kertis, Kimberly

    1994-01-01

    Reports results of the 1994 Automated System Marketplace survey based on responses from 60 vendors. Highlights include changes in the library automation marketplace; estimated library systems revenues; minicomputer and microcomputer-based systems; marketplace trends; global markets and mergers; research needs; new purchase processes; and profiles…

  16. Automation benefits BWR customers

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    A description is given of the increasing use of automation at General Electric's Wilmington fuel fabrication plant. Computerised systems and automated equipment perform a large number of inspections, inventory and process operations, and new advanced systems are being continuously introduced to reduce operator errors and expand product reliability margins. (U.K.)

  17. Automate functional testing

    Directory of Open Access Journals (Sweden)

    Ramesh Kalindri

    2014-06-01

    Full Text Available Currently, software engineers are increasingly turning to the option of automating functional tests, but not always have successful in this endeavor. Reasons range from low planning until over cost in the process. Some principles that can guide teams in automating these tests are described in this article.

  18. Automation in Warehouse Development

    NARCIS (Netherlands)

    Hamberg, R.; Verriet, J.

    2012-01-01

    The warehouses of the future will come in a variety of forms, but with a few common ingredients. Firstly, human operational handling of items in warehouses is increasingly being replaced by automated item handling. Extended warehouse automation counteracts the scarcity of human operators and

  19. Identity Management Processes Automation

    Directory of Open Access Journals (Sweden)

    A. Y. Lavrukhin

    2010-03-01

    Full Text Available Implementation of identity management systems consists of two main parts, consulting and automation. The consulting part includes development of a role model and identity management processes description. The automation part is based on the results of consulting part. This article describes the most important aspects of IdM implementation.

  20. Work and Programmable Automation.

    Science.gov (United States)

    DeVore, Paul W.

    A new industrial era based on electronics and the microprocessor has arrived, an era that is being called intelligent automation. Intelligent automation, in the form of robots, replaces workers, and the new products, using microelectronic devices, require significantly less labor to produce than the goods they replace. The microprocessor thus…

  1. Library Automation in Pakistan.

    Science.gov (United States)

    Haider, Syed Jalaluddin

    1998-01-01

    Examines the state of library automation in Pakistan. Discusses early developments; financial support by the Netherlands Library Development Project (Pakistan); lack of automated systems in college/university and public libraries; usage by specialist libraries; efforts by private-sector libraries and the National Library in Pakistan; commonly used…

  2. Library Automation Style Guide.

    Science.gov (United States)

    Gaylord Bros., Liverpool, NY.

    This library automation style guide lists specific terms and names often used in the library automation industry. The terms and/or acronyms are listed alphabetically and each is followed by a brief definition. The guide refers to the "Chicago Manual of Style" for general rules, and a notes section is included for the convenience of individual…

  3. Planning for Office Automation.

    Science.gov (United States)

    Sherron, Gene T.

    1982-01-01

    The steps taken toward office automation by the University of Maryland are described. Office automation is defined and some types of word processing systems are described. Policies developed in the writing of a campus plan are listed, followed by a section on procedures adopted to implement the plan. (Author/MLW)

  4. The Automated Office.

    Science.gov (United States)

    Naclerio, Nick

    1979-01-01

    Clerical personnel may be able to climb career ladders as a result of office automation and expanded job opportunities in the word processing area. Suggests opportunities in an automated office system and lists books and periodicals on word processing for counselors and teachers. (MF)

  5. Automating the Small Library.

    Science.gov (United States)

    Skapura, Robert

    1987-01-01

    Discusses the use of microcomputers for automating school libraries, both for entire systems and for specific library tasks. Highlights include available library management software, newsletters that evaluate software, constructing an evaluation matrix, steps to consider in library automation, and a brief discussion of computerized card catalogs.…

  6. Enforcing Transferable Permit Systems in the Presence of Market Power

    International Nuclear Information System (INIS)

    Chavez, C.A.; Stanlund, J.K.

    2003-01-01

    We derive an enforcement strategy for a transferable permit system in the presence of market power that achieves complete compliance in a cost-effective manner. We show that the presence of a firm with market influence makes designing an enforcement strategy more difficult than enforcing a perfectly competitive system. We also re-consider the suggestion that a firm with market influence should be allocated permits so that it chooses to not participate in the permit market. When enforcement and its costs are taken into account, that suggestion does not hold except in a very special case

  7. 32 CFR 637.7 - Drug enforcement activities.

    Science.gov (United States)

    2010-07-01

    ... CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.7 Drug enforcement activities... initial, interim and final military police reports concerning drug investigations will be provided to the...

  8. Deterring Spoilers: Peace Enforcement Operations and Political Settlements to Conflict

    National Research Council Canada - National Science Library

    Manseau, Nicole C

    2008-01-01

    .... In Somalia, Operation Restore Hope provided a strong peace enforcement operation, but ultimately failed to deter spoilers to United Nations negotiations for a political settlement to the conflict...

  9. Advances in inspection automation

    Science.gov (United States)

    Weber, Walter H.; Mair, H. Douglas; Jansen, Dion; Lombardi, Luciano

    2013-01-01

    This new session at QNDE reflects the growing interest in inspection automation. Our paper describes a newly developed platform that makes the complex NDE automation possible without the need for software programmers. Inspection tasks that are tedious, error-prone or impossible for humans to perform can now be automated using a form of drag and drop visual scripting. Our work attempts to rectify the problem that NDE is not keeping pace with the rest of factory automation. Outside of NDE, robots routinely and autonomously machine parts, assemble components, weld structures and report progress to corporate databases. By contrast, components arriving in the NDT department typically require manual part handling, calibrations and analysis. The automation examples in this paper cover the development of robotic thickness gauging and the use of adaptive contour following on the NRU reactor inspection at Chalk River.

  10. Automated model building

    CERN Document Server

    Caferra, Ricardo; Peltier, Nicholas

    2004-01-01

    This is the first book on automated model building, a discipline of automated deduction that is of growing importance Although models and their construction are important per se, automated model building has appeared as a natural enrichment of automated deduction, especially in the attempt to capture the human way of reasoning The book provides an historical overview of the field of automated deduction, and presents the foundations of different existing approaches to model construction, in particular those developed by the authors Finite and infinite model building techniques are presented The main emphasis is on calculi-based methods, and relevant practical results are provided The book is of interest to researchers and graduate students in computer science, computational logic and artificial intelligence It can also be used as a textbook in advanced undergraduate courses

  11. Automation in Warehouse Development

    CERN Document Server

    Verriet, Jacques

    2012-01-01

    The warehouses of the future will come in a variety of forms, but with a few common ingredients. Firstly, human operational handling of items in warehouses is increasingly being replaced by automated item handling. Extended warehouse automation counteracts the scarcity of human operators and supports the quality of picking processes. Secondly, the development of models to simulate and analyse warehouse designs and their components facilitates the challenging task of developing warehouses that take into account each customer’s individual requirements and logistic processes. Automation in Warehouse Development addresses both types of automation from the innovative perspective of applied science. In particular, it describes the outcomes of the Falcon project, a joint endeavour by a consortium of industrial and academic partners. The results include a model-based approach to automate warehouse control design, analysis models for warehouse design, concepts for robotic item handling and computer vision, and auton...

  12. Automation in Immunohematology

    Directory of Open Access Journals (Sweden)

    Meenu Bajpai

    2012-01-01

    Full Text Available There have been rapid technological advances in blood banking in South Asian region over the past decade with an increasing emphasis on quality and safety of blood products. The conventional test tube technique has given way to newer techniques such as column agglutination technique, solid phase red cell adherence assay, and erythrocyte-magnetized technique. These new technologies are adaptable to automation and major manufacturers in this field have come up with semi and fully automated equipments for immunohematology tests in the blood bank. Automation improves the objectivity and reproducibility of tests. It reduces human errors in patient identification and transcription errors. Documentation and traceability of tests, reagents and processes and archiving of results is another major advantage of automation. Shifting from manual methods to automation is a major undertaking for any transfusion service to provide quality patient care with lesser turnaround time for their ever increasing workload. This article discusses the various issues involved in the process.

  13. Formal Social Norms and their Enforcement in Computational MAS by Automated Reasoning

    Czech Academy of Sciences Publication Activity Database

    Neruda, Roman; Kazík, O.

    2012-01-01

    Roč. 39, č. 1 (2012), s. 80-87 ISSN 1819-9224 Institutional support: RVO:67985807 Keywords : role model * description logic * integrity constraints * computational intelligence Subject RIV: IN - Informatics, Computer Science

  14. Examining the impact of ASE (automated speed enforcement) in work zones on driver attention : final report.

    Science.gov (United States)

    2016-01-01

    Each year, there are over 500 fatal crashes in work zones in the U.S., with over 100 road construction workers : killed on work sites (NSC, 2011; FARS, 2011). Speed and distraction are among the top contributing factors to : work zone crashes (Garber...

  15. Systematic review automation technologies

    Science.gov (United States)

    2014-01-01

    Systematic reviews, a cornerstone of evidence-based medicine, are not produced quickly enough to support clinical practice. The cost of production, availability of the requisite expertise and timeliness are often quoted as major contributors for the delay. This detailed survey of the state of the art of information systems designed to support or automate individual tasks in the systematic review, and in particular systematic reviews of randomized controlled clinical trials, reveals trends that see the convergence of several parallel research projects. We surveyed literature describing informatics systems that support or automate the processes of systematic review or each of the tasks of the systematic review. Several projects focus on automating, simplifying and/or streamlining specific tasks of the systematic review. Some tasks are already fully automated while others are still largely manual. In this review, we describe each task and the effect that its automation would have on the entire systematic review process, summarize the existing information system support for each task, and highlight where further research is needed for realizing automation for the task. Integration of the systems that automate systematic review tasks may lead to a revised systematic review workflow. We envisage the optimized workflow will lead to system in which each systematic review is described as a computer program that automatically retrieves relevant trials, appraises them, extracts and synthesizes data, evaluates the risk of bias, performs meta-analysis calculations, and produces a report in real time. PMID:25005128

  16. On-Site School Library Automation: Automation Anywhere with Laptops.

    Science.gov (United States)

    Gunn, Holly; Oxner, June

    2000-01-01

    Four years after the Halifax Regional School Board was formed through amalgamation, over 75% of its school libraries were automated. On-site automation with laptops was a quicker, more efficient way of automating than sending a shelf list to the Technical Services Department. The Eastern Shore School Library Automation Project was a successful…

  17. Automated electron microprobe

    International Nuclear Information System (INIS)

    Thompson, K.A.; Walker, L.R.

    1986-01-01

    The Plant Laboratory at the Oak Ridge Y-12 Plant has recently obtained a Cameca MBX electron microprobe with a Tracor Northern TN5500 automation system. This allows full stage and spectrometer automation and digital beam control. The capabilities of the system include qualitative and quantitative elemental microanalysis for all elements above and including boron in atomic number, high- and low-magnification imaging and processing, elemental mapping and enhancement, and particle size, shape, and composition analyses. Very low magnification, quantitative elemental mapping using stage control (which is of particular interest) has been accomplished along with automated size, shape, and composition analysis over a large relative area

  18. Operational proof of automation

    International Nuclear Information System (INIS)

    Jaerschky, R.; Reifenhaeuser, R.; Schlicht, K.

    1976-01-01

    Automation of the power plant process may imply quite a number of problems. The automation of dynamic operations requires complicated programmes often interfering in several branched areas. This reduces clarity for the operating and maintenance staff, whilst increasing the possibilities of errors. The synthesis and the organization of standardized equipment have proved very successful. The possibilities offered by this kind of automation for improving the operation of power plants will only sufficiently and correctly be turned to profit, however, if the application of these technics of equipment is further improved and if its volume is tallied with a definite etc. (orig.) [de

  19. Chef infrastructure automation cookbook

    CERN Document Server

    Marschall, Matthias

    2013-01-01

    Chef Infrastructure Automation Cookbook contains practical recipes on everything you will need to automate your infrastructure using Chef. The book is packed with illustrated code examples to automate your server and cloud infrastructure.The book first shows you the simplest way to achieve a certain task. Then it explains every step in detail, so that you can build your knowledge about how things work. Eventually, the book shows you additional things to consider for each approach. That way, you can learn step-by-step and build profound knowledge on how to go about your configuration management

  20. Role of Enforcement in Prevention. Issues in Prevention

    Science.gov (United States)

    Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2012

    2012-01-01

    This issue of "Issues in Prevention" focuses on the role of enforcement in prevention. This issue contains the following articles: (1) What the Evidence Tells Us about the Role of Enforcement in Prevention; (2) Campus Briefs; (3) Q&A with Charles Cychosz; and (4) Higher Education Center Resources.

  1. 28 ATTITUDE OF NIGERIAN COURTS TO THE ENFORCEMENT OF ...

    African Journals Online (AJOL)

    Fr. Ikenga

    although the Nigerian courts rely on the above statutes, the present state of the law is an open invitation ... Enforcement of Foreign Judgments Ordinance, Cap 175, Laws of the Federation of Nigeria and Lagos, ...... enforcement of foreign judgment be made by a motion ex-parte is inconsistent with the modern concept of.

  2. A Comparative Analysis of Copyright Enforcement Provisions in ...

    African Journals Online (AJOL)

    Fr. Ikenga

    for infringement of conferred rights.6 Enforcement is important since without it, the law is of no use to those it seeks to ... the enforcement structures and laws available in Nigeria with focus on the remedies available .... usually pending the happening of an event such as the hearing and determination of a motion on notice or ...

  3. 24 CFR 81.86 - Enforcement and jurisdiction.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Enforcement and jurisdiction. 81.86 Section 81.86 Housing and Urban Development Office of the Secretary, Department of Housing and Urban... § 81.86 Enforcement and jurisdiction. If a GSE fails to comply with a final decision, the Secretary may...

  4. 39 CFR 962.14 - Enforcement of subpoenas.

    Science.gov (United States)

    2010-07-01

    ... Postal Service UNITED STATES POSTAL SERVICE PROCEDURES RULES OF PRACTICE IN PROCEEDINGS RELATIVE TO THE PROGRAM FRAUD CIVIL REMEDIES ACT § 962.14 Enforcement of subpoenas. In the case of contumacy or refusal to... have jurisdiction to issue an appropriate order for the enforcement of such subpoena. Any failure to...

  5. A comparative analysis of copyright enforcement provisions in ...

    African Journals Online (AJOL)

    While so many factors have been adduced for piracy in Nigeria, the inadequacy and sometimes lack of effective copyright enforcement laws is of significance. This paper focuses on a critical appraisal of the copyright enforcement provisions (specifically the remedies available in an action for infringement) under the Nigerian ...

  6. Task force on compliance and enforcement. Final report. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    1978-03-01

    Recommendations for measures to strengthen the FEA enforcement program in the area of petroleum price regulation are presented. Results of task force efforts are presented in report and recommendations sections concerned with pending cases, compliance program organization, enforcement powers, compliance strategy, and audit staffing and techniques. (JRD)

  7. The enforcement of social and economic rights in Africa: The ...

    African Journals Online (AJOL)

    The debates on socio-economic rights have now shifted from desirability to problems of enforcement. This does not indicate that socio-economic rights have gained universality such that all countries in Africa embrace and enforce them. There are few countries such as South Africa where these rights have not only been ...

  8. Higher Education Programs in Law Enforcement and Criminal Justice.

    Science.gov (United States)

    Tenney, Charles W., Jr.

    In 1966 the Office of Law Enforcement Assistance undertook to encourage higher education for law enforcement through a series of curriculum development grants to 2- and 4-year institutions throughout the nation. Altogether, 28 colleges and universities received 48 grants totalling nearly $1 million. First priority was given to schools in states…

  9. 75 FR 81547 - Defense Support of Civilian Law Enforcement Agencies

    Science.gov (United States)

    2010-12-28

    ... on policies to further DoD cooperation with civilian law enforcement officials, including CDO and law.... (d) The IG, DoD, shall issue guidance on cooperation with civilian law enforcement officials with... Components, whether alone or with civil authorities. Execution of CDO missions shall be decentralized through...

  10. Enforcing Competition Rules in South Africa: Thieves at the Dinner ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2013-03-01

    Mar 1, 2013 ... Describing and analyzing competition law in South Africa, this book promotes a deeper understanding of the development of this foundational economic law within its specific national, social and economic context. Enforcing Competition Rules in South Africa draws strongly on case law and enforcement ...

  11. The Cost of Enforcing Building Energy Codes: Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Alison [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Vine, Ed [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Price, Sarah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Sturges, Andrew [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Rosenquist, Greg [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-04-01

    The purpose of this literature review is to summarize key findings regarding the costs associated with enforcing building energy code compliance—primarily focusing on costs borne by local government. The review takes into consideration over 150 documents that discuss, to some extent, code enforcement. This review emphasizes those documents that specifically focus on costs associated with energy code enforcement. Given the low rates of building energy code compliance that have been reported in existing studies, as well as the many barriers to both energy code compliance and enforcement, this study seeks to identify the costs of initiatives to improve compliance and enforcement. Costs are reported primarily as presented in the original source. Some costs are given on a per home or per building basis, and others are provided for jurisdictions of a certain size. This literature review gives an overview of state-based compliance rates, barriers to code enforcement, and U.S. Department of Energy (DOE) and key stakeholder involvement in improving compliance with building energy codes. In addition, the processes and costs associated with compliance and enforcement of building energy codes are presented. The second phase of this study, which will be presented in a different report, will consist of surveying 34 experts in the building industry at the national and state or local levels in order to obtain additional cost information, building on the findings from the first phase, as well as recommendations for where to most effectively spend money on compliance and enforcement.

  12. 48 CFR 822.406 - Administration and enforcement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Administration and enforcement. 822.406 Section 822.406 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS... Involving Construction 822.406 Administration and enforcement. ...

  13. The effect of enforcement on speed behaviour : a literature review.

    NARCIS (Netherlands)

    Oei, H.-l.

    1998-01-01

    The objective of this literature study is to give an overview of research on speed enforcement and its effect on speed behaviour and safety. This study will be used to find new strategies and tactics to enhance the efficiency and effectiveness of speed enforcement by the police in terms of behaviour

  14. 78 FR 44165 - Nuclear Regulatory Commission Enforcement Policy

    Science.gov (United States)

    2013-07-23

    ... relating to a potential revision to the Enforcement Policy regarding issuance of orders banning individuals...) and of issuing orders banning individuals (licensed or unlicensed) for less than 1 year, and that... Enforcement Policy regarding issuance of orders banning individuals from NRC-licensed activities for periods...

  15. 40 CFR 205.171 - Selective enforcement auditing (SEA) requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing (SEA) requirements. 205.171 Section 205.171 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... § 205.171 Selective enforcement auditing (SEA) requirements. ...

  16. Legal Enforcement of Social Rights: Enabling Conditions and Impact Assessment

    NARCIS (Netherlands)

    S. Gloppen (Siri)

    2009-01-01

    textabstractThis article commends the concise and useful analysis of courts and the legal enforcement of economic, social and cultural rights given in Christian Courtis’ book, Courts and the Legal Enforcement of Economic, Social and Cultural Rights: Comparative Experiences of Justiciability. Yet, in

  17. An overview analysis of selected challenges in the enforcement of ...

    African Journals Online (AJOL)

    An overview analysis of selected challenges in the enforcement of the prohibition of insider trading and market manipulation in the European Union and South ... trading in securities has caused a great number of challenges for various national regulators, especially with regard to the enforcement of market abuse laws.

  18. Enforcing fire safety in the catering industry : an economic analysis.

    NARCIS (Netherlands)

    Suurmond, Guido

    2008-01-01

    What is an effective and efficient enforcement policy for fire safety in the catering industry? When and why is an informal, cooperative enforcement style through warnings, persuasion and advice (a so called compliance strategy) effective in inducing compliance with the fire safety regulation? The

  19. 40 CFR 35.6145 - Eligibility for enforcement Cooperative Agreements.

    Science.gov (United States)

    2010-07-01

    ... OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Cooperative Agreements and Superfund State Contracts for Superfund Response Actions Enforcement Cooperative Agreements § 35.6145 Eligibility for... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Eligibility for enforcement Cooperative...

  20. The Convention on the Recognition and Enforcement of Foreign ...

    African Journals Online (AJOL)

    The major benefits include boosting a country's goodwill as business friendly and contract enforcing, helping a country borrow on lower rate of interest and enhancing investor motivation toward lower rate of return on investment, ease of enforcing contracts abroad for domestic parties, ease of attracting foreign investment, ...

  1. 34 CFR 300.600 - State monitoring and enforcement.

    Science.gov (United States)

    2010-07-01

    ..., Technical Assistance, and Enforcement § 300.600 State monitoring and enforcement. (a) The State must— (1... in § 300.604(a)(1) (technical assistance), (a)(3) (conditions on funding of an LEA), (b)(2)(i) (a... indicators and such qualitative indicators as are needed to adequately measure performance in the priority...

  2. Optimal Enforcement Policies (Crackdowns) on a Drug Market

    NARCIS (Netherlands)

    Kort, P.M.; Feichtinger, G.; Hartl, R.F.; Haunschmied, J.L.

    1996-01-01

    In this paper an optimal control model is presented to design enforcement programs minimizing the social costs from both the market and crackdown.By using the maximum principle we show that performing an enforcement policy that leads to a collapse of the drug market is more likely to be optimal when

  3. Progress in the field of urban traffic law enforcement.

    NARCIS (Netherlands)

    Noordzij, P.C.

    1996-01-01

    From all the studies, the elements of effective police enforcement are rather well known: publicity, visibility, target times and places. If actual enforcement of a traffic rule is necessary, the earlier steps are necessary to inform and convince the public of the safety benefits of the traffic

  4. Improving Law Enforcement Cross Cultural Competencies through Continued Education

    Science.gov (United States)

    Sereni-Massinger, Christine; Wood, Nancy

    2016-01-01

    Over the last thirty years Community Oriented Policing (COP) has spawned advancements in creating community partnerships with law enforcement agencies. Agencies that focus on such partnerships have served to reduce crime and resolve conflict. However, community opinions towards law enforcement have become increasingly negative due to recent civil…

  5. Decentralized enforcement, sequential bargaining, and the clean development mechanism

    Energy Technology Data Exchange (ETDEWEB)

    Hovi, Jon

    2001-07-01

    While there is a vast literature both on international bargaining and on how international agreements can be enforced, very little work has been done on how bargaining and enforcement interact. An important exception is Fearon (1998), who models international cooperation as a two-stage process in which the bargaining process is constrained by a need for decentralized enforcement (meaning that the agreement must be enforced by the parties themselves rather than a third party, such as a court). Using the Clean Development Mechanism as an example, the present paper proposes a different model of this kind of interaction. The model follows Fearon's in so far as we both use the infinitely repeated Prisoners' Dilemma to capture the enforcement phase of the game. However, while Fearon depicts the bargaining stage as a War of Attrition, the present model sees that stage as a sequential bargaining game of the Staahl-Rubinstein type. The implications of the present model are compared both to those of the Staahl-Rubinstein model and to those of the Fearon model. A surprising conclusion is that a need for decentralized enforcement tends to make the bargaining outcome more symmetrical than otherwise. Thus, the impact of bargaining power is actually smaller when the resulting agreement must be enforced by the parties themselves than it is if enforcement is taken care of by a third party. (author)

  6. 34 CFR 300.537 - State enforcement mechanisms.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false State enforcement mechanisms. 300.537 Section 300.537... Procedures § 300.537 State enforcement mechanisms. Notwithstanding §§ 300.506(b)(7) and 300.510(d)(2), which... meeting, there is nothing in this part that would prevent the SEA from using other mechanisms to seek...

  7. 32 CFR 634.33 - Training of law enforcement personnel.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Training of law enforcement personnel. 634.33 Section 634.33 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.33...

  8. DOE enforcement program roles and responsibilities: DOE handbook

    International Nuclear Information System (INIS)

    1995-08-01

    The Price-Anderson Act provides indemnification to DOE contractors who manage and conduct nuclear activities in the DOE complex. The government acts as an insurer for these contractors against any findings of liability from the nuclear activities of the contractor within the scope of its contract. 10 CFR Part 820 establishes the legal framework for implementing DOE's Nuclear Safety Enforcement Program. Integration with other DOE organizations and programs would assure that the enforcement process properly considers the actual or potential safety significance of a violation when determining an appropriate enforcement sanction. Achieving a proactive contractor compliance assurance rather than a heavy enforcement hand, will require a foundation of cooperation and teamwork across DOE organizations. This handbook identifies the areas of interface for the DOE Enforcement Program and provides guidance on roles and responsibilities for the key DOE organizational areas. It complements DOE-HDBK-1087-95 and 1089-95

  9. Automation Interface Design Development

    Data.gov (United States)

    National Aeronautics and Space Administration — Our research makes its contributions at two levels. At one level, we addressed the problems of interaction between humans and computers/automation in a particular...

  10. Automated Vehicles Symposium 2014

    CERN Document Server

    Beiker, Sven; Road Vehicle Automation 2

    2015-01-01

    This paper collection is the second volume of the LNMOB series on Road Vehicle Automation. The book contains a comprehensive review of current technical, socio-economic, and legal perspectives written by experts coming from public authorities, companies and universities in the U.S., Europe and Japan. It originates from the Automated Vehicle Symposium 2014, which was jointly organized by the Association for Unmanned Vehicle Systems International (AUVSI) and the Transportation Research Board (TRB) in Burlingame, CA, in July 2014. The contributions discuss the challenges arising from the integration of highly automated and self-driving vehicles into the transportation system, with a focus on human factors and different deployment scenarios. This book is an indispensable source of information for academic researchers, industrial engineers, and policy makers interested in the topic of road vehicle automation.

  11. Fixed automated spray technology.

    Science.gov (United States)

    2011-04-19

    This research project evaluated the construction and performance of Boschungs Fixed Automated : Spray Technology (FAST) system. The FAST system automatically sprays de-icing material on : the bridge when icing conditions are about to occur. The FA...

