WorldWideScience

Sample records for automated enforcement

  1. Automated Traffic Enforcement in France

    OpenAIRE

    BRIQUET, Philippe; CANEL, A

    2002-01-01

    One of the goals of traffic safety in cities and between cities is to increase compliance with Traffic Regulations. For this purpose, the French Ministry of Transportation decided to set up an automated traffic enforcement program. This program currently focuses on several types of violations : speeding, spacing between vehicles, and traffic light and railway crossing. This article presents the main goals of the program and the expected challenges and characteristics of operations that have b...

  2. Feasibility study for automating the analytical laboratories of the Chemistry Branch, National Enforcement Investigation Center, Environmental Protection Agency

    International Nuclear Information System (INIS)

    The feasibility of automating the analytical laboratories of the Chemistry Branch of the National Enforcement Investigation Center, Environmental Protection Agency, Denver, Colorado, is explored. The goals of the chemistry laboratory are defined, and instrumental methods and other tasks to be automated are described. Five optional automation systems are proposed to meet these goals and the options are evaluated in terms of cost effectiveness and other specified criteria. The instruments to be automated include (1) a Perkin-Elmer AA spectrophotometer 403, (2) Perkin-Elmer AA spectrophotometer 306, (3) Technicon AutoAnalyzer II, (4) Mettler electronic balance, and a (5) Jarrell-Ash ICP emission spectrometer

  3. Feasibility study for automating the analytical laboratories of the Chemistry Branch, National Enforcement Investigation Center, Environmental Protection Agency

    Energy Technology Data Exchange (ETDEWEB)

    Morris, W.F.; Fisher, E.R.; Barton, G.W. Jr.

    1978-06-01

    The feasibility of automating the analytical laboratories of the Chemistry Branch of the National Enforcement Investigation Center, Environmental Protection Agency, Denver, Colorado, is explored. The goals of the chemistry laboratory are defined, and instrumental methods and other tasks to be automated are described. Five optional automation systems are proposed to meet these goals and the options are evaluated in terms of cost effectiveness and other specified criteria. The instruments to be automated include (1) a Perkin-Elmer AA spectrophotometer 403, (2) Perkin-Elmer AA spectrophotometer 306, (3) Technicon AutoAnalyzer II, (4) Mettler electronic balance, and a (5) Jarrell-Ash ICP emission spectrometer. (WHK)

  4. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  5. Enforcement Information System

    Data.gov (United States)

    Department of Transportation — EIS is an automated management information system that tracks the FAA’s enforcement actions on a nationwide basis. EIS is the FAA’s primary database for tracking...

  6. Enforcement Reports

    Data.gov (United States)

    U.S. Department of Health & Human Services — Whereas not all recalls are announced in the media or on our Recalls press release page, all recalls montiored by FDA are included in FDA's weekly Enforcement...

  7. Law Enforcement Locations

    Data.gov (United States)

    Kansas Data Access and Support Center — Law Enforcement Locations in Kansas Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law enforcement agencies "are...

  8. Enforcement and illegal migration

    OpenAIRE

    Orrenius, Pia

    2014-01-01

    Border enforcement of immigration laws attempts to raise the costs of illegal immigration, while interior enforcement also lowers the benefits. Border and interior enforcement therefore reduce the net benefits of illegal immigration and should lower the probability that an individual will decide to migrate. While some empirical studies find that border and interior enforcement serve as significant deterrents to illegal immigration, immigration enforcement is costly and carries significant uni...

  9. Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Union Slough National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  10. Enforcement and judicial review

    International Nuclear Information System (INIS)

    The 1990 Amendments to the enforcement provisions of the Clean Air Act generally give the Administrator and the courts broader powers to enforce the substantive provisions of the Act. The changes include wider applicability of civil sanctions, increased criminal penalties, broader emergency powers, broader inspection powers, and increased citizen involvement in enforcement and administrative decisionmaking. Another significant change is the addition of an administrative penalty scheme that would allow EPA to use streamlined procedures to assess administrative penalties of up to $200,000 (or more, in some cases). Furthermore, the Amendments extend the prohibition against entering into government contracts with violators to other facilities owned or operated by the convicted person. This chapter summarizes the statutory enforcement provisions of the Clean Air Act. It covers the new civil and criminal enforcement provisions, the new administrative penalty scheme, and the new provisions allowing broader public involvement in enforcement proceedings

  11. Immigration Enforcement and Crime

    OpenAIRE

    Paolo Pinotti

    2015-01-01

    Immigration enforcement has ambiguous implications for the crime rate of undocumented immigrants. On the one hand, expulsions reduce the pool of immigrants at risk of committing crimes, on the other they lower the opportunity cost of crime for those who are not expelled. We estimate the effect of expulsions on the crime rate of undocumented immigrants in Italy exploiting variation in enforcement toward immigrants of different nationality, due to the existence of bilateral agreements for the c...

  12. Selective enforcement of regulation

    Institute of Scientific and Technical Information of China (English)

    Donghua; Chen; Dequan; Jiang; Shangkun; Liang; Fangping; Wang

    2011-01-01

    Regulatory agencies may,whether outside of set rules or within their discretion,depart from the original goals or principles set for enforcing the rules,which we term selective enforcement.Taking China,a country in transition,as an example,and using cases and large-sample tests,we present empirical evidence of selective enforcement.The results show that the China Securities Regulatory Commission(CSRC) takes into account whether companies violating the rules have a state-owned background and the strength of that background when investigating and punishing non-compliance.After controlling for the degree of violation,state-owned-enterprises(SOEs) are punished less severely than private companies;and the higher the hierarchy of the SOE in question,the less severe the punishment.It also takes longer for SOEs to be punished.We also find that companies that violate the rules less seriously have a greater tendency to apply for refinancing than those that violate the rules more seriously.This may be because the severity of the violation can affect listed companies’ expectations of obtaining refinancing.The analysis and conclusions of this study prove useful in understanding the causes and consequences of selective enforcement in transition economies.

  13. Speed enforcement in Norway

    DEFF Research Database (Denmark)

    Elvik, Rune

    2015-01-01

    This paper probes the relationship between changes in the risk of apprehension for speeding in Norway and changes in the amount of speeding. The paper is based on a game-theoretic model of how the rate of violations and the amount of enforcement is determined by the interaction between drivers and...

  14. Risk Analysis Based Business Rule Enforcement for Intelligent Decision Support

    Science.gov (United States)

    Vasilecas, Olegas; Smaizys, Aidas; Brazinskas, Ramunas

    Intelligent information systems are acting by structured rules and do not deal with possible impact on the business environment or future consequences. That is the main reason why automated decisions based on such rules cannot take responsibility and requires involvement or approval of dedicated business people. This limits decision automation possibilities in information systems. However, business rules describe business policy and represent business logics. This can be used in intelligent information systems, together with risk assessment model to simulate real business environment and evaluate possible impact of automated decisions, to support intelligent decision automation. The chapter proposes risk and business rule model integration to provide full intelligent decision automation model used for business rule enforcement and implementation into intelligent software systems of information systems.

  15. Enforcement Program Guidelines : Mingo NWR

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Mingo NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  16. Certification/enforcement analysis

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    Industry compliance with minimum energy efficiency standards will be assured through a two-part program approach of certification and enforcement activities. The technical support document (TSD) presents the analyses upon which the proposed rule for assuring that consumer product comply with applicable energy efficiency standards is based. Much of the TSD is based upon support provided DOE by Vitro Laboratories. The OAO Corporation provided additional support in the development of the sampling plan incorporated in the proposed rule. Vitro's recommended approach to appliance certification and enforcement, developed after consideration of various program options, benefits, and impacts, establishes the C/E program framework, general criteria, and procedures for assuring a specified level of energy efficiency performance of covered consumer products. The results of the OAO analysis are given in Volume II of the TSD.

  17. Public Enforcement of Law

    OpenAIRE

    A. Mitchell Polinsky; Steven Shavell

    2006-01-01

    This entry for the forthcoming The New Palgrave Dictionary of Economics (Second Edition) surveys the economic analysis of public enforcement of law — the use of public agents (inspectors, tax auditors, police, prosecutors) to detect and to sanction violators of legal rules. We first discuss the basic elements of the theory: the probability of imposition of sanctions, the magnitude and form of sanctions (fines, imprisonment), and the rule of liability. We then examine a variety of extensions, ...

  18. Enforcement handbook: Enforcement of DOE nuclear safety requirements

    International Nuclear Information System (INIS)

    This Handbook provides detailed guidance and procedures to implement the General Statement of DOE Enforcement Policy (Enforcement Policy or Policy). A copy of this Enforcement Policy is included for ready reference in Appendix D. The guidance provided in this Handbook is qualified, however, by the admonishment to exercise discretion in determining the proper disposition of each potential enforcement action. As discussed in subsequent chapters, the Enforcement and Investigation Staff will apply a number of factors in assessing each potential enforcement situation. Enforcement sanctions are imposed in accordance with the Enforcement Policy for the purpose of promoting public and worker health and safety in the performance of activities at DOE facilities by DOE contractors (and their subcontractors and suppliers) who are indemnified under the Price-Anderson Amendments Act. These indemnified contractors, and their suppliers and subcontractors, will be referred to in this Handbook collectively as DOE contractors. It should be remembered that the purpose of the Department's enforcement policy is to improve nuclear safety for the workers and the public, and this goal should be the prime consideration in exercising enforcement discretion

  19. Enforcement handbook: Enforcement of DOE nuclear safety requirements

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    This Handbook provides detailed guidance and procedures to implement the General Statement of DOE Enforcement Policy (Enforcement Policy or Policy). A copy of this Enforcement Policy is included for ready reference in Appendix D. The guidance provided in this Handbook is qualified, however, by the admonishment to exercise discretion in determining the proper disposition of each potential enforcement action. As discussed in subsequent chapters, the Enforcement and Investigation Staff will apply a number of factors in assessing each potential enforcement situation. Enforcement sanctions are imposed in accordance with the Enforcement Policy for the purpose of promoting public and worker health and safety in the performance of activities at DOE facilities by DOE contractors (and their subcontractors and suppliers) who are indemnified under the Price-Anderson Amendments Act. These indemnified contractors, and their suppliers and subcontractors, will be referred to in this Handbook collectively as DOE contractors. It should be remembered that the purpose of the Department`s enforcement policy is to improve nuclear safety for the workers and the public, and this goal should be the prime consideration in exercising enforcement discretion.

  20. ENFORCEMENT OF MORTGAGE CONTRACT

    Directory of Open Access Journals (Sweden)

    Alisa A. BELU

    2016-07-01

    Full Text Available A chattel mortgage contract is the expression of a real guarantee that gives the creditor precedence over other creditors, in addition to the general pledge upon the belongings of the debtor. It refers to the sale of mortgaged movable assets, exclusively or prioritized in favor of the mortgaging creditor, in case the debtor does not comply with his / her commitments, under the signed mortgage contract. Beginning from this purpose, shared by both sides (as the chattel mortgage contract is synallagmatic, in case the debtor is unable to fulfill his / her commitments, the sides reach a situation of enforcement of the signed chattel mortgage contract. Given the legal status of the chattel mortgage contract [Art. 2387-2477 Noul Cod Civil , Universul Juridic, Bucureşti, 2016, ISBN 978-606-673-792-0], the principle of binding force of the contract and the principle according to which signed legal conventions will entail legal effects, the Romanian law maker developed the proper legal framework for the enforcement of the chattel mortgage contract. [art. 622 si urm. Noul Cod de Procedură Civilă, ed. Hamangiu, Bucureşti, 2016, ISBN 978-606-27-0459-9].

  1. Trade Expansion and Contract Enforcement

    OpenAIRE

    Avinash Dixit

    2003-01-01

    Consider a world of traders separated in geographic, economic, or social space. Honest trade offers larger gains for more distant traders, but frequencies of meetings, and information flows about cheating, have local bias. Honesty is self-enforcing only between pairs of sufficiently close neighbors. Global honesty prevails only in a sufficiently small world. The extent of self-enforcing honesty is likely to decrease when the world expands beyond this size. Costly external enforcement is usefu...

  2. Immigration Enforcement Actions - Annual Report

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  3. Stable and Enforceable

    DEFF Research Database (Denmark)

    Hallett, Andrew Hughes; Hougaard Jensen, Svend E.

    2011-01-01

    reappearing, and to prevent monetary policy from being undermined by undisciplined governments, there is a need for a framework capable of imposing fiscal discipline. This paper considers an intertemporal assignment, where fiscal policy focuses on long-term objectives and monetary policy on short-term......Since the great financial crash, the need for new fiscal rules to prevent unsustainable fiscal policies is universally recognised. In practice such rules, including those in the Stability and Growth Pact, have proved to be impossible to enforce. Thus, to avoid unsustainable fiscal policies...... which the debt targeting regime should operate. Making these factors explicit would both improve the credibility of planned fiscal policies and reduce risk premia on borrowing costs. We finally show how Europe’s competitiveness pact, and debt restructuring operations, can be used to maximise the...

  4. Home Automation

    OpenAIRE

    Ahmed, Zeeshan

    2010-01-01

    In this paper I briefly discuss the importance of home automation system. Going in to the details I briefly present a real time designed and implemented software and hardware oriented house automation research project, capable of automating house's electricity and providing a security system to detect the presence of unexpected behavior.

  5. Oversight and enforcement at DOE

    International Nuclear Information System (INIS)

    This paper addresses recent changes to the independent oversight and enforcement programs within the U.S. Department of Energy (DOE) and applications to criticality safety. DOE's Office of Oversight (Oversight hereafter), in the Office of Environment, Safety, and Health (EH), independently evaluates whether management systems ensure adequate protection of the worker, public, and environment. Oversight has adopted a new approach to performing evaluations based on the guiding principles for safety management identified by the Secretary of Energy. The principles Oversight evaluates are line management responsibility for safety and health, comprehensive requirements, and competence commensurate with responsibilities. Recently, the DOE codified the implementation of integrated safety management, further expounding on these basic guiding principles and Oversight's role. The Office of Enforcement and Investigations in EH (Enforcement hereafter) is responsible for enforcement, and relevant documents describe its role. This paper briefly discusses criticality safety aspects of the twin initiatives of Oversight and Enforcement

  6. HSIP Law Enforcement Locations in New Mexico

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — Law Enforcement Locations Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law Enforcement agencies "are publicly...

  7. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. Also included are a number of enforcement actions that had been previously resolved but not published in this NUREG. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  8. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1990) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. Also included are a number of enforcement actions that had been previously resolved but not published in this NUREG. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  9. Game animals & hunting : Law enforcement

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This is a summary of hunting activities, game mammal surveys, and law enforcement on Neal Smith National Wildlife Refuge between 1992 and 2009. For each year, a...

  10. Hydrologic enforcement of lidar DEMs

    Science.gov (United States)

    Poppenga, Sandra K.; Worstell, Bruce B.; Danielson, Jeffrey J.; Brock, John C.; Evans, Gayla A.; Heidemann, H. Karl

    2014-01-01

    Hydrologic-enforcement (hydro-enforcement) of light detection and ranging (lidar)-derived digital elevation models (DEMs) modifies the elevations of artificial impediments (such as road fills or railroad grades) to simulate how man-made drainage structures such as culverts or bridges allow continuous downslope flow. Lidar-derived DEMs contain an extremely high level of topographic detail; thus, hydro-enforced lidar-derived DEMs are essential to the U.S. Geological Survey (USGS) for complex modeling of riverine flow. The USGS Coastal and Marine Geology Program (CMGP) is integrating hydro-enforced lidar-derived DEMs (land elevation) and lidar-derived bathymetry (water depth) to enhance storm surge modeling in vulnerable coastal zones.

  11. Defensive Disclosure under Antitrust Enforcement

    OpenAIRE

    Bhaskarabhatla, Ajay; Pennings, Enrico

    2012-01-01

    textabstractWe formulate a simple model of optimal defensive disclosure by a monopolist facing uncertain antitrust enforcement and test its implications using unique data on defensive disclosures and patents by IBM during 1955-1989. Our results indicate that stronger antitrust enforcement leads to more defensive disclosure, that quality inventions are disclosed defensively, and that defensive disclosure served as an alternative but less successful mechanism to patenting at IBM in appropriatin...

  12. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October - December 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  13. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July - September 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  14. Financial Private Regulation and Enforcement

    OpenAIRE

    Miller, Geoffrey

    2011-01-01

    This paper has been delivered within the context of the research project "Transnational Private Regulatory Regimes: Constitutional foundations and governance design". This paper considers the topic of private regulation and enforcement for internationally active financial services firms. The paper documents the following types of regulation and enforcement that involve significant private input: house rules, contracts, internal compliance, management-based regulation, private standard-sett...

  15. Defensive Disclosure under Antitrust Enforcement

    OpenAIRE

    Bhaskarabhatla, Ajay; Pennings, Enrico

    2012-01-01

    We formulate a simple model of optimal defensive disclosure by a dominant firm facing uncertain antitrust enforcement and test its implications using unique data on defensive disclosures and patents by IBM. Our results indicate that stronger antitrust enforcement leads to more defensive disclosure, that quality inventions are also disclosed defensively, and that defensive disclosure served as an alternative, but less successful, mechanism to patenting at IBM in appropriating returns from R&D....

  16. Library Automation

    OpenAIRE

    Dhakne, B. N.; Giri, V. V; Waghmode, S. S.

    2010-01-01

    New technologies library provides several new materials, media and mode of storing and communicating the information. Library Automation reduces the drudgery of repeated manual efforts in library routine. By use of library automation collection, Storage, Administration, Processing, Preservation and communication etc.

  17. 29 CFR 42.6 - Enforcement strategy.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Enforcement strategy. 42.6 Section 42.6 Labor Office of the Secretary of Labor COORDINATED ENFORCEMENT § 42.6 Enforcement strategy. (a) Each Regional Farm Labor... enforcement strategy for each protective statute pursuant to § 42.20(c)(3). The National Committee...

  18. Process automation

    International Nuclear Information System (INIS)

    Process automation technology has been pursued in the chemical processing industries and to a very limited extent in nuclear fuel reprocessing. Its effective use has been restricted in the past by the lack of diverse and reliable process instrumentation and the unavailability of sophisticated software designed for process control. The Integrated Equipment Test (IET) facility was developed by the Consolidated Fuel Reprocessing Program (CFRP) in part to demonstrate new concepts for control of advanced nuclear fuel reprocessing plants. A demonstration of fuel reprocessing equipment automation using advanced instrumentation and a modern, microprocessor-based control system is nearing completion in the facility. This facility provides for the synergistic testing of all chemical process features of a prototypical fuel reprocessing plant that can be attained with unirradiated uranium-bearing feed materials. The unique equipment and mission of the IET facility make it an ideal test bed for automation studies. This effort will provide for the demonstration of the plant automation concept and for the development of techniques for similar applications in a full-scale plant. A set of preliminary recommendations for implementing process automation has been compiled. Some of these concepts are not generally recognized or accepted. The automation work now under way in the IET facility should be useful to others in helping avoid costly mistakes because of the underutilization or misapplication of process automation. 6 figs

  19. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1990) and includes copies of letters, notices, and orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  20. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  1. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  2. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1990) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  3. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  4. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April-June 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  5. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  6. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  7. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  8. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1990) and includes copies of letters, notices, and orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  9. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  10. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  11. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  12. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  13. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  14. Automating Spreadsheet Discovery & Risk Assessment

    CERN Document Server

    Perry, Eric

    2008-01-01

    There have been many articles and mishaps published about the risks of uncontrolled spreadsheets in today's business environment, including non-compliance, operational risk, errors, and fraud all leading to significant loss events. Spreadsheets fall into the realm of end user developed applications and are often absent the proper safeguards and controls an IT organization would enforce for enterprise applications. There is also an overall lack of software programming discipline enforced in how spreadsheets are developed. However, before an organization can apply proper controls and discipline to critical spreadsheets, an accurate and living inventory of spreadsheets across the enterprise must be created, and all critical spreadsheets must be identified. As such, this paper proposes an automated approach to the initial stages of the spreadsheet management lifecycle - discovery, inventory and risk assessment. Without the use of technology, these phases are often treated as a one-off project. By leveraging techn...

  15. Optimal enforcement of competition law

    NARCIS (Netherlands)

    Motchenkova, E.

    2005-01-01

    Despite the recent theoretical developments in the field of antitrust law enforcement, much still needs to be done in order to prevent collusion and price-fixing in the major indiustries. Although penalties were recently increased considerably and new instruments of cartel deterrence such as lenienc

  16. Quota enforcement in resource industries

    DEFF Research Database (Denmark)

    Hansen, Lars Gårn; Jensen, Frank; Nøstbakken, Linda

    2014-01-01

    Quotas are frequently used in the management of renewable resources and emissions. However, in many industries there is concern about their basic effectiveness due to non-compliance. We develop an enforcement model of a quota-regulated resource and focus on a situation with significant non...

  17. Quota enforcement in resource industries

    DEFF Research Database (Denmark)

    Hansen, Lars Gårn; Jensen, Frank; Nøstbakken, Linda

    Quotas or permits are frequently used in the management of renewable resources and emissions. However, in many industries there is concern about the basic e ectiveness of quotas due to non-compliance. We develop an enforcement model of a quota-regulated resource and focus on a situation with signi...

  18. Police enforcement and driving speed.

    NARCIS (Netherlands)

    2008-01-01

    Speed limits are violated frequently in the Netherlands. As speed is an important factor in road crashes, the surveillance of driving speeds is one of the spearheads in the policy plans of the Dutch police. Different methods of speed enforcement have proved to be effective in reducing speed and cras

  19. Law Enforcement Plan : Ottawa National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Ottawa NWR Complex Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about...

  20. Law Enforcement Plan : Agassiz National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Agassiz Law Enforcement Plan clarifies Fish and Wildlife enforcement policies as they apply to Agassiz Refuge. It provides information about problems,...

  1. Law Enforcement Plan : Tamarac National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Tamarac NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  2. Law Enforcement Plan: Sherburne National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Sherburne NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  3. Law Enforcement Plan: Horicon National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Horicon NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  4. Chautauqua National Wildlife Refuge : Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Chautauqua National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  5. Law Enforcement Plan : Necedah National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Necedah NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  6. Enforcement of Labor Regulation and Firm Size

    OpenAIRE

    De Almeida, Rita; Carneiro, Pedro

    2009-01-01

    This paper investigates how the enforcement of labor regulation affects firm size and other firm characteristics in Brazil. We explore firm level data on employment, capital, and output, city level data on economic characteristics, and new administrative data measuring enforcement of regulation at the city level. Since enforcement may be endogenous, we instrument this variable with the distance between the city where the firm is located and surrounding enforcement offices, while controlling f...

  7. 76 FR 48919 - NRC Enforcement Policy

    Science.gov (United States)

    2011-08-09

    ...), approved a major revision to its Enforcement Policy. The NRC published a notice (75 FR 60485) announcing an... COMMISSION NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Solicitation of comments on... Commission paper that will include recommended revisions to the NRC Enforcement Policy. As such, this...

  8. 20 CFR 655.50 - Enforcement process.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Enforcement process. 655.50 Section 655.50... FOREIGN WORKERS IN THE UNITED STATES Labor Certification Process and Enforcement of Attestations for... Workers) § 655.50 Enforcement process. (a) Authority of the WHD Administrator. The WHD Administrator...