  12. Automated Vehicles Symposium 2015

    CERN Document Server

    Beiker, Sven

    2016-01-01

    This edited book comprises papers about the impacts, benefits and challenges of connected and automated cars. It is the third volume of the LNMOB series dealing with Road Vehicle Automation. The book comprises contributions from researchers, industry practitioners and policy makers, covering perspectives from the U.S., Europe and Japan. It is based on the Automated Vehicles Symposium 2015 which was jointly organized by the Association of Unmanned Vehicle Systems International (AUVSI) and the Transportation Research Board (TRB) in Ann Arbor, Michigan, in July 2015. The topical spectrum includes, but is not limited to, public sector activities, human factors, ethical and business aspects, energy and technological perspectives, vehicle systems and transportation infrastructure. This book is an indispensable source of information for academic researchers, industrial engineers and policy makers interested in the topic of road vehicle automation.

  13. Automation synthesis modules review

    International Nuclear Information System (INIS)

    Boschi, S.; Lodi, F.; Malizia, C.; Cicoria, G.; Marengo, M.

    2013-01-01

    The introduction of 68 Ga labelled tracers has changed the diagnostic approach to neuroendocrine tumours and the availability of a reliable, long-lived 68 Ge/ 68 Ga generator has been at the bases of the development of 68 Ga radiopharmacy. The huge increase in clinical demand, the impact of regulatory issues and a careful radioprotection of the operators have boosted for extensive automation of the production process. The development of automated systems for 68 Ga radiochemistry, different engineering and software strategies and post-processing of the eluate were discussed along with impact of automation with regulations. - Highlights: ► Generators availability and robust chemistry boosted for the huge diffusion of 68Ga radiopharmaceuticals. ► Different technological approaches for 68Ga radiopharmaceuticals will be discussed. ► Generator eluate post processing and evolution to cassette based systems were the major issues in automation. ► Impact of regulations on the technological development will be also considered

  14. Disassembly automation automated systems with cognitive abilities

    CERN Document Server

    Vongbunyong, Supachai

    2015-01-01

    This book presents a number of aspects to be considered in the development of disassembly automation, including the mechanical system, vision system and intelligent planner. The implementation of cognitive robotics increases the flexibility and degree of autonomy of the disassembly system. Disassembly, as a step in the treatment of end-of-life products, can allow the recovery of embodied value left within disposed products, as well as the appropriate separation of potentially-hazardous components. In the end-of-life treatment industry, disassembly has largely been limited to manual labor, which is expensive in developed countries. Automation is one possible solution for economic feasibility. The target audience primarily comprises researchers and experts in the field, but the book may also be beneficial for graduate students.

  15. Automated Lattice Perturbation Theory

    Energy Technology Data Exchange (ETDEWEB)

    Monahan, Christopher

    2014-11-01

    I review recent developments in automated lattice perturbation theory. Starting with an overview of lattice perturbation theory, I focus on the three automation packages currently "on the market": HiPPy/HPsrc, Pastor and PhySyCAl. I highlight some recent applications of these methods, particularly in B physics. In the final section I briefly discuss the related, but distinct, approach of numerical stochastic perturbation theory.

  16. Automated ISMS control auditability

    OpenAIRE

    Suomu, Mikko

    2015-01-01

    This thesis focuses on researching a possible reference model for automated ISMS’s (Information Security Management System) technical control auditability. The main objective was to develop a generic framework for automated compliance status monitoring of the ISO27001:2013 standard which could be re‐used in any ISMS system. The framework was tested with Proof of Concept (PoC) empirical research in a test infrastructure which simulates the framework target deployment environment. To fulfi...

  17. Marketing automation supporting sales

    OpenAIRE

    Sandell, Niko

    2016-01-01

    The past couple of decades has been a time of major changes in marketing. Digitalization has become a permanent part of marketing and at the same time enabled efficient collection of data. Personalization and customization of content are playing a crucial role in marketing when new customers are acquired. This has also created a need for automation to facilitate the distribution of targeted content. As a result of successful marketing automation more information of the customers is gathered ...

  18. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  19. Automated lattice data generation

    Directory of Open Access Journals (Sweden)

    Ayyar Venkitesh

    2018-01-01

    Full Text Available The process of generating ensembles of gauge configurations (and measuring various observables over them can be tedious and error-prone when done “by hand”. In practice, most of this procedure can be automated with the use of a workflow manager. We discuss how this automation can be accomplished using Taxi, a minimal Python-based workflow manager built for generating lattice data. We present a case study demonstrating this technology.

  20. Task automation in a successful industrial telerobot

    Science.gov (United States)

    Spelt, Philip F.; Jones, Sammy L.

    1994-01-01

    In this paper, we discuss cooperative work by Oak Ridge National Laboratory and Remotec, Inc., to automate components of the operator's workload using Remotec's Andros telerobot, thereby providing an enhanced user interface which can be retrofit to existing fielded units as well as being incorporated into new production units. Remotec's Andros robots are presently used by numerous electric utilities to perform tasks in reactors where substantial exposure to radiation exists, as well as by the armed forces and numerous law enforcement agencies. The automation of task components, as well as the video graphics display of the robot's position in the environment, will enhance all tasks performed by these users, as well as enabling performance in terrain where the robots cannot presently perform due to lack of knowledge about, for instance, the degree of tilt of the robot. Enhanced performance of a successful industrial mobile robot leads to increased safety and efficiency of performance in hazardous environments. The addition of these capabilities will greatly enhance the utility of the robot, as well as its marketability.

  1. Automated personnel data base system specifications, Task V. Final report

    International Nuclear Information System (INIS)

    Bartley, H.J.; Bocast, A.K.; Deppner, F.O.; Harrison, O.J.; Kraas, I.W.

    1978-11-01

    The full title of this study is 'Development of Qualification Requirements, Training Programs, Career Plans, and Methodologies for Effective Management and Training of Inspection and Enforcement Personnel.' Task V required the development of an automated personnel data base system for NRC/IE. This system is identified as the NRC/IE Personnel, Assignment, Qualifications, and Training System (PAQTS). This Task V report provides the documentation for PAQTS including the Functional Requirements Document (FRD), the Data Requirements Document (DRD), the Hardware and Software Capabilities Assessment, and the Detailed Implementation Schedule. Specific recommendations to facilitate implementation of PAQTS are also included

  2. Genetically modified plants for law enforcement applications

    Science.gov (United States)

    Stewart, C. Neal, Jr.

    2002-08-01

    Plants are ubiquitous in the environment and have the unique ability to respond to their environment physiologically and through altered gene expression profiles (they cannot walk away). In addition, plant genetic transformation techniques and genomic information in plants are becoming increasingly advanced. We have been performing research to express the jellyfish green fluorescent protein (GFP) in plants. GFP emits green light when excited by blue or UV light. In addition, my group and collaborators have developed methods to detect GFP in plants by contact instruments and at a standoff. There are several law enforcement applications for this technology. One involves using tagging and perhaps modifying drug plants genetically. In one instance, we could tag them for destruction. In another, we could adulterate them directly. Another application is one that falls into the chemical terrorism and bioterrorism countermeasures category. We are developing plants to sense toxins and whole organisms covertly. Plants are well adapted to monitor large geographic areas; biosurveillance. Some examples of research being performed focus on plants with plant pathogen inducible promoters fused to GFP for disease sensing, and algae biosensors for chemicals.

  3. Decoding Nonverbal Communication in Law Enforcement

    Directory of Open Access Journals (Sweden)

    Noel Otu

    2015-06-01

    Full Text Available This analytical study examined the importance of nonverbal communication in law enforcement work. In many encounters between police and citizens, the primary focus is always on suspects’/citizens’ verbal statements, rather than on how and what their body is conveying while telling the story. This study argues for an integrated approach in which the police officers need to realise that they, too, are communicating nonverbally with suspects. This study reveals that nonverbal communication, also known as body language, proxemic, and kinesics behavior, in many cases tends to constitute a much larger fraction of the police communication model than verbal communication, which should help officers to establish authority and dominance and ensure their safety. Nonverbal communication is not something added onto criminal justice, but rather it is the essence of criminal justice. This results suggest that nonverbal communication is the foundation of a successful relationship/encounter between criminal justice personnel and suspects or criminals, as well as being a powerful method that cannot be feigned.

  4. CORRECTIONS FOR RACIAL DISPARITIES IN LAW ENFORCEMENT

    Science.gov (United States)

    Griffin, Christopher L.; Sloan, Frank A.; Eldred, Lindsey M.

    2016-01-01

    Much empirical analysis has documented racial disparities at the beginning and end stages of a criminal case. However, our understanding about the perpetuation of — and even corrections for — differential outcomes as the process unfolds remains less than complete. This Article provides a comprehensive examination of criminal dispositions using all DWI cases in North Carolina during the period 2001–2011, focusing on several major decision points in the process. Starting with pretrial hearings and culminating in sentencing results, we track differences in outcomes by race and gender. Before sentencing, significant gaps emerge in the severity of pretrial release conditions that disadvantage black and Hispanic defendants. Yet when prosecutors decide whether to pursue charges, we observe an initial correction mechanism: Hispanic men are almost two-thirds more likely to have those charges dropped relative to white men. Although few cases survive after the plea bargaining stage, a second correction mechanism arises: Hispanic men are substantially less likely to receive harsher sentences and are sent to jail for significantly less time relative to white men. The first mechanism is based in part on prosecutors’ reviewing the strength of the evidence but much more on declining to invest scarce resources in the pursuit of defendants who fail to appear for trial. The second mechanism seems to follow more directly from judicial discretion to reverse decisions made by law enforcement. We discuss possible explanations for these novel empirical results and review methods for more precisely identifying causal mechanisms in criminal justice. PMID:28066033

  5. 78 FR 10623 - Privacy Act of 1974; Department of Homeland Security Immigration and Customs Enforcement-007...

    Science.gov (United States)

    2013-02-14

    ... the context of a criminal justice matter; prioritization of requests; research conducted by ICE during... 1974; Department of Homeland Security Immigration and Customs Enforcement-007--Alien Criminal Response... Customs Enforcement-007--Law Enforcement Support Center Alien [[Page 10624

  6. National Enforcement Initiative: Preventing Animal Waste from Contaminating Surface and Ground Water

    Science.gov (United States)

    This page describes EPA's goal in preventing animal waste from contaminating surface and ground Water. It is an EPA National Enforcement Initiative. Both enforcement cases, and a map of enforcement actions are provided.

  7. Automated annotation of microbial proteomes in SWISS-PROT.

    Science.gov (United States)

    Gattiker, Alexandre; Michoud, Karine; Rivoire, Catherine; Auchincloss, Andrea H; Coudert, Elisabeth; Lima, Tania; Kersey, Paul; Pagni, Marco; Sigrist, Christian J A; Lachaize, Corinne; Veuthey, Anne Lise; Gasteiger, Elisabeth; Bairoch, Amos

    2003-02-01

    Large-scale sequencing of prokaryotic genomes demands the automation of certain annotation tasks currently manually performed in the production of the SWISS-PROT protein knowledgebase. The HAMAP project, or 'High-quality Automated and Manual Annotation of microbial Proteomes', aims to integrate manual and automatic annotation methods in order to enhance the speed of the curation process while preserving the quality of the database annotation. Automatic annotation is only applied to entries that belong to manually defined orthologous families and to entries with no identifiable similarities (ORFans). Many checks are enforced in order to prevent the propagation of wrong annotation and to spot problematic cases, which are channelled to manual curation. The results of this annotation are integrated in SWISS-PROT, and a website is provided at http://www.expasy.org/sprot/hamap/.

  8. Lip-reading enhancement for law enforcement

    Science.gov (United States)

    Theobald, Barry J.; Harvey, Richard; Cox, Stephen J.; Lewis, Colin; Owen, Gari P.

    2006-09-01

    Accurate lip-reading techniques would be of enormous benefit for agencies involved in counter-terrorism and other law-enforcement areas. Unfortunately, there are very few skilled lip-readers, and it is apparently a difficult skill to transmit, so the area is under-resourced. In this paper we investigate the possibility of making the lip-reading task more amenable to a wider range of operators by enhancing lip movements in video sequences using active appearance models. These are generative, parametric models commonly used to track faces in images and video sequences. The parametric nature of the model allows a face in an image to be encoded in terms of a few tens of parameters, while the generative nature allows faces to be re-synthesised using the parameters. The aim of this study is to determine if exaggerating lip-motions in video sequences by amplifying the parameters of the model improves lip-reading ability. We also present results of lip-reading tests undertaken by experienced (but non-expert) adult subjects who claim to use lip-reading in their speech recognition process. The results, which are comparisons of word error-rates on unprocessed and processed video, are mixed. We find that there appears to be the potential to improve the word error rate but, for the method to improve the intelligibility there is need for more sophisticated tracking and visual modelling. Our technique can also act as an expression or visual gesture amplifier and so has applications to animation and the presentation of information via avatars or synthetic humans.

  9. Public education and enforcement research study : Macomb, Illinois : analysis

    Science.gov (United States)

    2011-03-01

    The Public Education and Enforcement Research Study (PEERS) was a collaborative effort between the Federal Railroad Administration, the Illinois Commerce Commission, and local communities in the State of Illinois. This project was designed to promote...

  10. Pesticides and Asbestos Programs and Enforcement Branch Case Tracking System

    Science.gov (United States)

    Tracks the entire life cycle of a regulated site from initial inspection through site response to enforcement actions. Separate site action history is maintained for each statute under which the site is regulated.

  11. Enforcement and Effectiveness of Consumer Law in the Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Pauknerová, Monika; Skalská, H.

    2017-01-01

    Roč. 7, č. 4 (2017), s. 243-254 ISSN 1805-8396 Institutional support: RVO:68378122 Keywords : consumer law * enforcement * alternative dispute resolution Subject RIV: AG - Legal Sciences OBOR OECD: Law

  12. Alternatives to detention in the UK: from enforcement to engagement?

    Directory of Open Access Journals (Sweden)

    Jerome Phelps

    2013-09-01

    Full Text Available The UK detains migrants on a large scale, and has had limited success in developing alternatives. The British experience highlights the need for a cultural shift towards engagement with migrants in place of reliance on enforcement.

  13. Privacy Impact Assessment for the Enforcement Action Response System

    Science.gov (United States)

    The Enforcement Action Response System collects waste transaction information, and liability determination information. Learn how this data is collected, how it will be used, access to the data, the purpose of data collection, and record retention policies

  14. Privacy Impact Assessment for the Enforcement Superfund Tracking System

    Science.gov (United States)

    This Enforcement Superfund Tracking System (ESTS) collects publicly available information from the California Secretary of State on businesses. Learn how this data is collected, how it will be used, access to the data, and the purpose of data collection.

  15. Price-Anderson Nuclear Safety Enforcement Program. 1997 annual report

    International Nuclear Information System (INIS)

    1998-01-01

    This report summarizes activities in the Department of Energy's Price-Anderson Amendments Act (PAAA) Enforcement Program in calendar year 1997 and highlights improvements planned for 1998. The DOE Enforcement Program involves the Office of Enforcement and Investigation in the DOE Headquarters Office of Environment, Safety and Health, as well as numerous PAAA Coordinators and technical advisors in DOE Field and Program Offices. The DOE Enforcement Program issued 13 Notices of Violation (NOV's) in 1997 for cases involving significant or potentially significant nuclear safety violations. Six of these included civil penalties totaling $440,000. Highlights of these actions include: (1) Brookhaven National Laboratory Radiological Control Violations / Associated Universities, Inc.; (2) Bioassay Program Violations at Mound / EG ampersand G, Inc.; (3) Savannah River Crane Operator Uptake / Westinghouse Savannah River Company; (4) Waste Calciner Worker Uptake / Lockheed-Martin Idaho Technologies Company; and (5) Reactor Scram and Records Destruction at Sandia / Sandia Corporation (Lockheed-Martin). Sandia / Sandia Corporation (Lockheed-Martin)

  16. Spatial service delivery system for smart licensing & enforcement management

    Science.gov (United States)

    Wahap, N. A.; Ismail, N. M.; Nor, N. M.; Ahmad, N.; Omar, M. F.; Termizi, A. A. A.; Zainal, D.; Noordin, N. M.; Mansor, S.

    2016-06-01

    Spatial information has introduced a new sense of urgency for a better understanding of the public needs in term of what, when and where they need services and through which devices, platform or physical locations they need them. The objective of this project is to value- add existing license management process for business premises which comes under the responsibility of Local Authority (PBT). Manipulation of geospatial and tracing technology via mobile platform allows enforcement officers to work in real-time, use a standardized system, improve service delivery, and optimize operation management. This paper will augment the scope and capabilities of proposed concept namely, Smart Licensing/Enforcement Management (SLEm). It will review the current licensing and enforcement practice of selected PBT in comparison to the enhanced method. As a result, the new enhanced system is expected to offer a total solution for licensing/enforcement management whilst increasing efficiency and transparency for smart city management and governance.

  17. Deporting the American Dream: Immigration Enforcement and Latino Foreclosures

    Directory of Open Access Journals (Sweden)

    Jacob S. Rugh

    2016-12-01

    Full Text Available Over the past decade, Latinos have been buffeted by two major forces: a record number of immigrant deportations and the housing foreclosure crisis. Yet, prior work has not assessed the link between the two. We hypothesize that deportations exacerbate rates of foreclosure among Latinos by removing income earners from owner-occupied households. We employ a quasi-experimental approach that leverages variation in county applications for 287(g immigration enforcement agreements with Immigration and Customs Enforcement and data on foreclosure filings from 2005–2012. These models uncover a substantial association of enforcement with Hispanic foreclosure rates. The association is stronger in counties with more immigrant detentions and a larger share of undocumented persons in owner-occupied homes. The results imply that local immigration enforcement plays an important role in understanding why Latinos experienced foreclosures most often. The reduced home ownership and wealth that result illustrate how legal status and deportation perpetuate the racial stratification of Latinos.

  18. Performance-Driven Interface Contract Enforcement for Scientific Components

    Energy Technology Data Exchange (ETDEWEB)

    Dahlgren, Tamara Lynn [Univ. of California, Davis, CA (United States)

    2008-01-01

    Performance-driven interface contract enforcement research aims to improve the quality of programs built from plug-and-play scientific components. Interface contracts make the obligations on the caller and all implementations of the specified methods explicit. Runtime contract enforcement is a well-known technique for enhancing testing and debugging. However, checking all of the associated constraints during deployment is generally considered too costly from a performance stand point. Previous solutions enforced subsets of constraints without explicit consideration of their performance implications. Hence, this research measures the impacts of different interface contract sampling strategies and compares results with new techniques driven by execution time estimates. Results from three studies indicate automatically adjusting the level of checking based on performance constraints improves the likelihood of detecting contract violations under certain circumstances. Specifically, performance-driven enforcement is better suited to programs exercising constraints whose costs are at most moderately expensive relative to normal program execution.

  19. Child Support Enforcement Annual Data Report Form 34A - 2007

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  20. Child Support Enforcement Annual Data Report Form 34A - 2006

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  1. 49 CFR 244.21 - Compliance and Enforcement.

    Science.gov (United States)

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS ON SAFETY INTEGRATION PLANS GOVERNING RAILROAD CONSOLIDATIONS, MERGERS, AND ACQUISITIONS OF CONTROL Safety Integration Plans § 244.21 Compliance and Enforcement. (a...

  2. Consumption risk sharing with private information and limited enforcement

    Czech Academy of Sciences Publication Activity Database

    Broer, T.; Kapička, Marek; Klein, P.

    2017-01-01

    Roč. 23, January (2017), s. 170-190 ISSN 1094-2025 Institutional support: RVO:67985998 Keywords : consumption insurance * private information * limited enforcement Subject RIV: AH - Economics OBOR OECD: Economic Theory Impact factor: 1.053, year: 2016

  3. 29 CFR 1952.122 - Level of Federal enforcement.

    Science.gov (United States)

    2010-07-01

    ... of the United States, including but not limited to dry docks or graving docks, marine railways or... safety and health standards within the borders of all military reservations; (8) Enforcement at...

  4. Analysis of Environmental Law Enforcement Mechanism Based on Economic Principle

    Science.gov (United States)

    Cao, Hongjun; Shao, Haohao; Cai, Xuesen

    2017-11-01

    Strengthening and improving the environmental law enforcement mechanism is an important way to protect the ecological environment. This paper is based on economical principles, we did analysis of the marginal management costs by using Pigou means and the marginal transaction costs by using Coase means vary with the quantity growth of pollutant discharge Enterprises. We analyzed all this information, then we got the conclusion as follows. In the process of strengthening the environmental law enforcement mechanism, firstly, we should fully mobilize all aspects of environmental law enforcement, such as legislative bodies and law enforcement agencies, public welfare organizations, television, newspapers, enterprises, people and so on, they need to form a reasonable and organic structure system; then we should use various management means, such as government regulation, legal sanctions, fines, persuasion and denounce, they also need to form an organic structural system.

  5. Pesticides and Asbestos Programs and Enforcement Branch Case Tracking System

    Data.gov (United States)

    U.S. Environmental Protection Agency — Tracks the entire life cycle of a regulated site from initial inspection through site response to enforcement actions. Separate site action history is maintained for...

  6. Operational Design for Peace Enforcement: Lessons for the Operational Staff

    National Research Council Canada - National Science Library

    Neumann, Michael

    2004-01-01

    U.S. involvement in Somalia serves as a useful case study of the unique challenges an operational staff may face when applying operational design to the planning and execution of a peace enforcement operation. U.S...

  7. Combined Action Platoons: A Strategy for Peace Enforcement

    National Research Council Canada - National Science Library

    Brewington, Brooks R

    1996-01-01

    The concept of the Combined Action Platoon (CAP), as it evolved in Vietnam, has potential applications in Operations Other Than War, particularly Chapter VII United Nations Peace Enforcement missions...

  8. 78 FR 21826 - Defense Support of Civilian Law Enforcement Agencies

    Science.gov (United States)

    2013-04-12

    ... requesting Federal law enforcement agency provides all security for such transportation and maintains custody... sniper training, military operations in urban terrain (MOUT), advanced MOUT, close quarters battle/close...

  9. Verification of Security Policy Enforcement in Enterprise Systems

    Science.gov (United States)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  10. Criminality or monopoly? Informal immigration enforcement in South Africa

    NARCIS (Netherlands)

    Vigneswaran, D.; Araia, T.; Hoag, C.; Tshabalala, X.

    2010-01-01

    Zimbabwean displacement has significant implications for the evolution of state forms in Southern Africa. In South Africa, Zimbabwean migrants' claims to residence confront exclusionary immigration laws. The South African government officials who are responsible for enforcing these laws have helped

  11. Enforcing Building Energy Codes in China: Progress and Comparative Lessons

    Energy Technology Data Exchange (ETDEWEB)

    Evans, Meredydd; Shui, Bin; Halverson, Mark A.; Delgado, Alison

    2010-08-15

    From 1995 to 2005, building energy use in China increased more rapidly than the world average. China has been adding 0.4 to 1.6 billion square meters of floor space annually , making it the world’s largest market for new construction. In fact, by 2020, China is expected to comprise half of all new construction. In response to this, China has begun to make important steps towards achieving building energy efficiency, including the implementation of building energy standards that requires new buildings to be 65% more efficient than buildings from the early 1980s. Making progress on reducing building energy use requires both a comprehensive code and a robust enforcement system. The latter – the enforcement system – is a particularly critical component for assuring that a building code has an effect. China has dramatically enhanced its enforcement system in the past two years, with more detailed requirements for ensuring enforcement and new penalties for non-compliance. We believe that the U.S. and other developed countries could benefit from learning about the multiple checks and the documentation required in China. Similarly, some of the more user-friendly enforcement approaches developed in the U.S. and elsewhere may be useful for China as it strives to improve enforcement in rural and smaller communities. In this article, we provide context to China’s building codes enforcement system by comparing it to the U.S. Among some of the enforcement mechanisms we look at are testing and rating procedures, compliance software, and training and public information.

  12. Coast Guard Strategic Management: Law Enforcement in the 1990s

    Science.gov (United States)

    1990-06-01

    Di NAVAL POSTGRADUATE SCHOOL. Monterey, California In 0 SRDDTIC S ELECTE MARO 11991 THESIS B . . COAST GUARD STRATEGIC MANAGEMENT : LAW ENFORCEMENT IN...NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO NO NO ACCESSION NO. 11 TITLE (Include Security Classification) COAST GUARD STRATEGIC MANAGEMENT : LAW...GROUP SUB-GROUP 8oas Guar strategy; Coast Guara Strategc Management; Coast Guard Strategic Management -- Law Enforcement 19 ABSTRACT (Continue on reverse

  13. EPA enforcement, December 1972 to November 1974: air, water, pesticides

    Energy Technology Data Exchange (ETDEWEB)

    1975-01-01

    This report offers documentation of the Environmental Protection Agency's enforcement effort over the two year period, December 1972 to November 1974, in the major program areas of air, water, pesticide pollution. It is intended to be the successor volume to the first two years; a February 1973 EPA publication on air, water, pesticide enforcement efforts over the initial period of the Agency's existence. (GRA)

  14. An Optimal Anti-Drug Law Enforcement Policy

    OpenAIRE

    Sylvaine Poret

    2005-01-01

    This paper presents a model of an optimal anti-drug law enforcement policy,whose objective is the reduction of drug-related social cost, including the net costof law enforcement, the social harm, and the surplus of agents. We consider avertically organized distribution system with two levels: traffickers and retailers.The two questions are which type of sellers authorities must pursue, traffickers orretailers, and which sanction a seller has to pay in case of arrest. The optimal levelof fine ...

  15. Central Bank (Supervision and Enforcement) (Amendment) Bill 2016: Legislative Bill

    DEFF Research Database (Denmark)

    Butler, Graham; Rock, Noel

    2016-01-01

    Private Members' Bill (legislation) introduced in Dáil Éireann (House of Deputies), Houses of the Oireachtas (Irish Parliament). An Act to amend sections 49 and 51 of the Central Bank (Supervision and Enforcement) Act 2013 to ensure the powers exercised by the Central Bank of Ireland to make...... regulations, conferred by the Central Bank (Supervision and Enforcement) Act 2013 are fit for purpose; and to provide for related matters....