  9. 45 CFR 1608.8 - Enforcement.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Enforcement. 1608.8 Section 1608.8 Public Welfare Regulations Relating to Public Welfare (Continued) LEGAL SERVICES CORPORATION PROHIBITED POLITICAL ACTIVITIES § 1608.8 Enforcement. This part shall be enforced according to the procedures set forth in §...

  10. CONSIDERATIONS REGARDING THE SUSPENSION OF THE ENFORCEMENT

    Directory of Open Access Journals (Sweden)

    Nicolae-Horia ŢIŢ

    2016-05-01

    Full Text Available The enforcement procedure is conducted from the time the enforcement body is seized by the enforcement officer, in order to comply with the provisions of the enforcement order, until the completion of the claim, with its accessoriesthereto, and the recovery of the costs of enforcement. The procedure involves a succession of acts, carried mostly by the enforcement officer. The continuity of the procedure may be affected by certain incidents leading to his timing. Among them, the situations ofenforcement suspension are generally determined by reference to their causes, respectively to the provisions of the law (in relation to specific acts or legal facts that occurred during the enforcement, the will of the creditor or the disposal of the court, at the request of the interested party. The analysis of the causes of suspension is important, in order to establish how they operate in concrete, as well for determining the effects that they produce.

  11. Taser as an Enforcement Tool

    OpenAIRE

    Árni Sigurgeirsson

    2009-01-01

    The enforcement tool Taser is used by police officers in United States, United Kingdom, France and Canada. The Icelandic Police Union has approved a request for police officers to carry and use Taser when they are on duty. Increasing violence against police officers is the main reason behind the request but according to the National Commissioner of the Police Assistant, Mrs. Sigríður Björk Guðjónsdóttir, police work is becoming more hostile for officers. The request has been taken under c...

  12. Enforcement as a Fundamental Right

    OpenAIRE

    Kinsch, Patrick

    2014-01-01

    There is, under the case law of the European Court of Human Rights, a right to the enforcement of judgments obtained abroad. The nature of that right can be substantive and founded on the right to recognition of the underlying situation. It can also be procedural and derive from the fair trial guarantee of Article 6 of the Convention which includes a right to the effectiveness of judgments rendered by ‘any court,’ a concept considered – without, in the author’s opinion, a cogent justificati...

  13. Automation Security

    OpenAIRE

    Mirzoev, Dr. Timur

    2014-01-01

    Web-based Automated Process Control systems are a new type of applications that use the Internet to control industrial processes with the access to the real-time data. Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation s critical infrastructu...

  14. Environmental enforcement in the UK.

    Science.gov (United States)

    Stott, David

    2009-03-01

    In the UK, the Environment Agency is responsible for enforcement of environmental legislation and offences committed under such laws and regulations. Under the current regime, if deemed serious enough, offenders are taken to court. In the past eight years, there have been approximately 1600 cases (including approximately 800 prosecutions) per year with 61% being for illegal disposal of wastes and a further 26% being for water pollution incidents. The level of fine has been relatively small at around pound sterling 6700 per conviction for water offences and pound sterling 3700 for waste offences. This is possibly due to a lack of awareness of the damage caused in environmental offending by the courts. New legislation in the form of the Regulatory Enforcement and Sanctions Act 2008 is likely to change the way offences are assessed and treated by the Agency and a proportion of cases will be dealt with by the Agency itself, with appeals being handled by a Tribunal and only the most serious cases going to the criminal courts. The efficacy of this approach has yet to be tested in the UK but may speed up the process and lead to more appropriate sanctions being levied. PMID:19280025

  15. An economic view on environmental law enforcement..

    OpenAIRE

    Blondiau, Thomas

    2013-01-01

    In this PhD thesis, we study the enforcement of environmental law using an economic perspective. Environmental law enforcement is an important topic for two reasons. Firstly, regulatory initiatives are important drivers for demand for environmental goods and services, for producing in a more environmentally-friendly way and for internalizing possible external costsof economic activities. Thus, enforcement of environmental regulation is a tool for going to a more sustainable economy. Secondly,...

  16. Automated document analysis system

    Science.gov (United States)

    Black, Jeffrey D.; Dietzel, Robert; Hartnett, David

    2002-08-01

    A software application has been developed to aid law enforcement and government intelligence gathering organizations in the translation and analysis of foreign language documents with potential intelligence content. The Automated Document Analysis System (ADAS) provides the capability to search (data or text mine) documents in English and the most commonly encountered foreign languages, including Arabic. Hardcopy documents are scanned by a high-speed scanner and are optical character recognized (OCR). Documents obtained in an electronic format bypass the OCR and are copied directly to a working directory. For translation and analysis, the script and the language of the documents are first determined. If the document is not in English, the document is machine translated to English. The documents are searched for keywords and key features in either the native language or translated English. The user can quickly review the document to determine if it has any intelligence content and whether detailed, verbatim human translation is required. The documents and document content are cataloged for potential future analysis. The system allows non-linguists to evaluate foreign language documents and allows for the quick analysis of a large quantity of documents. All document processing can be performed manually or automatically on a single document or a batch of documents.

  17. Immigration Enforcement Actions: Fiscal Year 2011

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  18. Immigration Enforcement Actions: Fiscal Year 2010

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  19. Immigration Enforcement Actions: Fiscal Year 2009

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  20. Immigration Enforcement Actions: Fiscal Year 2007

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  1. Immigration Enforcement Actions: Fiscal Year 2012

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  2. Immigration Enforcement Actions: Fiscal Year 2004

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  3. Immigration Enforcement Actions: Fiscal Year 2006

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  4. Immigration Enforcement Actions: Fiscal Year 2008

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  5. Immigration Enforcement Actions: Fiscal Year 2005

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  6. 19 CFR 12.104i - Enforcement.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Enforcement. 12.104i Section 12.104i Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY SPECIAL CLASSES OF MERCHANDISE Cultural Property § 12.104i Enforcement. In the customs territory of...

  7. 78 FR 69133 - Drug Enforcement Administration

    Science.gov (United States)

    2013-11-18

    ... Enforcement Administration Manufacturer of Controlled Substances; Notice of Registration; Lin Zhi International, Inc. By Notice dated May 14, 2013, and published in the Federal Register on May 22, 2013, 78 FR... renewal to the Drug Enforcement Administration (DEA) to be registered as a bulk manufacturer of...

  8. 76 FR 76192 - NRC Enforcement Policy

    Science.gov (United States)

    2011-12-06

    ..., 2010 (75 FR 60485), revisions to the Policy. The intent of this request for comment is to assist the... the Federal Register on August 9, 2011 (76 FR 48919), and September 6, 2011 (76 FR 54986). It was the... COMMISSION NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Proposed enforcement...

  9. 17 CFR 8.05 - Enforcement staff.

    Science.gov (United States)

    2010-04-01

    ... staff shall consist of employees of the exchange and/or persons hired on a contract basis. It may not... within its disciplinary jurisdiction, regardless of whether its enforcement staff consists of employees... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Enforcement staff....

  10. 50 CFR 17.107 - Facilitating enforcement.

    Science.gov (United States)

    2010-10-01

    ... Protection Areas § 17.107 Facilitating enforcement. Water vehicles operating in manatee sanctuary or refuge... 50 Wildlife and Fisheries 5 2010-10-01 2010-10-01 true Facilitating enforcement. 17.107 Section 17.107 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE...

  11. The false enforcement of unpopular norms.

    Science.gov (United States)

    Willer, Robb; Kuwabara, Ko; Macy, Michael W

    2009-09-01

    Prevailing theory assumes that people enforce norms in order to pressure others to act in ways that they approve. Yet there are numerous examples of "unpopular norms" in which people compel each other to do things that they privately disapprove. While peer sanctioning suggests a ready explanation for why people conform to unpopular norms, it is harder to understand why they would enforce a norm they privately oppose. The authors argue that people enforce unpopular norms to show that they have complied out of genuine conviction and not because of social pressure. They use laboratory experiments to demonstrate this "false enforcement" in the context of a wine tasting and an academic text evaluation. Both studies find that participants who conformed to a norm due to social pressure then falsely enforced the norm by publicly criticizing a lone deviant. A third study shows that enforcement of a norm effectively signals the enforcer's genuine support for the norm. These results demonstrate the potential for a vicious cycle in which perceived pressures to conform to and falsely enforce an unpopular norm reinforce one another. PMID:20614762

  12. 7 CFR 1145.3 - Enforcement.

    Science.gov (United States)

    2010-01-01

    ... Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Milk), DEPARTMENT OF AGRICULTURE DAIRY FORWARD PRICING PROGRAM Enforcement § 1145.3 Enforcement. A handler may not require participation in a forward pricing contract as a condition of...

  13. Assessment of the NRC Enforcement Program

    International Nuclear Information System (INIS)

    On May 12, 1994, the Executive Director for Operations (EDO) established a Review Team composed of senior NRC managers to re-examine the NRC enforcement program. A copy of the Review Team's charter is enclosed as Appendix A. This report presents the Team's assessment. The purpose of this review effort are: (1) to perform an assessment of the NRC's enforcement program to determine whether the defined purposes of the enforcement program are appropriate; (2) to determine whether the NRC's enforcement practices and procedures for issuing enforcement actions are consistent with those purposes; and (3) to provide recommendations on any changes the Review Team believes advisable. In accordance with its charter, the Review Team considered the following principal issues in conducting its assessment of the enforcement program: the balance between providing deterrence and incentives (both positive and negative) for the identification and correction of violations; the appropriateness of NRC sanctions; whether the commission should seek statutory authority to increase the amount of civil penalties; whether the NRC should use different enforcement policies and practices for different licensees (e.g., materials licensees in contrast to power reactors or large fuel facilities); and whether the commission should establish open enforcement conferences as the normal practice

  14. Automated Budget System

    Data.gov (United States)

    Department of Transportation — The Automated Budget System (ABS) automates management and planning of the Mike Monroney Aeronautical Center (MMAC) budget by providing enhanced capability to plan,...

  15. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    International Nuclear Information System (INIS)

    This document includes the US Nuclear Regulatory Commission's (NRC's or Commission's) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC's policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees' health and safety, the common defense and security, and the environment

  16. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    This document includes the US Nuclear Regulatory Commission`s (NRC`s or Commission`s) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC`s policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees` health and safety, the common defense and security, and the environment.

  17. Modelling and enforcing privacy for medical data disclosure across Europe.

    Science.gov (United States)

    Boussi Rahmouni, Hanene; Solomonides, Tony; Casassa Mont, Marco; Shiu, Simon

    2009-01-01

    The harmonization of data protection legislation in Europe has been theoretically achieved by means of the EU directive on data protection. In practice the harmonization is not absolute and conflicts and inconsistencies continue to exist in the way Member States are implementing the directive. The integration of different European medical systems by means of grid technologies will continue to be challenging if technology does not intervene to enhance interoperability between national regulatory frameworks on data protection. In this paper we present an approach to automate privacy requirements for the sharing of patient data across Europe on a healthgrid domain and ensure its enforcement internally and within external domains where the data might travel. This approach is based on the semantic modelling of privacy obligations that are of legal, ethical or cultural nature. These requirements are for the sharing of personal data between different European Member States. Our model reflects both similarities and conflicts, if any, between the different Member States. This allows us to reason on the safeguards a data controller should ask from an organization belonging to another Member State before disclosing medical data to them. The system will also generate the relevant set of policies to be enforced at the process level of the grid to ensure privacy compliance before allowing access to the data. PMID:19745400

  18. Recent Trends in Antitrust Enforcement

    Directory of Open Access Journals (Sweden)

    Mario Siragusa

    2015-10-01

    Full Text Available This article intends to discuss a selection of the most relevant features of the most recent trends in antitrust enforcement. Firstly, anticompetitive signalling will be addressed: its assessment depends on the kind of information provided. Where such information is of public knowledge or is very well known by the market participants, signalling should not be deemed as anticompetitive. Secondly, the Power Cable case has raised for the first time various problematic issues, such as the possibility to impose parental liability on a purely financial investor, even where the presumed direct infringer would have been able to pay the fine. This appears to be irreconcilable with the objectives for which the case law on parental liability has been elaborated. Thirdly, as to the concept of restriction of competition by object, it is argued that the Intel case does not disavow the principles established in Cartes Bancaires. Indeed, the finding of a violation and the different methodology applied in the first case are only due to its specific factual circumstances. Finally, the nouvelle vague of the case law on the anticompetitive abuse of rights has led to two opposite approaches, one at the EU and the other at the Italian level. The first one, based on the finding of objective circumstances, is perfectly consistent with existing EU case law, while the second, exclusively focused on the exclusionary intent, seems to be in sharp contrast with it. The hope is that the Court of Justice will intervene to resolve this contradiction.

  19. A law enforcement perspective of electricity deregulation

    International Nuclear Information System (INIS)

    In April 2004, the California Attorney General's (AG) office issued a white paper that provided a 'law enforcement perspective of the California energy crisis.' To complete this special issue's coverage, I summarize three aspects of that paper: notably, the deficiencies in market oversight and enforcement that left the deregulated market prone to potential abuse, the principal modus operandi that some market agents used to exploit those deficiencies without fear of retribution, and the AG's 'recommendations for improving enforcement and protecting consumers in deregulated energy markets.'. (author)

  20. Manufacturing and automation

    OpenAIRE

    Ernesto Córdoba Nieto

    2010-01-01

    The article presents concepts and definitions from different sources concerning automation. The work approaches automation by virtue of the author’s experience in manufacturing production; why and how automation prolects are embarked upon is considered. Technological reflection regarding the progressive advances or stages of automation in the production area is stressed. Coriat and Freyssenet’s thoughts about and approaches to the problem of automation and its current state are taken and e...

  1. Refuge Law Enforcement : Memorandum of Understanding

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This agreement, a reciprocal law enforcement and assistance agreement, is made between the U.S. Fish and Wildlife Service and the County Sheriffs Department. The...

  2. Law Enforcement : St. Vincent National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of the Law Enforcement Management Plan is to provide a ready reference to Service, Regional, and Station policies, procedures, and programs concerning...

  3. Enforcement and Compliance History Online (ECHO) Facilities

    Data.gov (United States)

    U.S. Environmental Protection Agency — ECHO provides integrated compliance and enforcement information for about 800,000 regulated facilities nationwide. Its features range from simple to advanced,...

  4. Enforcement and Compliance History Online (ECHO) Widget

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Enforcement and Compliance History Online (ECHO) widget displays the compliance records of larger facilities within a user-specified area of interest as...

  5. DNR Division of Enforcement Officer Patrol Areas

    Data.gov (United States)

    Minnesota Department of Natural Resources — This theme shows the DNR Division of Enforcement Office Patrol Areas as of January 1, 2003. Patrol areas were defined and verified by Patrol Officers during the...

  6. 18 CFR 382.104 - Enforcement.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Enforcement. 382.104 Section 382.104 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT... action permitted by law....

  7. Enforcing accounts receivable through public auctions

    OpenAIRE

    Kinkor, Jiří

    2012-01-01

    This Bachelor's thesis focuses on the legal ways of enforcing accounts receivable in public auctions within the Czech law. An important part of the thesis is dedicated to a description of accounts receivable formation process and the ways of debt securing. The crucial part refers to the legal framework identification and comparison of the receivables enforcement under obcansky soudni rad and zakon o verejenych drazbach. The entire process of the public auction from the auction proposal to the...

  8. Defensive Enforcement: Human Rights in Indonesia

    OpenAIRE

    Hadiprayitno, I.

    2010-01-01

    The objective of the article is to examine the human rights enforcement in Indonesian legal and political system. This is done by studying the legal basis of human rights, the process of proliferation of human rights discourse, and the actual controversies of human rights enforcement. The study has the effect of highlighting some of the immense deficits in ensuring that violations are treated under judicial procedure and the protection of human rights is available and accessible for victims. ...

  9. Enforcing Tax Compliance: To Punish or Persuade?

    OpenAIRE

    2008-01-01

    A long standing debate has existed between those who believe deterrence-based enforcement strategies work for gaining compliance from offenders and those who believe gentle persuasion and cooperation is more effective. This article is concerned with the issue of how to best deal with offenders so as to increase support for the law and lower the rate of subsequent re-offending. Using survey data from 652 taxpayers who have been through an enforcement experience with the Australian Taxation Off...

  10. Citizen enforcement and the smoking gun

    International Nuclear Information System (INIS)

    This article addresses the provisions for private citizens to bring lawsuits in federal court against regulated parties violating federal air pollution-control laws and the steps that operators of facilities subject to air pollution-control laws need to take to help avoid significant enforcement liabilities. The topics of the article include a look at citizen enforcement since 1970, the 1990 amendments to the Clean Air Act, construction and management with these regulations

  11. Bankruptcy Risk and Imperfectly Enforced Emissions Taxes

    OpenAIRE

    John K. Stranlund; Wei Zhang

    2008-01-01

    Under favorable but reasonable conditions, an imperfectly enforced emissions tax produces the efficient allocation of individual emissions control; aggregate emissions are independent of whether enforcement of the tax is sufficient to induce the full compliance of firms, and differences in individual violations are independent of firm-level differences. All of these desirable characteristics disappear when some firms under an emissions tax risk bankruptcy—the allocation of emissions control i...

  12. Flow enforcement algorithms for ATM networks

    DEFF Research Database (Denmark)

    Dittmann, Lars; Jacobsen, Søren B.; Moth, Klaus

    1991-01-01

    Four measurement algorithms for flow enforcement in asynchronous transfer mode (ATM) networks are presented. The algorithms are the leaky bucket, the rectangular sliding window, the triangular sliding window, and the exponentially weighted moving average. A comparison, based partly on teletraffic....... Implementations are proposed on the block diagram level, and dimensioning examples are carried out when flow enforcing a renewal-type connection using the four algorithms. The corresponding hardware demands are estimated aid compared...

  13. Illegal Immigration: Optimal Enforcement and Capital Mobility

    OpenAIRE

    Subhayu Bandyopadhyay

    2005-01-01

    This paper analyzes the effectiveness of enforcement in controlling illegal immigration in two scenarios, capital mobility and capital immobility in the host nation (for illegal immigrants). The source nation is assumed throughout to have immobility of capital. We show that the net enforcement expenditure is higher (lower) in the presence of capital mobility if the host nation is an importer (exporter) of capital at the target immigration level. Furthermore, we show that if the host nation is...

  14. Strengthened enforcement enhances marine sanctuary performance

    Directory of Open Access Journals (Sweden)

    Brendan P. Kelaher

    2015-01-01

    Full Text Available Marine sanctuaries are areas where the extraction of biota is not permitted. Although most marine sanctuaries have a positive influence on biotic communities, not all sanctuaries are meeting their conservation objectives. Amidst possible explanations (e.g., size, age and isolation, insufficient enforcement is often speculated to be a key driver of marine sanctuary underperformance. Despite this, there are few studies directly linking quantitative enforcement data to changes in biotic communities within marine sanctuaries. Here, we used an asymmetrical-BACI experimental design from 2006–2012 to test whether new enforcement initiatives enhanced abundances of target fishes and threatened species in an existing large sub-tropical marine sanctuary relative to areas open to fishing. Implementation of the new enforcement initiatives in 2010 was associated with a 201% increase in annual fine rate and a significant increase in target fish and elasmobranch abundance, as well as sightings of a critically-endangered shark, in the marine sanctuary relative to areas open to fishing. Overall, these results demonstrate that strengthening enforcement can have a rapid positive influence on target fish and perhaps threatened species in a subtropical marine sanctuary. From this, we contend that increased enforcement guided by risk-based compliance planning and operations may be a useful first step for improving underperforming marine sanctuaries.

  15. Operational outcomes of the SECURES urban gunshot detection technology for law enforcement crime intervention strategies and force protection

    Science.gov (United States)

    Litch, Michael; Calhoon, Mark; Scharf, Peter; Velea, Doru; Bradley, George

    2006-05-01

    Planning Systems Incorporated (PSI) has been working with the National Institute of Justice, Center for Society Law and Justice (CSLJ) at the University of New Orleans, and law enforcement agencies in five highly varied United States locations to evaluate the use of an automated, wireless acoustic gun fire detection and localization system. Multiple SECURES(r) systems have been deployed and are in operation around the county. The most recent SECURES(r) implementation has been with the Newport News VA Police Department (NNPD) and East Orange NJ Police Department (EOPD). This paper will discuss successes and specific examples of its use by law enforcement to solve crimes and reduce community gunfire.

  16. Manufacturing and automation

    Directory of Open Access Journals (Sweden)

    Ernesto Córdoba Nieto

    2010-04-01

    Full Text Available The article presents concepts and definitions from different sources concerning automation. The work approaches automation by virtue of the author’s experience in manufacturing production; why and how automation prolects are embarked upon is considered. Technological reflection regarding the progressive advances or stages of automation in the production area is stressed. Coriat and Freyssenet’s thoughts about and approaches to the problem of automation and its current state are taken and examined, especially that referring to the problem’s relationship with reconciling the level of automation with the flexibility and productivity demanded by competitive, worldwide manufacturing.

  17. Enforcement Matters : Enforcement and Compliance of European Directives in Four Member States

    NARCIS (Netherlands)

    Versluis, E.

    2003-01-01

    The dissertation 'Enforcement Matters' is a comparative analysis of the transposition and enforcement of, and compliance with, two directives regulating dangerous chemical substances (the Seveso II and Safety Data Sheets directives) in four member states (the Netherlands, Germany, United Kingdom and

  18. Three Essays on the Enforcement of Accounting Standards in Germany

    OpenAIRE

    Strohmenger, Manuel

    2014-01-01

    The dissertation at hand focuses on the enforcement of accounting standards in Germany. The legal basis of the external enforcement of accounting standards in Germany was created by the „Bilanzkontrollgesetz” (Financial Reporting Enforcement Act) at the end of 2004. An enforcement mechanism was installed to enforce accounting standard compliance by regular reviews of disclosed financial statements. The system was established as implementation of EU guidelines. Since 2005, International Financ...

  19. Human Trafficking in Indonesia: Law Enforcement Problems

    Directory of Open Access Journals (Sweden)

    Nathalina Naibaho

    2011-01-01

    Full Text Available Human trafficking is considered as a crime against humanity. To conduct the due process of law towards cases related with human trafficking, the law enforcement officers cannot work by themselves. They really need assistance from many parties – such as active report from the society – as a valuable information to disclose such cases. Law enforcement conducted towards woman and child trafficking is still ineffective. It is proven by many existing cases, that low number of processed cases before the court and minimum sanction convicted to the perpetrators is clearly evident. Factors which are deemed to have correlation with low attempt of law enforcement towards legal case on this case, among others are: Lack of the Government’s commitment to fight against the crime of human trafficking, in the event that the ineffectiveness in utilization of prevailing laws and regulation; Lack of capacity of professionalism of law enforcement agency (and relevant parties in handling women and child trafficking at the field. This may be caused by lack of knowledge on infringed regulation. For that matter, those law enforcement agency shall be given socialization and an SOP (standardized operational procedure, so that there will be no inconsistency in handling the existing cases.