  16. Overview of the recognition and enforcement of international commercial arbitration

    Directory of Open Access Journals (Sweden)

    Sergey Kravtsov

    2017-01-01

    Full Text Available The subject. This informational article is devoted to the peculiarities of recognition and enforcement of international commercial arbitration awards according to different countries’ legislation and international legal regulation.The purpose of the article is to identify legal patterns of recognition and enforcement of international commercial arbitration awards in different countries.Methodology. The study is based on comparative law and formal law methods, analysis and synthesis.Results, scope of application. Enforcement of arbitral awards in foreign countries is ensured and guaranteed by multilateral conventions, bilateral treaties and national legislation. The New York Convention 1958 in a certain way limits the scope of legal protection of arbitral awards and leaves the procedure for recognition and enforcement of arbitral awards for consideration of the state court. The author analyses of differentiation of the recognition and enforcement regime of so-called "domestic" and "foreign" solutions of international commercial arbitration in terms of doctrinal approaches and practice of foreign countries. Special attention is given to the analysis of foreign arbitral awards of recognition and enforcement procedures is given to a denial of recognition and enforcement of foreign arbitral awards and their reasons. In spite of the explicit grounds for refusal of recognition and enforcement of foreign arbitral awards in New York Convention 1958, some countries try to establish certain exceptions to the rule in the national legislation. Results may be applicable in improvement of international legal regulation.Conclusions. The courts of the countries – participants of the New York Convention 1958 cannot cancel the foreign arbitral award or revise it substantially. The refutation of this award is possible only in the court of the state in whose territory the relevant arbitral award was made, and such court is not formally bound by the rules of the

  17. Drug Trafficking within Mexico: A Law Enforcement Issue or Insurgency?

    Science.gov (United States)

    2011-06-10

    are employed in Mexico was reported by the Mexico City‘s Reforma newspaper in 2007. The report stated that La Familia, ―began to sign up workers to...DRUG TRAFFICKING WITHIN MEXICO : A LAW ENFORCEMENT ISSUE OR INSURGENCY? A thesis presented to the Faculty of the U.S. Army...JUN 2011 4. TITLE AND SUBTITLE Drug Trafficking within Mexico : A Law Enforcement Issue or Insurgency? 5a. CONTRACT NUMBER 5b. GRANT NUMBER

  18. Automating the CMS DAQ

    Energy Technology Data Exchange (ETDEWEB)

    Bauer, G.; et al.

    2014-01-01

    We present the automation mechanisms that have been added to the Data Acquisition and Run Control systems of the Compact Muon Solenoid (CMS) experiment during Run 1 of the LHC, ranging from the automation of routine tasks to automatic error recovery and context-sensitive guidance to the operator. These mechanisms helped CMS to maintain a data taking efficiency above 90% and to even improve it to 95% towards the end of Run 1, despite an increase in the occurrence of single-event upsets in sub-detector electronics at high LHC luminosity.

  19. Control and automation systems

    International Nuclear Information System (INIS)

    Schmidt, R.; Zillich, H.

    1986-01-01

    A survey is given of the development of control and automation systems for energy uses. General remarks about control and automation schemes are followed by a description of modern process control systems along with process control processes as such. After discussing the particular process control requirements of nuclear power plants the paper deals with the reliability and availability of process control systems and refers to computerized simulation processes. The subsequent paragraphs are dedicated to descriptions of the operating floor, ergonomic conditions, existing systems, flue gas desulfurization systems, the electromagnetic influences on digital circuits as well as of light wave uses. (HAG) [de

  20. Automated nuclear materials accounting

    International Nuclear Information System (INIS)

    Pacak, P.; Moravec, J.

    1982-01-01

    An automated state system of accounting for nuclear materials data was established in Czechoslovakia in 1979. A file was compiled of 12 programs in the PL/1 language. The file is divided into four groups according to logical associations, namely programs for data input and checking, programs for handling the basic data file, programs for report outputs in the form of worksheets and magnetic tape records, and programs for book inventory listing, document inventory handling and materials balance listing. A similar automated system of nuclear fuel inventory for a light water reactor was introduced for internal purposes in the Institute of Nuclear Research (UJV). (H.S.)

  1. Altering user' acceptance of automation through prior automation exposure.

    Science.gov (United States)

    Bekier, Marek; Molesworth, Brett R C

    2017-06-01

    Air navigation service providers worldwide see increased use of automation as one solution to overcome the capacity constraints imbedded in the present air traffic management (ATM) system. However, increased use of automation within any system is dependent on user acceptance. The present research sought to determine if the point at which an individual is no longer willing to accept or cooperate with automation can be manipulated. Forty participants underwent training on a computer-based air traffic control programme, followed by two ATM exercises (order counterbalanced), one with and one without the aid of automation. Results revealed after exposure to a task with automation assistance, user acceptance of high(er) levels of automation ('tipping point') decreased; suggesting it is indeed possible to alter automation acceptance. Practitioner Summary: This paper investigates whether the point at which a user of automation rejects automation (i.e. 'tipping point') is constant or can be manipulated. The results revealed after exposure to a task with automation assistance, user acceptance of high(er) levels of automation decreased; suggesting it is possible to alter automation acceptance.

  2. Idaho: Library Automation and Connectivity.

    Science.gov (United States)

    Bolles, Charles

    1996-01-01

    Provides an overview of the development of cooperative library automation and connectivity in Idaho, including telecommunications capacity, library networks, the Internet, and the role of the state library. Information on six shared automation systems in Idaho is included. (LRW)

  3. U.S. Environmental Protection Agency Office of Enforcement and Compliance Assurance New Mapping Tool for Enforcement Cases

    Data.gov (United States)

    U.S. Environmental Protection Agency — The new mapping tool shows facilities in the United States where the EPA concluded formal environmental enforcement actions between October 1, 2008 and September 30,...

  4. Cost and Benefit of Control Strategies - Estimation of Benefit functions, enforcement-probability function and enforcement-cost function

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Jensen, Frank

    of undersized lobsters and illegal bycactch of cod. The enforcement to avoid the illegal activities consists of physical control, such as dock side inspections and boarding, and administrative control with integration of different databases. This paper presents the first steps in the application of the theory...... on fishery enforcement from the COBECOS project to a specific case. It is done by estimations of functional relationships' for describing 1) the fisheries benefit function 2) the shadow value of biomass 3) the connection between the probability of being detected and apprehended for different enforcement...... levels and 4) the connection between different enforcement levels and costs. The purpose of estimating the functional relationships are for future application in the COBECOS computer modeling in order to carry out an cost-benefit analysis of control strategies and thereby find the optimal mix and level...

  5. Automated HAZOP revisited

    DEFF Research Database (Denmark)

    Taylor, J. R.

    2017-01-01

    Hazard and operability analysis (HAZOP) has developed from a tentative approach to hazard identification for process plants in the early 1970s to an almost universally accepted approach today, and a central technique of safety engineering. Techniques for automated HAZOP analysis were developed...

  6. Automated data model evaluation

    International Nuclear Information System (INIS)

    Kazi, Zoltan; Kazi, Ljubica; Radulovic, Biljana

    2012-01-01

    Modeling process is essential phase within information systems development and implementation. This paper presents methods and techniques for analysis and evaluation of data model correctness. Recent methodologies and development results regarding automation of the process of model correctness analysis and relations with ontology tools has been presented. Key words: Database modeling, Data model correctness, Evaluation

  7. Automated Vehicle Monitoring System

    OpenAIRE

    Wibowo, Agustinus Deddy Arief; Heriansyah, Rudi

    2014-01-01

    An automated vehicle monitoring system is proposed in this paper. The surveillance system is based on image processing techniques such as background subtraction, colour balancing, chain code based shape detection, and blob. The proposed system will detect any human's head as appeared at the side mirrors. The detected head will be tracked and recorded for further action.

  8. Automated Accounting. Instructor Guide.

    Science.gov (United States)

    Moses, Duane R.

    This curriculum guide was developed to assist business instructors using Dac Easy Accounting College Edition Version 2.0 software in their accounting programs. The module consists of four units containing assignment sheets and job sheets designed to enable students to master competencies identified in the area of automated accounting. The first…

  9. Mechatronic Design Automation

    DEFF Research Database (Denmark)

    Fan, Zhun

    successfully design analogue filters, vibration absorbers, micro-electro-mechanical systems, and vehicle suspension systems, all in an automatic or semi-automatic way. It also investigates the very important issue of co-designing plant-structures and dynamic controllers in automated design of Mechatronic...

  10. Protokoller til Home Automation

    DEFF Research Database (Denmark)

    Kjær, Kristian Ellebæk

    2008-01-01

    computer, der kan skifte mellem foruddefinerede indstillinger. Nogle gange kan computeren fjernstyres over internettet, så man kan se hjemmets status fra en computer eller måske endda fra en mobiltelefon. Mens nævnte anvendelser er klassiske indenfor home automation, er yderligere funktionalitet dukket op...

  11. Automated Water Extraction Index

    DEFF Research Database (Denmark)

    Feyisa, Gudina Legese; Meilby, Henrik; Fensholt, Rasmus

    2014-01-01

    of various sorts of environmental noise and at the same time offers a stable threshold value. Thus we introduced a new Automated Water Extraction Index (AWEI) improving classification accuracy in areas that include shadow and dark surfaces that other classification methods often fail to classify correctly...

  12. Myths in test automation

    Directory of Open Access Journals (Sweden)

    Jazmine Francis

    2015-01-01

    Full Text Available Myths in automation of software testing is an issue of discussion that echoes about the areas of service in validation of software industry. Probably, the first though that appears in knowledgeable reader would be Why this old topic again? What's New to discuss the matter? But, for the first time everyone agrees that undoubtedly automation testing today is not today what it used to be ten or fifteen years ago, because it has evolved in scope and magnitude. What began as a simple linear scripts for web applications today has a complex architecture and a hybrid framework to facilitate the implementation of testing applications developed with various platforms and technologies. Undoubtedly automation has advanced, but so did the myths associated with it. The change in perspective and knowledge of people on automation has altered the terrain. This article reflects the points of views and experience of the author in what has to do with the transformation of the original myths in new versions, and how they are derived; also provides his thoughts on the new generation of myths.

  13. Effectiveness of primary and secondary enforced seat belt laws.

    Science.gov (United States)

    Rivara, F P; Thompson, D C; Cummings, P

    1999-01-01

    The objective of this study was to determine the relative efficacy of primary and secondary enforced motor vehicle occupant restraint laws on the outcomes of restraint use, crash-related mortality, and crash-related injuries. We used the Cochrane Collaboration search strategy to search the following electronic databases: MEDLINE, EMBASE, National Technical Information Service (NTIS), Psyc-INFO, ERIC, Nursing and Allied Health (CINAHL), Transportation Research Information Service (TRIS), and EI Compendex. The reference lists from each potentially eligible study were checked, and knowledgeable people in the field were contacted, for additional leads to published reports. Studies had to include a comparison of primary enforcement law to no law, secondary enforcement law to no law, or a primary to a secondary law. Any study design was acceptable. Acceptable outcome measures included observed restraint use, and counts or rates of deaths or serious injuries. Data were collected using a standard abstract reporting from. Relative differences in outcomes and absolute differences were calculated when possible. We identified 48 studies for the review. When places or time periods with primary enforcement laws were compared to those without such laws, the relative prevalence of seat belt use ranged from 1.5 to 4.5; the prevalence differences ranged from 10 to 50 per 100 observed drivers. Secondary laws had smaller effects. Two studies evaluated a change in law from secondary to primary enforcement; this was associated with an increase in belt use 6 months later of 5.3 per 100 observed drivers in Louisiana and 18 per 100 drivers in California. Primary enforcement laws were associated with a relative risk of death in MV crashes of .54 to .97. The reduction in mortality associated with secondary enforcement laws was much more modest, with relative risks estimates of .81 to 1.025. Primary enforcement laws were associated with a relative risk of severe injuries of .20 to .89; the

  14. Driver Psychology during Automated Platooning

    NARCIS (Netherlands)

    Heikoop, D.D.

    2017-01-01

    With the rapid increase in vehicle automation technology, the call for understanding how humans behave while driving in an automated vehicle becomes more urgent. Vehicles that have automated systems such as Lane Keeping Assist (LKA) or Adaptive Cruise Control (ACC) not only support drivers in their

  15. Sub-Federal Enforcement of Immigration Law: An Introduction to the Problem of Pretextual Enforcement and Inadequate Remedies

    Directory of Open Access Journals (Sweden)

    Carrie Rosenbaum

    2014-01-01

    Full Text Available Sub-federal enforcement of immigration law has expanded significantly in the last decade raising questions concerning policing, rights violations, and remedies. While the Fourth Amendment has historically provided an avenue for potentially suppressing evidence obtained in violation of a criminal defendant’s civil rights, its applicability in the immigration removal context has been circumscribed. Thus, the avenues to protect the rights of unauthorized noncitizens in immigration removal proceedings are less clear where sub-federal agents act outside of their authorization, particularly in the context of Secure Communities, and enforce immigration law. In the context of immigration exceptionalism, racial profiling has historically played a unique role in immigration law. The lack of adequate measures to deter rights violations where sub-federal agents enforce immigration law raises questions concerning the relationship between criminal and immigration law, and the importance of deterring civil rights violations such as racial profiling, in immigration enforcement. This article will examine the problem of sub-federal law enforcement agents’ use of criminal law violations as a pretext to enforce immigration law and the lack of adequate deterrence of civil rights violations.

  16. Is your automated system disaster proof?

    International Nuclear Information System (INIS)

    Baird, P.W.; Priest, S.A.

    1990-01-01

    Disaster-proofing a system has four basic steps: (1) development of a disaster recovery plan; (2) creation and enforcement of procedures for developing and maintaining off-site back-ups for data, vital records, and documentation; (3) a performance test of the disaster recovery plan; and (4) the on-going maintenance of a plans currency and the periodic testing of the plant. The development of a complete disaster recovery plan has many elements: the operating environment for the system; the criteria under which an off-site recovery would be initiated; the back-up schedule and locations of all data; vital records and documentation; the steps required to recover the system; and any modifications necessitated by the off-site operating environment. Creation and enforcement of procedures for developing and maintaining current backups for all data, vital records, and documentation in a designated off-site location represent the second and most crucial step for ensuring an automated system can successfully survive a disaster. To effectively test any plan, a disaster scenario must be developed and performed by a disaster recovery team required to recover and operate the system in the off-site environment using nothing more than the disaster recovery plan and off-site information and data. Finally, the last step for ensuring that a system can survive a disaster is the maintenance of the plans currency and the continued performance of disaster recovery tests. As the environment surrounding a system changes a disaster recovery plan must be updated to reflect these changes. Equally important to the maintenance of currency is the on-going performance of disaster recovery tests on a periodic basis

  17. Automatic enforcement of speed and red light violations : applications, experiences and developments.

    NARCIS (Netherlands)

    Mäkinen, T. & Oei, H.-l.

    1993-01-01

    This paper explains the need for automatic enforcement, and reviews: (1) applications of automatic enforcement. Automatic enforcement has been carried out for about 20 years. Despite this, the number of scientific and experimental studies dealing with the effects of automatic traffic enforcement

  18. Enforcing the climate regime: Game theory and the Marrakesh Accords

    International Nuclear Information System (INIS)

    Hovi, Jon

    2002-01-01

    The article reviews basic insights about compliance and ''hard'' enforcement that can be derived from various non-cooperative equilibrium concepts and evaluates the Marrakesh Accords in light of these insights. Five different notions of equilibrium are considered - the Nash equilibrium, the sub game perfect equilibrium, the re negotiation proof equilibrium, the coalition proof equilibrium and the perfect Bayesian equilibrium. These various types of equilibrium have number of implications for effective enforcement: 1. Consequences of non-compliance should be more than proportionate. 2. To be credible punishment needs to take place in the Pareto frontier, rather than by reversion to some suboptimal state. 3. An effective enforcement system must be able to curb collective as well as individual incentives to cheat. 4. A fully transparent enforcement regime could in fact turn out to be detrimental for compliance levels. It is concluded that constructing an effective system for ''hard'' enforcement of the Kyoto Protocol is a formidable task that has only partially been accomplished by the Marrakesh Accords. A possible explanation is that the design of a compliance system for the climate regime involved a careful balancing of the desire to minimise non-compliance against other important considerations. (Author)

  19. Enforcing the climate regime: Game theory and the Marrakesh Accords

    Energy Technology Data Exchange (ETDEWEB)

    Hovi, Jon

    2002-07-01

    The article reviews basic insights about compliance and ''hard'' enforcement that can be derived from various non-cooperative equilibrium concepts and evaluates the Marrakesh Accords in light of these insights. Five different notions of equilibrium are considered - the Nash equilibrium, the sub game perfect equilibrium, the re negotiation proof equilibrium, the coalition proof equilibrium and the perfect Bayesian equilibrium. These various types of equilibrium have number of implications for effective enforcement: 1. Consequences of non-compliance should be more than proportionate. 2. To be credible punishment needs to take place in the Pareto frontier, rather than by reversion to some suboptimal state. 3. An effective enforcement system must be able to curb collective as well as individual incentives to cheat. 4. A fully transparent enforcement regime could in fact turn out to be detrimental for compliance levels. It is concluded that constructing an effective system for ''hard'' enforcement of the Kyoto Protocol is a formidable task that has only partially been accomplished by the Marrakesh Accords. A possible explanation is that the design of a compliance system for the climate regime involved a careful balancing of the desire to minimise non-compliance against other important considerations. (Author)

  20. Individual psychological features of law enforcement officers convicted of crimes

    Directory of Open Access Journals (Sweden)

    Lyutykh V.A.

    2016-06-01

    Full Text Available The relevance of this topic is caused by a significant number of crimes committed by law enforcement officers and the necessity of active prevention. The aim of the study was to determine the individual psychological characteristics of law enforcement officers convicted of intentional crimes. The hypothesis was suggested that the main difference of individual psychological characteristics of law enforcement officers convicted of intentional crimes from individual psychological characteristics of law-abiding law enforcement officers is the difference between the principal values of the person both the main motives of activity adopted by an individual and the structure and the hierarchy of these values. This article describes the progress and results of empirical research conducted on the materials of psychodiagnostic examination of: employees who have been convicted of intentional crimes; law-abiding employees; people entering an internal affairs agency. Test subjects - men 18-46 years old, 90 people. Recommendations for practical psychologist of internal affairs agencies on detection of individual psychological personality features typical for law enforcement officers convicted of intentional crimes are formulated based on the obtained results.

  1. The corruption process of a law enforcement officer: a paradigm of occupational stress and deviancy.

    Science.gov (United States)

    McCafferty, F L; Souryal, S; McCafferty, M A

    1998-01-01

    The public does not want all laws enforced. In the closed society of law enforcement institutions, police discretion, the conspiracy of silence, the lack of an administration with integrity, and susceptible law enforcement officers contribute to the development of corruption from occupational deviance. Corruption in law enforcement agencies may have similar roots in business, law, medicine, and other professions. Understanding the law enforcement corruption paradigm may therefore be helpful in correcting and curbing corruption in other professions.

  2. Automated campaign system

    Science.gov (United States)

    Vondran, Gary; Chao, Hui; Lin, Xiaofan; Beyer, Dirk; Joshi, Parag; Atkins, Brian; Obrador, Pere

    2006-02-01

    To run a targeted campaign involves coordination and management across numerous organizations and complex process flows. Everything from market analytics on customer databases, acquiring content and images, composing the materials, meeting the sponsoring enterprise brand standards, driving through production and fulfillment, and evaluating results; all processes are currently performed by experienced highly trained staff. Presented is a developed solution that not only brings together technologies that automate each process, but also automates the entire flow so that a novice user could easily run a successful campaign from their desktop. This paper presents the technologies, structure, and process flows used to bring this system together. Highlighted will be how the complexity of running a targeted campaign is hidden from the user through technologies, all while providing the benefits of a professionally managed campaign.

  3. Rapid automated nuclear chemistry

    International Nuclear Information System (INIS)

    Meyer, R.A.

    1979-01-01

    Rapid Automated Nuclear Chemistry (RANC) can be thought of as the Z-separation of Neutron-rich Isotopes by Automated Methods. The range of RANC studies of fission and its products is large. In a sense, the studies can be categorized into various energy ranges from the highest where the fission process and particle emission are considered, to low energies where nuclear dynamics are being explored. This paper presents a table which gives examples of current research using RANC on fission and fission products. The remainder of this text is divided into three parts. The first contains a discussion of the chemical methods available for the fission product elements, the second describes the major techniques, and in the last section, examples of recent results are discussed as illustrations of the use of RANC

  4. ATLAS Distributed Computing Automation

    CERN Document Server

    Schovancova, J; The ATLAS collaboration; Borrego, C; Campana, S; Di Girolamo, A; Elmsheuser, J; Hejbal, J; Kouba, T; Legger, F; Magradze, E; Medrano Llamas, R; Negri, G; Rinaldi, L; Sciacca, G; Serfon, C; Van Der Ster, D C

    2012-01-01

    The ATLAS Experiment benefits from computing resources distributed worldwide at more than 100 WLCG sites. The ATLAS Grid sites provide over 100k CPU job slots, over 100 PB of storage space on disk or tape. Monitoring of status of such a complex infrastructure is essential. The ATLAS Grid infrastructure is monitored 24/7 by two teams of shifters distributed world-wide, by the ATLAS Distributed Computing experts, and by site administrators. In this paper we summarize automation efforts performed within the ATLAS Distributed Computing team in order to reduce manpower costs and improve the reliability of the system. Different aspects of the automation process are described: from the ATLAS Grid site topology provided by the ATLAS Grid Information System, via automatic site testing by the HammerCloud, to automatic exclusion from production or analysis activities.

  5. Automated Assembly Center (AAC)

    Science.gov (United States)

    Stauffer, Robert J.

    1993-01-01

    The objectives of this project are as follows: to integrate advanced assembly and assembly support technology under a comprehensive architecture; to implement automated assembly technologies in the production of high-visibility DOD weapon systems; and to document the improved cost, quality, and lead time. This will enhance the production of DOD weapon systems by utilizing the latest commercially available technologies combined into a flexible system that will be able to readily incorporate new technologies as they emerge. Automated assembly encompasses the following areas: product data, process planning, information management policies and framework, three schema architecture, open systems communications, intelligent robots, flexible multi-ability end effectors, knowledge-based/expert systems, intelligent workstations, intelligent sensor systems, and PDES/PDDI data standards.

  6. Automated drawing generation system

    International Nuclear Information System (INIS)

    Yoshinaga, Toshiaki; Kawahata, Junichi; Yoshida, Naoto; Ono, Satoru

    1991-01-01

    Since automated CAD drawing generation systems still require human intervention, improvements were focussed on an interactive processing section (data input and correcting operation) which necessitates a vast amount of work. As a result, human intervention was eliminated, the original objective of a computerized system. This is the first step taken towards complete automation. The effects of development and commercialization of the system are as described below. (1) The interactive processing time required for generating drawings was improved. It was determined that introduction of the CAD system has reduced the time required for generating drawings. (2) The difference in skills between workers preparing drawings has been eliminated and the quality of drawings has been made uniform. (3) The extent of knowledge and experience demanded of workers has been reduced. (author)

  7. Automated fingerprint identification system

    International Nuclear Information System (INIS)

    Bukhari, U.A.; Sheikh, N.M.; Khan, U.I.; Mahmood, N.; Aslam, M.

    2002-01-01

    In this paper we present selected stages of an automated fingerprint identification system. The software for the system is developed employing algorithm for two-tone conversion, thinning, feature extraction and matching. Keeping FBI standards into account, it has been assured that no details of the image are lost in the comparison process. We have deployed a general parallel thinning algorithm for specialized images like fingerprints and modified the original algorithm after a series of experimentation selecting the one giving the best results. We also proposed an application-based approach for designing automated fingerprint identification systems keeping in view systems requirements. We will show that by using our system, the precision and efficiency of current fingerprint matching techniques are increased. (author)

  8. Automated breeder fuel fabrication

    International Nuclear Information System (INIS)

    Goldmann, L.H.; Frederickson, J.R.

    1983-01-01

    The objective of the Secure Automated Fabrication (SAF) Project is to develop remotely operated equipment for the processing and manufacturing of breeder reactor fuel pins. The SAF line will be installed in the Fuels and Materials Examination Facility (FMEF). The FMEF is presently under construction at the Department of Energy's (DOE) Hanford site near Richland, Washington, and is operated by the Westinghouse Hanford Company (WHC). The fabrication and support systems of the SAF line are designed for computer-controlled operation from a centralized control room. Remote and automated fuel fabriction operations will result in: reduced radiation exposure to workers; enhanced safeguards; improved product quality; near real-time accountability, and increased productivity. The present schedule calls for installation of SAF line equipment in the FMEF beginning in 1984, with qualifying runs starting in 1986 and production commencing in 1987. 5 figures

  9. Automated Instrumentation System Verification.

    Science.gov (United States)

    1983-04-01

    fUig JDma Entered) i. _-_J I ___________ UNCLASSI FI ED SECURITY CLASSIFICATION OF TIHIS PAGE(II7,m Daca Entod) 20. ABSTRACT (Continued). ) contain...automatic measurement should arise. 15 I "_......_______.....____,_.........____ _ ’ " AFWL-TR-82-137 11. TRADITIONAL PROCEDURES The necessity to measure data...measurement (Ref. 8). Finally, when the necessity for automation was recognized and funds were provided, the effort described in this report was started

  10. Cavendish Balance Automation

    Science.gov (United States)

    Thompson, Bryan

    2000-01-01

    This is the final report for a project carried out to modify a manual commercial Cavendish Balance for automated use in cryostat. The scope of this project was to modify an off-the-shelf manually operated Cavendish Balance to allow for automated operation for periods of hours or days in cryostat. The purpose of this modification was to allow the balance to be used in the study of effects of superconducting materials on the local gravitational field strength to determine if the strength of gravitational fields can be reduced. A Cavendish Balance was chosen because it is a fairly simple piece of equipment for measuring gravity, one the least accurately known and least understood physical constants. The principle activities that occurred under this purchase order were: (1) All the components necessary to hold and automate the Cavendish Balance in a cryostat were designed. Engineering drawings were made of custom parts to be fabricated, other off-the-shelf parts were procured; (2) Software was written in LabView to control the automation process via a stepper motor controller and stepper motor, and to collect data from the balance during testing; (3)Software was written to take the data collected from the Cavendish Balance and reduce it to give a value for the gravitational constant; (4) The components of the system were assembled and fitted to a cryostat. Also the LabView hardware including the control computer, stepper motor driver, data collection boards, and necessary cabling were assembled; and (5) The system was operated for a number of periods, data collected, and reduced to give an average value for the gravitational constant.

  11. On the Enforcement of Specific Performance in Civil Law Countries

    DEFF Research Database (Denmark)

    Lando, Henrik; Rose, Caspar

    2003-01-01

    Abstract:Proponents of specific performance as a remedy for breach ofcontract have found support in the alleged use of the remedy inCivil Law countries. However, we provide evidence that specificperformance is in fact a rare remedy in Denmark, Germany andFrance, and under CISG, when performance...... requires actions to beundertaken, and we relate this to costs of enforcement. We arguethat it is administratively costly to run a system of enforcementthat renders specific performance attractive to the aggrieved party,and that the Civil Law countries have (like Common Law countries)chosen not to incur...... these costs of enforcement. This is especiallyclear in the case of Denmark, where specific performance of actionshas been abandoned as a legal remedy.At the normative level, we argue that enforcement costs providesan additional rationale, over and above the rationales of the theoryof efficient breach...

  12. Forensic Speaker Recognition Law Enforcement and Counter-Terrorism

    CERN Document Server

    Patil, Hemant

    2012-01-01

    Forensic Speaker Recognition: Law Enforcement and Counter-Terrorism is an anthology of the research findings of 35 speaker recognition experts from around the world. The volume provides a multidimensional view of the complex science involved in determining whether a suspect’s voice truly matches forensic speech samples, collected by law enforcement and counter-terrorism agencies, that are associated with the commission of a terrorist act or other crimes. While addressing such topics as the challenges of forensic case work, handling speech signal degradation, analyzing features of speaker recognition to optimize voice verification system performance, and designing voice applications that meet the practical needs of law enforcement and counter-terrorism agencies, this material all sounds a common theme: how the rigors of forensic utility are demanding new levels of excellence in all aspects of speaker recognition. The contributors are among the most eminent scientists in speech engineering and signal process...

  13. U.S. Border Enforcement and Mexican Immigrant Location Choice.

    Science.gov (United States)

    Bohn, Sarah; Pugatch, Todd

    2015-10-01

    We provide the first evidence on the causal effect of border enforcement on the full spatial distribution of Mexican immigrants to the United States. We address the endogeneity of border enforcement with an instrumental variables strategy based on administrative delays in budgetary allocations for border security. We find that 1,000 additional Border Patrol officers assigned to prevent unauthorized migrants from entering a U.S. state decreases that state's share of Mexican immigrants by 21.9 %. Our estimates imply that if border enforcement had not changed from 1994 to 2011, the shares of Mexican immigrants locating in California and Texas would each be 8 percentage points greater, with all other states' shares lower or unchanged.

  14. Personal characteristics of a law enforcement unit of special purpose

    Directory of Open Access Journals (Sweden)

    Vasilenko T.G.

    2017-07-01

    Full Text Available The relevance of the study of the personal characteristics of law enforcement officers due to a significant number of crimes of an aggressive nature, committed by employees of internal Affairs bodies, and the need to develop preventive measures. The purpose of this research is to study peculiarities of the manifestation of progressive and inhibiting aggression personality factors in the structure of law enforcement officers, whose activities directly associated with aggression in the performance of official duties. The study involved 149 employees of special forces of law enforcement are male aged 18 to 35 years. Used a wide battery of psychodiagnostic methods aimed at a comprehensive study of the individual respondents. the data Obtained were analyzed using the method of correlation pleiades. According to the results, was discovered a unique picture of the relationship among personality structures and interaction progressive and deterrent aggression factors with the prevalence of progressive on inhibitory factors in the studied structure.

  15. Should AAPL enforce its ethics? Challenges and solutions.

    Science.gov (United States)

    Candilis, Philip J; Dike, Charles C; Meyer, Donald J; Myers, Wade C; Weinstock, Robert

    2014-01-01

    Ethics enforcement in psychiatry occurs at the district branch and American Psychiatric Association (APA) levels under the guidance of American Medical Association (AMA) and APA ethics documents. Subspecialty ethics consequently have no formal role in the enforcement process. This reality challenges practitioners to work according to guidelines that may not be sufficiently relevant and challenges ethics reviewers to apply frameworks not intended for the subspecialties. This article offers the theoretical and practical support to amend APA Procedures to permit formal consideration of subspecialty ethics during ethics complaints and to include forensic practitioners on panels reviewing them. This is the first step toward an integration of two conflicting models of ethics enforcement, regulatory and aspirational, that bring together specialty and subspecialty ethics. © 2014 American Academy of Psychiatry and the Law.

  16. Enforcement Issues in the Governance of Ships’ Carbon Emissions

    Directory of Open Access Journals (Sweden)

    Michael Bloor

    2015-07-01

    Full Text Available The shipping industry, although relatively carbon-efficient, is projected to produce rising carbon emissions in the future as a consequence of increasing world trade. A number of candidate regulations designed to mitigate these emissions have been canvassed by the UN’s International Maritime Organisation and by the European Commission. Many of these schemes are focussed on the use of market measures—emission trading schemes or fuel levies. This paper draws on observational and interview data gathered to examine enforcement issues associated with the control of ships’ sulphur emissions in order to consider the possible enforcement problems that might be associated with projected market measures to control ships’ carbon emissions. Enforcement problems are shown to be associated with the globalised character of the industry and its polycentric governance structure.

  17. A Critical Review of OSHA Heat Enforcement Cases: Lessons Learned.

    Science.gov (United States)

    Arbury, Sheila; Lindsley, Matthew; Hodgson, Michael

    2016-04-01

    The aim of the study was to review the Occupational Safety and Health Administration's (OSHA) 2012 to 2013 heat enforcement cases, using identified essential elements of heat illness prevention to evaluate employers' programs and make recommendations to better protect workers from heat illness. (1) Identify essential elements of heat illness prevention; (2) develop data collection tool; and (3) analyze OSHA 2012 to 2013 heat enforcement cases. OSHA's database contains 84 heat enforcement cases in 2012 to 2013. Employer heat illness prevention programs were lacking in essential elements such as providing water and shade; adjusting the work/rest proportion to allow for workload and effective temperature; and acclimatizing and training workers. In this set of investigations, most employers failed to implement common elements of illness prevention programs. Over 80% clearly did not rely on national standard approaches to heat illness prevention.

  18. Autonomy, Automation, and Systems

    Science.gov (United States)

    Turner, Philip R.

    1987-02-01

    Aerospace industry interest in autonomy and automation, given fresh impetus by the national goal of establishing a Space Station, is becoming a major item of research and technology development. The promise of new technology arising from research in Artificial Intelligence (AI) has focused much attention on its potential in autonomy and automation. These technologies can improve performance in autonomous control functions that involve planning, scheduling, and fault diagnosis of complex systems. There are, however, many aspects of system and subsystem design in an autonomous system that impact AI applications, but do not directly involve AI technology. Development of a system control architecture, establishment of an operating system within the design, providing command and sensory data collection features appropriate to automated operation, and the use of design analysis tools to support system engineering are specific examples of major design issues. Aspects such as these must also receive attention and technology development support if we are to implement complex autonomous systems within the realistic limitations of mass, power, cost, and available flight-qualified technology that are all-important to a flight project.

  19. Automation in biological crystallization.

    Science.gov (United States)

    Stewart, Patrick Shaw; Mueller-Dieckmann, Jochen

    2014-06-01

    Crystallization remains the bottleneck in the crystallographic process leading from a gene to a three-dimensional model of the encoded protein or RNA. Automation of the individual steps of a crystallization experiment, from the preparation of crystallization cocktails for initial or optimization screens to the imaging of the experiments, has been the response to address this issue. Today, large high-throughput crystallization facilities, many of them open to the general user community, are capable of setting up thousands of crystallization trials per day. It is thus possible to test multiple constructs of each target for their ability to form crystals on a production-line basis. This has improved success rates and made crystallization much more convenient. High-throughput crystallization, however, cannot relieve users of the task of producing samples of high quality. Moreover, the time gained from eliminating manual preparations must now be invested in the careful evaluation of the increased number of experiments. The latter requires a sophisticated data and laboratory information-management system. A review of the current state of automation at the individual steps of crystallization with specific attention to the automation of optimization is given.

  20. The Continuing Role For Antitrust Enforcement In the Electricity Sector

    OpenAIRE

    William Stallings

    2013-01-01

    William Stallings discusses some of the recent enforcement actions in the electricity sector, a highly regulated sector, where government has played an important role in enforcing competition policy. The recent “New York Capacity†cases involving a power generator and its financial services firm, includes the use of a derivative agreement to bypass merger regulation and restrain trade. As Stalling notes, this is an example of a novel liability theory used by the Antitrust Division of...

  1. On financing the internal enforcement of illegal immigration policies.

    Science.gov (United States)

    Bucci, G A; Tenorio, R

    1996-02-01

    "We introduce a government budget constraint into an illegal immigration model, and show that the effect of increasing internal enforcement of immigration laws on the host country's disposable national income depends on the mix of employer fines and income taxation used to finance the added enforcement. These issues are addressed under alternative assumptions about (a) the ability of host country employers to discern between legal and illegal workers, and (b) host country labor market conditions. Empirical evidence for the United States indicates that the employer sanctions program may have had a negative impact on disposable national income." excerpt

  2. Enforcement of UK merchant shipping legislation: in 2 volumes

    OpenAIRE

    Jurgens, Ulrich

    2009-01-01

    The basis of this thesis is an investigation of Maritime and Coastguard Agency (MCA) administrative and criminal enforcement files, relating to UK detentions and prosecutions. It would appear that this is the first time that such an analysis has been made.The thesis is divided into four parts of which Part B and C form the heart of the work. These two consider administrative (Part B) and criminal (Part C) enforcement measures and discusses their legal basis. But before these subjects are deal...

  3. Enforcement, Integration, and the Future of Immigration Federalism

    Directory of Open Access Journals (Sweden)

    Cristina Rodriguez

    2017-06-01

    Full Text Available The federal government has a monopoly over the terms of immigration law, and it superintends the nation’s singular immigration enforcement bureaucracy. But our federalism nonetheless provides a vital playing field for sharp debates over the status of immigrants in American life. The forms of state and local involvement in immigration policy are varied, but they fall into two basic categories of mutually dependent and re-enforcing policies: enforcement federalism and integration federalism. Whereas enforcement federalism concerns the extent to which localities should assist or resist federal removal policies, integration federalism encompasses measures designed to assist immigrants, regardless of status, to plant roots and acculturate to life in the United States. Both forms of immigration federalism take shape through a wide variety of intergovernmental relations, not only between the federal government on the one hand and states and localities on the other, but also between states and the cities within them — an increasingly important dimension of immigration federalism today. These relations have important legal characteristics, and constitutional and statutory law bring them into being and mediate them. But the nature of any given intergovernmental dynamic will be shaped just as much by a combination of ideology and institutional imperatives. These elements can either unite the center and the periphery in common cause or produce the sort of conflict that has made immigration federalism a high-profile issue for decades. Given the density of the intergovernmental dynamics that shape the country’s immigration policy, developing a comprehensive strategy for immigration federalism requires more than a predilection toward or away from centralization of government authority. It requires a clear view on the appropriate metes and bounds of immigration enforcement, as well as a set of beliefs about the proper place in the social order of

  4. Automation, Performance and International Competition

    DEFF Research Database (Denmark)

    Kromann, Lene; Sørensen, Anders

    This paper presents new evidence on trade‐induced automation in manufacturing firms using unique data combining a retrospective survey that we have assembled with register data for 2005‐2010. In particular, we establish a causal effect where firms that have specialized in product types for which...... the Chinese exports to the world market has risen sharply invest more in automated capital compared to firms that have specialized in other product types. We also study the relationship between automation and firm performance and find that firms with high increases in scale and scope of automation have faster...... productivity growth than other firms. Moreover, automation improves the efficiency of all stages of the production process by reducing setup time, run time, and inspection time and increasing uptime and quantity produced per worker. The efficiency improvement varies by type of automation....

  5. An Approach to Office Automation

    OpenAIRE

    Ischenko, A.N.; Tumeo, M.A.

    1983-01-01

    In recent years, the increasing scale of production and degree of specialization within firms has led to a significant growth in the amount of information needed for their successful management. As a result, the use of computer systems (office automation) has become increasingly common. However, no manuals or set automation procedures exist to help organizations design and implement an efficient and effective office automation system. The goals of this paper are to outline some important...

  6. Embedded system for building automation

    OpenAIRE

    Rolih, Andrej

    2014-01-01

    Home automation is a fast developing field of computer science and electronics. Companies are offering many different products for home automation. Ranging anywhere from complete systems for building management and control, to simple smart lights that can be connected to the internet. These products offer the user greater living comfort and lower their expenses by reducing the energy usage. This thesis shows the development of a simple home automation system that focuses mainly on the enhance...

  7. World-wide distribution automation systems

    International Nuclear Information System (INIS)

    Devaney, T.M.

    1994-01-01

    A worldwide power distribution automation system is outlined. Distribution automation is defined and the status of utility automation is discussed. Other topics discussed include a distribution management system, substation feeder, and customer functions, potential benefits, automation costs, planning and engineering considerations, automation trends, databases, system operation, computer modeling of system, and distribution management systems

  8. Contaminant analysis automation, an overview

    International Nuclear Information System (INIS)

    Hollen, R.; Ramos, O. Jr.

    1996-01-01

    To meet the environmental restoration and waste minimization goals of government and industry, several government laboratories, universities, and private companies have formed the Contaminant Analysis Automation (CAA) team. The goal of this consortium is to design and fabricate robotics systems that standardize and automate the hardware and software of the most common environmental chemical methods. In essence, the CAA team takes conventional, regulatory- approved (EPA Methods) chemical analysis processes and automates them. The automation consists of standard laboratory modules (SLMs) that perform the work in a much more efficient, accurate, and cost- effective manner

  9. 3PAC: Enforcing Access Policies for Web Services

    NARCIS (Netherlands)

    van Bemmel, J.; Wegdam, M.; Lagerberg, K.

    Web Services fail to deliver on the promise of ubiquitous deployment and seamless interoperability due to the lack of a uniform, standards-based approach to all aspects of security. In particular, the enforcement of access policies in a Service Oriented Architecture is not addressed adequately. We

  10. the machinery for enforcement of domestic arbitral awards in nigeria

    African Journals Online (AJOL)

    Mofasony

    That state of affairs surely calls for state assistance, hence the inevitable involvement of the court and even other law ... 1. Sections 31 and 51, Arbitration and Conciliation Act, Cap A18, Laws of Federation of Nigeria,. 2004 .... enforcement of Arbitral award that is by means of Motion on Notice18. Thus, a party seeking the ...

  11. 7 CFR 352.3 - Enforcement and administration.

    Science.gov (United States)

    2010-01-01

    ... Agriculture Regulations of the Department of Agriculture (Continued) ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE PLANT QUARANTINE SAFEGUARD REGULATIONS § 352.3 Enforcement and administration. (a) Plants, plant products, plant pests, soil, and other products and articles subject to the...

  12. 75 FR 38611 - Child Support Enforcement Program; Intergovernmental Child Support

    Science.gov (United States)

    2010-07-02

    ... responsibility for determining in which State tribunal a controlling order determination is made where multiple.../local partnership established to help families by ensuring that parents support their children even when... programs. The complexities of child support enforcement are compounded when parents reside in different...

  13. Assessing peak aerobic capacity in Dutch law enforcement officers.

    NARCIS (Netherlands)

    Wittink, H.; Takken, T.; Groot, J.F. de; Reneman, M.; Peters, R.; Vanhees, L.

    2015-01-01

    Objectives: To cross-validate the existing peak rate of oxygen consumption (VO2peak) prediction equations in Dutch law enforcement officers and to determine whether these prediction equations can be used to predict VO2peak for groups and in a single individual. A further objective was to report

  14. Enforceability of socio-economic rights: Seeing Nigeria through the ...

    African Journals Online (AJOL)

    Hence, these rights remain a mirage in Nigeria unlike the position in other jurisdictions. In countries like South Africa, India and some Latin American countries, the enforcement of these rights have been achieved by either merging constitutional provisions with socio-economic rights or the courts giving expansive definitions ...

  15. Controlling Rowdy House Parties through Enforcement. E-Fact Sheet

    Science.gov (United States)

    Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2009

    2009-01-01

    Off-campus parties that foster underage and high-risk drinking and become a nuisance to neighbors are often a sore spot when it comes to town-gown relations. Responding to these parties is leading communities to adopt new measures and enforcement strategies to reduce a range of problems faced by students and residents alike. While many policy and…

  16. Road Transportation and Traffic Law Enforcement in Nigeria: A case ...

    African Journals Online (AJOL)

    Road Transportation and Traffic Law Enforcement in Nigeria was established in order to reduce the increasing road crashes and fatalities as well as making road users comply with traffic Laws and regulations as a counter measure, which remain as a great challenge in Nigeria. This paper discussed the roles of the Federal ...

  17. Minimum Wage Legislation, Enforcement and Labour Outcomes in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Minimum Wage Legislation, Enforcement and Labour Outcomes in Argentina, Costa Rica and South Africa. Labour market regulations, particularly minimum wage policies, remain highly contentious and poorly understood issues, both within academic and policy circles. Some argue that such regulations are effective ...

  18. Assessing peak aerobic capacity in Dutch law enforcement officers

    NARCIS (Netherlands)

    Wittink, Harriet; Takken, Tim; de Groot, Janke; Reneman, Michiel; Peters, Roelof; Vanhees, Luc

    2015-01-01

    Objectives: To cross-validate the existing peak rate of oxygen consumption (VO2peak) prediction equations in Dutch law enforcement officers and to determine whether these prediction equations can be used to predict VO2peak for groups and in a single individual. A further objective was to report

  19. 75 FR 7428 - Amendments to Enforceable Consent Agreement Procedural Rules

    Science.gov (United States)

    2010-02-19

    ... Amendments to Enforceable Consent Agreement Procedural Rules AGENCY: Environmental Protection Agency (EPA... Manufacturers Association; several public meetings to discuss the procedures were held before the procedural... formally concluded, or have been terminated. EPA now proposes to revise the ECA procedural rule to increase...

  20. 75 FR 56472 - Amendments to Enforceable Consent Agreement Procedural Rules

    Science.gov (United States)

    2010-09-16

    ... Amendments to Enforceable Consent Agreement Procedural Rules AGENCY: Environmental Protection Agency (EPA... provide procedural safeguards equivalent to those that apply where testing is conducted by rule. B. What... comments indicated support for the ECA procedural changes, and had a few specific suggestions: Comment 1...

  1. 12 CFR Appendix A to Part 202 - Federal Enforcement Agencies

    Science.gov (United States)

    2010-01-01

    ... Part 202 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM... organizations operating under section 25 or 25A of the Federal Reserve Act: Federal Reserve Consumer Help Center... Agencies The following list indicates the federal agencies that enforce Regulation B for particular classes...

  2. 12 CFR Appendix I to Part 226 - Federal Enforcement Agencies

    Science.gov (United States)

    2010-01-01

    ... Part 226 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE... Agencies The following list indicates which federal agency enforces Regulation Z for particular classes of... banks, and organizations operating under section 25 or 25A of the Federal Reserve Act Federal Reserve...

  3. The national building code, indigenous contractors enforcement and ...

    African Journals Online (AJOL)

    Before the introduction of the building code, in Nigeria, there was no realistic Legislature, control or moderation in the building industry. The introduction of the building code is a well come development. The problem that is facing the building code and the nation is the issue of implementation, enforcement and compliance ...

  4. Compliance notices – A new tool in environmental enforcement ...

    African Journals Online (AJOL)

    This note examines compliance notices, a new administrative remedy that has been created to assist in compliance and enforcement of environmental laws. The note considers the aim and scope of compliance and the process of issuing a compliance notice. In addition, it reflects on objections to compliance notices as well ...

  5. Enforcement of Federal Civil Rights Laws in the Reagan Administration.

    Science.gov (United States)

    Reynolds, William Bradford

    In this statement, William Bradford Reynolds, Assistant Attorney General, discusses the Federal government's enforcement policies and activities regarding equal employment opportunity, and defends the Reagan Administration and the Justice Department against charges cited in a report by the Leadership Conference on Civil Rights. Reynolds contends…

  6. Energy regulations require strickter enforcement as response to climate change

    NARCIS (Netherlands)

    Visscher, H.J.; Itard, L.C.M.; Guerra Santin, O.

    2010-01-01

    Since a few years the attention for building regulatory systems and enforcement procedures is growing. Various developments in society, politics and the construction industry have influenced changes in the systems of building control in the last 20 years. The influence of climate change and the

  7. Recognition and Enforcement of Foreign Arbitral Awards in Civil and ...

    African Journals Online (AJOL)

    Ethiopia is not yet party to the New York Convention on the Recognition and Enforcement of Foreign Arbitral Awards. It can also be said that Ethiopian arbitration laws fail to cope with the emerging modern laws and practices in international commercial arbitration. However, as of 1965, with the introduction of the Civil ...

  8. 77 FR 32901 - State Enforcement of Household Goods Consumer Protection

    Science.gov (United States)

    2012-06-04

    .... Liability of Carriers Under Receipts and Bills of Lading; Limiting Liability of Household Goods Carriers to... Federal Motor Carrier Safety Administration 49 CFR Parts 371, 375, 386, and 387 State Enforcement of Household Goods Consumer Protection AGENCY: Federal Motor Carrier Safety Administration (FMCSA), DOT. ACTION...

  9. Codes of conduct and copyright enforcement in Cyberspace

    NARCIS (Netherlands)

    Hugenholtz, P.B.; Stamatoudi, I.A.

    2010-01-01

    This chapter critically examines the rise of codes of conduct that deal with copyright enforcement. Its focus will be on codes binding ISPs and other online intermediaries offering similar services, such as providers of user-generated content (UGC) platforms. While solutions in the United States and

  10. A Comparison of Military and Law Enforcement Body Armour

    Science.gov (United States)

    Pope, Rodney

    2018-01-01

    Law-enforcement officers increasingly wear body armour for protection; wearing body armour is common practice in military populations. Law-enforcement and military occupational demands are vastly different and military-styled body armour may not be suitable for law-enforcement. This study investigated differences between selected military body armour (MBA: 6.4 kg) and law-enforcement body armour (LEBA: 2.1 kg) in impacts on postural sway, vertical jump, agility, a functional movement screen (FMS), task simulations (vehicle exit; victim recovery), and subjective measures. Ten volunteer police officers (six females, four males) were randomly allocated to one of the designs on each of two days. Body armour type did not significantly affect postural sway, vertical jump, vehicle exit and 5 m sprint times, or victim recovery times. Both armour types increased sway velocity and sway-path length in the final five seconds compared to the first 5 s of a balance task. The MBA was associated with significantly slower times to complete the agility task, poorer FMS total scores, and poorer subjective ratings of performance and comfort. The LEBA was perceived as more comfortable and received more positive performance ratings during the agility test and task simulations. The impacts of MBA and LEBA differed significantly and they should not be considered interchangeable. PMID:29443905

  11. 40 CFR 271.16 - Requirements for enforcement authority.

    Science.gov (United States)

    2010-07-01

    ...: To the extent the State judgments or settlements provide penalties in amounts which EPA believes to... adverse effects upon human health and the environment resulting from the unauthorized activity, whether or... settlements of civil enforcement actions, except in cases where a settlement requires some immediate action (e...

  12. 40 CFR 92.1104 - General enforcement provisions.

    Science.gov (United States)

    2010-07-01

    ....1104 Section 92.1104 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM LOCOMOTIVES AND LOCOMOTIVE ENGINES General Enforcement Provisions... activity conducted pursuant to paragraph (a)(1) of this section; and (ii) To inspect records, files, papers...

  13. 36 CFR 905.737-102 - Enforcement proceedings.

    Science.gov (United States)

    2010-07-01

    ... or 5 CFR part 737 after a final decision by: (1) Prohibiting the individual from making, on behalf of... CORPORATION STANDARDS OF CONDUCT Conduct and Responsibilities of Former Employees-Enforcement § 905.737-102... there is reasonable cause to believe that a former employee has violated 18 U.S.C. 207 or 5 CFR part 737...

  14. Ethical Culture of SMEs and Perceived Contract Enforcement in ...

    African Journals Online (AJOL)

    The study examined the relationship between ethical culture, organizational memory, bargaining power of buyers/suppliers, subjective norms, attitudes and contract enforcement in the developing world context of Uganda. Using a proportional stratified random sampling approach, a sample of 1500 employees was drawn ...

  15. 40 CFR 35.6760 - Enforcement and termination for convenience.

    Science.gov (United States)

    2010-07-01

    ... OTHER FEDERAL ASSISTANCE STATE AND LOCAL ASSISTANCE Cooperative Agreements and Superfund State Contracts for Superfund Response Actions Other Administrative Requirements for Cooperative Agreements § 35.6760... Cooperative Agreement, and is subject to the requirements regarding enforcement of the terms of an award and...

  16. Law enforcement tools available at the Savannah River Site

    Energy Technology Data Exchange (ETDEWEB)

    Hofstetter, K.J.