  20. Hunting, law enforcement, and African primate conservation.

    Science.gov (United States)

    N'Goran, Paul K; Boesch, Christophe; Mundry, Roger; N'Goran, Eliezer K; Herbinger, Ilka; Yapi, Fabrice A; Kühl, Hjalmar S

    2012-06-01

    Primates are regularly hunted for bushmeat in tropical forests, and systematic ecological monitoring can help determine the effect hunting has on these and other hunted species. Monitoring can also be used to inform law enforcement and managers of where hunting is concentrated. We evaluated the effects of law enforcement informed by monitoring data on density and spatial distribution of 8 monkey species in Taï National Park, Côte d'Ivoire. We conducted intensive surveys of monkeys and looked for signs of human activity throughout the park. We also gathered information on the activities of law-enforcement personnel related to hunting and evaluated the relative effects of hunting, forest cover and proximity to rivers, and conservation effort on primate distribution and density. The effects of hunting on monkeys varied among species. Red colobus monkeys (Procolobus badius) were most affected and Campbell's monkeys (Cercopithecus campbelli) were least affected by hunting. Density of monkeys irrespective of species was up to 100 times higher near a research station and tourism site in the southwestern section of the park, where there is little hunting, than in the southeastern part of the park. The results of our monitoring guided law-enforcement patrols toward zones with the most hunting activity. Such systematic coordination of ecological monitoring and law enforcement may be applicable at other sites. PMID:22394275

  1. An automated swimming respirometer

    DEFF Research Database (Denmark)

    STEFFENSEN, JF; JOHANSEN, K; BUSHNELL, PG

    1984-01-01

    An automated respirometer is described that can be used for computerized respirometry of trout and sharks.......An automated respirometer is described that can be used for computerized respirometry of trout and sharks....

  2. Configuration Management Automation (CMA)

    Data.gov (United States)

    Department of Transportation — Configuration Management Automation (CMA) will provide an automated, integrated enterprise solution to support CM of FAA NAS and Non-NAS assets and investments. CMA...

  3. Workflow automation architecture standard

    Energy Technology Data Exchange (ETDEWEB)

    Moshofsky, R.P.; Rohen, W.T. [Boeing Computer Services Co., Richland, WA (United States)

    1994-11-14

    This document presents an architectural standard for application of workflow automation technology. The standard includes a functional architecture, process for developing an automated workflow system for a work group, functional and collateral specifications for workflow automation, and results of a proof of concept prototype.

  4. Law Enforcement of Cyber Terorism in Indonesia

    Directory of Open Access Journals (Sweden)

    Sri Ayu Astuti

    2015-12-01

    Full Text Available Cyber terrorism is one of the category of crimes that cross border organized and has been established as an extraordinary crime. This crime is becoming a serious threat to countries in the world. In this regard, the Government's attitude of firmness needed to enforce cyber laws against the freedom development in social media. The development of the immeasurable it in the country of Indonesia required the limitations by doing legal liability over the behavior of law which deviates towards the use of technology tools. Strict law enforcement efforts as a clear attitude to stop actively moving massive terrorism, by enacting the provisions of the law on information and electronic transactions as well as the law of terrorism effectively. How To Cite: Astuti, S. (2015. Law Enforcement of Cyber Terorism in Indonesia. Rechtsidee, 2(2, 157-178. doi:http://dx.doi.org/10.21070/jihr.v2i2.82

  5. Shoe-String Automation

    Energy Technology Data Exchange (ETDEWEB)

    Duncan, M.L.

    2001-07-30

    Faced with a downsizing organization, serious budget reductions and retirement of key metrology personnel, maintaining capabilities to provide necessary services to our customers was becoming increasingly difficult. It appeared that the only solution was to automate some of our more personnel-intensive processes; however, it was crucial that the most personnel-intensive candidate process be automated, at the lowest price possible and with the lowest risk of failure. This discussion relates factors in the selection of the Standard Leak Calibration System for automation, the methods of automation used to provide the lowest-cost solution and the benefits realized as a result of the automation.

  6. Implementing the SECURES urban gunshot detection technology for law enforcement crime intervention strategies

    Science.gov (United States)

    Litch, Michael; Shaw, Scott

    2004-09-01

    Planning Systems Incorporated (PSI) has been working with the National Institute of Justice, Center for Society Law and Justice (CSLJ) at the University of New Orleans, and law enforcement agencies in five highly varied United States locations over the past three years to evaluate the use of an automated, wireless acoustic gun fire detection and localization system. Considerable progress has been made in improving the sensor design, system engineering, software applications, deployment practices and manufacturing capabilities since last year's presentation. Two military variants have been developed as well. This paper will provide an updated status of SECURES technology and its utilization.

  7. Price-Anderson Nuclear Safety Enforcement Program. 1996 Annual report

    International Nuclear Information System (INIS)

    This first annual report on DOE's Price Anderson Amendments Act enforcement program covers the activities, accomplishments, and planning for calendar year 1996. It also includes the infrastructure development activities of 1995. It encompasses the activities of the headquarters' Office of Enforcement in the Office of Environment, Safety and Health (EH) and Investigation and the coordinators and technical advisors in DOE's Field and Program Offices and other EH Offices. This report includes an overview of the enforcement program; noncompliances, investigations, and enforcement actions; summary of significant enforcement actions; examples where enforcement action was deferred; and changes and improvements to the program

  8. Performance-Driven Interface Contract Enforcement for Scientific Components

    Energy Technology Data Exchange (ETDEWEB)

    Dahlgren, T

    2007-02-22

    Several performance-driven approaches to selectively enforce interface contracts for scientific components are investigated. The goal is to facilitate debugging deployed applications built from plug-and-play components while keeping the cost of enforcement within acceptable overhead limits. This paper describes a study of global enforcement using a priori execution cost estimates obtained from traces. Thirteen trials are formed from five, single-component programs. Enforcement experiments conducted using twenty-three enforcement policies are used to determine the nature of exercised contracts and the impact of a variety of sampling strategies. Performance-driven enforcement appears to be best suited to programs that exercise moderately expensive contracts.

  9. 76 FR 54986 - NRC Enforcement Policy

    Science.gov (United States)

    2011-09-06

    ..., 2010, the NRC published a notice (75 FR 60485) to announce an effective date of September 30, 2010, for... violation. 5. Civil Penalties for Loss of Control of Regulated Material On December 18, 2000 (65 FR 79139... COMMISSION 10 CFR Chapter I NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION:...

  10. 78 FR 5838 - NRC Enforcement Policy

    Science.gov (United States)

    2013-01-28

    ... September 30, 2010 (75 FR 60485), the NRC published the revised Policy in the Federal Register. In addition... Register on September 6, 2011 (76 FR 54986), and December 6, 2011 (76 FR 76192). III. Summary of... COMMISSION NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Policy revision;...

  11. Intimate Partner Violence within Law Enforcement Families

    Science.gov (United States)

    Anderson, Anita S.; Lo, Celia C.

    2011-01-01

    Using data from the Baltimore Police Stress and Domestic Violence study, the authors examined how exposure to stressful events on the job affects law enforcement employees' physical aggression toward domestic partners, evaluating the role of negative emotions and authoritarian spillover in mediating the impact of such task-related stress. The…

  12. Optimal Debt Contracts under Costly Enforcement

    OpenAIRE

    Hvide, Hans K.; Leite, Tore

    2007-01-01

    We consider a financing game with costly enforcement based on Townsend (1979), but where monitoring is non-contractible and allowed to be stochastic. Debt is the optimal contract. Moreover, the debt contract induces creditor leniency and strategic defaults by the borrower on the equilibrium path, consistent with empirical evidence on repayment and monitoring behaviour in credit markets.

  13. 28 CFR 54.605 - Enforcement procedures.

    Science.gov (United States)

    2010-07-01

    ... regulations. These procedures may be found at 28 CFR 42.106 through 42.111. ....605 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) NONDISCRIMINATION ON THE BASIS OF SEX IN... procedures. The investigative, compliance, and enforcement procedural provisions of Title VI of the...

  14. 31 CFR 103.56 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Enforcement. 103.56 Section 103.56 Money and Finance: Treasury Regulations Relating to Money and Finance FINANCIAL RECORDKEEPING AND... CFR 103.57; investigate possible civil violations of these provisions (in addition to the...

  15. Risk sharing relations and enforcement mechanisms

    NARCIS (Netherlands)

    Barr, A.; Dekker, M.; Fafchamps, M

    2008-01-01

    We investigate whether the set of available enforcement mechanisms affects the formation of risk sharing relations by applying dyadic regression analysis to data from a specifically designed behavioural experiment, two surveys and a genealogical mapping exercise. During the experiment participants a

  16. 76 FR 80846 - Definition of Enforcement Action

    Science.gov (United States)

    2011-12-27

    ... to make revisions. 75 FR 70680 (Nov. 18, 2010). On April 4, 2011, after holding eight consultations... consultation schedule and process for review. 76 FR 18457. The Commission's regulatory review process... National Indian Gaming Commission 25 CFR Part 502 RIN 3141-AA43 Definition of Enforcement Action...

  17. Optimal contracts under imperfect enforcement revisited

    OpenAIRE

    Hans K. Hvide

    2005-01-01

    We consider a financing game with costly enforcement based on Townsend (1979), but where monitoring is non-contractible and allowed to be stochastic. Debt is the optimal contract. Moreover, the debt contract induces creditor leniency and strategic defaults by the borrower on the equilibrium path, consistent with empirical evidence on repayment and monitoring behavior in credit markets.

  18. 31 CFR 132.7 - Regulatory enforcement.

    Science.gov (United States)

    2010-07-01

    ... UNLAWFUL INTERNET GAMBLING § 132.7 Regulatory enforcement. The requirements under this part are subject to... designated payment systems and participants therein that are subject to the respective jurisdiction of such... payment systems and participants therein not otherwise subject to the jurisdiction of any...

  19. 12 CFR 233.7 - Regulatory enforcement.

    Science.gov (United States)

    2010-01-01

    ... PROHIBITION ON FUNDING OF UNLAWFUL INTERNET GAMBLING (REGULATION GG) § 233.7 Regulatory enforcement. The... regulators, with respect to the designated payment systems and participants therein that are subject to the... Commission, with respect to designated payment systems and participants therein not otherwise subject to...

  20. Commercial Court and Enforcement Assessment Tool

    OpenAIRE

    Ebeid, Omniah; Gramckow, Heike

    2016-01-01

    An effective and efficient justice system is essential for sustained economic growth. In a well-functioning, independent, and efficient justice system, decisions are taken within a reasonable time and are predictably and effectively enforced, and individual rights, including property rights, are adequately protected. Among other objectives, the efficiency of the judicial system is importan...

  1. Informed consent: Enforcing pharmaceutical companies' obligations abroad.

    Science.gov (United States)

    Lee, Stacey B

    2010-01-01

    The past several years have seen an evolution in the obligations of pharmaceutical companies conducting clinical trials abroad. Key players, such as international human rights organizations, multinational pharmaceutical companies, the United States government and courts, and the media, have played a significant role in defining these obligations. This article examines how such obligations have developed through the lens of past, present, and future recommendations for informed consent protections. In doing so, this article suggests that, no matter how robust obligations appear, they will continue to fall short of providing meaningful protection until they are accompanied by a substantive enforcement mechanism that holds multinational pharmaceutical companies accountable for their conduct. Issues of national sovereignty, particularly in the United States, will continue to prevent meaningful enforcement by an international tribunal or through one universally adopted code of ethics. This article argues that, rather than continuing to pursue an untenable international approach, the Alien Torts Statute (ATS) offers a viable enforcement mechanism, at least for US-based pharmaceutical companies. Recent federal appellate court precedent interpreting the ATS provides the mechanism for granting victims redress and enforcing accountability of sponsors (usually pharmaceutical companies and research and academic institutions) for informed consent misconduct. Substantive human rights protections are vital in order to ensure that every person can realize the "right to health." This article concludes that by building on the federal appellate court's ATS analysis, which grants foreign trial participants the right to pursue claims of human rights violations in US courts, a mechanism can be created for enforcing not only substantive informed consent, but also human rights protections. PMID:20930251

  2. EPA Enforcement and Compliance History Online: EPA Enforcement Action Data Set

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Enforcement and Compliance History Online (ECHO) data sets have been compiled for access to larger sets of national data to ensure that ECHO meets your data...

  3. Automated Apprenticeship Training (AAT). A Systematized Audio-Visual Approach to Self-Paced Job Training.

    Science.gov (United States)

    Pieper, William J.; And Others

    Two Automated Apprenticeship Training (AAT) courses were developed for Air Force Security Police Law Enforcement and Security specialists. The AAT was a systematized audio-visual approach to self-paced job training employing an easily operated teaching device. AAT courses were job specific and based on a behavioral task analysis of the two…

  4. 78 FR 44165 - Nuclear Regulatory Commission Enforcement Policy

    Science.gov (United States)

    2013-07-23

    ... From the Federal Register Online via the Government Publishing Office NUCLEAR REGULATORY COMMISSION Nuclear Regulatory Commission Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Enforcement policy; request for comment. SUMMARY: The U.S. Nuclear Regulatory Commission (NRC) is...

  5. Crab Orchard National Wildlife Refuge : Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Crab Orchard National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  6. Law Enforcement Plan: Minnesota Valley National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Minnesota Valley NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about...

  7. Mark Twain National Wildlife Refuge: Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Mark Twain NWR including Clarence Cannon, Louisa, and Calhoun NWRs Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to...

  8. Law Enforcement Plan : Big Stone National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Big Stone NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  9. Law Enforcement Plan Swan Lake National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Swan Lake National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  10. Automated stopcock actuator

    OpenAIRE

    Vandehey, N. T.; O'Neil, J.P.

    2015-01-01

    Introduction We have developed a low-cost stopcock valve actuator for radiochemistry automation built using a stepper motor and an Arduino, an open-source single-board microcontroller. The con-troller hardware can be programmed to run by serial communication or via two 5–24 V digital lines for simple integration into any automation control system. This valve actuator allows for automated use of a single, disposable stopcock, providing a number of advantages over stopcock manifold systems ...

  11. The Adaptive Automation Design

    OpenAIRE

    Calefato, Caterina; Montanari, Roberto; TESAURI, Francesco

    2008-01-01

    After considering the positive effects of adaptive automation implementation, this chapter focuses on two partly overlapping phenomena: on the one hand, the role of trust in automation is considered, particularly as to the effects of overtrust and mistrust in automation's reliability; on the other hand, long-term lack of exercise on specific operation may lead users to skill deterioration. As a future work, it will be interesting and challenging to explore the conjunction of adaptive automati...

  12. Service functional test automation

    OpenAIRE

    Hillah, Lom Messan; Maesano, Ariele-Paolo; Rosa, Fabio; Maesano, Libero; Lettere, Marco; Fontanelli, Riccardo

    2015-01-01

    This paper presents the automation of the functional test of services (black-box testing) and services architectures (grey-box testing) that has been developed by the MIDAS project and is accessible on the MIDAS SaaS. In particular, the paper illustrates the solutions of tough functional test automation problems such as: (i) the configuration of the automated test execution system against large and complex services architectures, (ii) the constraint-based test input generation, (iii) the spec...

  13. Automated Weather Observing System

    Data.gov (United States)

    Department of Transportation — The Automated Weather Observing System (AWOS) is a suite of sensors, which measure, collect, and disseminate weather data to help meteorologists, pilots, and flight...

  14. Laboratory Automation and Middleware.

    Science.gov (United States)

    Riben, Michael

    2015-06-01

    The practice of surgical pathology is under constant pressure to deliver the highest quality of service, reduce errors, increase throughput, and decrease turnaround time while at the same time dealing with an aging workforce, increasing financial constraints, and economic uncertainty. Although not able to implement total laboratory automation, great progress continues to be made in workstation automation in all areas of the pathology laboratory. This report highlights the benefits and challenges of pathology automation, reviews middleware and its use to facilitate automation, and reviews the progress so far in the anatomic pathology laboratory. PMID:26065792

  15. Automated cloning methods.; TOPICAL

    International Nuclear Information System (INIS)

    Argonne has developed a series of automated protocols to generate bacterial expression clones by using a robotic system designed to be used in procedures associated with molecular biology. The system provides plate storage, temperature control from 4 to 37 C at various locations, and Biomek and Multimek pipetting stations. The automated system consists of a robot that transports sources from the active station on the automation system. Protocols for the automated generation of bacterial expression clones can be grouped into three categories (Figure 1). Fragment generation protocols are initiated on day one of the expression cloning procedure and encompass those protocols involved in generating purified coding region (PCR)

  16. 50 CFR 10.22 - Law enforcement offices.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 1 2010-10-01 2010-10-01 false Law enforcement offices. 10.22 Section 10... GENERAL PROVISIONS Addresses § 10.22 Law enforcement offices. Service law enforcement offices and their areas of responsibility follow. Mail should be addressed: “Assistant Regional Director, Division of...

  17. 20 CFR 638.805 - Security and law enforcement.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Security and law enforcement. 638.805 Section... and law enforcement. (a) The Job Corps Director shall provide guidelines to protect the security of... jurisdiction with the appropriate State and locality with respect to criminal law enforcement as long as...

  18. 40 CFR 161.180 - Enforcement analytical method.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Enforcement analytical method. 161.180 Section 161.180 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS... § 161.180 Enforcement analytical method. An analytical method suitable for enforcement purposes must...

  19. 40 CFR 158.355 - Enforcement analytical method.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Enforcement analytical method. 158.355... DATA REQUIREMENTS FOR PESTICIDES Product Chemistry § 158.355 Enforcement analytical method. An analytical method suitable for enforcement purposes must be provided for each active ingredient in...

  20. 10 CFR 431.383 - Enforcement process for electric motors.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Enforcement process for electric motors. 431.383 Section... COMMERCIAL AND INDUSTRIAL EQUIPMENT Enforcement § 431.383 Enforcement process for electric motors. (a) Test... motor sold by a particular manufacturer or private labeler, which indicates that the electric motor...

  1. Forensic imaging tools for law enforcement

    Energy Technology Data Exchange (ETDEWEB)

    SMITHPETER,COLIN L.; SANDISON,DAVID R.; VARGO,TIMOTHY D.

    2000-01-01

    Conventional methods of gathering forensic evidence at crime scenes are encumbered by difficulties that limit local law enforcement efforts to apprehend offenders and bring them to justice. Working with a local law-enforcement agency, Sandia National Laboratories has developed a prototype multispectral imaging system that can speed up the investigative search task and provide additional and more accurate evidence. The system, called the Criminalistics Light-imaging Unit (CLU), has demonstrated the capabilities of locating fluorescing evidence at crime scenes under normal lighting conditions and of imaging other types of evidence, such as untreated fingerprints, by direct white-light reflectance. CLU employs state of the art technology that provides for viewing and recording of the entire search process on videotape. This report describes the work performed by Sandia to design, build, evaluate, and commercialize CLU.

  2. Nuclear forensics in law enforcement applications

    International Nuclear Information System (INIS)

    Over the past several years, the Livermore Forensic Science Center has conducted analyses of nuclear-related samples in conjunction with domestic and international criminal investigations. Law enforcement officials have sought conventional and nuclear-forensic analyses of questioned specimens that have typically consisted of miscellaneous metal species or actinide salts. The investigated activities have included nuclear smuggling and the proliferation of alleged fissionable materials, nonradioactive hoaxes such as 'Red Mercury', and the interdiction of illegal laboratories engaged in methamphetamine synthesis. (author)

  3. Law Enforcement of Cyber Terorism in Indonesia

    OpenAIRE

    Sri Ayu Astuti

    2015-01-01

    Cyber terrorism is one of the category of crimes that cross border organized and has been established as an extraordinary crime. This crime is becoming a serious threat to countries in the world. In this regard, the Government's attitude of firmness needed to enforce cyber laws against the freedom development in social media. The development of the immeasurable it in the country of Indonesia required the limitations by doing legal liability over the behavior of law which deviates towards the ...

  4. Illegal Migration, Enforcement and Minimum Wage

    OpenAIRE

    Epstein, Gil S.; Heizler (Cohen), Odelia

    2007-01-01

    This paper examines the connection between illegal migration, minimum wages and enforcement policy. We first explore the employers' decision regarding the employment of illegal migrants in the presence of an effective minimum wage. We show that the employers' decision depends on the wage gap between those of the legal and illegal workers and on the penalty for employing illegal workers. We consider the effects a change in the minimum wage has on the employment of illegal immigrants and local ...

  5. Injunctive Relief and Private Antitrust Enforcement

    OpenAIRE

    Peyer, Sebastian

    2011-01-01

    The paper analyses the role of injunctions in the private enforcement of competition law. Most commentators deal predominantly with damages actions and the European policy proposals only discuss the conditions for successful compensation claims. However, damages claims are likely to be the most expensive and time consuming remedy available. In many cases injunctive relief may be cheaper and, thus, be preferred by the victim. Asking the court to order the perpetrator to either cease from certa...

  6. Library Automation Style Guide.

    Science.gov (United States)

    Gaylord Bros., Liverpool, NY.

    This library automation style guide lists specific terms and names often used in the library automation industry. The terms and/or acronyms are listed alphabetically and each is followed by a brief definition. The guide refers to the "Chicago Manual of Style" for general rules, and a notes section is included for the convenience of individual…

  7. Automation in Warehouse Development

    NARCIS (Netherlands)

    Hamberg, R.; Verriet, J.

    2012-01-01

    The warehouses of the future will come in a variety of forms, but with a few common ingredients. Firstly, human operational handling of items in warehouses is increasingly being replaced by automated item handling. Extended warehouse automation counteracts the scarcity of human operators and support

  8. Automate functional testing

    Directory of Open Access Journals (Sweden)

    Ramesh Kalindri

    2014-06-01

    Full Text Available Currently, software engineers are increasingly turning to the option of automating functional tests, but not always have successful in this endeavor. Reasons range from low planning until over cost in the process. Some principles that can guide teams in automating these tests are described in this article.

  9. Automation in Immunohematology

    Directory of Open Access Journals (Sweden)

    Meenu Bajpai

    2012-01-01

    Full Text Available There have been rapid technological advances in blood banking in South Asian region over the past decade with an increasing emphasis on quality and safety of blood products. The conventional test tube technique has given way to newer techniques such as column agglutination technique, solid phase red cell adherence assay, and erythrocyte-magnetized technique. These new technologies are adaptable to automation and major manufacturers in this field have come up with semi and fully automated equipments for immunohematology tests in the blood bank. Automation improves the objectivity and reproducibility of tests. It reduces human errors in patient identification and transcription errors. Documentation and traceability of tests, reagents and processes and archiving of results is another major advantage of automation. Shifting from manual methods to automation is a major undertaking for any transfusion service to provide quality patient care with lesser turnaround time for their ever increasing workload. This article discusses the various issues involved in the process.

  10. Automated model building

    CERN Document Server

    Caferra, Ricardo; Peltier, Nicholas

    2004-01-01

    This is the first book on automated model building, a discipline of automated deduction that is of growing importance Although models and their construction are important per se, automated model building has appeared as a natural enrichment of automated deduction, especially in the attempt to capture the human way of reasoning The book provides an historical overview of the field of automated deduction, and presents the foundations of different existing approaches to model construction, in particular those developed by the authors Finite and infinite model building techniques are presented The main emphasis is on calculi-based methods, and relevant practical results are provided The book is of interest to researchers and graduate students in computer science, computational logic and artificial intelligence It can also be used as a textbook in advanced undergraduate courses

  11. Automation in Warehouse Development

    CERN Document Server

    Verriet, Jacques

    2012-01-01

    The warehouses of the future will come in a variety of forms, but with a few common ingredients. Firstly, human operational handling of items in warehouses is increasingly being replaced by automated item handling. Extended warehouse automation counteracts the scarcity of human operators and supports the quality of picking processes. Secondly, the development of models to simulate and analyse warehouse designs and their components facilitates the challenging task of developing warehouses that take into account each customer’s individual requirements and logistic processes. Automation in Warehouse Development addresses both types of automation from the innovative perspective of applied science. In particular, it describes the outcomes of the Falcon project, a joint endeavour by a consortium of industrial and academic partners. The results include a model-based approach to automate warehouse control design, analysis models for warehouse design, concepts for robotic item handling and computer vision, and auton...