    2000-03-29

    A number of nuclear technologies developed and applied at the Savannah River Site in support of nuclear weapons material production and environmental remediation can be applied to problems in law enforcement. Techniques and equipment for high-sensitivity analyses of samples are available to identify and quantify trace elements and establish origins and histories of forensic evidence removed from crime scenes. While some of theses capabilities are available at local crime laboratories, state-of-the-art equipment and breakthroughs in analytical techniques are continually being developed at DOE laboratories. Extensive experience with the handling of radioactive samples at the DOE labs minimizes the chances of cross-contamination of evidence received from law enforcement. In addition to high-sensitivity analyses, many of the field techniques developed for use in a nuclear facility can assist law enforcement personnel in detecting illicit materials and operations, in retrieving of pertinent evidence and in surveying crime scenes. Some of these tools include chemical sniffers, hand-held detectors, thermal imaging, etc. In addition, mobile laboratories can be deployed to a crime scene to provide field screening of potential evidence. A variety of portable sensors can be deployed on vehicle, aerial, surface or submersible platforms to assist in the location of pertinent evidence or illicit operations. Several specific nuclear technologies available to law enforcement and their potential uses are discussed.

  17. 50 CFR 600.504 - Facilitation of enforcement.

    Science.gov (United States)

    2010-10-01

    ... vessel, its gear, equipment, records, and fish and fish products on board for purposes of enforcing the... no joints below the top step. (v) Battens made of hardwood, or other material of equivalent... than 1.20 m (3 ft 11 inches) above the top of the bulwark. (4) When necessary to facilitate the...

  18. 167 | Page THE MACHINERY FOR ENFORCEMENT OF DOMESTIC ...

    African Journals Online (AJOL)

    Fr. Ikenga

    THE MACHINERY FOR ENFORCEMENT OF DOMESTIC ARBITRAL AWARDS. IN NIGERIA – PROSPECTS FOR STAY OF EXECUTION OF NON-MONETARY. AWARDS*. Abstract. The decision of an arbitral tribunal is known as “award”. There are domestic, international and foreign awards. An award is domestic when it is ...

  19. 19 CFR 12.62 - Enforcement; duties of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Enforcement; duties of Customs officers. 12.62 Section 12.62 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...; duties of Customs officers. (a) In accordance with the authority contained in sections 10 and 12 of the...

  20. Gaps and Challenges in the Enforcement Framework for Consumer ...

    African Journals Online (AJOL)

    The effectiveness of consumer protection in a market economy is, inter alia, determined by the quality of the enforcement framework of competition law and consumer protection law. Despite Ethiopias current efforts to bring about an effective consumer protection regime, the country has been experiencing various consumer ...

  1. Immigration Enforcement Practices Harm Refugee Children and Citizen-Children

    Science.gov (United States)

    Zayas, Luis H.

    2018-01-01

    Aggressive immigration enforcement hurts the very youngest children. Refugee and U.S.-born children of undocumented immigrants experience many childhood adversities, compromising their development and health. Refugee children flee traumatizing violence in their home countries, face grueling migrations, and are harmed further by being held in…

  2. Judicial Enforcement of Economic, Social and Cultural Right

    Directory of Open Access Journals (Sweden)

    Aulona Haxhiraj

    2013-07-01

    In every society there is violation which implies its citizen not get proper social right, economical right and cultural right. Proper implementation and adoption of judicial enforcement can reduce this violation rate and established social peace. Step mentioned in the above might not perfect but it might be small starting and ensure social, culture & economical right for the people living in the society.

  3. A Comparison of Military and Law Enforcement Body Armour.

    Science.gov (United States)

    Orr, Robin; Schram, Ben; Pope, Rodney

    2018-02-14

    Law-enforcement officers increasingly wear body armour for protection; wearing body armour is common practice in military populations. Law-enforcement and military occupational demands are vastly different and military-styled body armour may not be suitable for law-enforcement. This study investigated differences between selected military body armour (MBA: 6.4 kg) and law-enforcement body armour (LEBA: 2.1 kg) in impacts on postural sway, vertical jump, agility, a functional movement screen (FMS), task simulations (vehicle exit; victim recovery), and subjective measures. Ten volunteer police officers (six females, four males) were randomly allocated to one of the designs on each of two days. Body armour type did not significantly affect postural sway, vertical jump, vehicle exit and 5 m sprint times, or victim recovery times. Both armour types increased sway velocity and sway-path length in the final five seconds compared to the first 5 s of a balance task. The MBA was associated with significantly slower times to complete the agility task, poorer FMS total scores, and poorer subjective ratings of performance and comfort. The LEBA was perceived as more comfortable and received more positive performance ratings during the agility test and task simulations. The impacts of MBA and LEBA differed significantly and they should not be considered interchangeable.

  4. 24 CFR 7.42 - Enforcement of EEOC final decisions.

    Science.gov (United States)

    2010-04-01

    ... Opportunity Without Regard to Race, Color Religion, Sex, National Origin, Age, Disability or Reprisal Remedies... Complainant may petition the EEOC for enforcement of a decision issued under the EEOC's appellate jurisdiction... provide the reasons that led the Complainant to believe that the Department is not complying with the...

  5. 18 CFR 401.97 - Enforcement of penalties.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Enforcement of penalties. 401.97 Section 401.97 Conservation of Power and Water Resources DELAWARE RIVER BASIN COMMISSION ADMINISTRATIVE MANUAL RULES OF PRACTICE AND PROCEDURE Penalties and Settlements in Lieu of Penalties § 401.97...

  6. Event Composition Model: Achieving Naturalness in Runtime Enforcement

    NARCIS (Netherlands)

    Malakuti Khah Olun Abadi, Somayeh

    2011-01-01

    Runtime enforcement techniques are introduced in the literature to cope with the failures that occur while software is being executed in its target environment. These techniques may also offer diagnosis and recovery actions to respectively identify the causes of the failures and to heal them. Since

  7. Law enforcement officers in the USDA forest service

    Science.gov (United States)

    Deborah J. Chavez; Joanne F. Tynon

    2006-01-01

    This paper reports results fiom the first in a series of studies evaluating perceptions of law enforcement officers (LEOs) in the US Forest Service (USFS). It is a follow-up to previous qualitative studies conducted to learn more about crime and violence in national forests and the impacts on recreation visitation and management, and test key characteristics of success...

  8. 43 CFR 422.3 - Reclamation law enforcement policy.

    Science.gov (United States)

    2010-10-01

    ... attained and maintained by each law enforcement unit undertaking a contract or cooperative agreement; (e... criminal and intelligence information with other Federal, State, local, and tribal agencies, as appropriate... that the use of force by agency personnel under contracts or cooperative agreements with Reclamation...

  9. 29 CFR 553.211 - Law enforcement activities.

    Science.gov (United States)

    2010-07-01

    ..., investigative and law enforcement techniques, community relations, medical aid and ethics. (b) Employees who... State or local jurisdiction. Section 3(e)(2)(C) of the Act excludes from its definition of “employee... personnel for purposes of the section 7(k) exemption are those who have responsibility for controlling and...

  10. Working together: public law enforcement and private security.

    Science.gov (United States)

    Jones, Harold T

    2010-01-01

    Private security forces, including hospital security professionals, provide a vast largely untapped resource for public law enforcement in a number of critical areas affecting society, the author points out. At the same time, police agencies in some communities have programs which can be used to provide additional training for private security officers.

  11. Consumption risk sharing with private information and limited enforcement

    Czech Academy of Sciences Publication Activity Database

    Broer, T.; Kapička, Marek; Klein, P.

    2017-01-01

    Roč. 23, January (2017), s. 170-190 ISSN 1094-2025 Institutional support: Progres-Q24 Keywords : consumption insurance * private information * limited enforcement Subject RIV: AH - Economics OBOR OECD: Economic Theory Impact factor: 1.053, year: 2016

  12. 76 FR 43569 - Identification of Enforceable Rules and Orders

    Science.gov (United States)

    2011-07-21

    ... Mortgage Licensing Act of 2008.\\10\\ \\10\\ This rule will become effective on August 29, 2011. See 76 FR...--Disclosure Requirements and Prohibitions Concerning Franchising 12. 16 CFR part 437--Disclosure Requirements... the Secure and Fair Enforcement for Mortgage Licensing Act of 2008) 3. 24 CFR part 1710--Land...

  13. Forum Issues in the Enforcement of Regulatory Obligations of ...

    African Journals Online (AJOL)

    Forum Issues in the Enforcement of Regulatory Obligations of Nigerian Public Companies. ... Journal of Sustainable Development Law and Policy (The) ... In Nigeria, owing largely to lack of clear guiding principles, this conflict reflects presently in the judicial determination of the regulatory obligations of the country's public ...

  14. Gaps and Challenges in the Enforcement Framework for Consumer ...

    African Journals Online (AJOL)

    Tessema_Elias

    effective enforcement strategies and institutional design for consumer protection. The third section highlights factors that determine the choice of the design. Sections 4, 5 and 6 briefly deal with the challenges of limited competition, institutional framework and price regulation. 1. Common Features and Practices of Effective.

  15. Policing and Law Enforcement in COIN -- The Thick Blue Line

    Science.gov (United States)

    2009-02-01

    often seeking a terrorist, insurgent, and criminal nexus for synergy (called Grey Stew herein to describe the phenomenon). This newer form of...situation in the country. Pakistan was chosen to be the recipient of a comprehensive law enforcement and policing assistance package based on two

  16. 29 CFR 1908.7 - Relationship to enforcement.

    Science.gov (United States)

    2010-07-01

    ... State shall be conducted independently of any OSHA enforcement activity. (2) The consultative activity... not be provided to OSHA for use in any compliance activity, except as provided for in § 1908.6(f)(1... have priority over OSHA compliance inspections except as provided in paragraph (b)(2) of this section...

  17. recognition and enforcement of foreign arbitral awards in civil

    African Journals Online (AJOL)

    eliasn

    Thus, award-creditors may need to move across borders looking for a forum within which ... award-creditor in a foreign arbitral award may seek only for its recognition or its recognition and enforcement.5 The purpose of ..... electionis), the award may face the risk of being set aside. The Ethiopian courts may examine that the ...

  18. The Animal Welfare Act: from enactment to enforcement.

    Science.gov (United States)

    Cardon, Andrew D; Bailey, Matthew R; Bennett, B Taylor

    2012-05-01

    Originally enacted in 1966, the Laboratory Animal Welfare Act has been amended several times and renamed the Animal Welfare Act. Responsibility for administering the Animal Welfare Act was delegated within the United States Department of Agriculture to the Administrator of the Animal and Plant Health Inspection Service, and regulations and standards have been developed to implement the intent of Congress conveyed in the language of the Act. In our opinion, the key to compliance with the Animal Welfare Act and its regulations and standards is to have in place a proactive, progressive Animal Care and Use Program that uses the semiannual inspection and programmatic review process to improve the day-to-day management of the program. Successfully managing the inspection process has taken on new meaning in what has recently become known as the 'Age of Enforcement.' As part of this approach, the Animal and Plant Health Inspection Service made changes to the inspection process and issued an Enhanced Animal Welfare Enforcement Plan, which included the development of an Inspection Requirements Handbook. The Inspection Requirements Handbook provides inspectors with information on conducting inspections and includes as an attachment a flow chart for Enforcement Action Guidance. The chart describes 4 types of actions that may occur as part of the enforcement process and the steps that will be followed if noncompliant items are documented during an inspection.

  19. 78 FR 4081 - Request for Comment on Enforcement Process

    Science.gov (United States)

    2013-01-18

    ... Initial Stages of Enforcement. What are the advantages and disadvantages to this current practice? Another... provide greater or lesser procedural protections? The Commission is also interested in any studies... through its own work the facts may merit a complete investigation * * * [I]t is clear that a consideration...

  20. A case for global enforceable prenuptial agreements | Ifemeje ...

    African Journals Online (AJOL)

    Ever since 1929, the English Courts have outrightly rejected the recognition and enforcement of pre-nuptial agreements, primarily on grounds of “Public Policy”. Most African countries have equally stigmatized them as un-cultural. With the passage of time however, the unpredictability, uncertainty and gender discrimination ...

  1. The case for an analytical construction and enforcement of demand ...

    African Journals Online (AJOL)

    A review of Nigerian law reveals a lack of clarity in the construction and enforcement of demand guarantees, such that the courts have largely adopted a blanket approach which erroneously conflates the principles that undergird true guarantees and demand guarantees, and treats the payment obligation arising in both ...

  2. Fossil power plant automation

    International Nuclear Information System (INIS)

    Divakaruni, S.M.; Touchton, G.

    1991-01-01

    This paper elaborates on issues facing the utilities industry and seeks to address how new computer-based control and automation technologies resulting from recent microprocessor evolution, can improve fossil plant operations and maintenance. This in turn can assist utilities to emerge stronger from the challenges ahead. Many presentations at the first ISA/EPRI co-sponsored conference are targeted towards improving the use of computer and control systems in the fossil and nuclear power plants and we believe this to be the right forum to share our ideas

  3. Automated Test Case Generation

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    I would like to present the concept of automated test case generation. I work on it as part of my PhD and I think it would be interesting also for other people. It is also the topic of a workshop paper that I am introducing in Paris. (abstract below) Please note that the talk itself would be more general and not about the specifics of my PhD, but about the broad field of Automated Test Case Generation. I would introduce the main approaches (combinatorial testing, symbolic execution, adaptive random testing) and their advantages and problems. (oracle problem, combinatorial explosion, ...) Abstract of the paper: Over the last decade code-based test case generation techniques such as combinatorial testing or dynamic symbolic execution have seen growing research popularity. Most algorithms and tool implementations are based on finding assignments for input parameter values in order to maximise the execution branch coverage. Only few of them consider dependencies from outside the Code Under Test’s scope such...

  4. Automation from pictures

    International Nuclear Information System (INIS)

    Kozubal, A.J.

    1992-01-01

    The state transition diagram (STD) model has been helpful in the design of real time software, especially with the emergence of graphical computer aided software engineering (CASE) tools. Nevertheless, the translation of the STD to real time code has in the past been primarily a manual task. At Los Alamos we have automated this process. The designer constructs the STD using a CASE tool (Cadre Teamwork) using a special notation for events and actions. A translator converts the STD into an intermediate state notation language (SNL), and this SNL is compiled directly into C code (a state program). Execution of the state program is driven by external events, allowing multiple state programs to effectively share the resources of the host processor. Since the design and the code are tightly integrated through the CASE tool, the design and code never diverge, and we avoid design obsolescence. Furthermore, the CASE tool automates the production of formal technical documents from the graphic description encapsulated by the CASE tool. (author)

  5. AUTOMATED GEOSPATIAL WATERSHED ASSESSMENT ...

    Science.gov (United States)

    The Automated Geospatial Watershed Assessment tool (AGWA) is a GIS interface jointly developed by the USDA Agricultural Research Service, the U.S. Environmental Protection Agency, the University of Arizona, and the University of Wyoming to automate the parameterization and execution of the Soil Water Assessment Tool (SWAT) and KINEmatic Runoff and EROSion (KINEROS2) hydrologic models. The application of these two models allows AGWA to conduct hydrologic modeling and watershed assessments at multiple temporal and spatial scales. AGWA’s current outputs are runoff (volumes and peaks) and sediment yield, plus nitrogen and phosphorus with the SWAT model. AGWA uses commonly available GIS data layers to fully parameterize, execute, and visualize results from both models. Through an intuitive interface the user selects an outlet from which AGWA delineates and discretizes the watershed using a Digital Elevation Model (DEM) based on the individual model requirements. The watershed model elements are then intersected with soils and land cover data layers to derive the requisite model input parameters. The chosen model is then executed, and the results are imported back into AGWA for visualization. This allows managers to identify potential problem areas where additional monitoring can be undertaken or mitigation activities can be focused. AGWA also has tools to apply an array of best management practices. There are currently two versions of AGWA available; AGWA 1.5 for

  6. Maneuver Automation Software

    Science.gov (United States)

    Uffelman, Hal; Goodson, Troy; Pellegrin, Michael; Stavert, Lynn; Burk, Thomas; Beach, David; Signorelli, Joel; Jones, Jeremy; Hahn, Yungsun; Attiyah, Ahlam; hide

    2009-01-01

    The Maneuver Automation Software (MAS) automates the process of generating commands for maneuvers to keep the spacecraft of the Cassini-Huygens mission on a predetermined prime mission trajectory. Before MAS became available, a team of approximately 10 members had to work about two weeks to design, test, and implement each maneuver in a process that involved running many maneuver-related application programs and then serially handing off data products to other parts of the team. MAS enables a three-member team to design, test, and implement a maneuver in about one-half hour after Navigation has process-tracking data. MAS accepts more than 60 parameters and 22 files as input directly from users. MAS consists of Practical Extraction and Reporting Language (PERL) scripts that link, sequence, and execute the maneuver- related application programs: "Pushing a single button" on a graphical user interface causes MAS to run navigation programs that design a maneuver; programs that create sequences of commands to execute the maneuver on the spacecraft; and a program that generates predictions about maneuver performance and generates reports and other files that enable users to quickly review and verify the maneuver design. MAS can also generate presentation materials, initiate electronic command request forms, and archive all data products for future reference.

  7. A Demonstration of Automated DNA Sequencing.

    Science.gov (United States)

    Latourelle, Sandra; Seidel-Rogol, Bonnie

    1998-01-01

    Details a simulation that employs a paper-and-pencil model to demonstrate the principles behind automated DNA sequencing. Discusses the advantages of automated sequencing as well as the chemistry of automated DNA sequencing. (DDR)

  8. Local Immigration Enforcement and Arrests of the Hispanic Population

    Directory of Open Access Journals (Sweden)

    Michael Coon

    2017-08-01

    Full Text Available Section 287(g of the Immigration and Nationality Act (INA, which was added to the INA by the Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (IIRIRA, allows the federal government to enter into voluntary partnerships with state and local law enforcement agencies to enforce immigration law. Upon entering these agreements, law enforcement officers are trained by Immigration and Customs Enforcement (ICE and receive delegated authority to enquire about an individual’s immigration status and, if found to be removable, to detain the individual while ICE makes a determination of whether to initiate deportation proceedings. In some instances, this inquiry about immigration status takes place as part of the intake process when a criminal defendant is arrested and placed into a criminal jail. In other instances, task force officers are trained to inquire in the field about immigration status and enforce immigration law against people who have not committed any criminal offense.  The key difference between the two models is that task force agents can arrest for immigration violations undocumented individuals who have not committed any criminal offense, whereas in the jail model individuals must be arrested on some other criminal charge before immigration status can be determined. The 287(g program has raised several concerns regarding its implementation and results. First, the program could lead to racial and ethnic profiling. In particular, given that the majority of undocumented immigrants hail from Latin American countries, it is highly plausible that Hispanics, regardless of immigrant status, might be disproportionally affected by this program. That is, in a jurisdiction that participates in the jail model, an officer might arrest a Hispanic individual for a very minor offence in order to process them through the jail and determine their immigration status, when perhaps without the program they may have only issued a citation

  9. Opening up Library Automation Software

    Science.gov (United States)

    Breeding, Marshall

    2009-01-01

    Throughout the history of library automation, the author has seen a steady advancement toward more open systems. In the early days of library automation, when proprietary systems dominated, the need for standards was paramount since other means of inter-operability and data exchange weren't possible. Today's focus on Application Programming…

  10. Automated Power-Distribution System

    Science.gov (United States)

    Ashworth, Barry; Riedesel, Joel; Myers, Chris; Miller, William; Jones, Ellen F.; Freeman, Kenneth; Walsh, Richard; Walls, Bryan K.; Weeks, David J.; Bechtel, Robert T.

    1992-01-01

    Autonomous power-distribution system includes power-control equipment and automation equipment. System automatically schedules connection of power to loads and reconfigures itself when it detects fault. Potential terrestrial applications include optimization of consumption of power in homes, power supplies for autonomous land vehicles and vessels, and power supplies for automated industrial processes.

  11. Automation in Catholic College Libraries.

    Science.gov (United States)

    Stussy, Susan A.

    1981-01-01

    Reports on a 1980 survey of library automation in 105 Catholic colleges with collections containing less than 300,000 bibliographic items. The report indicates that network membership and grant funding were a vital part of library automation in the schools surveyed. (Author/LLS)

  12. Library Automation: A Year on.

    Science.gov (United States)

    Electronic Library, 1997

    1997-01-01

    A follow-up interview with librarians from Hong Kong, Mexico, Australia, Canada, and New Zealand about library automation systems in their libraries and their plans for the future. Discusses system performance, upgrades, services, resources, intranets, trends in automation, Web interfaces, full-text image/document systems, document delivery, OPACs…

  13. Library Automation: A Balanced View

    Science.gov (United States)

    Avram, Henriette

    1972-01-01

    Ellsworth Mason's two recently published papers, severely criticizing library automation, are refuted. While admitting to the failures and problems, this paper also presents the positive accomplishments in a brief evaluation of the status of library automation in 1971. (16 references) (Author/SJ)

  14. Library Automation: A Critical Review.

    Science.gov (United States)

    Overmyer, LaVahn

    This report has two main purposes: (1) To give an account of the use of automation in selected libraries throughout the country and in the development of networks; and (2) To discuss some of the fundamental considerations relevant to automation and the implications for library education, library research and the library profession. The first part…

  15. Automated methods of corrosion measurement

    DEFF Research Database (Denmark)

    Andersen, Jens Enevold Thaulov; Bech-Nielsen, Gregers; Reeve, John Ch

    1997-01-01

    to revise assumptions regarding the basis of the method, which sometimes leads to the discovery of as-yet unnoticed phenomena. The present selection of automated methods for corrosion measurements is not motivated simply by the fact that a certain measurement can be performed automatically. Automation...

  16. Automated Methods Of Corrosion Measurements

    DEFF Research Database (Denmark)

    Bech-Nielsen, Gregers; Andersen, Jens Enevold Thaulov; Reeve, John Ch

    1997-01-01

    The chapter describes the following automated measurements: Corrosion Measurements by Titration, Imaging Corrosion by Scanning Probe Microscopy, Critical Pitting Temperature and Application of the Electrochemical Hydrogen Permeation Cell.......The chapter describes the following automated measurements: Corrosion Measurements by Titration, Imaging Corrosion by Scanning Probe Microscopy, Critical Pitting Temperature and Application of the Electrochemical Hydrogen Permeation Cell....

  17. Automated Test-Form Generation

    Science.gov (United States)

    van der Linden, Wim J.; Diao, Qi

    2011-01-01

    In automated test assembly (ATA), the methodology of mixed-integer programming is used to select test items from an item bank to meet the specifications for a desired test form and optimize its measurement accuracy. The same methodology can be used to automate the formatting of the set of selected items into the actual test form. Three different…

  18. A Survey of Automated Deduction

    OpenAIRE

    Bundy, Alan

    1999-01-01

    We survey research in the automation of deductive inference, from its beginnings in the early history of computing to the present day. We identify and describe the major areas of research interest and their applications. The area is characterised by its wide variety of proof methods, forms of automated deduction and applications.

  19. 77 FR 27381 - Financial Crimes Enforcement Network: Customer Due Diligence Requirements for Financial...

    Science.gov (United States)

    2012-05-10

    ...-AB15 Financial Crimes Enforcement Network: Customer Due Diligence Requirements for Financial Institutions; Extension of Comment Period AGENCY: Financial Crimes Enforcement Network (FinCEN), Treasury... concerning customer due diligence requirements for financial institutions. DATES: Written comments on the...

  20. Booster seat law enforcement : examples from Delaware, New Jersey, Pennsylvania, and Washington.

    Science.gov (United States)

    2010-02-01

    The objective of this study was to evaluate the implementation of State booster seat laws : (enhanced child restraint laws) and examine the most effective strategies that law enforcement agencies can : use to enforce booster seat laws. The research i...

  1. 29 CFR 42.20 - Regional Farm Labor Coordinated Enforcement Committee.

    Science.gov (United States)

    2010-07-01

    ... Coordinated Enforcement Committee. (a) Under the leadership of the ESA Regional Administrator, each region... Committee shall: (1) Meet regularly on at least a quarterly basis; (2) Exchange information on enforcement...

  2. 76 FR 27355 - Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection and Application...

    Science.gov (United States)

    2011-05-11

    ... of Justice Programs Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection... public, the ``Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection and Application Guide.'' The opportunity to provide comments on these documents is open to industry technical...

  3. 76 FR 21813 - Energy Conservation Program: Certification, Compliance, and Enforcement for Consumer Products and...

    Science.gov (United States)

    2011-04-19

    ..., and Enforcement for Consumer Products and Commercial and Industrial Equipment AGENCY: Office of Energy... certification, compliance, and enforcement regulations for certain commercial and industrial equipment covered... provisions for commercial refrigeration equipment; commercial heating, ventilating, air- conditioning (HVAC...

  4. 45 CFR 304.22 - Federal financial participation in purchased support enforcement services.

    Science.gov (United States)

    2010-10-01

    ... FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES FEDERAL FINANCIAL PARTICIPATION § 304.22 Federal financial participation in purchased support enforcement services. Federal financial participation is.... Support enforcement services which may be purchased with Federal financial participation are those for...

  5. Child Support Enforcement Annual Data Report Form 157 – YR 2014

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  6. 75 FR 19873 - Collection of Administrative Debts; Collection of Debts Arising From Enforcement and...

    Science.gov (United States)

    2010-04-16

    ... money penalty, petition the court for a contempt order, or otherwise exercise its authority to enforce... for a contempt order under 2 U.S.C. 437g(a)(11), or otherwise exercise its authority to enforce or...

  7. The Science of Home Automation

    Science.gov (United States)

    Thomas, Brian Louis

    Smart home technologies and the concept of home automation have become more popular in recent years. This popularity has been accompanied by social acceptance of passive sensors installed throughout the home. The subsequent increase in smart homes facilitates the creation of home automation strategies. We believe that home automation strategies can be generated intelligently by utilizing smart home sensors and activity learning. In this dissertation, we hypothesize that home automation can benefit from activity awareness. To test this, we develop our activity-aware smart automation system, CARL (CASAS Activity-aware Resource Learning). CARL learns the associations between activities and device usage from historical data and utilizes the activity-aware capabilities to control the devices. To help validate CARL we deploy and test three different versions of the automation system in a real-world smart environment. To provide a foundation of activity learning, we integrate existing activity recognition and activity forecasting into CARL home automation. We also explore two alternatives to using human-labeled data to train the activity learning models. The first unsupervised method is Activity Detection, and the second is a modified DBSCAN algorithm that utilizes Dynamic Time Warping (DTW) as a distance metric. We compare the performance of activity learning with human-defined labels and with automatically-discovered activity categories. To provide evidence in support of our hypothesis, we evaluate CARL automation in a smart home testbed. Our results indicate that home automation can be boosted through activity awareness. We also find that the resulting automation has a high degree of usability and comfort for the smart home resident.

  8. Berkeley automated supernova search

    Energy Technology Data Exchange (ETDEWEB)

    Kare, J.T.; Pennypacker, C.R.; Muller, R.A.; Mast, T.S.; Crawford, F.S.; Burns, M.S.

    1981-01-01

    The Berkeley automated supernova search employs a computer controlled 36-inch telescope and charge coupled device (CCD) detector to image 2500 galaxies per night. A dedicated minicomputer compares each galaxy image with stored reference data to identify supernovae in real time. The threshold for detection is m/sub v/ = 18.8. We plan to monitor roughly 500 galaxies in Virgo and closer every night, and an additional 6000 galaxies out to 70 Mpc on a three night cycle. This should yield very early detection of several supernovae per year for detailed study, and reliable premaximum detection of roughly 100 supernovae per year for statistical studies. The search should be operational in mid-1982.

  9. Berkeley automated supernova search

    International Nuclear Information System (INIS)

    Kare, J.T.; Pennypacker, C.R.; Muller, R.A.; Mast, T.S.

    1981-01-01

    The Berkeley automated supernova search employs a computer controlled 36-inch telescope and charge coupled device (CCD) detector to image 2500 galaxies per night. A dedicated minicomputer compares each galaxy image with stored reference data to identify supernovae in real time. The threshold for detection is m/sub v/ = 18.8. We plan to monitor roughly 500 galaxies in Virgo and closer every night, and an additional 6000 galaxies out to 70 Mpc on a three night cycle. This should yield very early detection of several supernovae per year for detailed study, and reliable premaximum detection of roughly 100 supernovae per year for statistical studies. The search should be operational in mid-1982

  10. Automated attendance accounting system

    Science.gov (United States)

    Chapman, C. P. (Inventor)

    1973-01-01

    An automated accounting system useful for applying data to a computer from any or all of a multiplicity of data terminals is disclosed. The system essentially includes a preselected number of data terminals which are each adapted to convert data words of decimal form to another form, i.e., binary, usable with the computer. Each data terminal may take the form of a keyboard unit having a number of depressable buttons or switches corresponding to selected data digits and/or function digits. A bank of data buffers, one of which is associated with each data terminal, is provided as a temporary storage. Data from the terminals is applied to the data buffers on a digit by digit basis for transfer via a multiplexer to the computer.

  11. Robust automated knowledge capture.

    Energy Technology Data Exchange (ETDEWEB)

    Stevens-Adams, Susan Marie; Abbott, Robert G.; Forsythe, James Chris; Trumbo, Michael Christopher Stefan; Haass, Michael Joseph; Hendrickson, Stacey M. Langfitt

    2011-10-01

    This report summarizes research conducted through the Sandia National Laboratories Robust Automated Knowledge Capture Laboratory Directed Research and Development project. The objective of this project was to advance scientific understanding of the influence of individual cognitive attributes on decision making. The project has developed a quantitative model known as RumRunner that has proven effective in predicting the propensity of an individual to shift strategies on the basis of task and experience related parameters. Three separate studies are described which have validated the basic RumRunner model. This work provides a basis for better understanding human decision making in high consequent national security applications, and in particular, the individual characteristics that underlie adaptive thinking.

  12. (No) Security in Automation!?

    CERN Document Server

    Lüders, S

    2008-01-01

    Modern Information Technologies like Ethernet, TCP/IP, web server or FTP are nowadays increas-ingly used in distributed control and automation systems. Thus, information from the factory floor is now directly available at the management level (From Shop-Floor to Top-Floor) and can be ma-nipulated from there. Despite the benefits coming with this (r)evolution, new vulnerabilities are in-herited, too: worms and viruses spread within seconds via Ethernet and attackers are becoming interested in control systems. Unfortunately, control systems lack the standard security features that usual office PCs have. This contribution will elaborate on these problems, discuss the vulnerabilities of modern control systems and present international initiatives for mitigation.

  13. Automated Motivic Analysis

    DEFF Research Database (Denmark)

    Lartillot, Olivier

    2016-01-01

    Motivic analysis provides very detailed understanding of musical composi- tions, but is also particularly difficult to formalize and systematize. A computational automation of the discovery of motivic patterns cannot be reduced to a mere extraction of all possible sequences of descriptions....... The systematic approach inexorably leads to a proliferation of redundant structures that needs to be addressed properly. Global filtering techniques cause a drastic elimination of interesting structures that damages the quality of the analysis. On the other hand, a selection of closed patterns allows...... for lossless compression. The structural complexity resulting from successive repetitions of patterns can be controlled through a simple modelling of cycles. Generally, motivic patterns cannot always be defined solely as sequences of descriptions in a fixed set of dimensions: throughout the descriptions...

  14. Printing quality control automation

    Science.gov (United States)

    Trapeznikova, O. V.

    2018-04-01

    One of the most important problems in the concept of standardizing the process of offset printing is the control the quality rating of printing and its automation. To solve the problem, a software has been developed taking into account the specifics of printing system components and the behavior in printing process. In order to characterize the distribution of ink layer on the printed substrate the so-called deviation of the ink layer thickness on the sheet from nominal surface is suggested. The geometric data construction the surface projections of the color gamut bodies allows to visualize the color reproduction gamut of printing systems in brightness ranges and specific color sectors, that provides a qualitative comparison of the system by the reproduction of individual colors in a varying ranges of brightness.

  15. Automated electronic filter design

    CERN Document Server

    Banerjee, Amal

    2017-01-01

    This book describes a novel, efficient and powerful scheme for designing and evaluating the performance characteristics of any electronic filter designed with predefined specifications. The author explains techniques that enable readers to eliminate complicated manual, and thus error-prone and time-consuming, steps of traditional design techniques. The presentation includes demonstration of efficient automation, using an ANSI C language program, which accepts any filter design specification (e.g. Chebyschev low-pass filter, cut-off frequency, pass-band ripple etc.) as input and generates as output a SPICE(Simulation Program with Integrated Circuit Emphasis) format netlist. Readers then can use this netlist to run simulations with any version of the popular SPICE simulator, increasing accuracy of the final results, without violating any of the key principles of the traditional design scheme.

  16. Assessing the efficiency of priorities for traffic law enforcement in Norway

    DEFF Research Database (Denmark)

    Elvik, Rune; Sogge, Céline Vallet; Lager, Lasse

    2012-01-01

    This paper assesses the efficiency of priorities for traffic law enforcement in Norway. Priorities are regarded as efficient if: (1) enforcement ensures a sufficient level of deterrence to keep down the rate of violations; (2) selection of target violations for enforcement is based on the risk at...

  17. Fragile convergence: understanding variation in the enforcement of China's industrial pollution law

    NARCIS (Netherlands)

    van Rooij, B.; Lo, C.W.H.

    2010-01-01

    Official statistics and independent survey data show that in the last decade China has witnessed a remarkable change in its enforcement of environmental pollution violations, moving toward more formalistic and coercive law enforcement with more enforcement cases as well as higher fines. The data

  18. 75 FR 146 - Public Comment on Candidate National Enforcement and Compliance Assurance Priorities for Fiscal...

    Science.gov (United States)

    2010-01-04

    ... Enforcement and Compliance Assurance is collecting external comment on the following preliminary set of... Assurance, is collecting external comment on a set of candidate enforcement and compliance priorities for FY... National Enforcement and Compliance Assurance Priorities for Fiscal Years 2011-2013 AGENCY: Environmental...

  19. Professional Development: A Six-Year Data Evaluation of HIDTA Law Enforcement Task Force Training Programs

    Science.gov (United States)

    Burnett, Larry D.

    2012-01-01

    This is a nationwide six-year data study of law enforcement training and professional development in relationship to workplace productivity. Why do we care about law enforcement training and professional development? Because the law enforcement environment is not standing still. Unlawful activity, and in particular drug trafficking strategies,…

  20. Automated Essay Scoring

    Directory of Open Access Journals (Sweden)

    Semire DIKLI

    2006-01-01

    Full Text Available Automated Essay Scoring Semire DIKLI Florida State University Tallahassee, FL, USA ABSTRACT The impacts of computers on writing have been widely studied for three decades. Even basic computers functions, i.e. word processing, have been of great assistance to writers in modifying their essays. The research on Automated Essay Scoring (AES has revealed that computers have the capacity to function as a more effective cognitive tool (Attali, 2004. AES is defined as the computer technology that evaluates and scores the written prose (Shermis & Barrera, 2002; Shermis & Burstein, 2003; Shermis, Raymat, & Barrera, 2003. Revision and feedback are essential aspects of the writing process. Students need to receive feedback in order to increase their writing quality. However, responding to student papers can be a burden for teachers. Particularly if they have large number of students and if they assign frequent writing assignments, providing individual feedback to student essays might be quite time consuming. AES systems can be very useful because they can provide the student with a score as well as feedback within seconds (Page, 2003. Four types of AES systems, which are widely used by testing companies, universities, and public schools: Project Essay Grader (PEG, Intelligent Essay Assessor (IEA, E-rater, and IntelliMetric. AES is a developing technology. Many AES systems are used to overcome time, cost, and generalizability issues in writing assessment. The accuracy and reliability of these systems have been proven to be high. The search for excellence in machine scoring of essays is continuing and numerous studies are being conducted to improve the effectiveness of the AES systems.

  1. Automated endoscope reprocessors.

    Science.gov (United States)

    Desilets, David; Kaul, Vivek; Tierney, William M; Banerjee, Subhas; Diehl, David L; Farraye, Francis A; Kethu, Sripathi R; Kwon, Richard S; Mamula, Petar; Pedrosa, Marcos C; Rodriguez, Sarah A; Wong Kee Song, Louis-Michel

    2010-10-01

    The ASGE Technology Committee provides reviews of existing, new, or emerging endoscopic technologies that have an impact on the practice of GI endoscopy. Evidence-based methodology is used, with a MEDLINE literature search to identify pertinent clinical studies on the topic and a MAUDE (U.S. Food and Drug Administration Center for Devices and Radiological Health) database search to identify the reported complications of a given technology. Both are supplemented by accessing the "related articles" feature of PubMed and by scrutinizing pertinent references cited by the identified studies. Controlled clinical trials are emphasized, but in many cases data from randomized, controlled trials are lacking. In such cases, large case series, preliminary clinical studies, and expert opinions are used. Technical data are gathered from traditional and Web-based publications, proprietary publications, and informal communications with pertinent vendors. Technology Status Evaluation Reports are drafted by 1 or 2 members of the ASGE Technology Committee, reviewed and edited by the committee as a whole, and approved by the Governing Board of the ASGE. When financial guidance is indicated, the most recent coding data and list prices at the time of publication are provided. For this review, the MEDLINE database was searched through February 2010 for articles related to automated endoscope reprocessors, using the words endoscope reprocessing, endoscope cleaning, automated endoscope reprocessors, and high-level disinfection. Technology Status Evaluation Reports are scientific reviews provided solely for educational and informational purposes. Technology Status Evaluation Reports are not rules and should not be construed as establishing a legal standard of care or as encouraging, advocating, requiring, or discouraging any particular treatment or payment for such treatment. Copyright © 2010 American Society for Gastrointestinal Endoscopy. Published by Mosby, Inc. All rights reserved.

  2. Accountable Care Organizations and Antitrust Enforcement: Promoting Competition and Innovation.

    Science.gov (United States)

    Feinstein, Deborah L; Kuhlmann, Patrick; Mucchetti, Peter J

    2015-08-01

    The antitrust laws stand to protect consumers of health care services from conduct that would raise prices, lower quality, and decrease innovation by lessening competition. Importantly, though, vigorous antitrust enforcement does not impede accountable care organizations (ACOs) and similar collaborations that advance these same goals of better and more efficient care; in fact, by fostering competitive markets, the antitrust laws encourage such initiatives. This article summarizes the legal framework that the federal antitrust agencies - the Federal Trade Commission and the Antitrust Division of the US Department of Justice - use to analyze ACOs and other collaborations among health care providers. It outlines the guidance provided by the federal antitrust agencies concerning when ACOs and other provider collaborations likely would harm competition and consumers. In addition, it reviews common antitrust issues that can arise with ACOs and provides examples of enforcement actions that have prevented health care providers from taking or continuing anticompetitive actions. Copyright © 2015 by Duke University Press.

  3. Large Enforced Sparse Non-Negative Matrix Factorization

    OpenAIRE

    Gavin, Brendan; Gadepally, Vijay; Kepner, Jeremy

    2015-01-01

    Non-negative matrix factorization (NMF) is a common method for generating topic models from text data. NMF is widely accepted for producing good results despite its relative simplicity of implementation and ease of computation. One challenge with applying NMF to large datasets is that intermediate matrix products often become dense, stressing the memory and compute elements of a system. In this article, we investigate a simple but powerful modification of a common NMF algorithm that enforces ...

  4. Endogenous enforcement and effectiveness of China's pollution levy system

    OpenAIRE

    Hua Wang; Wheeler, David

    2000-01-01

    The authors investigate two aspects of China's pollution levy system, which was first implemented about 20 years ago. First, they analyze what determines differences in enforcement of the pollution levy in various urban areas. They find that collection of the otherwise uniform pollution levy is sensitive to differences in economic development and environmental quality. Air and water pollution levies are higher in areas that are heavily polluted. Second, they analyze the impact of pollution ch...

  5. Efficient Enforcement of Security Policies in Distributed Systems

    OpenAIRE

    Alzahrani, Ali Mousa G.

    2013-01-01

    Policy-based management (PBM) is an adaptable security policy mechanism in information systems (IS) that confirm only authorised users can access resources. A few decades ago, the traditional PBM has focused on closed systems, where enforcement mechanisms are trusted by system administrators who define access control policies. Most of current work on the PBM systems focuses on designing a centralised policy decision point (PDP), the component that evaluates an access request against a poli...

  6. Maritime Law Enforcement: A Critical Capability for the Navy?

    Science.gov (United States)

    2012-03-01

    Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202–4302, and to the Office of Management and Budget, Paperwork Reduction...enforcement authorities that complement, hopefully, what you all do. Can you just comment on that briefly? Admiral HARRIS. Yes, sir , I would be glad to...366 Admiral Humphry Smith cited in Till, Seapower, 359. 367 Till, Seapower, 359; Murphy, “Suppression of Piracy and Maritime Terrorism: A Suitable

  7. Peer punishment promotes enforcement of bad social norms.

    Science.gov (United States)

    Abbink, Klaus; Gangadharan, Lata; Handfield, Toby; Thrasher, John

    2017-09-20

    Social norms are an important element in explaining how humans achieve very high levels of cooperative activity. It is widely observed that, when norms can be enforced by peer punishment, groups are able to resolve social dilemmas in prosocial, cooperative ways. Here we show that punishment can also encourage participation in destructive behaviours that are harmful to group welfare, and that this phenomenon is mediated by a social norm. In a variation of a public goods game, in which the return to investment is negative for both group and individual, we find that the opportunity to punish led to higher levels of contribution, thereby harming collective payoffs. A second experiment confirmed that, independently of whether punishment is available, a majority of subjects regard the efficient behaviour of non-contribution as socially inappropriate. The results show that simply providing a punishment opportunity does not guarantee that punishment will be used for socially beneficial ends, because the social norms that influence punishment behaviour may themselves be destructive.Punishment by peers can enforce social norms, such as contributing to a public good. Here, Abbink and colleagues show that individuals will enforce norms even when contributions reduce the net benefit of the group, resulting in the maintenance of wasteful contributions.

  8. Homicides of law enforcement officers responding to domestic disturbance calls.

    Science.gov (United States)

    Kercher, Cassandra; Swedler, David I; Pollack, Keshia M; Webster, Daniel W

    2013-10-01

    To describe the law enforcement officer (LEO), encounter, perpetrator and victim characteristics of domestic disturbance-related LEO homicides in the USA from 1996 to 2010. Narrative text analysis was conducted on the Federal Bureau of Investigation's annual report 'Law Enforcement Officers Killed and Assaulted'. Potential cases were confirmed if the narrative included the term 'domestic disturbance' or a domestic disturbance situation was described. 116 LEOs were killed while responding to domestic disturbance calls. Ninety-five per cent of these homicides were committed with a firearm. Sixty-seven per cent of LEOs were wearing body armour when killed; however, 52% received the fatal wound to the head/neck. Sixty-one per cent of suspects had a criminal history mentioned within the narratives and perpetrators of intimate partner violence (IPV) were more likely to be killed by LEOs than suspects involved in other forms of domestic violence. Victims of the domestic disturbance were killed in 21% of the IPV-related LEO homicide cases as opposed to only 5% of other domestic disturbance calls. A firearm was the most common weapon used in the murder of a domestic disturbance victim (86%). This study describes domestic disturbance-related LEO homicides. Future research in this area should further examine the dangers unique to domestic disturbance calls. A longitudinal analysis could provide greater understanding of the injury and mortality risks faced by LEOs, in order to inform homicide prevention among law enforcement.

  9. Training as a critical component of successful noise enforcement programs

    Science.gov (United States)

    Zwerling, Eric

    2004-05-01

    The point of application of any noise enforcement program is the enforcement officer. The quality of their training is of paramount importance in determining their efficacy in resolving complaints in the field or, failing that, in court. Some of the critical components that must be addressed in a training program are the technology, techniques and strategies of legally valid sound level measurement; documentation of measurement parameters and results; calculation of corrected source sound levels; managing the expectations of complainants; negotiations with alleged violators; and compliance determination methods for nonmetered performance standards. A strong emphasis must be on practical field measurements. The training must assist the enforcement officer to become comfortable with the process, motivating the officer to embrace the new skill, rather than resenting a new task. It is important to take into account the background of the students, professionally, and as individuals, as well as the institutional culture of their agency. The better prepared an officer is to go to court, the less likely is that possibility. A well designed and executed program, represented by its field officers, provides significant deterrence. Thirteen years of training experience at the Rutgers Noise Technical Assistance Center is reviewed.

  10. PROGRESSIVE LAW ENFORCEMENT TOWARDS HUMAN RIGHTS VIOLATION IN KOTA KUPANG

    Directory of Open Access Journals (Sweden)

    Joni Efraim Liunima

    2016-01-01

    Full Text Available Copyright is creator intellectual wealth so it needs to be protected by the State as a form of responsibility. Responding that problem comes into the world Law Number 28 Year 2014 concerning Copyrights and all violations in UUHC is formulated as delict complaint. Consequence of delict complaint is not all of copyright violations can be asked for the responsibility because law agencies are passive and limited by space and time. Answering that jurisdictional problem then researcher used empirical law research method. The result showed that civil servants investigator (PPNS Kanwil Kemenkumham NTT and also Kupang Kota Police Resort have done progressive step such as appealing, warning, calling, making statement, stocktaking and confiscation whereas the obstacle factor of progressive law enforcement is knowledge, mindset and in the formula of UUHC there is no section which formulate what the step can be done if criminal matters happen so the suggestions given is law enforcement agencies need an explanation about progressive law enforcement and it is better if in UUHC need to be formulated a step which will be taken if criminal matters happen

  11. Automating the radiographic NDT process

    International Nuclear Information System (INIS)

    Aman, J.K.

    1986-01-01

    Automation, the removal of the human element in inspection, has not been generally applied to film radiographic NDT. The justication for automating is not only productivity but also reliability of results. Film remains in the automated system of the future because of its extremely high image content, approximately 8 x 10 9 bits per 14 x 17. The equivalent to 2200 computer floppy discs. Parts handling systems and robotics applied for manufacturing and some NDT modalities, should now be applied to film radiographic NDT systems. Automatic film handling can be achieved with the daylight NDT film handling system. Automatic film processing is becoming the standard in industry and can be coupled to the daylight system. Robots offer the opportunity to automate fully the exposure step. Finally, computer aided interpretation appears on the horizon. A unit which laser scans a 14 x 17 (inch) film in 6 - 8 seconds can digitize film information for further manipulation and possible automatic interrogations (computer aided interpretation). The system called FDRS (for Film Digital Radiography System) is moving toward 50 micron (*approx* 16 lines/mm) resolution. This is believed to meet the need of the majority of image content needs. We expect the automated system to appear first in parts (modules) as certain operations are automated. The future will see it all come together in an automated film radiographic NDT system (author) [pt

  12. Information Sharing and Interoperability in Law Enforcement: An Investigation of Federal Criminal Justice Information Systems Use by State/Local Law Enforcement Organizations

    National Research Council Canada - National Science Library

    Dethlefs, David

    2003-01-01

    This thesis investigates the frequency of use and perceptions of usefulness of federal criminal justice information systems among state and local law enforcement personnel and certain IS environmental...

  13. An Automation Survival Guide for Media Centers.

    Science.gov (United States)

    Whaley, Roger E.

    1989-01-01

    Reviews factors that should affect the decision to automate a school media center and offers suggestions for the automation process. Topics discussed include getting the library collection ready for automation, deciding what automated functions are needed, evaluating software vendors, selecting software, and budgeting. (CLB)

  14. National Automated Conformity Inspection Process -

    Data.gov (United States)

    Department of Transportation — The National Automated Conformity Inspection Process (NACIP) Application is intended to expedite the workflow process as it pertains to the FAA Form 81 0-10 Request...

  15. Home automation with Intel Galileo

    CERN Document Server

    Dundar, Onur

    2015-01-01

    This book is for anyone who wants to learn Intel Galileo for home automation and cross-platform software development. No knowledge of programming with Intel Galileo is assumed, but knowledge of the C programming language is essential.

  16. Fully automated parallel oligonucleotide synthesizer

    Czech Academy of Sciences Publication Activity Database

    Lebl, M.; Burger, Ch.; Ellman, B.; Heiner, D.; Ibrahim, G.; Jones, A.; Nibbe, M.; Thompson, J.; Mudra, Petr; Pokorný, Vít; Poncar, Pavel; Ženíšek, Karel

    2001-01-01

    Roč. 66, č. 8 (2001), s. 1299-1314 ISSN 0010-0765 Institutional research plan: CEZ:AV0Z4055905 Keywords : automated oligonucleotide synthesizer Subject RIV: CC - Organic Chemistry Impact factor: 0.778, year: 2001

  17. Office Automation Boosts University's Productivity.

    Science.gov (United States)

    School Business Affairs, 1986

    1986-01-01

    The University of Pittsburgh has a 2-year agreement designating the Xerox Corporation as the primary supplier of word processing and related office automation equipment in order to increase productivity and more efficient use of campus resources. (MLF)

  18. Office Automation at Memphis State.

    Science.gov (United States)

    Smith, R. Eugene; And Others

    1986-01-01

    The development of a university-wide office automation plan, beginning with a short-range pilot project and a five-year plan for the entire organization with the potential for modular implementation, is described. (MSE)

  19. The Evaluation of Automated Systems

    National Research Council Canada - National Science Library

    McDougall, Jeffrey

    2004-01-01

    .... The Army has recognized this change and is adapting to operate in this new environment. It has developed a number of automated tools to assist leaders in the command and control of their organizations...

  20. Automation and Human Resource Management.

    Science.gov (United States)

    Taft, Michael

    1988-01-01

    Discussion of the automation of personnel administration in libraries covers (1) new developments in human resource management systems; (2) system requirements; (3) software evaluation; (4) vendor evaluation; (5) selection of a system; (6) training and support; and (7) benefits. (MES)

  1. Anesthesiology, automation, and artificial intelligence.

    Science.gov (United States)

    Alexander, John C; Joshi, Girish P

    2018-01-01

    There have been many attempts to incorporate automation into the practice of anesthesiology, though none have been successful. Fundamentally, these failures are due to the underlying complexity of anesthesia practice and the inability of rule-based feedback loops to fully master it. Recent innovations in artificial intelligence, especially machine learning, may usher in a new era of automation across many industries, including anesthesiology. It would be wise to consider the implications of such potential changes before they have been fully realized.

  2. Aprendizaje automático

    OpenAIRE

    Suárez Cueto, Armando

    2006-01-01

    En este libro se introducen los conceptos básicos en una de las ramas más estudiadas actualmente dentro de la inteligencia artificial: el aprendizaje automático. Se estudian temas como el aprendizaje inductivo, el razonamiento analógico, el aprendizaje basado en explicaciones, las redes neuronales, los algoritmos genéticos, el razonamiento basado en casos o las aproximaciones teóricas al aprendizaje automático.

  3. 2015 Chinese Intelligent Automation Conference

    CERN Document Server

    Li, Hongbo

    2015-01-01

    Proceedings of the 2015 Chinese Intelligent Automation Conference presents selected research papers from the CIAC’15, held in Fuzhou, China. The topics include adaptive control, fuzzy control, neural network based control, knowledge based control, hybrid intelligent control, learning control, evolutionary mechanism based control, multi-sensor integration, failure diagnosis, reconfigurable control, etc. Engineers and researchers from academia, industry and the government can gain valuable insights into interdisciplinary solutions in the field of intelligent automation.

  4. Technology modernization assessment flexible automation

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, D.W.; Boyd, D.R.; Hansen, N.H.; Hansen, M.A.; Yount, J.A.