  12. Advances in inspection automation

    Science.gov (United States)

    Weber, Walter H.; Mair, H. Douglas; Jansen, Dion; Lombardi, Luciano

    2013-01-01

    This new session at QNDE reflects the growing interest in inspection automation. Our paper describes a newly developed platform that makes the complex NDE automation possible without the need for software programmers. Inspection tasks that are tedious, error-prone or impossible for humans to perform can now be automated using a form of drag and drop visual scripting. Our work attempts to rectify the problem that NDE is not keeping pace with the rest of factory automation. Outside of NDE, robots routinely and autonomously machine parts, assemble components, weld structures and report progress to corporate databases. By contrast, components arriving in the NDT department typically require manual part handling, calibrations and analysis. The automation examples in this paper cover the development of robotic thickness gauging and the use of adaptive contour following on the NRU reactor inspection at Chalk River.

  13. The law enforcement agencies in Turkey

    International Nuclear Information System (INIS)

    Full text: In Turkey, the law enforcement agencies are gathered into two main authorities. These are as below. 1. Under the Ministry of Interior: General Commander of Gendarmarie; General Directorate of National Police; General Commandery of Coast Guard; 2. Within the Undersecretariat of Customs there are two main service units to combat smuggling. These are: General Directorate of Customs Enforcement (GDCE) and General Directorate of Customs. The responsible areas of these administrations are legally as below: The region of Gendarmarie: It covers rural areas. In that region, Gendarmarie is responsible, inter alia, combating smuggling; The region of police: General Directorate of National Police has performed its tasks, one of which is to combat smuggling in the city areas; The region of Territorial Waters: Coast Guard is related authority in territorial water for, among other things, fighting smuggling. The region of Customs: General Directorate of Customs Enforcement fulfills in these regions as the authority and responsible law enforcement agent. The main difference between GDCE and other law enforcement agencies are: GDCE is the only Administration whose main aim is to struggle against smuggling; Generally, all units conduct their operations in their responsible region, however, if it is necessary, depending on the case, an operation can be performed jointly only in another region in cooperation with the relevant agent. In that context, as far as General Directorate of Customs Enforcement is concerned, fulfilling an operation in other regions is not a legal necessity. Any units of GDCE can seize and do operation all over Turkey by itself, without any regional limitations from legislation. Organizational Structure of the Customs Administration in Turkey - The principle functions of the General Directorate of Customs are: implementation of customs policies, collection of customs taxes, inspection of passengers and goods, also, investigation of smuggling

  14. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  15. Computational infrastructure for law enforcement. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Lades, M.; Kunz, C.; Strikos, I.

    1997-02-01

    This project planned to demonstrate the leverage of enhanced computational infrastructure for law enforcement by demonstrating the face recognition capability at LLNL. The project implemented a face finder module extending the segmentation capabilities of the current face recognition so it was capable of processing different image formats and sizes and create the pilot of a network-accessible image database for the demonstration of face recognition capabilities. The project was funded at $40k (2 man-months) for a feasibility study. It investigated several essential components of a networked face recognition system which could help identify, apprehend, and convict criminals.

  16. Improvement of Test Automation

    OpenAIRE

    Räsänen, Timo

    2013-01-01

    The purpose for this study was to find out how to ensure that the automated testing of MME in the Network Verification will continue smooth and reliable while using the in-house developed test automation framework. The goal of this thesis was to reveal the reasons of the currently challenging situation and to find the key elements to be improved in the MME testing carried by the test automation. Also a reason for the study was to get solutions as to how to change the current procedures and wa...

  17. Chef infrastructure automation cookbook

    CERN Document Server

    Marschall, Matthias

    2013-01-01

    Chef Infrastructure Automation Cookbook contains practical recipes on everything you will need to automate your infrastructure using Chef. The book is packed with illustrated code examples to automate your server and cloud infrastructure.The book first shows you the simplest way to achieve a certain task. Then it explains every step in detail, so that you can build your knowledge about how things work. Eventually, the book shows you additional things to consider for each approach. That way, you can learn step-by-step and build profound knowledge on how to go about your configuration management

  18. Novel strategies to enforce an epithelial phenotype in mesenchymal cells.

    Science.gov (United States)

    Dragoi, Ana-Maria; Swiss, Rachel; Gao, Beile; Agaisse, Hervé

    2014-07-15

    E-cadherin downregulation in cancer cells is associated with epithelial-to-mesenchymal transition (EMT) and metastatic prowess, but the underlying mechanisms are incompletely characterized. In this study, we probed E-cadherin expression at the plasma membrane as a functional assay to identify genes involved in E-cadherin downregulation. The assay was based on the E-cadherin-dependent invasion properties of the intracellular pathogen Listeria monocytogenes. On the basis of a functional readout, automated microscopy and computer-assisted image analysis were used to screen siRNAs targeting 7,000 human genes. The validity of the screen was supported by its definition of several known regulators of E-cadherin expression, including ZEB1, HDAC1, and MMP14. We identified three new regulators (FLASH, CASP7, and PCGF1), the silencing of which was sufficient to restore high levels of E-cadherin transcription. In addition, we identified two new regulators (FBXL5 and CAV2), the silencing of which was sufficient to increase E-cadherin expression at a posttranscriptional level. FLASH silencing regulated the expression of E-cadherin and other ZEB1-dependent genes, through posttranscriptional regulation of ZEB1, but it also regulated the expression of numerous ZEB1-independent genes with functions predicted to contribute to a restoration of the epithelial phenotype. Finally, we also report the identification of siRNA duplexes that potently restored the epithelial phenotype by mimicking the activity of known and putative microRNAs. Our findings suggest new ways to enforce epithelial phenotypes as a general strategy to treat cancer by blocking invasive and metastatic phenotypes associated with EMT. PMID:24845104

  19. Commercial-vehicle enforcement: a guide for law-enforcement managers

    Energy Technology Data Exchange (ETDEWEB)

    1987-01-01

    The purpose of the document is to provide a resource for law enforcement agencies to evaluate their programs, and to promote the uniform application of concepts already shown to be effective in other jurisdictions, which identify and address commercial-vehicle traffic safety needs.

  20. Enforcement of federal underground storage tank regulations

    International Nuclear Information System (INIS)

    During the 1980s, underground storage tanks (USTs) were leaking petroleum products into the soil and groundwater at an alarming rate. The federal government has recently developed an UST regulatory program that includes operating and financial responsibility requirements. Federal regulation requires UST system owners to notify state environmental agencies of the existence of these systems, and directs the EPA to formulate regulations concerning UST release detection, prevention, and corrective action, as well as for financial responsibility for leaks of regulated substances from USTs. State environmental agencies are required to compile tank inventories and to provide this information to the EPA. The EPA is mandated to establish a federal program for the regulation of USTs that allows state programs to operate in lieu of the federal program is they are no less strict than the federal requirements and can be adequately enforced. To recover shallow spills, the contaminated soil may be excavated and placed in a landfill. For deeper pollution, the only methods of treatment are flushing and recovery or an in-situ treatment, such as biological degradation using bacteria. Ethical issues include the relationship between the public demand for petroleum products, environmental damage, and the conflicts encountered by environmental consulting firms. Legal issues concern the notification of the public and the sale of property on which storage tanks are located, as well as the increasing involvement of the legal system in enforcement of environmental legislation

  1. Sex Trafficking, Law Enforcement and Perpetrator Accountability

    Directory of Open Access Journals (Sweden)

    Holly Burkhalter

    2012-09-01

    Full Text Available In theory, everyone – except for criminals involved in their exploitation - agrees that children must not be in the sex industry and further, that those who prey on them must be prosecuted and punished. Virtually every country in the world has adopted national laws prohibiting the commercial sexual exploitation of children. International law is clear on this point, as well. Yet, when governments – and NGOs working with them – take action to extract children from commercial sex venues, common ground on protecting children from abuse can quickly erode with concerns about the efficacy of police intervention, the possibility of collateral harm to consenting adult sex workers or a decrease in access to HIV-prevention and related health services. The author argues that healing this divide must come through the reform of local police – and that, without the participation of law enforcement, there can be no long-term protection for children vulnerable to trafficking and related exploitation. In this article, human rights practitioner Holly Burkhalter argues that healing this divide must be accomplished through the reform of local police – and that human rights advocates, local governments and others seeking to combat trafficking cannot achieve long-term, sustainable protection for children without the involvement of law enforcement.

  2. REGULATION AND ENFORCEMENT OF COMPETITION POLICY

    Directory of Open Access Journals (Sweden)

    Liviana Andreea Niminet

    2014-12-01

    Full Text Available Competition policy starts by shaping a legislative framework. This is aimed to establish boundaries for conducting competition and also sets limits of licit and illicit demarcation, for competitive and anticompetitive practices. The Romanian Competition Law has a divalent approach and it aims to provide specific behavioral conditions in order to stimulate and protect free-market competition, with the ultimate goal of developing a balanced, efficient and competitive economy. Our country’s Competition policy is based on punishing the behavior. There are three such types of anti-competitive behavior, namely: agreements between undertakings, abuse of dominant position and mergers and other concentrations between undertakings. Recent Practice proved that this “enforcement-conduct-punishment” structure is not necessary the best way to address competition and it is high time for authorities to switch both regulation and enforcement of competition from the “classical perspective” towards concepts like “competition advocacy” and “soft power” and give competition policy a new, reshaped face.

  3. Automated Vehicles Symposium 2014

    CERN Document Server

    Beiker, Sven; Road Vehicle Automation 2

    2015-01-01

    This paper collection is the second volume of the LNMOB series on Road Vehicle Automation. The book contains a comprehensive review of current technical, socio-economic, and legal perspectives written by experts coming from public authorities, companies and universities in the U.S., Europe and Japan. It originates from the Automated Vehicle Symposium 2014, which was jointly organized by the Association for Unmanned Vehicle Systems International (AUVSI) and the Transportation Research Board (TRB) in Burlingame, CA, in July 2014. The contributions discuss the challenges arising from the integration of highly automated and self-driving vehicles into the transportation system, with a focus on human factors and different deployment scenarios. This book is an indispensable source of information for academic researchers, industrial engineers, and policy makers interested in the topic of road vehicle automation.

  4. I-94 Automation FAQs

    Data.gov (United States)

    Department of Homeland Security — In order to increase efficiency, reduce operating costs and streamline the admissions process, U.S. Customs and Border Protection has automated Form I-94 at air and...

  5. Automated Vehicles Symposium 2015

    CERN Document Server

    Beiker, Sven

    2016-01-01

    This edited book comprises papers about the impacts, benefits and challenges of connected and automated cars. It is the third volume of the LNMOB series dealing with Road Vehicle Automation. The book comprises contributions from researchers, industry practitioners and policy makers, covering perspectives from the U.S., Europe and Japan. It is based on the Automated Vehicles Symposium 2015 which was jointly organized by the Association of Unmanned Vehicle Systems International (AUVSI) and the Transportation Research Board (TRB) in Ann Arbor, Michigan, in July 2015. The topical spectrum includes, but is not limited to, public sector activities, human factors, ethical and business aspects, energy and technological perspectives, vehicle systems and transportation infrastructure. This book is an indispensable source of information for academic researchers, industrial engineers and policy makers interested in the topic of road vehicle automation.

  6. Hydrometeorological Automated Data System

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Office of Hydrologic Development of the National Weather Service operates HADS, the Hydrometeorological Automated Data System. This data set contains the last...

  7. An automated Certification Authority

    CERN Document Server

    Shamardin, L V

    2002-01-01

    This note describe an approach to building an automated Certification Authority. It is compatible with basic requirements of RFC2527. It also supports Registration Authorities and Globus Toolkit grid-cert-renew automatic certificate renewal.

  8. Disassembly automation automated systems with cognitive abilities

    CERN Document Server

    Vongbunyong, Supachai

    2015-01-01

    This book presents a number of aspects to be considered in the development of disassembly automation, including the mechanical system, vision system and intelligent planner. The implementation of cognitive robotics increases the flexibility and degree of autonomy of the disassembly system. Disassembly, as a step in the treatment of end-of-life products, can allow the recovery of embodied value left within disposed products, as well as the appropriate separation of potentially-hazardous components. In the end-of-life treatment industry, disassembly has largely been limited to manual labor, which is expensive in developed countries. Automation is one possible solution for economic feasibility. The target audience primarily comprises researchers and experts in the field, but the book may also be beneficial for graduate students.

  9. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  10. Automating Supplier Selection Procedures

    OpenAIRE

    Davidrajuh, Reggie

    2001-01-01

    This dissertation describes a methodology, tools, and implementation techniques of automating supplier selection procedures of a small and medium-sized agile virtual enterprise. Firstly, a modeling approach is devised that can be used to model the supplier selection procedures of an enterprise. This modeling approach divides the supplier selection procedures broadly into three stages, the pre-selection, selection, and post-selection stages. Secondly, a methodology is presented for automating ...

  11. Taiwan Automated Telescope Network

    OpenAIRE

    Shuhrat Ehgamberdiev; Alexander Serebryanskiy; Antonio Jimenez; Li-Han Wang; Ming-Tsung Sun; Javier Fernandez Fernandez; Dean-Yi Chou

    2010-01-01

    A global network of small automated telescopes, the Taiwan Automated Telescope (TAT) network, dedicated to photometric measurements of stellar pulsations, is under construction. Two telescopes have been installed in Teide Observatory, Tenerife, Spain and Maidanak Observatory, Uzbekistan. The third telescope will be installed at Mauna Loa Observatory, Hawaii, USA. Each system uses a 9-cm Maksutov-type telescope. The effective focal length is 225 cm, corresponding to an f-ratio of 25. The field...

  12. Automated Lattice Perturbation Theory

    Energy Technology Data Exchange (ETDEWEB)

    Monahan, Christopher

    2014-11-01

    I review recent developments in automated lattice perturbation theory. Starting with an overview of lattice perturbation theory, I focus on the three automation packages currently "on the market": HiPPy/HPsrc, Pastor and PhySyCAl. I highlight some recent applications of these methods, particularly in B physics. In the final section I briefly discuss the related, but distinct, approach of numerical stochastic perturbation theory.

  13. Automated functional software testing

    OpenAIRE

    Jelnikar, Kristina

    2009-01-01

    The following work describes an approach to software test automation of functional testing. In the introductory part we are introducing what testing problems development companies are facing. The second chapter describes some testing methods, what role does testing have in software development, some approaches to software development and the meaning of testing environment. Chapter 3 is all about test automation. After a brief historical presentation, we are demonstrating through s...

  14. Instant Sikuli test automation

    CERN Document Server

    Lau, Ben

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A concise guide written in an easy-to follow style using the Starter guide approach.This book is aimed at automation and testing professionals who want to use Sikuli to automate GUI. Some Python programming experience is assumed.

  15. Formal Social Norms and their Enforcement in Computational MAS by Automated Reasoning

    Czech Academy of Sciences Publication Activity Database

    Neruda, Roman; Kazík, O.

    2012-01-01

    Roč. 39, č. 1 (2012), s. 80-87. ISSN 1819-9224 Institutional support: RVO:67985807 Keywords : role model * description logic * integrity constraints * computational intelligence Subject RIV: IN - Informatics, Computer Science

  16. Setting standards for credible compliance and law enforcement

    OpenAIRE

    2000-01-01

    In this paper we examine the setting of optimal legal standards to simultaneously induce parties to invest in care and to motivate law enforcers to detect violators of the law. The strategic interaction between care providers and law enforcers determines the degree of efficiency achieved by the standards. Our principal finding is that some divergence between the marginal benefits and marginal costs of providing care is required to control enforcement costs. Further, the setting of standards m...

  17. NRC Enforcement Policy Review, July 1995-July 1997

    International Nuclear Information System (INIS)

    On June 30, 1995, the Nuclear Regulatory Commission (NRC) issued a complete revision of its General Statement of Policy and Procedure for Enforcement Action (Enforcement Policy) (60 FR 34381). In approving the 1995 revision to the Enforcement Policy, the Commission directed the staff to perform a review of its implementation of the Policy after approximately 2 years of experience and to consider public comments. This report represents the results of that review

  18. NRC Enforcement Policy Review, July 1995-July 1997

    Energy Technology Data Exchange (ETDEWEB)

    Lieberman, J.; Pedersen, R.M.

    1998-04-01

    On June 30, 1995, the Nuclear Regulatory Commission (NRC) issued a complete revision of its General Statement of Policy and Procedure for Enforcement Action (Enforcement Policy) (60 FR 34381). In approving the 1995 revision to the Enforcement Policy, the Commission directed the staff to perform a review of its implementation of the Policy after approximately 2 years of experience and to consider public comments. This report represents the results of that review.

  19. Self-Policing in a Targeted Enforcement Regime

    OpenAIRE

    Sarah L. Stafford

    2006-01-01

    This paper adds to the debate over whether self-policing can increase environmental protection by considering an aspect of self-policing that has been ignored in previous models Ð that self-policing may influence future enforcement. The model combines self-policing with targeted enforcement and allows for both deliberate and inadvertent violations. As expected, rewarding self-policers with more lenient future enforcement increases auditing, remediation, and disclosure of inadvertent violation...

  20. Problems Concerning the Enforcement of Investment Arbitral Awards (Japanese)

    OpenAIRE

    MIZUSHIMA Tomonori

    2013-01-01

    When the host state does not comply with an investment arbitral award, the investor may seek to enforce it in another state. Given that the Convention on the Settlement of Investment Disputes between States and Nationals of Other States (ICSID Convention) and the New York Convention on the Recognition and Enforcement of Foreign Arbitral Awards, both of which have been ratified by nearly 150 states, obligate contracting states to enforce arbitral awards, these Conventions might be assumed to c...

  1. The influence of the elements of procedural justice and speed camera enforcement on young novice driver self-reported speeding.

    Science.gov (United States)

    Bates, Lyndel; Allen, Siobhan; Watson, Barry

    2016-07-01

    Road policing is an important tool used to modify road user behaviour. While other theories, such as deterrence theory, are significant in road policing, there may be a role for using procedural justice as a framework to improve outcomes in common police citizen interactions such as traffic law enforcement. This study, using a sample of 237 young novice drivers, considered how the four elements of procedural justice (voice, neutrality, respect and trustworthiness) were perceived in relation to two forms of speed enforcement: point-to-point (or average) speed and mobile speed cameras. Only neutrality was related to both speed camera types suggesting that it may be possible to influence behaviour by emphasising one or more elements, rather than using all components of procedural justice. This study is important as it indicates that including at least some elements of procedural justice in more automated policing encounters can encourage citizen compliance. PMID:27038499

  2. 40 CFR 63.368 - Implementation and enforcement.

    Science.gov (United States)

    2010-07-01

    ... (CONTINUED) NATIONAL EMISSION STANDARDS FOR HAZARDOUS AIR POLLUTANTS FOR SOURCE CATEGORIES Ethylene Oxide Emissions Standards for Sterilization Facilities § 63.368 Implementation and enforcement. (a) This...

  3. Task automation in a successful industrial telerobot

    Science.gov (United States)

    Spelt, Philip F.; Jones, Sammy L.

    1994-01-01

    In this paper, we discuss cooperative work by Oak Ridge National Laboratory and Remotec, Inc., to automate components of the operator's workload using Remotec's Andros telerobot, thereby providing an enhanced user interface which can be retrofit to existing fielded units as well as being incorporated into new production units. Remotec's Andros robots are presently used by numerous electric utilities to perform tasks in reactors where substantial exposure to radiation exists, as well as by the armed forces and numerous law enforcement agencies. The automation of task components, as well as the video graphics display of the robot's position in the environment, will enhance all tasks performed by these users, as well as enabling performance in terrain where the robots cannot presently perform due to lack of knowledge about, for instance, the degree of tilt of the robot. Enhanced performance of a successful industrial mobile robot leads to increased safety and efficiency of performance in hazardous environments. The addition of these capabilities will greatly enhance the utility of the robot, as well as its marketability.

  4. Task automation in a successful industrial telerobot

    Energy Technology Data Exchange (ETDEWEB)

    Spelt, P.F. [Oak Ridge National Lab., TN (United States); Jones, S.L. [REMOTEC, Inc., Oak Ridge, TN (United States)

    1994-01-01

    In this paper, we discuss cooperative work by Oak Ridge National Laboratory and Remotec{trademark}, Inc., to automate components of the operator`s workload using Remotec`s Andros telerobot, thereby providing an enhanced user interface which can be retroll to existing fielded units as well as being incorporated into now production units. Remotec`s Andros robots are presently used by numerous electric utilities to perform tasks in reactors where substantial exposure to radiation exists, as well as by the armed forces and numerous law enforcement agencies. The automation of task components, as well as the video graphics display of the robot`s position in the environment, will enhance all tasks performed by these users, as well as enabling performance in terrain where the robots cannot presently perform due to lack of knowledge about, for instance, the degree of tilt of the robot. Enhanced performance of a successful industrial mobile robot leads to increased safety and efficiency of performances in hazardous environments. The addition of these capabilities will greatly enhance the utility of the robot, as well as its marketability.

  5. j5 DNA assembly design automation software.

    Science.gov (United States)

    Hillson, Nathan J; Rosengarten, Rafael D; Keasling, Jay D

    2012-01-20

    Recent advances in Synthetic Biology have yielded standardized and automatable DNA assembly protocols that enable a broad range of biotechnological research and development. Unfortunately, the experimental design required for modern scar-less multipart DNA assembly methods is frequently laborious, time-consuming, and error-prone. Here, we report the development and deployment of a web-based software tool, j5, which automates the design of scar-less multipart DNA assembly protocols including SLIC, Gibson, CPEC, and Golden Gate. The key innovations of the j5 design process include cost optimization, leveraging DNA synthesis when cost-effective to do so, the enforcement of design specification rules, hierarchical assembly strategies to mitigate likely assembly errors, and the instruction of manual or automated construction of scar-less combinatorial DNA libraries. Using a GFP expression testbed, we demonstrate that j5 designs can be executed with the SLIC, Gibson, or CPEC assembly methods, used to build combinatorial libraries with the Golden Gate assembly method, and applied to the preparation of linear gene deletion cassettes for E. coli. The DNA assembly design algorithms reported here are generally applicable to broad classes of DNA construction methodologies and could be implemented to supplement other DNA assembly design tools. Taken together, these innovations save researchers time and effort, reduce the frequency of user design errors and off-target assembly products, decrease research costs, and enable scar-less multipart and combinatorial DNA construction at scales unfeasible without computer-aided design. PMID:23651006

  6. DNA databanks: law enforcement's greatest surveillance tool?

    Science.gov (United States)

    Hibbert, M

    1999-01-01

    All fifty states have laws requiring the collection of DNA samples from certain classes of criminals. Genetic profiles are gleaned from these samples and entered into DNA databanks, after which they then can be accessed by law enforcement personnel and others. DNA forensic technologies can be used to identify criminal offenders, but they can also be used in ways that reveal health and other personal information about the target and even about his or her relations. Moreover, the rapid introduction of ever-changing types of DNA forensic techniques creates a potential for error. Such errors may wrongly implicate some individuals for a crime and may wrongly exculpate others. This Article examines weaknesses in state DNA databanking laws regarding the protection of genetic privacy and imposition of quality assurance mechanisms and suggests policies which state legislatures should incorporate into the state DNA databanking scheme. PMID:12664925

  7. [The protection of health in law enforcement].