    1990-12-01

    The objectives of this report are: to present technology assessment guidelines to be considered in conjunction with defense regulations before an automation project is developed to give examples showing how assessment guidelines may be applied to a current project to present several potential areas where automation might be applied successfully in the depot system. Depots perform primarily repair and remanufacturing operations, with limited small batch manufacturing runs. While certain activities (such as Management Information Systems and warehousing) are directly applicable to either environment, the majority of applications will require combining existing and emerging technologies in different ways, with the special needs of depot remanufacturing environment. Industry generally enjoys the ability to make revisions to its product lines seasonally, followed by batch runs of thousands or more. Depot batch runs are in the tens, at best the hundreds, of parts with a potential for large variation in product mix; reconfiguration may be required on a week-to-week basis. This need for a higher degree of flexibility suggests a higher level of operator interaction, and, in turn, control systems that go beyond the state of the art for less flexible automation and industry in general. This report investigates the benefits and barriers to automation and concludes that, while significant benefits do exist for automation, depots must be prepared to carefully investigate the technical feasibility of each opportunity and the life-cycle costs associated with implementation. Implementation is suggested in two ways: (1) develop an implementation plan for automation technologies based on results of small demonstration automation projects; (2) use phased implementation for both these and later stage automation projects to allow major technical and administrative risk issues to be addressed. 10 refs., 2 figs., 2 tabs. (JF)

  5. Virtual Machine in Automation Projects

    OpenAIRE

    Xing, Xiaoyuan

    2010-01-01

    Virtual machine, as an engineering tool, has recently been introduced into automation projects in Tetra Pak Processing System AB. The goal of this paper is to examine how to better utilize virtual machine for the automation projects. This paper designs different project scenarios using virtual machine. It analyzes installability, performance and stability of virtual machine from the test results. Technical solutions concerning virtual machine are discussed such as the conversion with physical...

  6. Towards automated traceability maintenance.

    Science.gov (United States)

    Mäder, Patrick; Gotel, Orlena

    2012-10-01

    Traceability relations support stakeholders in understanding the dependencies between artifacts created during the development of a software system and thus enable many development-related tasks. To ensure that the anticipated benefits of these tasks can be realized, it is necessary to have an up-to-date set of traceability relations between the established artifacts. This goal requires the creation of traceability relations during the initial development process. Furthermore, the goal also requires the maintenance of traceability relations over time as the software system evolves in order to prevent their decay. In this paper, an approach is discussed that supports the (semi-) automated update of traceability relations between requirements, analysis and design models of software systems expressed in the UML. This is made possible by analyzing change events that have been captured while working within a third-party UML modeling tool. Within the captured flow of events, development activities comprised of several events are recognized. These are matched with predefined rules that direct the update of impacted traceability relations. The overall approach is supported by a prototype tool and empirical results on the effectiveness of tool-supported traceability maintenance are provided.

  7. Automated personnel radiation monitor

    International Nuclear Information System (INIS)

    Sterling, S.G.

    1981-01-01

    An automated Personnel Low-Level Radiation Portal Monitor has been developed by UNC Nuclear Industries, Inc. It is micro-computer controlled and uses nineteen large gas flow radiation detectors. By employing a micro-computer, sophisticated mathematical analysis is used on the detector informational data base to determine the statistical probability of contamination. This system provides for: (1) Increased sensitivity to point source contamination; (2) Real time background level compensation before and during Portal occupancy; (3) Variable counting periods as necessary to provide a significant statistical probability of contamination; (4) Continuous self-testing of system components, detector operability and sensitivity; and (5) Multiple modes of operation allowing the operator/owner control from continuous walk-through (for SNM detection at gates) to complete whole body counts (at step-off points from radiation zones). Sr-90 sources of .005 uCi can be detected from the hands and feet with a 90% confidence level, less than .1% false alarm rate with background levels up to 0.1 mR/hr. For the occupants periphery adjacent to the detectors, a sensitivity of .01 uCi is readily attainable. Alpha particle detection is legitimately available on hands, due to close proximity detection and thin Mylar detector cover techniques

  8. Automated personnel radiation monitor

    Energy Technology Data Exchange (ETDEWEB)

    Sterling, S.G.

    1981-06-01

    An automated Personnel Low-Level Radiation Portal Monitor has been developed by UNC Nuclear Industries, Inc. It is micro-computer controlled and uses nineteen large gas flow radiation detectors. By employing a micro-computer, sophisticated mathematical analysis is used on the detector informational data base to determine the statistical probability of contamination. This system provides for: (1) Increased sensitivity to point source contamination; (2) Real time background level compensation before and during Portal occupancy; (3) Variable counting periods as necessary to provide a significant statistical probability of contamination; (4) Continuous self-testing of system components, detector operability and sensitivity; and (5) Multiple modes of operation allowing the operator/owner control from continuous walk-through (for SNM detection at gates) to complete whole body counts (at step-off points from radiation zones). Sr-90 sources of .005 uCi can be detected from the hands and feet with a 90% confidence level, less than .1% false alarm rate with background levels up to 0.1 mR/hr. For the occupants periphery adjacent to the detectors, a sensitivity of .01 uCi is readily attainable. Alpha particle detection is legitimately available on hands, due to close proximity detection and thin Mylar detector cover techniques.

  9. Particle Accelerator Focus Automation

    Science.gov (United States)

    Lopes, José; Rocha, Jorge; Redondo, Luís; Cruz, João

    2017-08-01

    The Laboratório de Aceleradores e Tecnologias de Radiação (LATR) at the Campus Tecnológico e Nuclear, of Instituto Superior Técnico (IST) has a horizontal electrostatic particle accelerator based on the Van de Graaff machine which is used for research in the area of material characterization. This machine produces alfa (He+) and proton (H+) beams of some μA currents up to 2 MeV/q energies. Beam focusing is obtained using a cylindrical lens of the Einzel type, assembled near the high voltage terminal. This paper describes the developed system that automatically focuses the ion beam, using a personal computer running the LabVIEW software, a multifunction input/output board and signal conditioning circuits. The focusing procedure consists of a scanning method to find the lens bias voltage which maximizes the beam current measured on a beam stopper target, which is used as feedback for the scanning cycle. This system, as part of a wider start up and shut down automation system built for this particle accelerator, brings great advantages to the operation of the accelerator by turning it faster and easier to operate, requiring less human presence, and adding the possibility of total remote control in safe conditions.

  10. Automated propellant leak detection

    Science.gov (United States)

    Makel, D. B.; Jansa, E. D.; Bickmore, T. W.; Powers, W. T.

    1993-01-01

    An automated hydrogen leak detection system is being developed for earth-to-orbit rocket engine applications. The system consists of three elements, a sensor array, a signal processing unit, and a diagnostic processor. The sensor array consists of discrete solid state sensors which are located at specific potential leak sites and in potential leak zones. The signal processing unit provides excitations power for the sensors and provides analog to digital data conversion of the sensor signals. The diagnostic computer analyzes the sensor outputs to determine leak sources and magnitude. Leak data from the sensor network is interpreted using knowledge based software and displayed on-line through a graphical user interface including 3-D leak visualization. The system requirements have been developed assuming eventual application to the Space Shuttle Main Engine which requires approximately 72 measurement locations. A prototype system has been constructed to demonstrate the operational features of the system. This system includes both prototype electronics and data processing software algorithms. Experiments are in progress to evaluate system operation at conditions which simulate prelaunch and flight. The prototype system consists of a network using 16 sensors within a testbed which simulates engine components. Sensor response, orientation, and data analysis algorithms are being evaluated using calibrated leaks produced within the testbed. A prototype flight system is also under development consisting of 8 sensors and flight capable electronics with autonomous control and data recording.

  11. Particle Accelerator Focus Automation

    Directory of Open Access Journals (Sweden)

    Lopes José

    2017-08-01

    Full Text Available The Laboratório de Aceleradores e Tecnologias de Radiação (LATR at the Campus Tecnológico e Nuclear, of Instituto Superior Técnico (IST has a horizontal electrostatic particle accelerator based on the Van de Graaff machine which is used for research in the area of material characterization. This machine produces alfa (He+ and proton (H+ beams of some μA currents up to 2 MeV/q energies. Beam focusing is obtained using a cylindrical lens of the Einzel type, assembled near the high voltage terminal. This paper describes the developed system that automatically focuses the ion beam, using a personal computer running the LabVIEW software, a multifunction input/output board and signal conditioning circuits. The focusing procedure consists of a scanning method to find the lens bias voltage which maximizes the beam current measured on a beam stopper target, which is used as feedback for the scanning cycle. This system, as part of a wider start up and shut down automation system built for this particle accelerator, brings great advantages to the operation of the accelerator by turning it faster and easier to operate, requiring less human presence, and adding the possibility of total remote control in safe conditions.

  12. Automated uranium titration system

    International Nuclear Information System (INIS)

    Takahashi, M.; Kato, Y.

    1983-01-01

    An automated titration system based on the Davies-Gray method has been developed for accurate determination of uranium. The system consists of a potentiometric titrator with precise burettes, a sample changer, an electronic balance and a desk-top computer with a printer. Fifty-five titration vessels are loaded in the sample changer. The first three contain the standard solution for standardizing potassium dichromate titrant, and the next two and the last two contain the control samples for data quality assurance. The other forty-eight measurements are carried out for sixteen unknown samples. Sample solution containing about 100 mg uranium is taken in a titration vessel. At the pretreatment position, uranium (VI) is reduced to uranium (IV) by iron (II). After the valency adjustment, the vessel is transferred to the titration position. The rate of titrant addition is automatically controlled to be slower near the end-point. The last figure (0.01 mL) of the equivalent titrant volume for uranium is calculated from the potential change. The results obtained with this system on 100 mg uranium gave a precision of 0.2% (RSD,n=3) and an accuracy of better than 0.1%. Fifty-five titrations are accomplished in 10 hours. (author)

  13. Automated asteroseismic peak detections

    Science.gov (United States)

    García Saravia Ortiz de Montellano, Andrés; Hekker, S.; Themeßl, N.

    2018-05-01

    Space observatories such as Kepler have provided data that can potentially revolutionize our understanding of stars. Through detailed asteroseismic analyses we are capable of determining fundamental stellar parameters and reveal the stellar internal structure with unprecedented accuracy. However, such detailed analyses, known as peak bagging, have so far been obtained for only a small percentage of the observed stars while most of the scientific potential of the available data remains unexplored. One of the major challenges in peak bagging is identifying how many solar-like oscillation modes are visible in a power density spectrum. Identification of oscillation modes is usually done by visual inspection that is time-consuming and has a degree of subjectivity. Here, we present a peak-detection algorithm especially suited for the detection of solar-like oscillations. It reliably characterizes the solar-like oscillations in a power density spectrum and estimates their parameters without human intervention. Furthermore, we provide a metric to characterize the false positive and false negative rates to provide further information about the reliability of a detected oscillation mode or the significance of a lack of detected oscillation modes. The algorithm presented here opens the possibility for detailed and automated peak bagging of the thousands of solar-like oscillators observed by Kepler.

  14. Automated ISS Flight Utilities

    Science.gov (United States)

    Offermann, Jan Tuzlic

    2016-01-01

    During my internship at NASA Johnson Space Center, I worked in the Space Radiation Analysis Group (SRAG), where I was tasked with a number of projects focused on the automation of tasks and activities related to the operation of the International Space Station (ISS). As I worked on a number of projects, I have written short sections below to give a description for each, followed by more general remarks on the internship experience. My first project is titled "General Exposure Representation EVADOSE", also known as "GEnEVADOSE". This project involved the design and development of a C++/ ROOT framework focused on radiation exposure for extravehicular activity (EVA) planning for the ISS. The utility helps mission managers plan EVAs by displaying information on the cumulative radiation doses that crew will receive during an EVA as a function of the egress time and duration of the activity. SRAG uses a utility called EVADOSE, employing a model of the space radiation environment in low Earth orbit to predict these doses, as while outside the ISS the astronauts will have less shielding from charged particles such as electrons and protons. However, EVADOSE output is cumbersome to work with, and prior to GEnEVADOSE, querying data and producing graphs of ISS trajectories and cumulative doses versus egress time required manual work in Microsoft Excel. GEnEVADOSE automates all this work, reading in EVADOSE output file(s) along with a plaintext file input by the user providing input parameters. GEnEVADOSE will output a text file containing all the necessary dosimetry for each proposed EVA egress time, for each specified EVADOSE file. It also plots cumulative dose versus egress time and the ISS trajectory, and displays all of this information in an auto-generated presentation made in LaTeX. New features have also been added, such as best-case scenarios (egress times corresponding to the least dose), interpolated curves for trajectories, and the ability to query any time in the

  15. Automated Supernova Discovery (Abstract)

    Science.gov (United States)

    Post, R. S.

    2015-12-01

    (Abstract only) We are developing a system of robotic telescopes for automatic recognition of Supernovas as well as other transient events in collaboration with the Puckett Supernova Search Team. At the SAS2014 meeting, the discovery program, SNARE, was first described. Since then, it has been continuously improved to handle searches under a wide variety of atmospheric conditions. Currently, two telescopes are used to build a reference library while searching for PSN with a partial library. Since data is taken every night without clouds, we must deal with varying atmospheric and high background illumination from the moon. Software is configured to identify a PSN, reshoot for verification with options to change the run plan to acquire photometric or spectrographic data. The telescopes are 24-inch CDK24, with Alta U230 cameras, one in CA and one in NM. Images and run plans are sent between sites so the CA telescope can search while photometry is done in NM. Our goal is to find bright PSNs with magnitude 17.5 or less which is the limit of our planned spectroscopy. We present results from our first automated PSN discoveries and plans for PSN data acquisition.

  16. An Office Automation Needs Assessment Model

    Science.gov (United States)

    1985-08-01

    office automation needs of a Army Hospital. Based on a literature review and interviews with industry experts, a model was developed to assess office automation needs. The model was applied against the needs of the Clinical Support Division. The author identified a need for a strategic plan for Office Automation prior to analysis of a specific service for automaton. He recommended establishment of a Hospital Automation Advisory Council to centralize establish policy recommendations for Office automation

  17. A Phenomenological Exploration of Black Male Law Enforcement Officers' Perspectives of Racial Profiling and Their Law Enforcement Career Exploration and Commitment

    Science.gov (United States)

    Salters, Gregory A.

    2013-01-01

    This phenomenological study explored Black male law enforcement officers' perspectives of how racial profiling shaped their decisions to explore and commit to a law enforcement career. Criterion and snow ball sampling was used to obtain the 17 participants for this study. Super's (1990) archway model was used as the theoretical…

  18. Traffic enforcement in Europe: effects, measures, needs and future. Final report of the ESCAPE Consortium. (The acroynm ESCAPE stands for Enhanced Safety Coming from Appropriate Police Enforcement).

    NARCIS (Netherlands)

    Mäkinen, T. Zaidel, D.M. Andersson, G. Biecheler-Fretel, M.-B. Christ, R. Cauzard, J.-P. Elvik, R. Goldenbeld, C. Gelau, C. Heidstra, J. Jayet, M.-C. Nilsson, G. Papaioanou, P. Quimby, A. Rehnova, V. & Vaa, T.

    2003-01-01

    The objectives of the project were to identify important issues of traffic law enforcement in the EU, examine traditional and innovative enforcement approaches and tools, and assess their potential to improve compliance for increased safety on roads. The following main issues were addressed: the

  19. Assessing peak aerobic capacity in Dutch law enforcement officers

    Directory of Open Access Journals (Sweden)

    Harriet Wittink

    2015-06-01

    Full Text Available Objectives: To cross-validate the existing peak rate of oxygen consumption (VO2peak prediction equations in Dutch law enforcement officers and to determine whether these prediction equations can be used to predict VO2peak for groups and in a single individual. A further objective was to report normative absolute and relative VO2peak values of a sample of law enforcement officers in the Netherlands. Material and Methods: The peak rate of oxygen consumption (ml×kg–1×min–1 was measured using a maximal incremental bicycle test in 1530 subjects, including 1068 male and 461 female police officers. Validity of the prediction equations for groups was assessed by comparing predicted VO2peak with measured VO2peak using paired t-tests. For individual differences limits of agreement (LoA were calculated. Equations were considered valid for individuals when the difference between measured and predicted VO2peak did not exceed ±1 metabolic equivalent (MET in 95% of individuals. Results: None of the equations met the validity criterion of 95% of individuals having ±1 MET difference or less than the measured value. Limits of agreement (LoAs were large in all predictions. At the individual level, none of the equations were valid predictors of VO2peak (ml×kg–1×min–1. Normative values for Dutch law enforcement officers were presented. Conclusions: Substantial differences between measured and predicted VO2peak (ml×kg–1×min–1 were found. Most tested equations were invalid predictors of VO2peak at group level and all were invalid at individual levels.

  20. Forensic drug intelligence: an important tool in law enforcement.

    Science.gov (United States)

    Esseiva, Pierrre; Ioset, Sylvain; Anglada, Frédéric; Gasté, Laëtitia; Ribaux, Olivier; Margot, Pierre; Gallusser, Alain; Biedermann, Alex; Specht, Yves; Ottinger, Edmond

    2007-04-11

    Organised criminality is a great concern for national/international security. The demonstration of complex crimes is increasingly dependant on knowledge distributed within law-enforcement agencies and scientific disciplines. This separation of knowledge creates difficulties in reconstructing and prosecuting such crimes. Basic interdisciplinary research in drug intelligence combined with crime analysis, forensic intelligence, and traditional law enforcement investigation is leading to important advances in crime investigation support. Laboratory results constitute one highly dependable source of information that is both reliable and testable. Their operational use can support investigation and even provide undetected connections or organisation of structure. The foremost difficulties encountered by drug analysts are not principally of a chemical or analytical nature, but methodologies to extract parameters or features that are deemed to be crucial for handling and contextualising drug profiling data. An organised memory has been developed in order to provide accurate, timely, useful and meaningful information for linking spatially and temporally distinct events on a national and international level (including cross-border phenomena). Literature has already pointed out that forensic case data are amenable for use in an intelligence perspective if data and knowledge of specialised actors are appropriately organised, shared and processed. As a particular form of forensic case data, the authors' research focuses on parameters obtained through the systematic physical and chemical profiling of samples of illicit drugs. The procedure is used to infer and characterise links between samples that originate from the same and different seizures. The discussion will not, however, focus on how samples are actually analysed and compared as substantial literature on this topic already exists. Rather, attention is primarily drawn to an active and close collaboration between

  1. MAJOR PERSONALITY TRAITS OF THE LAW ENFORCEMENT PROFESSIONALS

    Directory of Open Access Journals (Sweden)

    D. S. Volkov

    2013-03-01

    Thus, the de?ned traits can be characterized as threat for the normal personality functioning and successful ful?llment of the professional duties. The de?ned individual characteristics of the law enforcement professionals suggest the necessity of improving personnel selection and the psychological screening of their functioning; taking into account personality factors in the promotion to higher positions and in the course of career training; upbringing of the young professionals with reference to their individual characteristics. It is planned to use the data obtained for the development of the special psychocorrectional programs.

  2. On the Enforcement of Specific Performance in Civil Law Countries

    DEFF Research Database (Denmark)

    Lando, Henrik; Rose, Caspar

    2003-01-01

    requires actions to beundertaken, and we relate this to costs of enforcement. We arguethat it is administratively costly to run a system of enforcementthat renders specific performance attractive to the aggrieved party,and that the Civil Law countries have (like Common Law countries)chosen not to incur......Abstract:Proponents of specific performance as a remedy for breach ofcontract have found support in the alleged use of the remedy inCivil Law countries. However, we provide evidence that specificperformance is in fact a rare remedy in Denmark, Germany andFrance, and under CISG, when performance...

  3. Privacy Enforcement in a Cost-Effective Smart Grid

    DEFF Research Database (Denmark)

    Mikkelsen, Søren Aagaard

    In this technical report we present the current state of the research conducted during the first part of the PhD period. The PhD thesis “Privacy Enforcement in a Cost-Effective Smart Grid” focuses on ensuring privacy when generating market for energy service providers that develop web services...... and privacy challenges that emerge when designing a system architecture and infrastructure. The resulting architecture is a consumer-centric and agent-based design and uses open Internet-based communication protocols for enabling interoperability while being cost-effective. Finally, the PhD report present...

  4. Analytical challenges: bridging the gap from regulation to enforcement.

    Science.gov (United States)

    Van den Eede, Guy; Kay, Simon; Anklam, Elke; Schimmel, Heinz

    2002-01-01

    An overview is presented of the analytical steps that may be needed to determine the presence of genetically modified organisms (GMOs) or for analysis of GMO-derived produce. The analytical aspects necessary for compliance with labeling regulations are discussed along with bottlenecks that may develop when a plant product or a food sample is analyzed for conformity with current European Union GMO legislation. In addition to sampling and testing, other topics deal with complications that arise from biological and agricultural realities that may influence testing capabilities. The issues presented are intended to serve as elements to examine the different challenges that enforcement laboratories might face.

  5. 77 FR 48527 - National Customs Automation Program (NCAP) Test Concerning Automated Commercial Environment (ACE...

    Science.gov (United States)

    2012-08-14

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection National Customs Automation... National Customs Automation Program (NCAP) test concerning the simplified entry functionality in the... INFORMATION: Background In General Customs and Border Protection's (CBP's) National Customs Automation Program...

  6. AUTOMATED ANALYSIS OF BREAKERS

    Directory of Open Access Journals (Sweden)

    E. M. Farhadzade

    2014-01-01

    Full Text Available Breakers relate to Electric Power Systems’ equipment, the reliability of which influence, to a great extend, on reliability of Power Plants. In particular, the breakers determine structural reliability of switchgear circuit of Power Stations and network substations. Failure in short-circuit switching off by breaker with further failure of reservation unit or system of long-distance protection lead quite often to system emergency.The problem of breakers’ reliability improvement and the reduction of maintenance expenses is becoming ever more urgent in conditions of systematic increasing of maintenance cost and repair expenses of oil circuit and air-break circuit breakers. The main direction of this problem solution is the improvement of diagnostic control methods and organization of on-condition maintenance. But this demands to use a great amount of statistic information about nameplate data of breakers and their operating conditions, about their failures, testing and repairing, advanced developments (software of computer technologies and specific automated information system (AIS.The new AIS with AISV logo was developed at the department: “Reliability of power equipment” of AzRDSI of Energy. The main features of AISV are:· to provide the security and data base accuracy;· to carry out systematic control of breakers conformity with operating conditions;· to make the estimation of individual  reliability’s value and characteristics of its changing for given combination of characteristics variety;· to provide personnel, who is responsible for technical maintenance of breakers, not only with information but also with methodological support, including recommendations for the given problem solving  and advanced methods for its realization.

  7. Automated ship image acquisition

    Science.gov (United States)

    Hammond, T. R.

    2008-04-01

    The experimental Automated Ship Image Acquisition System (ASIA) collects high-resolution ship photographs at a shore-based laboratory, with minimal human intervention. The system uses Automatic Identification System (AIS) data to direct a high-resolution SLR digital camera to ship targets and to identify the ships in the resulting photographs. The photo database is then searchable using the rich data fields from AIS, which include the name, type, call sign and various vessel identification numbers. The high-resolution images from ASIA are intended to provide information that can corroborate AIS reports (e.g., extract identification from the name on the hull) or provide information that has been omitted from the AIS reports (e.g., missing or incorrect hull dimensions, cargo, etc). Once assembled into a searchable image database, the images can be used for a wide variety of marine safety and security applications. This paper documents the author's experience with the practicality of composing photographs based on AIS reports alone, describing a number of ways in which this can go wrong, from errors in the AIS reports, to fixed and mobile obstructions and multiple ships in the shot. The frequency with which various errors occurred in automatically-composed photographs collected in Halifax harbour in winter time were determined by manual examination of the images. 45% of the images examined were considered of a quality sufficient to read identification markings, numbers and text off the entire ship. One of the main technical challenges for ASIA lies in automatically differentiating good and bad photographs, so that few bad ones would be shown to human users. Initial attempts at automatic photo rating showed 75% agreement with manual assessments.

  8. Assessing the efficiency of priorities for traffic law enforcement in Norway.

    Science.gov (United States)

    Elvik, Rune; Sogge, Céline Vallet; Lager, Lasse; Amundsen, Finn Harald; Pasnin, Live Tanum; Karlsen, Runar; Fosli, Knut

    2012-07-01

    This paper assesses the efficiency of priorities for traffic law enforcement in Norway. Priorities are regarded as efficient if: (1) enforcement ensures a sufficient level of deterrence to keep down the rate of violations; (2) selection of target violations for enforcement is based on the risk attributable to them; and (3) an optimal level of enforcement is selected, i.e. the marginal benefits of enforcement in terms of preventing accidents equal the marginal costs of enforcement. The efficiency of current traffic law enforcement in Norway is assessed in terms of these criteria. It is found that the risk of apprehension varies considerably between different traffic violations. These variations do not reflect the risk attributable to the violations, i.e. it is not the case that the risk of apprehension is higher for violations that make a large contribution to fatalities and injuries than for violations that make a smaller contribution. In principle, shifting priorities so as to increase the risk of apprehension for some violations and reduce it for other violations could make police enforcement slightly more efficient. The main finding, however, is that the current level of enforcement is too low. Cost-benefit analyses show that substantially increasing the amount of police enforcement is cost-effective. Copyright © 2012 Elsevier Ltd. All rights reserved.

  9. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    Science.gov (United States)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  10. Piracy in cyber space: consumer complicity, pirates and enterprise enforcement

    Science.gov (United States)

    Chaudhry, Peggy E.; Chaudhry, Sohail S.; Stumpf, Stephen A.; Sudler, Hasshi

    2011-05-01

    This article presents an overview of the growth of internet piracy in the global marketplace. The ethical perceptions (or lack of) of the younger generation is addressed, in terms of their willingness to consume counterfeit goods on the web. Firms face the task of educating the consumer that downloading music, software, movies and the like, without compensation, is unethical. This awareness is critical for decreasing the demand for counterfeit goods in the virtual marketplace, where a consumer can exhibit a rogue behaviour with a limited fear of prosecution. We address the pyramid of internet piracy, which encompasses sophisticated suppliers/facilitators, such as the Warez group. Recent sting operations, such as Operation Buccaneer, are also depicted to highlight successful tactical manoeuvres of enforcement agencies. An overview of the Digital Millennium Copyright Act and the No Electronic Theft Act is included to debate the controversy surrounding this legislation. A discussion of enterprise enforcement mechanisms and novel anti-piracy technology for cyberspace is provided to reveal some of the tools used to fight the pirates, such as innovations in digital watermarking and NEC's recently announced video content identification technology. Enterprise information systems and its interdependence on the internet are also demanding new technologies that enable internet investigators to rapidly search, verify and potentially remove pirated content using web services. The quality of service of web services designed to efficiently detect pirated content is a growing consideration for new anti-piracy technology.

  11. General considerations on the enforcement (application of law

    Directory of Open Access Journals (Sweden)

    Berlingher Remus Daniel

    2016-06-01

    Full Text Available Law is a system of norms developed and/or recognized by the state as norms guiding human behaviour according to the values of that particular society, establishing rights and obligations, principles and definitions, structures and relationships of social organization and activity that must be obeyed and which, when necessary, are insured by the coercive force of the state. Thus, the development of this system of norms is not an end in itself, but is intended to regulate all social relations, guide human behaviours and achieve the aims of the law. The enforcement of law is the process of translating legal rules into practice, through which the subjects of law obey and execute legal norms, and state authorities apply them, depending on their competence. The enforcement of law depends on a number of factors that shape law, such as its natural framework of existence, the historical context and the ethnic and national particularities of that community’s development, the economic factor or framework, the framework and particularities of the political system, the cultural-ideological framework or factor, the international framework or factor, etc.

  12. Electronic aroma detection technology for forensic and law enforcement applications

    Energy Technology Data Exchange (ETDEWEB)

    Barshick, S.-A.; Griest, W.H.; Vass, A.A.

    1996-12-31

    A major problem hindering criminal investigations is the lack of appropriate tools for proper crime scene investigations. Often locating important pieces of evidence means relying on the ability of trained detection canines. Development of analytical technology to uncover and analyze evidence, potentially at the scene, could serve to expedite criminal investigations, searches, and court proceedings. To address this problem, a new technology based on gas sensor arrays was investigated for its applicability to forensic and law enforcement problems. The technology employs an array of sensors that respond to volatile chemical components yielding a characteristic `fingerprint` pattern representative of the vapor- phase composition of a sample. Sample aromas can be analyzed and identified using artificial neural networks that are trained on known aroma patterns. Several candidate applications based on known technological needs of the forensic and law enforcement communities have been investigated. These applications have included the detection of aromas emanating from cadavers to aid in determining time since death, drug detection for deterring the manufacture, sale, and use of drugs of abuse, and the analysis of fire debris for accelerant identification. The results to date for these applications have been extremely promising and demonstrate the potential applicability of this technology for forensic use.

  13. Law enforcement preferences for PTSD treatment and crisis management alternatives.

    Science.gov (United States)

    Becker, Carolyn Black; Meyer, Glenn; Price, John S; Graham, Melissa M; Arsena, Ashley; Armstrong, David A; Ramon, Elizabeth

    2009-03-01

    Evidence-based treatments (EBT) for posttraumatic stress disorder (PTSD) remain underutilized. Analog research, however, indicates that patients may be more amenable to receiving EBT for PTSD than utilization rates suggest. This study sought to extend previous studies by investigating PTSD treatment preferences among law enforcement individuals (i.e., active duty officers, cadets, criminal justice students). We asked 379 participants, with varying trauma histories, to read a police traumatic event and imagine they had developed PTSD. Participants rated the credibility of six treatment options which they might encounter in a treatment setting, and chose their most and least preferred treatments. Next, they evaluated a widely used debriefing intervention aimed at preventing PTSD. Almost 90% of participants chose exposure or Cognitive Processing Therapy as their first or second most preferred treatment, and they rated these interventions as significantly more credible than the other four treatment options. The sample showed ambivalence regarding the perceived efficacy of debriefing but found the rationale credible. This study supports previous analog research indicating that patients may be more interested in EBT than indicated by utilization rates, and suggests that law enforcement departments should consider offering EBT to officers who develop PTSD.

  14. Non-iterative distance constraints enforcement for cloth drapes simulation

    Science.gov (United States)

    Hidajat, R. L. L. G.; Wibowo, Arifin, Z.; Suyitno

    2016-03-01

    A cloth simulation represents the behavior of cloth objects such as flag, tablecloth, or even garments has application in clothing animation for games and virtual shops. Elastically deformable models have widely used to provide realistic and efficient simulation, however problem of overstretching is encountered. We introduce a new cloth simulation algorithm that replaces iterative distance constraint enforcement steps with non-iterative ones for preventing over stretching in a spring-mass system for cloth modeling. Our method is based on a simple position correction procedure applied at one end of a spring. In our experiments, we developed a rectangle cloth model which is initially at a horizontal position with one point is fixed, and it is allowed to drape by its own weight. Our simulation is able to achieve a plausible cloth drapes as in reality. This paper aims to demonstrate the reliability of our approach to overcome overstretches while decreasing the computational cost of the constraint enforcement process due to an iterative procedure that is eliminated.

  15. The Cost of Enforcing Building Energy Codes: Phase 2

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Alison [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Price, Sarah K. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Vine, Ed [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2014-10-15

    The purpose of this study is to present key findings regarding costs associated with enforcing building energy code compliance–primarily focusing on costs borne by local government. Building codes, if complied with, have the ability to save a significant amount of energy. However, energy code compliance rates have been significantly lower than 100%. Renewed interest in building energy codes has focused efforts on increasing compliance, particularly as a result of the 2009 American Recovery and Reinvestment Act (ARRA) requirement that in order for states to receive additional energy grants, they must have “a plan for the jurisdiction achieving compliance with the building energy code…in at least 90 percent of new and renovated residential and commercial building space” by 2017 (Public Law 111-5, Section 410(2)(C)). One study by the Institute for Market Transformation (IMT) estimated the costs associated with reaching 90% compliance to be $810 million, or $610 million in additional funding over existing expenditures, a non-trivial value. [Majersik & Stellberg 2010] In this context, Lawrence Berkeley National Laboratory (LBNL) conducted a study to better pinpoint the costs of enforcement through a two-phase process.

  16. The effect of enforcing some direct tax law

    Directory of Open Access Journals (Sweden)

    Hassan Ghodrati

    2014-08-01

    Full Text Available Regarding to the role of tax in the economy as the most stable and constant source of income and also due to the fact that there was no success in achieving fiscal goals by the government during its economic and developmental programs, paying attention to and making effort in this domain is regarded as a necessity in any country. The purpose of this study is to evaluate the effect of enforcing Article 181 of Direct Tax Law on extent of taxpayers’ satisfaction, increase of trust, increase of tax compliance or decrease of tax evasion in Isfahan, Iran. The present study consists of a main hypothesis and four sub-hypotheses. Data were collected from 100 companies regarding their performance during 200 years. Article 181 of Direct Tax Code was implemented upon these companies over the period 2006-2011. Hypotheses of the study were evaluated. The results of the study, in survey and post-event pivot, showed that enforcing Article 181 of Direct Tax Law in Isfahan was effective. However, its effect was not significant regarding increase of taxpayers’ familiarity and acquaintance with Tax Office and its functions in Isfahan; it increased tax compliance, decreased tax evasion by the taxpayers, increased taxpayers’ satisfaction and helped them trust on Tax Office and its performance.

  17. LiveWall Operational Evaluation: Seattle Law Enforcement Pilot

    Energy Technology Data Exchange (ETDEWEB)

    Barr, Jonathan L.; Burtner, Edwin R.; Stein, Steven L.

    2013-10-01

    The LiveWall concept envisioned as an outgrowth of the Precision Information Environment (PIE) project allows communications between separate groups using interactive video, audio, and a shared desktop environment; this allows everyone to participate and collaborate in real time, regardless of location. The LiveWall concept provides a virtual window to other locations, where all parties can interact and collaboratively work with each other. This functionality is intended to improve multi-site coordination amongst emergency operations centers (EOC), field operations sites and across organizations and jurisdictions to accommodate communications during routine and emergency events. For the initial LiveWall operational evaluation PNNL partnered with the Seattle Police Department (SPD). This partnership allowed for the creation of an excellent LiveWall test bed specific to law enforcement. This partnership made it possible to test the LiveWall concept with scenarios involving the many facets of the law enforcement work done by SPD. PNNL and SPD agreed that integrating the systems into operations for a real event would be the best test of the technology and give SPD staff greater visibility into the functionality and benefits offered by the LiveWall concept.

  18. Electronic aroma detection technology for forensic and law enforcement applications

    Science.gov (United States)

    Barshick, Stacy-Ann; Griest, Wayne H.; Vass, Arpad A.

    1997-02-01

    A major problem hindering criminal investigations is the lack of appropriate tools for proper crime scene investigations. Often locating important pieces of evidence means relying on the ability of trained detection canines. Development of analytical technology to uncover and analyze evidence, potentially at the scene, could serve to expedite criminal investigations, searches, and court proceedings. To address this problem, a new technology based on gas sensor arrays was investigated for its applicability to forensic and law enforcement problems. The technology employs an array of sensors that respond to volatile chemical components yielding a characteristic 'fingerprint' pattern representative of the vapor-phase composition of a sample. Sample aromas can be analyzed and identified using artificial neural networks that are trained on known aroma patterns. Several candidate applications based on known technological needs of the forensic and law enforcement communities have been investigated. These applications have included the detection of aromas emanating from cadavers to aid in determining time since death, drug detection for deterring the manufacture, sale, and use of drugs of abuse, and the analysis of fire debris for accelerant identification. The result to date for these applications have been extremely promising and demonstrate the potential applicability of this technology for forensic use.

  19. Enforcement of opacity security properties for ship information system

    Directory of Open Access Journals (Sweden)

    Bowen Xing

    2016-09-01

    Full Text Available In this paper, we consider the cybersecurity issue of ship information system (SIS from a new perspective which is called opacity. For a SIS, its confidential information (named as “secret” may be leaked through the working behaviors of each Distributed Control Unit (DCU from an outside observer called an “intruder” which is able to determine ship's mission state by detecting the source of each data flow from the corresponding DCUs in SIS. Therefore we proposed a dual layer mechanism to enforce opacity by activating non-essential DCU during secret mission. This mechanism is calculated by two types of insertion functions: Safety-assured insertion function (fIS and Admissibility-assured insertion function (fIA. Due to different objectives, fIS is designed to confuse intruder by constructing a non-secret behaviors from a unsafe one, and the division of fIA is to polish the modified output behaviors back to normal. We define the property of “I2–Enforceability” that dual layer insertion functions has the ability to enforce opacity. By a given mission map of SIS and the marked secret missions, we propose an algorithm to select fIS and compute its matchable fIA and then the DCUs which should be activated to release non-essential data flow in each step is calculable.

  20. Programmable automation systems in PSA

    International Nuclear Information System (INIS)

    Pulkkinen, U.

    1997-06-01

    The Finnish safety authority (STUK) requires plant specific PSAs, and quantitative safety goals are set on different levels. The reliability analysis is more problematic when critical safety functions are realized by applying programmable automation systems. Conventional modeling techniques do not necessarily apply to the analysis of these systems, and the quantification seems to be impossible. However, it is important to analyze contribution of programmable automation systems to the plant safety and PSA is the only method with system analytical view over the safety. This report discusses the applicability of PSA methodology (fault tree analyses, failure modes and effects analyses) in the analysis of programmable automation systems. The problem of how to decompose programmable automation systems for reliability modeling purposes is discussed. In addition to the qualitative analysis and structural reliability modeling issues, the possibility to evaluate failure probabilities of programmable automation systems is considered. One solution to the quantification issue is the use of expert judgements, and the principles to apply expert judgements is discussed in the paper. A framework to apply expert judgements is outlined. Further, the impacts of subjective estimates on the interpretation of PSA results are discussed. (orig.) (13 refs.)

  1. International Conference Automation : Challenges in Automation, Robotics and Measurement Techniques

    CERN Document Server

    Zieliński, Cezary; Kaliczyńska, Małgorzata

    2016-01-01

    This book presents the set of papers accepted for presentation at the International Conference Automation, held in Warsaw, 2-4 March of 2016. It presents the research results presented by top experts in the fields of industrial automation, control, robotics and measurement techniques. Each chapter presents a thorough analysis of a specific technical problem which is usually followed by numerical analysis, simulation, and description of results of implementation of the solution of a real world problem. The presented theoretical results, practical solutions and guidelines will be valuable for both researchers working in the area of engineering sciences and for practitioners solving industrial problems. .

  2. Do Reputation Systems Undermine Trust? Divergent Effects of Enforcement Type on Generalized Trust and Trustworthiness.

    Science.gov (United States)

    Kuwabara, Ko

    2015-03-01

    Research shows that enforcing cooperation using contracts or tangible sanctions can backfire, undermining people's intrinsic motivation to cooperate: when the enforcement is removed, people are less trusting or trustworthy than when there is no enforcement to begin with. The author examines whether reputation systems have similar consequences for generalized trust and trustworthiness. Using a web-based experiment simulating online market transactions (studies 1 and 2), he shows that reputation systems can reinforce generalized trust and trustworthiness, unlike contractual enforcement or relational enforcement based on repeated interactions. In a survey experiment (study 3), he finds that recalling their eBay feedback scores made participants more trusting and trustworthy. These results are predicated on the diffuse nature of reputational enforcement to reinforce perceptions of trust and trustworthiness. These results have implications for understanding how different forms of governance affect generalized trust and trustworthiness.

  3. Manual versus automated blood sampling

    DEFF Research Database (Denmark)

    Teilmann, A C; Kalliokoski, Otto; Sørensen, Dorte B

    2014-01-01

    corticosterone metabolites, and expressed more anxious behavior than did the mice of the other groups. Plasma corticosterone levels of mice subjected to tail blood sampling were also elevated, although less significantly. Mice subjected to automated blood sampling were less affected with regard to the parameters......Facial vein (cheek blood) and caudal vein (tail blood) phlebotomy are two commonly used techniques for obtaining blood samples from laboratory mice, while automated blood sampling through a permanent catheter is a relatively new technique in mice. The present study compared physiological parameters......, glucocorticoid dynamics as well as the behavior of mice sampled repeatedly for 24 h by cheek blood, tail blood or automated blood sampling from the carotid artery. Mice subjected to cheek blood sampling lost significantly more body weight, had elevated levels of plasma corticosterone, excreted more fecal...

  4. Computer automation and artificial intelligence

    International Nuclear Information System (INIS)

    Hasnain, S.B.

    1992-01-01

    Rapid advances in computing, resulting from micro chip revolution has increased its application manifold particularly for computer automation. Yet the level of automation available, has limited its application to more complex and dynamic systems which require an intelligent computer control. In this paper a review of Artificial intelligence techniques used to augment automation is presented. The current sequential processing approach usually adopted in artificial intelligence has succeeded in emulating the symbolic processing part of intelligence, but the processing power required to get more elusive aspects of intelligence leads towards parallel processing. An overview of parallel processing with emphasis on transputer is also provided. A Fuzzy knowledge based controller for amination drug delivery in muscle relaxant anesthesia on transputer is described. 4 figs. (author)

  5. Visual automated macromolecular model building.

    Science.gov (United States)

    Langer, Gerrit G; Hazledine, Saul; Wiegels, Tim; Carolan, Ciaran; Lamzin, Victor S

    2013-04-01

    Automated model-building software aims at the objective interpretation of crystallographic diffraction data by means of the construction or completion of macromolecular models. Automated methods have rapidly gained in popularity as they are easy to use and generate reproducible and consistent results. However, the process of model building has become increasingly hidden and the user is often left to decide on how to proceed further with little feedback on what has preceded the output of the built model. Here, ArpNavigator, a molecular viewer tightly integrated into the ARP/wARP automated model-building package, is presented that directly controls model building and displays the evolving output in real time in order to make the procedure transparent to the user.

  6. Unmet needs in automated cytogenetics

    International Nuclear Information System (INIS)

    Bender, M.A.

    1976-01-01

    Though some, at least, of the goals of automation systems for analysis of clinical cytogenetic material seem either at hand, like automatic metaphase finding, or at least likely to be met in the near future, like operator-assisted semi-automatic analysis of banded metaphase spreads, important areas of cytogenetic analsis, most importantly the determination of chromosomal aberration frequencies in populations of cells or in samples of cells from people exposed to environmental mutagens, await practical methods of automation. Important as are the clinical diagnostic applications, it is apparent that increasing concern over the clastogenic effects of the multitude of potentially clastogenic chemical and physical agents to which human populations are being increasingly exposed, and the resulting emergence of extensive cytogenetic testing protocols, makes the development of automation not only economically feasible but almost mandatory. The nature of the problems involved, and acutal of possible approaches to their solution, are discussed

  7. Post-Crackdown Effectiveness of Field-Based Forest Law Enforcement in the Brazilian Amazon

    OpenAIRE

    B?rner, Jan; Kis-Katos, Krisztina; Hargrave, Jorge; K?nig, Konstantin

    2015-01-01

    Regulatory enforcement of forest conservation laws is often dismissed as an ineffective approach to reducing tropical forest loss. Yet, effective enforcement is often a precondition for alternative conservation measures, such as payments for environmental services, to achieve desired outcomes. Fair and efficient policies to reducing emissions from deforestation and forest degradation (REDD) will thus crucially depend on understanding the determinants and requirements of enforcement effectiven...

  8. Chemically Enhanced Trust: Potential Law Enforcement and Military Applications for Oxytocin

    Science.gov (United States)

    2007-12-01

    individuals in the crowd if possible. Officers should remember that a smile is contagious and will not completely destroy their authority.”251 The use of...understanding how oxytocin can be used in the law enforcement and military environments. Oxytocin’s potential law enforcement and military applicability...material necessary to understanding how oxytocin can be used in the law enforcement and military environments. Oxytocin’s potential law

  9. SpecCert: Specifying and Verifying Hardware-based Security Enforcement

    OpenAIRE

    Letan , Thomas; Chifflier , Pierre; Hiet , Guillaume; Néron , Pierre; Morin , Benjamin

    2016-01-01

    Over time, hardware designs have constantly grown in complexity and modern platforms involve multiple interconnected hardware components. During the last decade, several vulnerability disclosures have proven that trust in hardware can be misplaced. In this article, we give a formal definition of Hardware-based Security Enforcement (HSE) mechanisms, a class of security enforcement mechanisms such that a software component relies on the underlying hardware platform to enforce a security policy....

  10. Creating a Learning Organization for State, Local, and Tribal Law Enforcement to Combat Violent Extremism

    Science.gov (United States)

    2016-09-01

    officer’s standards and training commission for five hours of continuing law enforcement educational credit. The general outline for this course is...ones. If the law enforcement learning organization does not account for a changing environment, its collection of strategies from shared dialogue...LEARNING ORGANIZATION FOR STATE, LOCAL, AND TRIBAL LAW ENFORCEMENT TO COMBAT VIOLENT EXTREMISM by John Eric Powell September 2016 Thesis Co

  11. Toward designing for trust in database automation

    International Nuclear Information System (INIS)

    Duez, P. P.; Jamieson, G. A.

    2006-01-01

    Appropriate reliance on system automation is imperative for safe and productive work, especially in safety-critical systems. It is unsafe to rely on automation beyond its designed use; conversely, it can be both unproductive and unsafe to manually perform tasks that are better relegated to automated tools. Operator trust in automated tools mediates reliance, and trust appears to affect how operators use technology. As automated agents become more complex, the question of trust in automation is increasingly important. In order to achieve proper use of automation, we must engender an appropriate degree of trust that is sensitive to changes in operating functions and context. In this paper, we present research concerning trust in automation in the domain of automated tools for relational databases. Lee and See have provided models of trust in automation. One model developed by Lee and See identifies three key categories of information about the automation that lie along a continuum of attributional abstraction. Purpose-, process-and performance-related information serve, both individually and through inferences between them, to describe automation in such a way as to engender r properly-calibrated trust. Thus, one can look at information from different levels of attributional abstraction as a general requirements analysis for information key to appropriate trust in automation. The model of information necessary to engender appropriate trust in automation [1] is a general one. Although it describes categories of information, it does not provide insight on how to determine the specific information elements required for a given automated tool. We have applied the Abstraction Hierarchy (AH) to this problem in the domain of relational databases. The AH serves as a formal description of the automation at several levels of abstraction, ranging from a very abstract purpose-oriented description to a more concrete description of the resources involved in the automated process

  12. Design automation, languages, and simulations

    CERN Document Server

    Chen, Wai-Kai

    2003-01-01

    As the complexity of electronic systems continues to increase, the micro-electronic industry depends upon automation and simulations to adapt quickly to market changes and new technologies. Compiled from chapters contributed to CRC's best-selling VLSI Handbook, this volume covers a broad range of topics relevant to design automation, languages, and simulations. These include a collaborative framework that coordinates distributed design activities through the Internet, an overview of the Verilog hardware description language and its use in a design environment, hardware/software co-design, syst

  13. Status of automated tensile machine

    International Nuclear Information System (INIS)

    Satou, M.; Hamilton, M.L.; Sato, S.; Kohyama, A.

    1992-01-01

    The objective of this work is to develop the Monbusho Automated Tensile machine (MATRON) and install and operate it at the Pacific Northwest Laboratory (PNL). The machine is designed to provide rapid, automated testing of irradiated miniature tensile specimen in a vacuum at elevated temperatures. The MATRON was successfully developed and shipped to PNL for installation in a hot facility. The original installation plan was modified to simplify the current and subsequent installations, and the installation was completed. Detailed procedures governing the operation of the system were written. Testing on irradiated miniature tensile specimen should begin in the near future

  14. Computer automation in veterinary hospitals.

    Science.gov (United States)

    Rogers, H

    1996-05-01

    Computers have been used to automate complex and repetitive tasks in veterinary hospitals since the 1960s. Early systems were expensive, but their use was justified because they performed jobs which would have been impossible or which would have required greater resources in terms of time and personnel had they been performed by other methods. Systems found in most veterinary hospitals today are less costly, magnitudes more capable, and often underused. Modern multitasking operating systems and graphical interfaces bring many opportunities for automation. Commercial and custom programs developed and used in a typical multidoctor mixed species veterinary practice are described.

  15. Automated fabrication of reactor fuel

    International Nuclear Information System (INIS)

    Nyman, D.H.; McLemore, D.R.; Bennett, D.W.; Yatabe, J.M.

    1980-01-01

    The development of Secure Automated Fabrication (SAF) methods is the goal of the United States breeder reactor program and will form the technological basis for the future breeder reactor fuel supply. A major factor in achieving this goal is the development of remotely operated fuel fabrication equipment. The unit operations are being designed for microprocessor control connected to a central control center. The program schedule is to demonstrate the feasibility of automated pellet fuel fabrication and remote maintenance techniques by the mid-1980's. Development of major ceramic unit operations and the required computer control system is currently in the engineering testing stage

  16. 2013 Chinese Intelligent Automation Conference

    CERN Document Server

    Deng, Zhidong

    2013-01-01

    Proceedings of the 2013 Chinese Intelligent Automation Conference presents selected research papers from the CIAC’13, held in Yangzhou, China. The topics include e.g. adaptive control, fuzzy control, neural network based control, knowledge based control, hybrid intelligent control, learning control, evolutionary mechanism based control, multi-sensor integration, failure diagnosis, and reconfigurable control. Engineers and researchers from academia, industry, and government can gain an inside view of new solutions combining ideas from multiple disciplines in the field of intelligent automation.   Zengqi Sun and Zhidong Deng are professors at the Department of Computer Science, Tsinghua University, China.

  17. 2013 Chinese Intelligent Automation Conference

    CERN Document Server

    Deng, Zhidong

    2013-01-01

    Proceedings of the 2013 Chinese Intelligent Automation Conference presents selected research papers from the CIAC’13, held in Yangzhou, China. The topics include e.g. adaptive control, fuzzy control, neural network based control, knowledge based control, hybrid intelligent control, learning control, evolutionary mechanism based control, multi-sensor integration, failure diagnosis, and reconfigurable control. Engineers and researchers from academia, industry, and government can gain an inside view of new solutions combining ideas from multiple disciplines in the field of intelligent automation. Zengqi Sun and Zhidong Deng are professors at the Department of Computer Science, Tsinghua University, China.

  18. Automated Podcasting System for Universities

    Directory of Open Access Journals (Sweden)

    Ypatios Grigoriadis

    2013-03-01

    Full Text Available This paper presents the results achieved at Graz University of Technology (TU Graz in the field of automating the process of recording and publishing university lectures in a very new way. It outlines cornerstones of the development and integration of an automated recording system such as the lecture hall setup, the recording hardware and software architecture as well as the development of a text-based search for the final product by method of indexing video podcasts. Furthermore, the paper takes a look at didactical aspects, evaluations done in this context and future outlook.

  19. The Impact of Financial Reporting Enforcement and IFRS Adoption on Executive Compensation

    DEFF Research Database (Denmark)

    Banghøj, Jesper; Marton, Jan; Plenborg, Thomas

    This study examines whether both IFRS adoption and the level of financial reporting enforcement impact the contractual usefulness of financial statements, as reflected in payperformance sensitivity. Using a sample of 8,440 executive year observations from 522 firms in 16 European countries we find....... This suggests that the impact of enforcement on pay‐performance sensitivity vanishes after the implementation of IFRS. These results indicate that IFRS dominate enforcement when it comes to the contractual usefulness of financial statements. The findings should be of interest to both enforcement authorities...

  20. 75 FR 36062 - Notice of Enforcement Policy Symposium on Combating Counterfeiting in the 21st Century

    Science.gov (United States)

    2010-06-24

    ... United States Government enforcement policy regarding counterfeit goods involving health and safety... investigation and prosecution of counterfeit goods involving health and safety concerns. A third panel on the...