    Science.gov (United States)

    Pira, Enrico

    2014-01-01

    Herein the question of health protection/safety and well being in the Law Enforcement is introduced and includes examples of some particular risk conditions that may be multiple and polymorphous. Not only the "traditional" sources are involved in these risks, like chemical, physical and biological agents, but other issues emerge in these "new scenarios" connected to risk factors involving organization and/or psychosocial elements. From this, we may deduce that there is a specific need for all the operators involved in prevention/care in this particular sector to be well versed on the highest possible updated specialized knowledge along with having a complete and thorough mastery of the best practices in Occupational Medicine to face this task in the correct manner: PMID:25558739

  8. Automated annotation of microbial proteomes in SWISS-PROT.

    Science.gov (United States)

    Gattiker, Alexandre; Michoud, Karine; Rivoire, Catherine; Auchincloss, Andrea H; Coudert, Elisabeth; Lima, Tania; Kersey, Paul; Pagni, Marco; Sigrist, Christian J A; Lachaize, Corinne; Veuthey, Anne Lise; Gasteiger, Elisabeth; Bairoch, Amos

    2003-02-01

    Large-scale sequencing of prokaryotic genomes demands the automation of certain annotation tasks currently manually performed in the production of the SWISS-PROT protein knowledgebase. The HAMAP project, or 'High-quality Automated and Manual Annotation of microbial Proteomes', aims to integrate manual and automatic annotation methods in order to enhance the speed of the curation process while preserving the quality of the database annotation. Automatic annotation is only applied to entries that belong to manually defined orthologous families and to entries with no identifiable similarities (ORFans). Many checks are enforced in order to prevent the propagation of wrong annotation and to spot problematic cases, which are channelled to manual curation. The results of this annotation are integrated in SWISS-PROT, and a website is provided at http://www.expasy.org/sprot/hamap/. PMID:12798039

  9. 40 CFR 204.57 - Selective enforcement auditing.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing. 204.57 Section 204.57 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT Portable Air Compressors § 204.57 Selective enforcement...

  10. 40 CFR 205.171 - Selective enforcement auditing (SEA) requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing (SEA) requirements. 205.171 Section 205.171 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Motorcycle Exhaust Systems § 205.171 Selective enforcement auditing...

  11. 40 CFR 205.160 - Selective enforcement auditing (SEA) requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing (SEA) requirements. 205.160 Section 205.160 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Motorcycles § 205.160 Selective enforcement auditing...

  12. 45 CFR 5.68 - Exemption seven: Law enforcement.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Exemption seven: Law enforcement. 5.68 Section 5... INFORMATION REGULATIONS Reasons for Withholding Some Records § 5.68 Exemption seven: Law enforcement. We are not required to disclose information or records that the government has compiled for law...

  13. 40 CFR 35.6145 - Eligibility for enforcement Cooperative Agreements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Eligibility for enforcement Cooperative Agreements. 35.6145 Section 35.6145 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS AND... enforcement Cooperative Agreements. Pursuant to CERCLA section 104(d), States, political subdivisions...

  14. 25 CFR 11.1003 - Law enforcement officer's duties.

    Science.gov (United States)

    2010-04-01

    ... LAW AND ORDER CODE Juvenile Offender Procedure § 11.1003 Law enforcement officer's duties. A law enforcement officer who takes a minor into custody pursuant to § 11.1002 of this part shall: (a) Give the following warnings to any minor taken into custody prior to any questioning: (1) The minor has a right...

  15. Task force on compliance and enforcement. Final report. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    1978-03-01

    Recommendations for measures to strengthen the FEA enforcement program in the area of petroleum price regulation are presented. Results of task force efforts are presented in report and recommendations sections concerned with pending cases, compliance program organization, enforcement powers, compliance strategy, and audit staffing and techniques. (JRD)

  16. 12 CFR Appendix B to Part 205 - Federal Enforcement Agencies

    Science.gov (United States)

    2010-01-01

    ... ELECTRONIC FUND TRANSFERS (REGULATION E) Pt. 205, App. B Appendix B to Part 205—Federal Enforcement Agencies The following list indicates which Federal agency enforces Regulation E (12 CFR part 205) for... above Federal Trade Commission, Electronic Fund Transfers, Washington, D.C. 20580....

  17. 31 CFR 103.76 - Enforcement of summons.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Enforcement of summons. 103.76 Section 103.76 Money and Finance: Treasury Regulations Relating to Money and Finance FINANCIAL..., prompt notification of the referral must be made to the Director, Office of Financial Enforcement,...

  18. 75 FR 25121 - Revisions to Energy Efficiency Enforcement Regulations

    Science.gov (United States)

    2010-05-07

    ... Parts 430 and 431 RIN 1904-AC23 Revisions to Energy Efficiency Enforcement Regulations AGENCY: Office of Energy Efficiency and Renewable Energy and Office of the General Counsel, Department of Energy. ACTION... ``Department'') intends to expand and revise its existing energy efficiency enforcement regulations for...

  19. Role of Enforcement in Prevention. Issues in Prevention

    Science.gov (United States)

    Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2012

    2012-01-01

    This issue of "Issues in Prevention" focuses on the role of enforcement in prevention. This issue contains the following articles: (1) What the Evidence Tells Us about the Role of Enforcement in Prevention; (2) Campus Briefs; (3) Q&A with Charles Cychosz; and (4) Higher Education Center Resources.

  20. 29 CFR 775.0 - General enforcement policy.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false General enforcement policy. 775.0 Section 775.0 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR STATEMENTS OF GENERAL POLICY OR INTERPRETATION NOT DIRECTLY RELATED TO REGULATIONS GENERAL § 775.0 General enforcement...

  1. Automated Camera Calibration

    Science.gov (United States)

    Chen, Siqi; Cheng, Yang; Willson, Reg

    2006-01-01

    Automated Camera Calibration (ACAL) is a computer program that automates the generation of calibration data for camera models used in machine vision systems. Machine vision camera models describe the mapping between points in three-dimensional (3D) space in front of the camera and the corresponding points in two-dimensional (2D) space in the camera s image. Calibrating a camera model requires a set of calibration data containing known 3D-to-2D point correspondences for the given camera system. Generating calibration data typically involves taking images of a calibration target where the 3D locations of the target s fiducial marks are known, and then measuring the 2D locations of the fiducial marks in the images. ACAL automates the analysis of calibration target images and greatly speeds the overall calibration process.

  2. Automated telescope scheduling

    Science.gov (United States)

    Johnston, Mark D.

    1988-08-01

    With the ever increasing level of automation of astronomical telescopes the benefits and feasibility of automated planning and scheduling are becoming more apparent. Improved efficiency and increased overall telescope utilization are the most obvious goals. Automated scheduling at some level has been done for several satellite observatories, but the requirements on these systems were much less stringent than on modern ground or satellite observatories. The scheduling problem is particularly acute for Hubble Space Telescope: virtually all observations must be planned in excruciating detail weeks to months in advance. Space Telescope Science Institute has recently made significant progress on the scheduling problem by exploiting state-of-the-art artificial intelligence software technology. What is especially interesting is that this effort has already yielded software that is well suited to scheduling groundbased telescopes, including the problem of optimizing the coordinated scheduling of more than one telescope.

  3. DOE enforcement program roles and responsibilities: DOE handbook

    International Nuclear Information System (INIS)

    The Price-Anderson Act provides indemnification to DOE contractors who manage and conduct nuclear activities in the DOE complex. The government acts as an insurer for these contractors against any findings of liability from the nuclear activities of the contractor within the scope of its contract. 10 CFR Part 820 establishes the legal framework for implementing DOE's Nuclear Safety Enforcement Program. Integration with other DOE organizations and programs would assure that the enforcement process properly considers the actual or potential safety significance of a violation when determining an appropriate enforcement sanction. Achieving a proactive contractor compliance assurance rather than a heavy enforcement hand, will require a foundation of cooperation and teamwork across DOE organizations. This handbook identifies the areas of interface for the DOE Enforcement Program and provides guidance on roles and responsibilities for the key DOE organizational areas. It complements DOE-HDBK-1087-95 and 1089-95

  4. An empirical investigation of compliance and enforcement problems

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Jensen, Frank

    2011-01-01

    Compliance and enforcement are important issues from an economic point of view because management measures are useless without a certain level of enforcement. These conclusions come from the well-established theoretical literature on compliance and enforcement problems within fisheries. This paper...... at the level of compliance and the private and social benefits of varying enforcement intensities, penalties and management measures as well as combinations thereof. The empirical investigation of the case study indicates the current level of control is too low compared to the optimal level of...... contributes to the literature by investigating compliance and enforcement in the empirical case of a mixed trawl fishery targeting Norway lobster in Kattegat and Skagerrak located north of Denmark with help from a simulated model. The paper presents results from two simulation models of the case study: one...

  5. Myths in test automation

    OpenAIRE

    Jazmine Francis

    2015-01-01

    Myths in automation of software testing is an issue of discussion that echoes about the areas of service in validation of software industry. Probably, the first though that appears in knowledgeable reader would be Why this old topic again? What's New to discuss the matter? But, for the first time everyone agrees that undoubtedly automation testing today is not today what it used to be ten or fifteen years ago, because it has evolved in scope and magnitude. What began as a simple linear script...

  6. Automated phantom assay system

    International Nuclear Information System (INIS)

    This paper describes an automated phantom assay system developed for assaying phantoms spiked with minute quantities of radionuclides. The system includes a computer-controlled linear-translation table that positions the phantom at exact distances from a spectrometer. A multichannel analyzer (MCA) interfaces with a computer to collect gamma spectral data. Signals transmitted between the controller and MCA synchronize data collection and phantom positioning. Measured data are then stored on disk for subsequent analysis. The automated system allows continuous unattended operation and ensures reproducible results

  7. Cassini Attitude Control Operations Flight Rules and How They are Enforced

    Science.gov (United States)

    Burk, Thomas; Bates, David

    2008-01-01

    The Cassini spacecraft was launched on October 15, 1997 and arrived at Saturn on June 30, 2004. It has performed detailed observations and remote sensing of Saturn, its rings, and its satellites since that time. Cassini deployed the European-built Huygens probe which descended through the Titan atmosphere and landed on its surface on January 14, 2005. Operating the Cassini spacecraft is a complex scientific, engineering, and management job. In order to safely operate the spacecraft, a large number of flight rules were developed. These flight rules must be enforced throughout the lifetime of the Cassini spacecraft. Flight rules are defined as any operational limitation imposed by the spacecraft system design, hardware, and software, violation of which would result in spacecraft damage, loss of consumables, loss of mission objectives, loss and/or degradation of science, and less than optimal performance. Flight rules require clear description and rationale. Detailed automated methods have been developed to insure the spacecraft is continuously operated within these flight rules. An overview of all the flight rules allocated to the Cassini Attitude Control and Articulation Subsystem and how they are enforced is presented in this paper.

  8. Cost and Benefit of Control Strategies - Estimation of Benefit functions, enforcement-probability function and enforcement-cost function

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Jensen, Frank

      Within the EU Sixth Framework Programme an ongoing research project, COBECOS, has developed a theory of enforcement and a software code for computer modeling of different fisheries with fisheries enforcement cases. The case of the Danish fishery for Nephrops faces problems with landings of...... undersized lobsters and illegal bycactch of cod. The enforcement to avoid the illegal activities consists of physical control, such as dock side inspections and boarding, and administrative control with integration of different databases. This paper presents the first steps in the application of the theory...... enforcement levels and 4) the connection between different enforcement levels and costs. The purpose of estimating the functional relationships are for future application in the COBECOS computer modeling in order to carry out an cost-benefit analysis of control strategies and thereby find the optimal mix and...

  9. Automated conflict resolution issues

    Science.gov (United States)

    Wike, Jeffrey S.

    1991-01-01

    A discussion is presented of how conflicts for Space Network resources should be resolved in the ATDRSS era. The following topics are presented: a description of how resource conflicts are currently resolved; a description of issues associated with automated conflict resolution; present conflict resolution strategies; and topics for further discussion.

  10. Protokoller til Home Automation

    DEFF Research Database (Denmark)

    Kjær, Kristian Ellebæk

    2008-01-01

    computer, der kan skifte mellem foruddefinerede indstillinger. Nogle gange kan computeren fjernstyres over internettet, så man kan se hjemmets status fra en computer eller måske endda fra en mobiltelefon. Mens nævnte anvendelser er klassiske indenfor home automation, er yderligere funktionalitet dukket op...

  11. Myths in test automation

    Directory of Open Access Journals (Sweden)

    Jazmine Francis

    2015-01-01

    Full Text Available Myths in automation of software testing is an issue of discussion that echoes about the areas of service in validation of software industry. Probably, the first though that appears in knowledgeable reader would be Why this old topic again? What's New to discuss the matter? But, for the first time everyone agrees that undoubtedly automation testing today is not today what it used to be ten or fifteen years ago, because it has evolved in scope and magnitude. What began as a simple linear scripts for web applications today has a complex architecture and a hybrid framework to facilitate the implementation of testing applications developed with various platforms and technologies. Undoubtedly automation has advanced, but so did the myths associated with it. The change in perspective and knowledge of people on automation has altered the terrain. This article reflects the points of views and experience of the author in what has to do with the transformation of the original myths in new versions, and how they are derived; also provides his thoughts on the new generation of myths.

  12. Automated data model evaluation

    International Nuclear Information System (INIS)

    Modeling process is essential phase within information systems development and implementation. This paper presents methods and techniques for analysis and evaluation of data model correctness. Recent methodologies and development results regarding automation of the process of model correctness analysis and relations with ontology tools has been presented. Key words: Database modeling, Data model correctness, Evaluation

  13. Automated solvent concentrator

    Science.gov (United States)

    Griffith, J. S.; Stuart, J. L.

    1976-01-01

    Designed for automated drug identification system (AUDRI), device increases concentration by 100. Sample is first filtered, removing particulate contaminants and reducing water content of sample. Sample is extracted from filtered residue by specific solvent. Concentrator provides input material to analysis subsystem.

  14. ELECTROPNEUMATIC AUTOMATION EDUCATIONAL LABORATORY

    OpenAIRE

    Dolgorukov, S. O.; National Aviation University; Roman, B. V.; National Aviation University

    2013-01-01

    The article reflects current situation in education regarding mechatronics learning difficulties. Com-plex of laboratory test benches on electropneumatic automation are considered as a tool in advancing through technical science. Course of laboratory works developed to meet the requirement of efficient and reliable way of practical skills acquisition is regarded the simplest way for students to learn the ba-sics of mechatronics.

  15. Decoding Nonverbal Communication in Law Enforcement

    Directory of Open Access Journals (Sweden)

    Noel Otu

    2015-06-01

    Full Text Available This analytical study examined the importance of nonverbal communication in law enforcement work. In many encounters between police and citizens, the primary focus is always on suspects’/citizens’ verbal statements, rather than on how and what their body is conveying while telling the story. This study argues for an integrated approach in which the police officers need to realise that they, too, are communicating nonverbally with suspects. This study reveals that nonverbal communication, also known as body language, proxemic, and kinesics behavior, in many cases tends to constitute a much larger fraction of the police communication model than verbal communication, which should help officers to establish authority and dominance and ensure their safety. Nonverbal communication is not something added onto criminal justice, but rather it is the essence of criminal justice. This results suggest that nonverbal communication is the foundation of a successful relationship/encounter between criminal justice personnel and suspects or criminals, as well as being a powerful method that cannot be feigned.

  16. Enforcement of legislation to control environmental pollution

    International Nuclear Information System (INIS)

    The atrocities inflicted upon humanity in the name of progress there should be an end to it as discussed at length in the title of Enforcement of Legislation to control the Environmental Pollution, the smoke emitting vehicles plying on the road side, polluted water allover the country, uncontrolled smoke of factories, kiln, steel mills thermal power station and enormous activities uncontrolled in the presence of Environmental Laws, what else we need to accomplish the same, it is due to lack of education that we yet to get to show some improvements in this aspect, but who will suffer? Non but The coming generation. Spreading pollution in the name of progress; Industries, factories, and machines, in excess; Black smoke and the refuse, they process Contaminate the rivers and the land's bareness; Threatens the laws of nature, they transgress; Undernourished children suffering from poverty; Perished food and their bodies scrawny; Asking the world with heir eyes teary; Why the deprivation and their futures foggy. Hear, O' embryo my pieces of ad ice; For every great deed you ought to pay a price, Strive for restoring the peace of nature; Struggle against the odds like a strong creature; Loving the nature and singing His song; God is with lose who are steadfast and strong. (author)

  17. ENFORCING ARBITRAL AWARDS IN ROMANIA - ALWAYS A CHALLENGE

    Directory of Open Access Journals (Sweden)

    Paul COMŞA

    2015-07-01

    Full Text Available Securing a favourable award from a foreign or domestic arbitral court proves to be in many cases only half the battle. As a rule, Romanian law and courts acknowledge the final, binding and enforceable nature of arbitration awards and state the principle that arbitration awards shall be freely implemented by parties. However, there are instances where the unsuccessful party does not voluntarily perform the obligations arising from the arbitral award. In these cases, before incurring legal expenses on formal enforcement procedures, it is worth attempting several informal or indirect means of persuading the other party to honour its duties. If the opposing party still refuses to comply with the award, one may resort to an ordinary enforcement procedure. In Romania, enforcement procedures may be conducted by judicial executors only after the arbitral award is rendered enforceable by a domestic court of law. As in most developed states, the vast majority of Romanian courts have enforced both domestic and foreign arbitral awards. Although there are certain instances when arbitral awards have been denied enforcement, these are the exception rather than the rule because under Romanian law the right of refusal to comply with the arbitral award shall be exerted only through an action of annulment for limited reasons.

  18. Prospects of development of the court decrees enforcement system

    Directory of Open Access Journals (Sweden)

    Kristina Sergeyevna Morkovskaya

    2015-06-01

    Full Text Available Objective the relevance of the topic the insufficient level of its scientific elaboration predetermined the research objectives which consist in the analysis of the institution of enforcement proceedings the identification of key challenges trends and ways to improve the current system of court decrees enforcement. Methods the methodological basis of the undertaken research is scientific method of cognition in conjunction with certain specific scientific methods the laws of formal logic historical method comparative legal method and systematic analysis of theoretical works studied in this work. Results the emerging trends in the enforcement proceedings reform in the country cannot be considered to be satisfactory in general although some initiatives seem quite appropriate in case of the proper performance. If you the situation cannot be rectified with the execution of judicial decrees basing on own experience only it is necessary to pay attention to foreign practices and to provide citizens with the right to an effective judicial protection. Of all approaches to reforming of the enforcement institution analyzed in the article the preferred for the Russian legal reality is modernization of the existing nonjudicial system of enforcement through civil procedural means. Scientific novelty at present neither the civil procedure nor the general theory of law has not developed a unified understanding of the civil procedural tools for improving the efficiency of enforcement proceedings. Practical value the main provisions and conclusions of the article can be used in research and teaching when viewing the issues of the effectiveness of enforcement proceedings. nbsp

  19. Automating spectral measurements

    Science.gov (United States)

    Goldstein, Fred T.

    2008-09-01

    This paper discusses the architecture of software utilized in spectroscopic measurements. As optical coatings become more sophisticated, there is mounting need to automate data acquisition (DAQ) from spectrophotometers. Such need is exacerbated when 100% inspection is required, ancillary devices are utilized, cost reduction is crucial, or security is vital. While instrument manufacturers normally provide point-and-click DAQ software, an application programming interface (API) may be missing. In such cases automation is impossible or expensive. An API is typically provided in libraries (*.dll, *.ocx) which may be embedded in user-developed applications. Users can thereby implement DAQ automation in several Windows languages. Another possibility, developed by FTG as an alternative to instrument manufacturers' software, is the ActiveX application (*.exe). ActiveX, a component of many Windows applications, provides means for programming and interoperability. This architecture permits a point-and-click program to act as automation client and server. Excel, for example, can control and be controlled by DAQ applications. Most importantly, ActiveX permits ancillary devices such as barcode readers and XY-stages to be easily and economically integrated into scanning procedures. Since an ActiveX application has its own user-interface, it can be independently tested. The ActiveX application then runs (visibly or invisibly) under DAQ software control. Automation capabilities are accessed via a built-in spectro-BASIC language with industry-standard (VBA-compatible) syntax. Supplementing ActiveX, spectro-BASIC also includes auxiliary serial port commands for interfacing programmable logic controllers (PLC). A typical application is automatic filter handling.

  20. CASTLE: an advanced technology partnership serving law enforcement

    Science.gov (United States)

    McCoig, Thomas M.

    1997-01-01

    The Center for Applied Science and Technology for Law Enforcement (CASTLE) is supported by the National Institute of Justice Office of Science and Technology and is establishing partnerships with the National Law Enforcement Corrections and Technology Center in Charleston, South Carolina. Additionally, CASTLE is working with the American Society of Crime Lab Directors (ASCLD) to direct effective interface with and support of state and local crime laboratories. Extremely sophisticated, often one-of-a-kind, equipment and very-capable scientific expertise are resident at U.S. federal government laboratories and, until recently, have not been applied often to law enforcement problems, particularly at the state and local level. While there have been a number of research and development programs at national laboratories sponsored by agencies such as the National Institute of Justice, most of these have been focused on long-term objectives to meet broad national needs. In discussions with local law enforcement personnel, it is apparent that there are much more immediate technology needs, which are not being addressed by nationwide programs, in fundamental areas including video and audio surveillance, trace and physical evidence sampling, and forensic laboratory analysis. In a pilot program, Oak Ridge National Laboratory (ORNL), a significant component of the nation's science and technology resources located in Tennessee, recently made a commitment to support law enforcement where possible with advanced technology. ORNL formed the Center for Applied Science and Technology for Law Enforcement (CASTLE), a partnership of scientific, university, private sector, and law enforcement personnel. The goal of the CASTLE program is to apply technology at the grassroots working level to both solve crimes, to improve safety to law enforcement personnel, and to improve the overall quality of law enforcement services within the United States.

  1. Child Support Enforcement Annual Data Report Form 157 - YR 2004

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  2. Child Support Enforcement Annual Data Report Form 34A - 2006

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains information about collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D...

  3. Child Support Enforcement Annual Data Report Form 34A - 2007

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  4. Child Support Enforcement Annual Data Report Form 34A - 2003

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  5. Child Support Enforcement Annual Data Report Form 34A - 2009

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  6. Child Support Enforcement Annual Data Report Form 34A - 2006

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  7. Child Support Enforcement Annual Data Report Form 34A - 2008

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  8. Child Support Enforcement Annual Data Report Form 34A - 2004

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  9. Child Support Enforcement Annual Data Report Form 34A - 2005

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  10. 32 CFR 505.12 - Privacy Act enforcement actions.

    Science.gov (United States)

    2010-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a... record under false pretenses; or (iii) Maintaining a system of records without first meeting the...

  11. Price-Anderson Nuclear Safety Enforcement Program. 1997 annual report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-01-01

    This report summarizes activities in the Department of Energy's Price-Anderson Amendments Act (PAAA) Enforcement Program in calendar year 1997 and highlights improvements planned for 1998. The DOE Enforcement Program involves the Office of Enforcement and Investigation in the DOE Headquarters Office of Environment, Safety and Health, as well as numerous PAAA Coordinators and technical advisors in DOE Field and Program Offices. The DOE Enforcement Program issued 13 Notices of Violation (NOV`s) in 1997 for cases involving significant or potentially significant nuclear safety violations. Six of these included civil penalties totaling $440,000. Highlights of these actions include: (1) Brookhaven National Laboratory Radiological Control Violations / Associated Universities, Inc.; (2) Bioassay Program Violations at Mound / EG and G, Inc.; (3) Savannah River Crane Operator Uptake / Westinghouse Savannah River Company; (4) Waste Calciner Worker Uptake / Lockheed-Martin Idaho Technologies Company; and (5) Reactor Scram and Records Destruction at Sandia / Sandia Corporation (Lockheed-Martin).

  12. Spatial service delivery system for smart licensing & enforcement management

    Science.gov (United States)

    Wahap, N. A.; Ismail, N. M.; Nor, N. M.; Ahmad, N.; Omar, M. F.; Termizi, A. A. A.; Zainal, D.; Noordin, N. M.; Mansor, S.

    2016-06-01

    Spatial information has introduced a new sense of urgency for a better understanding of the public needs in term of what, when and where they need services and through which devices, platform or physical locations they need them. The objective of this project is to value- add existing license management process for business premises which comes under the responsibility of Local Authority (PBT). Manipulation of geospatial and tracing technology via mobile platform allows enforcement officers to work in real-time, use a standardized system, improve service delivery, and optimize operation management. This paper will augment the scope and capabilities of proposed concept namely, Smart Licensing/Enforcement Management (SLEm). It will review the current licensing and enforcement practice of selected PBT in comparison to the enhanced method. As a result, the new enhanced system is expected to offer a total solution for licensing/enforcement management whilst increasing efficiency and transparency for smart city management and governance.

  13. Performance-Driven Interface Contract Enforcement for Scientific Components

    Energy Technology Data Exchange (ETDEWEB)

    Dahlgren, T L

    2007-10-01

    Performance-driven interface contract enforcement research aims to improve the quality of programs built from plug-and-play scientific components. Interface contracts make the obligations on the caller and all implementations of the specified methods explicit. Runtime contract enforcement is a well-known technique for enhancing testing and debugging. However, checking all of the associated constraints during deployment is generally considered too costly from a performance stand point. Previous solutions enforced subsets of constraints without explicit consideration of their performance implications. Hence, this research measures the impacts of different interface contract sampling strategies and compares results with new techniques driven by execution time estimates. Results from three studies indicate automatically adjusting the level of checking based on performance constraints improves the likelihood of detecting contract violations under certain circumstances. Specifically, performance-driven enforcement is better suited to programs exercising constraints whose costs are at most moderately expensive relative to normal program execution.

  14. Price-Anderson Nuclear Safety Enforcement Program. 1997 annual report

    International Nuclear Information System (INIS)

    This report summarizes activities in the Department of Energy's Price-Anderson Amendments Act (PAAA) Enforcement Program in calendar year 1997 and highlights improvements planned for 1998. The DOE Enforcement Program involves the Office of Enforcement and Investigation in the DOE Headquarters Office of Environment, Safety and Health, as well as numerous PAAA Coordinators and technical advisors in DOE Field and Program Offices. The DOE Enforcement Program issued 13 Notices of Violation (NOV's) in 1997 for cases involving significant or potentially significant nuclear safety violations. Six of these included civil penalties totaling $440,000. Highlights of these actions include: (1) Brookhaven National Laboratory Radiological Control Violations / Associated Universities, Inc.; (2) Bioassay Program Violations at Mound / EG ampersand G, Inc.; (3) Savannah River Crane Operator Uptake / Westinghouse Savannah River Company; (4) Waste Calciner Worker Uptake / Lockheed-Martin Idaho Technologies Company; and (5) Reactor Scram and Records Destruction at Sandia / Sandia Corporation (Lockheed-Martin). Sandia / Sandia Corporation (Lockheed-Martin)

  15. Child Support Enforcement Annual Data Report Form 157 - YR 2009

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  16. Privacy enforcement and analysis for functional active objects

    OpenAIRE

    Kammueller, Florian

    2011-01-01

    In this paper we present an approach for the enforcement of privacy in distributed active object systems, illustrate its implementation in the language ASPfun, and formally prove privacy based on information flow security.

  17. Pesticides and Asbestos Programs and Enforcement Branch Case Tracking System

    Data.gov (United States)

    U.S. Environmental Protection Agency — Tracks the entire life cycle of a regulated site from initial inspection through site response to enforcement actions. Separate site action history is maintained...

  18. Automated Preferences Elicitation

    Czech Academy of Sciences Publication Activity Database

    Kárný, Miroslav; Guy, Tatiana Valentine

    Prague : Institute of Information Theory and Automation, 2011, s. 20-25. ISBN 978-80-903834-6-3. [The 2nd International Workshop od Decision Making with Multiple Imperfect Decision Makers. Held in Conjunction with the 25th Annual Conference on Neural Information Processing Systems (NIPS 2011). Sierra Nevada (ES), 16.12.2011-16.12.2011] R&D Projects: GA MŠk 1M0572; GA ČR GA102/08/0567 Institutional research plan: CEZ:AV0Z10750506 Keywords : elicitation * decision making * Bayesian decision making * fully probabilistic design Subject RIV: BB - Applied Statistics, Operational Research http://library.utia.cas.cz/separaty/2011/AS/karny-automated preferences elicitation.pdf

  19. Automated drawing generation system

    International Nuclear Information System (INIS)

    Since automated CAD drawing generation systems still require human intervention, improvements were focussed on an interactive processing section (data input and correcting operation) which necessitates a vast amount of work. As a result, human intervention was eliminated, the original objective of a computerized system. This is the first step taken towards complete automation. The effects of development and commercialization of the system are as described below. (1) The interactive processing time required for generating drawings was improved. It was determined that introduction of the CAD system has reduced the time required for generating drawings. (2) The difference in skills between workers preparing drawings has been eliminated and the quality of drawings has been made uniform. (3) The extent of knowledge and experience demanded of workers has been reduced. (author)

  20. Terminal automation system maintenance

    Energy Technology Data Exchange (ETDEWEB)

    Coffelt, D.; Hewitt, J. [Engineered Systems Inc., Tempe, AZ (United States)

    1997-01-01

    Nothing has improved petroleum product loading in recent years more than terminal automation systems. The presence of terminal automation systems (TAS) at loading racks has increased operational efficiency and safety and enhanced their accounting and management capabilities. However, like all finite systems, they occasionally malfunction or fail. Proper servicing and maintenance can minimize this. And in the unlikely event a TAS breakdown does occur, prompt and effective troubleshooting can reduce its impact on terminal productivity. To accommodate around-the-clock loading at racks, increasingly unattended by terminal personnel, TAS maintenance, servicing and troubleshooting has become increasingly demanding. It has also become increasingly important. After 15 years of trial and error at petroleum and petrochemical storage and transfer terminals, a number of successful troubleshooting programs have been developed. These include 24-hour {open_quotes}help hotlines,{close_quotes} internal (terminal company) and external (supplier) support staff, and {open_quotes}layered{close_quotes} support. These programs are described.

  1. ATLAS Distributed Computing Automation

    CERN Document Server

    Schovancova, J; The ATLAS collaboration; Borrego, C; Campana, S; Di Girolamo, A; Elmsheuser, J; Hejbal, J; Kouba, T; Legger, F; Magradze, E; Medrano Llamas, R; Negri, G; Rinaldi, L; Sciacca, G; Serfon, C; Van Der Ster, D C

    2012-01-01

    The ATLAS Experiment benefits from computing resources distributed worldwide at more than 100 WLCG sites. The ATLAS Grid sites provide over 100k CPU job slots, over 100 PB of storage space on disk or tape. Monitoring of status of such a complex infrastructure is essential. The ATLAS Grid infrastructure is monitored 24/7 by two teams of shifters distributed world-wide, by the ATLAS Distributed Computing experts, and by site administrators. In this paper we summarize automation efforts performed within the ATLAS Distributed Computing team in order to reduce manpower costs and improve the reliability of the system. Different aspects of the automation process are described: from the ATLAS Grid site topology provided by the ATLAS Grid Information System, via automatic site testing by the HammerCloud, to automatic exclusion from production or analysis activities.

  2. Rapid automated nuclear chemistry

    International Nuclear Information System (INIS)

    Rapid Automated Nuclear Chemistry (RANC) can be thought of as the Z-separation of Neutron-rich Isotopes by Automated Methods. The range of RANC studies of fission and its products is large. In a sense, the studies can be categorized into various energy ranges from the highest where the fission process and particle emission are considered, to low energies where nuclear dynamics are being explored. This paper presents a table which gives examples of current research using RANC on fission and fission products. The remainder of this text is divided into three parts. The first contains a discussion of the chemical methods available for the fission product elements, the second describes the major techniques, and in the last section, examples of recent results are discussed as illustrations of the use of RANC

  3. Rapid automated nuclear chemistry

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, R.A.

    1979-05-31

    Rapid Automated Nuclear Chemistry (RANC) can be thought of as the Z-separation of Neutron-rich Isotopes by Automated Methods. The range of RANC studies of fission and its products is large. In a sense, the studies can be categorized into various energy ranges from the highest where the fission process and particle emission are considered, to low energies where nuclear dynamics are being explored. This paper presents a table which gives examples of current research using RANC on fission and fission products. The remainder of this text is divided into three parts. The first contains a discussion of the chemical methods available for the fission product elements, the second describes the major techniques, and in the last section, examples of recent results are discussed as illustrations of the use of RANC.

  4. Automated Microbial Metabolism Laboratory

    Science.gov (United States)

    1973-01-01

    Development of the automated microbial metabolism laboratory (AMML) concept is reported. The focus of effort of AMML was on the advanced labeled release experiment. Labeled substrates, inhibitors, and temperatures were investigated to establish a comparative biochemical profile. Profiles at three time intervals on soil and pure cultures of bacteria isolated from soil were prepared to establish a complete library. The development of a strategy for the return of a soil sample from Mars is also reported.

  5. Components for automated microscopy

    Science.gov (United States)

    Determann, H.; Hartmann, H.; Schade, K. H.; Stankewitz, H. W.

    1980-12-01

    A number of devices, aiming at automated analysis of microscopic objects as regards their morphometrical parameters or their photometrical values, were developed. These comprise: (1) a device for automatic focusing tuned on maximum contrast; (2) a feedback system for automatic optimization of microscope illumination; and (3) microscope lenses with adjustable pupil distances for usage in the two previous devices. An extensive test program on histological and zytological applications proves the wide application possibilities of the autofocusing device.

  6. Automation of dissolution tests

    OpenAIRE

    Rolf Rolli

    2003-01-01

    Dissolution testing of drug formulations was introduced in the 1960s and accepted by health regulatory authorities in the 1970s. Since then, the importance of dissolution has grown rapidly as have the number of tests and demands in quality-control laboratories. Recent research works lead to the development of in-vitro dissolution tests as replacements for human and animal bioequivalence studies. For many years, a lot of time and effort has been invested in automation of dissolution tests. The...

  7. Automated uranium assays

    International Nuclear Information System (INIS)

    Precise, timely inventories of enriched uranium stocks are vital to help prevent the loss, theft, or diversion of this material for illicit use. A wet-chemistry analyzer has been developed at LLL to assist in these inventories by performing automated analyses of uranium samples from different stages in the nuclear fuel cycle. These assays offer improved accuracy, reduced costs, significant savings in manpower, and lower radiation exposure for personnel compared with present techniques

  8. Construction Automation and Robotics

    OpenAIRE

    Bock, Thomas

    2008-01-01

    Due to the high complexity of the construction process and the stagnating technological development a long-term preparation is necessary to adapt it to advanced construction methods. Architects, engineers and all other participants of the construction process have to be integrated in this adaptation process. The short- and long-term development of automation will take place step-by-step and will be oriented to the respective application and requirements. In the initial phase existing building...

  9. Shielded cells transfer automation

    International Nuclear Information System (INIS)

    Nuclear waste from shielded cells is removed, packaged, and transferred manually in many nuclear facilities. To reduce radiation exposure to operators, technological advances in remote handling and automation were employed. An industrial robot and a specially designed end effector, access port, and sealing machine were used to remotely bag waste containers out of a glove box. The system is operated from a control panel outside the work area via television cameras

  10. Video Analysis for Body-worn Cameras in Law Enforcement

    OpenAIRE

    Corso, Jason J.; Alahi, Alexandre; Grauman, Kristen; Hager, Gregory D.; Morency, Louis-Philippe; Sawhney, Harpreet; Sheikh, Yaser

    2016-01-01

    The social conventions and expectations around the appropriate use of imaging and video has been transformed by the availability of video cameras in our pockets. The impact on law enforcement can easily be seen by watching the nightly news; more and more arrests, interventions, or even routine stops are being caught on cell phones or surveillance video, with both positive and negative consequences. This proliferation of the use of video has led law enforcement to look at the potential benefit...

  11. Contract Innovation and Legal Evolution under Imperfect Enforcement

    OpenAIRE

    Nicola Gennaioli; Giacomo A.M. Ponzetto

    2015-01-01

    We model the joint evolution of contracts and precedents by introducing imperfect enforcement into a standard incomplete contracts setup. We assume that biased trial courts can refuse to verify novel evidence but are bound to respect precedents, namely to verify evidence that other judges verified in past cases. We find that optimal contracts are innovative (contingent on both precedents and novel evidence), but noisy evidence and judicial biases introduce enforcement risk and cause incentive...

  12. Central Bank (Supervision and Enforcement) (Amendment) Bill 2016: Legislative Bill

    OpenAIRE

    Butler, Graham; Rock, Noel

    2016-01-01

    Private Members' Bill (legislation) introduced in Dáil Éireann (House of Deputies), Houses of the Oireachtas (Irish Parliament).An Act to amend sections 49 and 51 of the Central Bank (Supervision and Enforcement) Act 2013 to ensure the powers exercised by the Central Bank of Ireland to make regulations, conferred by the Central Bank (Supervision and Enforcement) Act 2013 are fit for purpose; and to provide for related matters.

  13. Averting Enforcement: Strategic Response to the Threat of Environmental Regulation

    OpenAIRE

    Keohane, Nathaniel O.; Erin T. Mansur; Voynov, Andrey

    2007-01-01

    This paper uses data from the U.S. electric power industry to explore the strategic responses of regulated firms to government enforcement. We focus on the enforcement of New Source Review, a provision of the Clean Air Act that imposes stringent emissions limitations on substantially modified older power plants. Starting in late 1999, the EPA sued the owners of 46 power plants for NSR violations. This paper explores how electric utilities responded to both the perceived threat of future actio...

  14. The effect of enforcement on speed behaviour : a literature review.

    OpenAIRE

    Oei, H.-l.

    1998-01-01

    The objective of this literature study is to give an overview of research on speed enforcement and its effect on speed behaviour and safety. This study will be used to find new strategies and tactics to enhance the efficiency and effectiveness of speed enforcement by the police in terms of behaviour and safety. (For the original MASTER Deliverable 3 report see http://www.vtt.fi/rte/projects/yki6/master/rep212.pdf)

  15. Stronger Enforcement of Security Using AOP and Spring AOP

    OpenAIRE

    Sirbi, Kotrappa; Kulkarni, Prakash Jayanth

    2010-01-01

    An application security has two primary goals: first, it is intended to prevent unauthorised personnel from accessing information at higher classification than their authorisation. Second, it is intended to prevent personnel from declassifying information. Using an object oriented approach to implementing application security results not only with the problem of code scattering and code tangling, but also results in weaker enforcement of security. This weaker enforcement of security could be ...

  16. Fighting impunity of enforced disappearances through a regional model

    OpenAIRE

    C.; Genovese; Wilt, de, J.

    2014-01-01

    Grievous moral opprobrium has often been the trigger justifying the recourse to individual criminal responsibility of perpetrators. The process of ‘justice cascade’ initiated by the Nuremberg trials should not come to a halt. Though the current measures of criminal justice enforcement within international tribunals and national courts prove to be necessary mechanisms, they are not always sufficient. Bringing forward the crime of enforced disappearance as an illustration of a phenomenon where ...

  17. Increasing capacity & changing the culture : volunteer management in law enforcement

    OpenAIRE

    Cayson, Donna M.

    2009-01-01

    CHDS State/Local In the post-September 11 world, law enforcement agencies are struggling to protect their communities from the threat of global terrorism, and also preparing for and responding to natural and manmade disasters. The demands on municipal law enforcement agencies have never been greater. Today, more than ever, it is clear that volunteers can play a fundamental role in augmenting a department's homeland security efforts. Are there best practices when incorporating volunteers in...

  18. Defensive Disclosure of Patentable Inventions Under Antitrust Enforcement

    OpenAIRE

    Bhaskarabhatla, Ajay; Pennings, Enrico

    2013-01-01

    textabstractWe formulate a simple model of optimal defensive disclosure by a dominant firm facing uncertain antitrust enforcement and test its implications using unique data on defensive disclosures and patents by IBM. Our results indicate that stronger antitrust enforcement leads to more defensive disclosure and that defensive disclosure served as an alternative, but less successful, mechanism to patenting at IBM in appropriating returns from R&D. We extend our analysis to two other exceptio...

  19. LINAC control automation system

    International Nuclear Information System (INIS)

    A 7 MeV Electron Beam Linear Accelerator (LINAC) being used for pulse radiolysis experiments at RC and CDD, B.A.R.C. has been automated with a PLC based control panel designed and developed by Computer Division, B.A.R.C.. The control panel after power on switches ON various units in a pre-defined sequence and intervals on a single turn of START key from OFF to ON position. The control panel also generates various ramp signals in a pre-defined sequence and rate and steady values and feeds to the LINAC bringing it to the ready for experiment condition. Similarly on a single turn of STOP key from OFF to ON position, the panel ramps down the various signals in pre-defined manners and makes OFF the various units in predefined sequence and timing providing safety to the machine. The steady values for various signals are on line settable as and when required so. This automation system relieves the operator from fatigue of time consuming manual ramping up or down of various signals and running around in four rooms for switching ON or OFF the various units enhancing efficiency and safety. This also facilitates the user scientist to do start up and shutdown operation in the absence of skilled operators and thus adds flexibility for working up to extended timing. This unit has been working satisfactorily since August 2002. For extraordinary condition automation to manual or vice versa change over has been provided. (author)

  20. U.S. Environmental Protection Agency Office of Enforcement and Compliance Assurance New Mapping Tool for Enforcement Cases

    Data.gov (United States)

    U.S. Environmental Protection Agency — The new mapping tool shows facilities in the United States where the EPA concluded formal environmental enforcement actions between October 1, 2008 and September...

  1. Consumer involvement in private EU competition law enforcement: evaluating and Reshaping the enforcement toolbox - towards acceptable mechanisms

    OpenAIRE

    Ioannidou, Maria; Ezrachi, Ariel

    2012-01-01

    EU competition law rhetoric attributes particular importance to ‘consumer interest’. However, despite these often repeated pronouncements, final consumers and their respective interests play only an ancillary role in EU competition law enforcement. This thesis embarks from this observation with the aim of strengthening the importance attributed to ‘consumer interest’ in the application and enforcement of EU competition law. Taking into account the difficulty in adopting a ‘final consumer welf...

  2. M2m Automation: Matlab-To-Map Reduce Automation

    Directory of Open Access Journals (Sweden)

    Archana C S

    2014-06-01

    Full Text Available Abstract- MapReduce is a very popular parallel programming model for cloud computing platforms, and has become an effective method for processing massive data by using a cluster of computers. Program language -to-MapReduce Automator is a possible solution to help traditional programmers easily deploy an application to cloud systems through translating sequential codes to MapReduce codes.M2M Automation mainly focuses on automating numerical computations by using hadoop at the back end. M2M automates Hadoop, for faster execution of Matlab commands using MapReduce code.

  3. Sub-Federal Enforcement of Immigration Law: An Introduction to the Problem of Pretextual Enforcement and Inadequate Remedies

    Directory of Open Access Journals (Sweden)

    Carrie Rosenbaum

    2014-01-01

    Full Text Available Sub-federal enforcement of immigration law has expanded significantly in the last decade raising questions concerning policing, rights violations, and remedies. While the Fourth Amendment has historically provided an avenue for potentially suppressing evidence obtained in violation of a criminal defendant’s civil rights, its applicability in the immigration removal context has been circumscribed. Thus, the avenues to protect the rights of unauthorized noncitizens in immigration removal proceedings are less clear where sub-federal agents act outside of their authorization, particularly in the context of Secure Communities, and enforce immigration law. In the context of immigration exceptionalism, racial profiling has historically played a unique role in immigration law. The lack of adequate measures to deter rights violations where sub-federal agents enforce immigration law raises questions concerning the relationship between criminal and immigration law, and the importance of deterring civil rights violations such as racial profiling, in immigration enforcement. This article will examine the problem of sub-federal law enforcement agents’ use of criminal law violations as a pretext to enforce immigration law and the lack of adequate deterrence of civil rights violations.

  4. Automated Assessment, Face to Face

    OpenAIRE

    Rizik M. H. Al-Sayyed; Amjad Hudaib; Muhannad AL-Shboul; Yousef Majdalawi; Mohammed Bataineh

    2010-01-01

    This research paper evaluates the usability of automated exams and compares them with the paper-and-pencil traditional ones. It presents the results of a detailed study conducted at The University of Jordan (UoJ) that comprised students from 15 faculties. A set of 613 students were asked about their opinions concerning automated exams; and their opinions were deeply analyzed. The results indicate that most students reported that they are satisfied with using automated exams but they have sugg...

  5. Automation System Products and Research

    OpenAIRE

    Rintala, Mikko; Sormunen, Jussi; Kuisma, Petri; Rahkala, Matti

    2014-01-01

    Automation systems are used in most buildings nowadays. In the past they were mainly used in industry to control and monitor critical systems. During the past few decades the automation systems have become more common and are used today from big industrial solutions to homes of private customers. With the growing need for ecologic and cost-efficient management systems, home and building automation systems are becoming a standard way of controlling lighting, ventilation, heating etc. Auto...

  6. Software Testing and Documenting Automation

    OpenAIRE

    Tsybin, Anton; Lyadova, Lyudmila

    2008-01-01

    This article describes some approaches to problem of testing and documenting automation in information systems with graphical user interface. Combination of data mining methods and theory of finite state machines is used for testing automation. Automated creation of software documentation is based on using metadata in documented system. Metadata is built on graph model. Described approaches improve performance and quality of testing and documenting processes.

  7. Embedded system for building automation

    OpenAIRE

    Rolih, Andrej

    2014-01-01

    Home automation is a fast developing field of computer science and electronics. Companies are offering many different products for home automation. Ranging anywhere from complete systems for building management and control, to simple smart lights that can be connected to the internet. These products offer the user greater living comfort and lower their expenses by reducing the energy usage. This thesis shows the development of a simple home automation system that focuses mainly on the enhance...

  8. Assessing the efficiency of priorities for traffic law enforcement in Norway

    DEFF Research Database (Denmark)

    Elvik, Rune; Sogge, Céline Vallet; Lager, Lasse;

    2012-01-01

    This paper assesses the efficiency of priorities for traffic law enforcement in Norway. Priorities are regarded as efficient if: (1) enforcement ensures a sufficient level of deterrence to keep down the rate of violations; (2) selection of target violations for enforcement is based on the risk...... attributable to them; and (3) an optimal level of enforcement is selected, i.e. the marginal benefits of enforcement in terms of preventing accidents equal the marginal costs of enforcement. The efficiency of current traffic law enforcement in Norway is assessed in terms of these criteria. It is found that the...

  9. World-wide distribution automation systems

    Energy Technology Data Exchange (ETDEWEB)

    Devaney, T.M.

    1994-12-31

    A worldwide power distribution automation system is outlined. Distribution automation is defined and the status of utility automation is discussed. Other topics discussed include a distribution management system, substation feeder, and customer functions, potential benefits, automation costs, planning and engineering considerations, automation trends, databases, system operation, computer modeling of system, and distribution management systems.

  10. AUTOMATED API TESTING APPROACH

    Directory of Open Access Journals (Sweden)

    SUNIL L. BANGARE

    2012-02-01

    Full Text Available Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. With the help of software testing we can verify or validate the software product. Normally testing will be done after development of software but we can perform the software testing at the time of development process also. This paper will give you a brief introduction about Automated API Testing Tool. This tool of testing will reduce lots of headache after the whole development of software. It saves time as well as money. Such type of testing is helpful in the Industries & Colleges also.

  11. Automated radioimmunoassay of nicotine

    International Nuclear Information System (INIS)

    The authors have developed an automated nonequilibrium procedure for the radioimmunoassay of nicotine. The use of a unique iodinated nicotine derivative in this procedure gave a sensitivity of 10 μg/l for nicotine with a between-run precision of 7.4% and within-run precision of 6.0%. Nicotine levels of 60 to 67 μg/l were found in subjects 15 min after smoking one standard cigarette. The technique herein reported is a very rapid, and sensitive radioimmunoassay for nicotine and facilitates the determination of nicotine in smoking subjects during the actual process of smoking. (Auth.)

  12. Automated Motivic Analysis

    DEFF Research Database (Denmark)

    Lartillot, Olivier

    2016-01-01

    Motivic analysis provides very detailed understanding of musical composi- tions, but is also particularly difficult to formalize and systematize. A computational automation of the discovery of motivic patterns cannot be reduced to a mere extraction of all possible sequences of descriptions....... The systematic approach inexorably leads to a proliferation of redundant structures that needs to be addressed properly. Global filtering techniques cause a drastic elimination of interesting structures that damages the quality of the analysis. On the other hand, a selection of closed patterns allows...

  13. Mechatronic Design Automation

    DEFF Research Database (Denmark)

    Fan, Zhun

    This book proposes a novel design method that combines both genetic programming (GP) to automatically explore the open-ended design space and bond graphs (BG) to unify design representations of multi-domain Mechatronic systems. Results show that the method, formally called GPBG method, can...... successfully design analogue filters, vibration absorbers, micro-electro-mechanical systems, and vehicle suspension systems, all in an automatic or semi-automatic way. It also investigates the very important issue of co-designing plant-structures and dynamic controllers in automated design of Mechatronic...

  14. Private law enforcement in post-communist Southeastern Europe: An economic analysis of arbitration and execution

    OpenAIRE

    Schoenfelder Bruno

    2004-01-01

    The very idea of private law enforcement is alien in Southeastern Europe and appears there to be perceived as somewhat extravagant. A thoroughgoing search for the reasons of an extremely limited scope of the private law enforcement is undertaken in the paper. Private law enforcement is seen as taking three basic forms: self-enforcement, enforcement through other agents and illegal means and through specialized agents and with reliance on legal means. Particularly extensive is the analysis of ...

  15. Private Law Enforcement, Fine Sharing, and Tax Collection: Theory and Historical Evidence

    OpenAIRE

    Metin M. Cosgel; Haggay Etkes; Thomas J. Miceli

    2010-01-01

    This paper contributes to the literature on private law enforcement by proposing a novel solution to the problem of underenforcement by monopolistic enforcers. Monopolistic enforcers underinvest in fine collection because, by maximizing net expected revenue, they ignore the social benefits of deterrence. We show that this problem can be partially resolved by combining the tasks of law enforcement with tax collection because a joint enforcer-collector will have an interest in reducing the crim...

  16. Enforcing the climate regime: Game theory and the Marrakesh Accords

    Energy Technology Data Exchange (ETDEWEB)

    Hovi, Jon

    2002-07-01

    The article reviews basic insights about compliance and ''hard'' enforcement that can be derived from various non-cooperative equilibrium concepts and evaluates the Marrakesh Accords in light of these insights. Five different notions of equilibrium are considered - the Nash equilibrium, the sub game perfect equilibrium, the re negotiation proof equilibrium, the coalition proof equilibrium and the perfect Bayesian equilibrium. These various types of equilibrium have number of implications for effective enforcement: 1. Consequences of non-compliance should be more than proportionate. 2. To be credible punishment needs to take place in the Pareto frontier, rather than by reversion to some suboptimal state. 3. An effective enforcement system must be able to curb collective as well as individual incentives to cheat. 4. A fully transparent enforcement regime could in fact turn out to be detrimental for compliance levels. It is concluded that constructing an effective system for ''hard'' enforcement of the Kyoto Protocol is a formidable task that has only partially been accomplished by the Marrakesh Accords. A possible explanation is that the design of a compliance system for the climate regime involved a careful balancing of the desire to minimise non-compliance against other important considerations. (Author)

  17. Regulatory scheme for noise enforcement in New Jersey

    Science.gov (United States)

    Zwerling, Eric M.

    2005-09-01

    In the state of New Jersey, noise control programs exist at the state, county, and municipal levels. The Noise Control Act of 1971 (N.J.S.A.13:1G-1, et seq.) is the enabling legislation for the current statewide scheme of noise regulation, which empowered the New Jersey Department of Environmental Protection (DEP) to ``promulgate codes, rules and regulations'' to control and abate noise. Chapter 29, Noise Control (N.J.A.C. 7:29, et seq.) was adopted in 1974, regulating commercial, industrial, community, and public service facilities. Initially, the DEP conducted field enforcement of the code, but has since delegated the authority primarily to county enforcement programs, pursuant to the County Environmental Health Act (N.J.S.A. 20:3A2-21, et seq.). Local agencies may enforce the state code by agreement with their county or alternatively may adopt the Model Ordinance promulgated by the DEP. The Model Ordinance regulates additional sound sources, including residential, multidwelling and multiuse buildings, and enumerates a list of Restricted Uses and Activities. The state code and Model Ordinance are performance codes which establish specific sound level limits, measured per established protocol. Local jurisdictions lacking the desire or capability of enforcing a performance code may choose to adopt and enforce a more subjective nuisance code.

  18. Enforcing the climate regime: Game theory and the Marrakesh Accords

    International Nuclear Information System (INIS)

    The article reviews basic insights about compliance and ''hard'' enforcement that can be derived from various non-cooperative equilibrium concepts and evaluates the Marrakesh Accords in light of these insights. Five different notions of equilibrium are considered - the Nash equilibrium, the sub game perfect equilibrium, the re negotiation proof equilibrium, the coalition proof equilibrium and the perfect Bayesian equilibrium. These various types of equilibrium have number of implications for effective enforcement: 1. Consequences of non-compliance should be more than proportionate. 2. To be credible punishment needs to take place in the Pareto frontier, rather than by reversion to some suboptimal state. 3. An effective enforcement system must be able to curb collective as well as individual incentives to cheat. 4. A fully transparent enforcement regime could in fact turn out to be detrimental for compliance levels. It is concluded that constructing an effective system for ''hard'' enforcement of the Kyoto Protocol is a formidable task that has only partially been accomplished by the Marrakesh Accords. A possible explanation is that the design of a compliance system for the climate regime involved a careful balancing of the desire to minimise non-compliance against other important considerations. (Author)

  19. Individual psychological features of law enforcement officers convicted of crimes

    Directory of Open Access Journals (Sweden)

    Lyutykh V.A.

    2016-06-01

    Full Text Available The relevance of this topic is caused by a significant number of crimes committed by law enforcement officers and the necessity of active prevention. The aim of the study was to determine the individual psychological characteristics of law enforcement officers convicted of intentional crimes. The hypothesis was suggested that the main difference of individual psychological characteristics of law enforcement officers convicted of intentional crimes from individual psychological characteristics of law-abiding law enforcement officers is the difference between the principal values of the person both the main motives of activity adopted by an individual and the structure and the hierarchy of these values. This article describes the progress and results of empirical research conducted on the materials of psychodiagnostic examination of: employees who have been convicted of intentional crimes; law-abiding employees; people entering an internal affairs agency. Test subjects - men 18-46 years old, 90 people. Recommendations for practical psychologist of internal affairs agencies on detection of individual psychological personality features typical for law enforcement officers convicted of intentional crimes are formulated based on the obtained results.

  20. Maneuver Automation Software

    Science.gov (United States)

    Uffelman, Hal; Goodson, Troy; Pellegrin, Michael; Stavert, Lynn; Burk, Thomas; Beach, David; Signorelli, Joel; Jones, Jeremy; Hahn, Yungsun; Attiyah, Ahlam; Illsley, Jeannette

    2009-01-01

    The Maneuver Automation Software (MAS) automates the process of generating commands for maneuvers to keep the spacecraft of the Cassini-Huygens mission on a predetermined prime mission trajectory. Before MAS became available, a team of approximately 10 members had to work about two weeks to design, test, and implement each maneuver in a process that involved running many maneuver-related application programs and then serially handing off data products to other parts of the team. MAS enables a three-member team to design, test, and implement a maneuver in about one-half hour after Navigation has process-tracking data. MAS accepts more than 60 parameters and 22 files as input directly from users. MAS consists of Practical Extraction and Reporting Language (PERL) scripts that link, sequence, and execute the maneuver- related application programs: "Pushing a single button" on a graphical user interface causes MAS to run navigation programs that design a maneuver; programs that create sequences of commands to execute the maneuver on the spacecraft; and a program that generates predictions about maneuver performance and generates reports and other files that enable users to quickly review and verify the maneuver design. MAS can also generate presentation materials, initiate electronic command request forms, and archive all data products for future reference.

  1. Automated Test Case Generation

    CERN Document Server

    CERN. Geneva

    2015-01-01

    I would like to present the concept of automated test case generation. I work on it as part of my PhD and I think it would be interesting also for other people. It is also the topic of a workshop paper that I am introducing in Paris. (abstract below) Please note that the talk itself would be more general and not about the specifics of my PhD, but about the broad field of Automated Test Case Generation. I would introduce the main approaches (combinatorial testing, symbolic execution, adaptive random testing) and their advantages and problems. (oracle problem, combinatorial explosion, ...) Abstract of the paper: Over the last decade code-based test case generation techniques such as combinatorial testing or dynamic symbolic execution have seen growing research popularity. Most algorithms and tool implementations are based on finding assignments for input parameter values in order to maximise the execution branch coverage. Only few of them consider dependencies from outside the Code Under Test’s scope such...

  2. Automation from pictures

    International Nuclear Information System (INIS)

    The state transition diagram (STD) model has been helpful in the design of real time software, especially with the emergence of graphical computer aided software engineering (CASE) tools. Nevertheless, the translation of the STD to real time code has in the past been primarily a manual task. At Los Alamos we have automated this process. The designer constructs the STD using a CASE tool (Cadre Teamwork) using a special notation for events and actions. A translator converts the STD into an intermediate state notation language (SNL), and this SNL is compiled directly into C code (a state program). Execution of the state program is driven by external events, allowing multiple state programs to effectively share the resources of the host processor. Since the design and the code are tightly integrated through the CASE tool, the design and code never diverge, and we avoid design obsolescence. Furthermore, the CASE tool automates the production of formal technical documents from the graphic description encapsulated by the CASE tool. (author)

  3. Automated digital magnetofluidics

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, J; Garcia, A A; Marquez, M [Harrington Department of Bioengineering Arizona State University, Tempe AZ 85287-9709 (United States)], E-mail: tony.garcia@asu.edu

    2008-08-15

    Drops can be moved in complex patterns on superhydrophobic surfaces using a reconfigured computer-controlled x-y metrology stage with a high degree of accuracy, flexibility, and reconfigurability. The stage employs a DMC-4030 controller which has a RISC-based, clock multiplying processor with DSP functions, accepting encoder inputs up to 22 MHz, provides servo update rates as high as 32 kHz, and processes commands at rates as fast as 40 milliseconds. A 6.35 mm diameter cylindrical NdFeB magnet is translated by the stage causing water drops to move by the action of induced magnetization of coated iron microspheres that remain in the drop and are attracted to the rare earth magnet through digital magnetofluidics. Water drops are easily moved in complex patterns in automated digital magnetofluidics at an average speed of 2.8 cm/s over a superhydrophobic polyethylene surface created by solvent casting. With additional components, some potential uses for this automated microfluidic system include characterization of superhydrophobic surfaces, water quality analysis, and medical diagnostics.

  4. Automated Postediting of Documents

    CERN Document Server

    Knight, K; Knight, Kevin; Chander, Ishwar

    1994-01-01

    Large amounts of low- to medium-quality English texts are now being produced by machine translation (MT) systems, optical character readers (OCR), and non-native speakers of English. Most of this text must be postedited by hand before it sees the light of day. Improving text quality is tedious work, but its automation has not received much research attention. Anyone who has postedited a technical report or thesis written by a non-native speaker of English knows the potential of an automated postediting system. For the case of MT-generated text, we argue for the construction of postediting modules that are portable across MT systems, as an alternative to hardcoding improvements inside any one system. As an example, we have built a complete self-contained postediting module for the task of article selection (a, an, the) for English noun phrases. This is a notoriously difficult problem for Japanese-English MT. Our system contains over 200,000 rules derived automatically from online text resources. We report on l...

  5. Testing automation of projects in telecommunication domain

    OpenAIRE

    Alexey, Veselov; Vsevolod, Kotlyarov

    2010-01-01

    This paper presents an integrated approach to testing automation of telecommunication projects along with proposals to automation of conformance testing. The underlying idea is to benefit from combining formal verification and testing automation techniques in order to improve product quality.

  6. Forensic Speaker Recognition Law Enforcement and Counter-Terrorism

    CERN Document Server

    Patil, Hemant

    2012-01-01

    Forensic Speaker Recognition: Law Enforcement and Counter-Terrorism is an anthology of the research findings of 35 speaker recognition experts from around the world. The volume provides a multidimensional view of the complex science involved in determining whether a suspect’s voice truly matches forensic speech samples, collected by law enforcement and counter-terrorism agencies, that are associated with the commission of a terrorist act or other crimes. While addressing such topics as the challenges of forensic case work, handling speech signal degradation, analyzing features of speaker recognition to optimize voice verification system performance, and designing voice applications that meet the practical needs of law enforcement and counter-terrorism agencies, this material all sounds a common theme: how the rigors of forensic utility are demanding new levels of excellence in all aspects of speaker recognition. The contributors are among the most eminent scientists in speech engineering and signal process...

  7. Enforcement Issues in the Governance of Ships’ Carbon Emissions

    Directory of Open Access Journals (Sweden)

    Michael Bloor

    2015-07-01

    Full Text Available The shipping industry, although relatively carbon-efficient, is projected to produce rising carbon emissions in the future as a consequence of increasing world trade. A number of candidate regulations designed to mitigate these emissions have been canvassed by the UN’s International Maritime Organisation and by the European Commission. Many of these schemes are focussed on the use of market measures—emission trading schemes or fuel levies. This paper draws on observational and interview data gathered to examine enforcement issues associated with the control of ships’ sulphur emissions in order to consider the possible enforcement problems that might be associated with projected market measures to control ships’ carbon emissions. Enforcement problems are shown to be associated with the globalised character of the industry and its polycentric governance structure.

  8. Stress intensity and performance capabilities of law enforcement officers

    Directory of Open Access Journals (Sweden)

    Nikolaeva N.V.

    2014-09-01

    Full Text Available We discuss the problem of the stress influence on the performance of law enforcement officers. The importance of the stress connection with psychological and psychophysical functioning is caused by the fact that many professional tasks solving is possible only in case of effective adaptation to the difficult conditions of work. The concepts such as stress and performance, as well as the mechanisms of biological adaptation to stress and the effects of stress on the individual police officer, are considered. Attention is paid to the differences between male and female stress and causes of stress in occupations with a large amount of communication activity. We conducted an empirical study in which we investigated the relationship of stress severity and the performance of law enforcement officers, as well as the differences in law enforcement employees performance depending on stress presence, its level, and gender.

  9. Automated Methods of Corrosion Measurements

    DEFF Research Database (Denmark)

    Andersen, Jens Enevold Thaulov

    . Mechanical control, recording, and data processing must therefore be automated to a high level of precision and reliability. These general techniques and the apparatus involved have been described extensively. The automated methods of such high-resolution microscopy coordinated with computerized...

  10. Opening up Library Automation Software

    Science.gov (United States)

    Breeding, Marshall

    2009-01-01

    Throughout the history of library automation, the author has seen a steady advancement toward more open systems. In the early days of library automation, when proprietary systems dominated, the need for standards was paramount since other means of inter-operability and data exchange weren't possible. Today's focus on Application Programming…

  11. Automation, Performance and International Competition

    DEFF Research Database (Denmark)

    Kromann, Lene; Sørensen, Anders

    productivity growth than other firms. Moreover, automation improves the efficiency of all stages of the production process by reducing setup time, run time, and inspection time and increasing uptime and quantity produced per worker. The efficiency improvement varies by type of automation....

  12. Automated separation for heterogeneous immunoassays

    OpenAIRE

    Truchaud, A.; Barclay, J; Yvert, J. P.; Capolaghi, B.

    1991-01-01

    Beside general requirements for modern automated systems, immunoassay automation involves specific requirements as a separation step for heterogeneous immunoassays. Systems are designed according to the solid phase selected: dedicated or open robots for coated tubes and wells, systems nearly similar to chemistry analysers in the case of magnetic particles, and a completely original design for those using porous and film materials.

  13. Automated Test-Form Generation

    Science.gov (United States)

    van der Linden, Wim J.; Diao, Qi

    2011-01-01

    In automated test assembly (ATA), the methodology of mixed-integer programming is used to select test items from an item bank to meet the specifications for a desired test form and optimize its measurement accuracy. The same methodology can be used to automate the formatting of the set of selected items into the actual test form. Three different…

  14. Automated Methods Of Corrosion Measurements

    DEFF Research Database (Denmark)

    Bech-Nielsen, Gregers; Andersen, Jens Enevold Thaulov; Reeve, John Ch;

    1997-01-01

    The chapter describes the following automated measurements: Corrosion Measurements by Titration, Imaging Corrosion by Scanning Probe Microscopy, Critical Pitting Temperature and Application of the Electrochemical Hydrogen Permeation Cell.......The chapter describes the following automated measurements: Corrosion Measurements by Titration, Imaging Corrosion by Scanning Probe Microscopy, Critical Pitting Temperature and Application of the Electrochemical Hydrogen Permeation Cell....

  15. Automated security response robot

    Science.gov (United States)

    Ciccimaro, Dominic A.; Everett, Hobart R.; Gilbreath, Gary A.; Tran, Tien T.

    1999-01-01

    ROBART III is intended as an advance demonstration platform for non-lethal response measures, extending the concepts of reflexive teleoperation into the realm of coordinated weapons control in law enforcement and urban warfare scenarios. A rich mix of ultrasonic and optical proximity and range sensors facilitates remote operation in unstructured and unexplored buildings with minimal operator supervision. Autonomous navigation and mapping of interior spaces is significantly enhanced by an innovative algorithm which exploits the fact that the majority of man-made structures are characterized by parallel and orthogonal walls. Extremely robust intruder detection and assessment capabilities are achieved through intelligent fusion of a multitude of inputs form various onboard motion sensors. Intruder detection is addressed by a 360-degree staring array of passive-IR motion detectors, augmented by a number of positionable head-mounted sensors. Automatic camera tracking of a moving target is accomplished using a video line digitizer. Non-lethal response systems include a six- barrelled pneumatically-powered Gatling gun, high-powered strobe lights, and three ear-piercing 103-decibel sirens.

  16. Automated Standard Hazard Tool

    Science.gov (United States)

    Stebler, Shane

    2014-01-01

    The current system used to generate standard hazard reports is considered cumbersome and iterative. This study defines a structure for this system's process in a clear, algorithmic way so that standard hazard reports and basic hazard analysis may be completed using a centralized, web-based computer application. To accomplish this task, a test server is used to host a prototype of the tool during development. The prototype is configured to easily integrate into NASA's current server systems with minimal alteration. Additionally, the tool is easily updated and provides NASA with a system that may grow to accommodate future requirements and possibly, different applications. Results of this project's success are outlined in positive, subjective reviews complete by payload providers and NASA Safety and Mission Assurance personnel. Ideally, this prototype will increase interest in the concept of standard hazard automation and lead to the full-scale production of a user-ready application.

  17. Expedition automated flow fluorometer

    Science.gov (United States)

    Krikun, V. A.; Salyuk, P. A.

    2015-11-01

    This paper describes an apparatus and operation of automated flow-through dual-channel fluorometer for studying the fluorescence of dissolved organic matter, and the fluorescence of phytoplankton cells with open and closed reaction centers in sea areas with oligotrophic and eutrophic water type. The step-by step excitation by two semiconductor lasers or two light-emitting diodes is realized in the current device. The excitation wavelengths are 405nm and 532nm in the default configuration. Excitation radiation of each light source can be changed with different durations, intensities and repetition rate. Registration of the fluorescence signal carried out by two photo-multipliers with different optical filters of 580-600 nm and 680-700 nm band pass diapasons. The configuration of excitation sources and spectral diapasons of registered radiation can be changed due to decided tasks.

  18. Robust automated knowledge capture.

    Energy Technology Data Exchange (ETDEWEB)

    Stevens-Adams, Susan Marie; Abbott, Robert G.; Forsythe, James Chris; Trumbo, Michael Christopher Stefan; Haass, Michael Joseph; Hendrickson, Stacey M. Langfitt

    2011-10-01

    This report summarizes research conducted through the Sandia National Laboratories Robust Automated Knowledge Capture Laboratory Directed Research and Development project. The objective of this project was to advance scientific understanding of the influence of individual cognitive attributes on decision making. The project has developed a quantitative model known as RumRunner that has proven effective in predicting the propensity of an individual to shift strategies on the basis of task and experience related parameters. Three separate studies are described which have validated the basic RumRunner model. This work provides a basis for better understanding human decision making in high consequent national security applications, and in particular, the individual characteristics that underlie adaptive thinking.

  19. Berkeley automated supernova search

    International Nuclear Information System (INIS)

    The Berkeley automated supernova search employs a computer controlled 36-inch telescope and charge coupled device (CCD) detector to image 2500 galaxies per night. A dedicated minicomputer compares each galaxy image with stored reference data to identify supernovae in real time. The threshold for detection is m/sub v/ = 18.8. We plan to monitor roughly 500 galaxies in Virgo and closer every night, and an additional 6000 galaxies out to 70 Mpc on a three night cycle. This should yield very early detection of several supernovae per year for detailed study, and reliable premaximum detection of roughly 100 supernovae per year for statistical studies. The search should be operational in mid-1982

  20. Automated synthetic scene generation

    Science.gov (United States)

    Givens, Ryan N.

    Physics-based simulations generate synthetic imagery to help organizations anticipate system performance of proposed remote sensing systems. However, manually constructing synthetic scenes which are sophisticated enough to capture the complexity of real-world sites can take days to months depending on the size of the site and desired fidelity of the scene. This research, sponsored by the Air Force Research Laboratory's Sensors Directorate, successfully developed an automated approach to fuse high-resolution RGB imagery, lidar data, and hyperspectral imagery and then extract the necessary scene components. The method greatly reduces the time and money required to generate realistic synthetic scenes and developed new approaches to improve material identification using information from all three of the input datasets.

  1. Automated Electrostatics Environmental Chamber

    Science.gov (United States)

    Calle, Carlos; Lewis, Dean C.; Buchanan, Randy K.; Buchanan, Aubri

    2005-01-01

    The Mars Electrostatics Chamber (MEC) is an environmental chamber designed primarily to create atmospheric conditions like those at the surface of Mars to support experiments on electrostatic effects in the Martian environment. The chamber is equipped with a vacuum system, a cryogenic cooling system, an atmospheric-gas replenishing and analysis system, and a computerized control system that can be programmed by the user and that provides both automation and options for manual control. The control system can be set to maintain steady Mars-like conditions or to impose temperature and pressure variations of a Mars diurnal cycle at any given season and latitude. In addition, the MEC can be used in other areas of research because it can create steady or varying atmospheric conditions anywhere within the wide temperature, pressure, and composition ranges between the extremes of Mars-like and Earth-like conditions.

  2. [From automation to robotics].

    Science.gov (United States)

    1985-01-01

    The introduction of automation into the laboratory of biology seems to be unavoidable. But at which cost, if it is necessary to purchase a new machine for every new application? Fortunately the same image processing techniques, belonging to a theoretic framework called Mathematical Morphology, may be used in visual inspection tasks, both in car industry and in the biology lab. Since the market for industrial robotics applications is much higher than the market of biomedical applications, the price of image processing devices drops, and becomes sometimes less than the price of a complete microscope equipment. The power of the image processing methods of Mathematical Morphology will be illustrated by various examples, as automatic silver grain counting in autoradiography, determination of HLA genotype, electrophoretic gels analysis, automatic screening of cervical smears... Thus several heterogeneous applications may share the same image processing device, provided there is a separate and devoted work station for each of them. PMID:4091303

  3. Automating the multiprocessing environment

    Science.gov (United States)

    Arpasi, Dale J.

    1989-01-01

    An approach to automate the programming and operation of tree-structured networks of multiprocessor systems is discussed. A conceptual, knowledge-based operating environment is presented, and requirements for two major technology elements are identified as follows: (1) An intelligent information translator is proposed for implementating information transfer between dissimilar hardware and software, thereby enabling independent and modular development of future systems and promoting a language-independence of codes and information; (2) A resident system activity manager, which recognizes the systems capabilities and monitors the status of all systems within the environment, is proposed for integrating dissimilar systems into effective parallel processing resources to optimally meet user needs. Finally, key computational capabilities which must be provided before the environment can be realized are identified.

  4. Automating the radiographic NDT process

    International Nuclear Information System (INIS)

    Automation, the removal of the human element in inspection, has not been generally applied to film radiographic NDT. The justication for automating is not only productivity but also reliability of results. Film remains in the automated system of the future because of its extremely high image content, approximately 8 x 109 bits per 14 x 17. The equivalent to 2200 computer floppy discs. Parts handling systems and robotics applied for manufacturing and some NDT modalities, should now be applied to film radiographic NDT systems. Automatic film handling can be achieved with the daylight NDT film handling system. Automatic film processing is becoming the standard in industry and can be coupled to the daylight system. Robots offer the opportunity to automate fully the exposure step. Finally, computer aided interpretation appears on the horizon. A unit which laser scans a 14 x 17 (inch) film in 6 - 8 seconds can digitize film information for further manipulation and possible automatic interrogations (computer aided interpretation). The system called FDRS (for Film Digital Radiography System) is moving toward 50 micron (*approx* 16 lines/mm) resolution. This is believed to meet the need of the majority of image content needs. We expect the automated system to appear first in parts (modules) as certain operations are automated. The future will see it all come together in an automated film radiographic NDT system (author)

  5. Automating the radiographic ndt process

    International Nuclear Information System (INIS)

    Automation, the removal of the human element in inspection, has not been generally applied to film radiographic NDT. The justification for automating is not only productivity but also reliability of results. Film remains in the automated system of the future because of its extremely high image content, approximately 8 x 109 bits per 14 x 17. This is equivalent to 2200 computer floppy discs. Parts handling systems and robotics applied for manufacturing and some NDT modalities, should now be applied to film radiographic NDT systems. Automatic film handling can be achieved with the daylight NDT film handling system. Automatic film processing is becoming the standard in industry and can be coupled to the daylight system. Robots offer the opportunity to automate fully the exposure step. Finally, computer aided interpretation appears on the horizon. A unit which laser scans a 14 x 17 inch film in 6 - 8 seconds can digitize film information for further manipulation and possible automatic interrogations (computer aided interpretation). The system called FDRS (for Film Digital Radiography System) is moving toward 50 micron (16 lines/mm) resolution. This is believed to meet the need of the majority of image content needs. We expect the automated system to appear first in separate parts (modules) as certain operations are automated. The future will see it all come together in an automated film radiographic NDT system

  6. Cultural Competency, Education, and Training among Campus Law Enforcement

    Science.gov (United States)

    Anderson, Ashley; Hendricks, James E.

    2011-01-01

    Enforcement agencies have developed an acute understanding of the importance of cultural competency among officers given the historically diverse nature of societies and communities. However, it has only been in the recent past that departments have begun ongoing training in this area. Training in cultural competency benefits departments in many…

  7. The Role of Law Enforcement in Prevention. Prevention Update

    Science.gov (United States)

    Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2011

    2011-01-01

    As campuses and communities across the country grapple with problems related to unruly house parties, neighborhood disruptions, and alcohol-fueled "celebratory" incidents, they are developing partnerships with law enforcement agencies to implement strategies to reduce such problems and protect the health and safety of students and residents alike.…

  8. 21 CFR 118.12 - Enforcement and compliance.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Enforcement and compliance. 118.12 Section 118.12... compliance. (a) Authority. This part is established under authority of the Public Health Service Act (the PHS....) or by a treatment that achieves at least a 5-log destruction of SE or destroyed by or under...

  9. 3PAC: Enforcing Access Policies for Web Services

    NARCIS (Netherlands)

    Bemmel, van J.; Wegdam, M.; Lagerberg, K.

    2005-01-01

    Web services fail to deliver on the promise of ubiquitous deployment and seamless interoperability due to the lack of a uniform, standards-based approach to all aspects of security. In particular, the enforcement of access policies in a service oriented architecture is not addressed adequately. We p

  10. Central Bank (Supervision and Enforcement) (Amendment) Bill 2016: Legislative Bill

    DEFF Research Database (Denmark)

    Butler, Graham; Rock, Noel

    2016-01-01

    Private Members' Bill (legislation) introduced in Dáil Éireann (House of Deputies), Houses of the Oireachtas (Irish Parliament). An Act to amend sections 49 and 51 of the Central Bank (Supervision and Enforcement) Act 2013 to ensure the powers exercised by the Central Bank of Ireland to make regu...

  11. 40 CFR 80.81 - Enforcement exemptions for California gasoline.

    Science.gov (United States)

    2010-07-01

    ... gasoline. 80.81 Section 80.81 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) REGULATION OF FUELS AND FUEL ADDITIVES Reformulated Gasoline § 80.81 Enforcement exemptions for California gasoline. (a)(1) The requirements of subparts D, E, F, and J of this part...

  12. Measuring the economic effects of competition law enforcement

    NARCIS (Netherlands)

    Don, H.; Kemp, R.G.M.; Sinderen, J.

    2008-01-01

    Together with a move from a rules-based legal approach to a more economic approach in competition cases, the economic effects of competition law enforcement have received increasing attention. Measuring these effects is important for external accountability of the Competition Authority, for quality

  13. Law enforcement tools available at the Savannah River Site

    Energy Technology Data Exchange (ETDEWEB)

    Hofstetter, K.J.

    2000-03-29

    A number of nuclear technologies developed and applied at the Savannah River Site in support of nuclear weapons material production and environmental remediation can be applied to problems in law enforcement. Techniques and equipment for high-sensitivity analyses of samples are available to identify and quantify trace elements and establish origins and histories of forensic evidence removed from crime scenes. While some of theses capabilities are available at local crime laboratories, state-of-the-art equipment and breakthroughs in analytical techniques are continually being developed at DOE laboratories. Extensive experience with the handling of radioactive samples at the DOE labs minimizes the chances of cross-contamination of evidence received from law enforcement. In addition to high-sensitivity analyses, many of the field techniques developed for use in a nuclear facility can assist law enforcement personnel in detecting illicit materials and operations, in retrieving of pertinent evidence and in surveying crime scenes. Some of these tools include chemical sniffers, hand-held detectors, thermal imaging, etc. In addition, mobile laboratories can be deployed to a crime scene to provide field screening of potential evidence. A variety of portable sensors can be deployed on vehicle, aerial, surface or submersible platforms to assist in the location of pertinent evidence or illicit operations. Several specific nuclear technologies available to law enforcement and their potential uses are discussed.

  14. Law enforcement tools available at the Savannah River Site

    International Nuclear Information System (INIS)

    A number of nuclear technologies developed and applied at the Savannah River Site in support of nuclear weapons material production and environmental remediation can be applied to problems in law enforcement. Techniques and equipment for high-sensitivity analyses of samples are available to identify and quantify trace elements and establish origins and histories of forensic evidence removed from crime scenes. While some of these capabilities are available at local crime laboratories, state-of-the-art equipment and breakthroughs in analytical techniques are continually being developed at DOE laboratories. Extensive experience with the handling of radioactive samples at the DOE labs minimizes the chances of cross-contamination of evidence received from law enforcement. In addition to high-sensitivity analyses, many of the field techniques developed for use in a nuclear facility can assist law enforcement personnel in detecting illicit materials and operations, in retrieving of pertinent evidence and in surveying crime sciences. Some of these tools include chemical sniffers, hand-held detectors, thermal imaging, etc. In addition, mobile laboratories can be deployed to a crime scene to provide field screening of potential evidence. A variety of portable sensors can be deployed on vehicle, aerial, surface of submersible platforms to assist in the location of pertinent evidence or illicit operations. Several specific nuclear technologies available to law enforcement and their potential uses are discussed. (author)

  15. 40 CFR 205.57 - Selective enforcement auditing requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing requirements. 205.57 Section 205.57 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Medium and Heavy Trucks §...

  16. 19 CFR 12.62 - Enforcement; duties of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Enforcement; duties of Customs officers. 12.62 Section 12.62 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...; duties of Customs officers. (a) In accordance with the authority contained in sections 10 and 12 of...

  17. Automated Fluid Interface System (AFIS)

    Science.gov (United States)

    1990-01-01

    Automated remote fluid servicing will be necessary for future space missions, as future satellites will be designed for on-orbit consumable replenishment. In order to develop an on-orbit remote servicing capability, a standard interface between a tanker and the receiving satellite is needed. The objective of the Automated Fluid Interface System (AFIS) program is to design, fabricate, and functionally demonstrate compliance with all design requirements for an automated fluid interface system. A description and documentation of the Fairchild AFIS design is provided.

  18. National Automated Conformity Inspection Process

    Data.gov (United States)

    Department of Transportation — The National Automated Conformity Inspection Process (NACIP) Application is intended to expedite the workflow process as it pertains to the FAA Form 81 0-10 Request...

  19. Automation of antimicrobial activity screening.

    Science.gov (United States)

    Forry, Samuel P; Madonna, Megan C; López-Pérez, Daneli; Lin, Nancy J; Pasco, Madeleine D

    2016-03-01

    Manual and automated methods were compared for routine screening of compounds for antimicrobial activity. Automation generally accelerated assays and required less user intervention while producing comparable results. Automated protocols were validated for planktonic, biofilm, and agar cultures of the oral microbe Streptococcus mutans that is commonly associated with tooth decay. Toxicity assays for the known antimicrobial compound cetylpyridinium chloride (CPC) were validated against planktonic, biofilm forming, and 24 h biofilm culture conditions, and several commonly reported toxicity/antimicrobial activity measures were evaluated: the 50 % inhibitory concentration (IC50), the minimum inhibitory concentration (MIC), and the minimum bactericidal concentration (MBC). Using automated methods, three halide salts of cetylpyridinium (CPC, CPB, CPI) were rapidly screened with no detectable effect of the counter ion on antimicrobial activity. PMID:26970766

  20. Automating the Purple Crow Lidar

    Science.gov (United States)

    Hicks, Shannon; Sica, R. J.; Argall, P. S.

    2016-06-01

    The Purple Crow LiDAR (PCL) was built to measure short and long term coupling between the lower, middle, and upper atmosphere. The initial component of my MSc. project is to automate two key elements of the PCL: the rotating liquid mercury mirror and the Zaber alignment mirror. In addition to the automation of the Zaber alignment mirror, it is also necessary to describe the mirror's movement and positioning errors. Its properties will then be added into the alignment software. Once the alignment software has been completed, we will compare the new alignment method with the previous manual procedure. This is the first among several projects that will culminate in a fully-automated lidar. Eventually, we will be able to work remotely, thereby increasing the amount of data we collect. This paper will describe the motivation for automation, the methods we propose, preliminary results for the Zaber alignment error analysis, and future work.

  1. Fully automated parallel oligonucleotide synthesizer

    Czech Academy of Sciences Publication Activity Database

    Lebl, M.; Burger, Ch.; Ellman, B.; Heiner, D.; Ibrahim, G.; Jones, A.; Nibbe, M.; Thompson, J.; Mudra, Petr; Pokorný, Vít; Poncar, Pavel; Ženíšek, Karel

    2001-01-01

    Roč. 66, č. 8 (2001), s. 1299-1314. ISSN 0010-0765 Institutional research plan: CEZ:AV0Z4055905 Keywords : automated oligonucleotide synthesizer Subject RIV: CC - Organic Chemistry Impact factor: 0.778, year: 2001

  2. Home automation with Intel Galileo

    CERN Document Server

    Dundar, Onur

    2015-01-01

    This book is for anyone who wants to learn Intel Galileo for home automation and cross-platform software development. No knowledge of programming with Intel Galileo is assumed, but knowledge of the C programming language is essential.

  3. Towards automated traceability maintenance.

    Science.gov (United States)

    Mäder, Patrick; Gotel, Orlena

    2012-10-01

    Traceability relations support stakeholders in understanding the dependencies between artifacts created during the development of a software system and thus enable many development-related tasks. To ensure that the anticipated benefits of these tasks can be realized, it is necessary to have an up-to-date set of traceability relations between the established artifacts. This goal requires the creation of traceability relations during the initial development process. Furthermore, the goal also requires the maintenance of traceability relations over time as the software system evolves in order to prevent their decay. In this paper, an approach is discussed that supports the (semi-) automated update of traceability relations between requirements, analysis and design models of software systems expressed in the UML. This is made possible by analyzing change events that have been captured while working within a third-party UML modeling tool. Within the captured flow of events, development activities comprised of several events are recognized. These are matched with predefined rules that direct the update of impacted traceability relations. The overall approach is supported by a prototype tool and empirical results on the effectiveness of tool-supported traceability maintenance are provided. PMID:23471308

  4. Automated Supernova Discovery (Abstract)

    Science.gov (United States)

    Post, R. S.

    2015-12-01

    (Abstract only) We are developing a system of robotic telescopes for automatic recognition of Supernovas as well as other transient events in collaboration with the Puckett Supernova Search Team. At the SAS2014 meeting, the discovery program, SNARE, was first described. Since then, it has been continuously improved to handle searches under a wide variety of atmospheric conditions. Currently, two telescopes are used to build a reference library while searching for PSN with a partial library. Since data is taken every night without clouds, we must deal with varying atmospheric and high background illumination from the moon. Software is configured to identify a PSN, reshoot for verification with options to change the run plan to acquire photometric or spectrographic data. The telescopes are 24-inch CDK24, with Alta U230 cameras, one in CA and one in NM. Images and run plans are sent between sites so the CA telescope can search while photometry is done in NM. Our goal is to find bright PSNs with magnitude 17.5 or less which is the limit of our planned spectroscopy. We present results from our first automated PSN discoveries and plans for PSN data acquisition.

  5. Automated Stellar Spectral Classification

    Science.gov (United States)

    Bailer-Jones, Coryn; Irwin, Mike; von Hippel, Ted

    1996-05-01

    Stellar classification has long been a useful tool for probing important astrophysical phenomena. Beyond simply categorizing stars it yields fundamental stellar parameters, acts as a probe of galactic abundance distributions and gives a first foothold on the cosmological distance ladder. The MK system in particular has survived on account of its robustness to changes in the calibrations of the physical parameters. Nonetheless, if stellar classification is to continue as a useful tool in stellar surveys, then it must adapt to keep pace with the large amounts of data which will be acquired as magnitude limits are pushed ever deeper. We are working on a project to automate the multi-parameter classification of visual stellar spectra, using artificial neural networks and other techniques. Our techniques have been developed with 10,000 spectra (B Analysis as a front-end compression of the data. Our continuing work also looks at the application of synthetic spectra to the direct classification of spectra in terms of the physical parameters of Teff, log g, and [Fe/H].

  6. Genetic circuit design automation.

    Science.gov (United States)

    Nielsen, Alec A K; Der, Bryan S; Shin, Jonghyeon; Vaidyanathan, Prashant; Paralanov, Vanya; Strychalski, Elizabeth A; Ross, David; Densmore, Douglas; Voigt, Christopher A

    2016-04-01

    Computation can be performed in living cells by DNA-encoded circuits that process sensory information and control biological functions. Their construction is time-intensive, requiring manual part assembly and balancing of regulator expression. We describe a design environment, Cello, in which a user writes Verilog code that is automatically transformed into a DNA sequence. Algorithms build a circuit diagram, assign and connect gates, and simulate performance. Reliable circuit design requires the insulation of gates from genetic context, so that they function identically when used in different circuits. We used Cello to design 60 circuits forEscherichia coli(880,000 base pairs of DNA), for which each DNA sequence was built as predicted by the software with no additional tuning. Of these, 45 circuits performed correctly in every output state (up to 10 regulators and 55 parts), and across all circuits 92% of the output states functioned as predicted. Design automation simplifies the incorporation of genetic circuits into biotechnology projects that require decision-making, control, sensing, or spatial organization. PMID:27034378

  7. Virtual Machine in Automation Projects

    OpenAIRE

    Xing, Xiaoyuan

    2010-01-01

    Virtual machine, as an engineering tool, has recently been introduced into automation projects in Tetra Pak Processing System AB. The goal of this paper is to examine how to better utilize virtual machine for the automation projects. This paper designs different project scenarios using virtual machine. It analyzes installability, performance and stability of virtual machine from the test results. Technical solutions concerning virtual machine are discussed such as the conversion with physical...

  8. 2015 Chinese Intelligent Automation Conference

    CERN Document Server

    Li, Hongbo

    2015-01-01

    Proceedings of the 2015 Chinese Intelligent Automation Conference presents selected research papers from the CIAC’15, held in Fuzhou, China. The topics include adaptive control, fuzzy control, neural network based control, knowledge based control, hybrid intelligent control, learning control, evolutionary mechanism based control, multi-sensor integration, failure diagnosis, reconfigurable control, etc. Engineers and researchers from academia, industry and the government can gain valuable insights into interdisciplinary solutions in the field of intelligent automation.

  9. Aprendizaje automático

    OpenAIRE

    Moreno, Antonio

    2006-01-01

    En este libro se introducen los conceptos básicos en una de las ramas más estudiadas actualmente dentro de la inteligencia artificial: el aprendizaje automático. Se estudian temas como el aprendizaje inductivo, el razonamiento analógico, el aprendizaje basado en explicaciones, las redes neuronales, los algoritmos genéticos, el razonamiento basado en casos o las aproximaciones teóricas al aprendizaje automático.

  10. Automation of cell line development

    OpenAIRE

    Lindgren, Kristina; Salmén, Andréa; Lundgren, Mats; Bylund, Lovisa; Ebler, Åsa; Fäldt, Eric; Sörvik, Lina; Fenge, Christel; Skoging-Nyberg, Ulrica

    2009-01-01

    An automated platform for development of high producing cell lines for biopharmaceutical production has been established in order to increase throughput and reduce development costs. The concept is based on the Cello robotic system (The Automation Partnership) and covers screening for colonies and expansion of static cultures. In this study, the glutamine synthetase expression system (Lonza Biologics) for production of therapeutic monoclonal antibodies in Chinese hamster ovary cells was used ...

  11. 76 FR 27355 - Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection and Application...

    Science.gov (United States)

    2011-05-11

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF JUSTICE Office of Justice Programs Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection... public, the ``Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection...

  12. Child Support Enforcement Annual Data Report Form 157 – YR 2010

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  13. Child Support Enforcement Annual Data Report Form 157 – Yrs. 2012 to 2014

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  14. Crab Orchard National Wildlife Refuge : Law Enforcement Plan and Station Crowd Control Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Crab Orchard National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  15. Child Support Enforcement Annual Data Report Form 157 – YR 2011

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  16. 77 FR 5049 - Office of Surface Mining Reclamation and Enforcement; Notice of Proposed Information Collection...

    Science.gov (United States)

    2012-02-01

    ... Office of Surface Mining Reclamation and Enforcement; Notice of Proposed Information Collection for 1029-0103 AGENCY: Office of Surface Mining Reclamation and Enforcement, Interior. ACTION: Notice and request... Surface Mining Reclamation and Enforcement, 1951 Constitution Ave. NW., Room 203--SIB, Washington,...

  17. 21 CFR 20.64 - Records or information compiled for law enforcement purposes.

    Science.gov (United States)

    2010-04-01

    ... any other criminal law enforcement authority in the course of a criminal investigation or by an agency... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Records or information compiled for law... law enforcement purposes. (a) Records or information compiled for law enforcement purposes may...

  18. 13 CFR 120.1500 - Types of enforcement actions-SBA Lenders.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Types of enforcement actions-SBA Lenders. 120.1500 Section 120.1500 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Enforcement Actions § 120.1500 Types of enforcement actions—SBA Lenders. Upon a determination that the...

  19. 13 CFR 120.1400 - Grounds for enforcement actions-SBA Lenders.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Grounds for enforcement actions-SBA Lenders. 120.1400 Section 120.1400 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Enforcement Actions § 120.1400 Grounds for enforcement actions—SBA Lenders. (a) Agreement. By making SBA...

  20. 77 FR 42765 - Request of the U.S. Intellectual Property Enforcement Coordinator for Public Comments...

    Science.gov (United States)

    2012-07-20

    ... BUDGET Request of the U.S. Intellectual Property Enforcement Coordinator for Public Comments: Development of the Joint Strategic Plan on Intellectual Property Enforcement AGENCY: Office of the U.S. Intellectual Property Enforcement Coordinator, Executive Office of the President. ACTION: Request for...

  1. 76 FR 64075 - Request for Comments on Intellectual Property Enforcement in China

    Science.gov (United States)

    2011-10-17

    ... United States Patent and Trademark Office Request for Comments on Intellectual Property Enforcement in... States, U.S. rights holders are increasingly seeking to protect and enforce their intellectual property... White House Intellectual Property Enforcement Coordinator (IPEC), has conducted a series of...

  2. 40 CFR 142.11 - Initial determination of primary enforcement responsibility.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 22 2010-07-01 2010-07-01 false Initial determination of primary enforcement responsibility. 142.11 Section 142.11 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... Enforcement Responsibility § 142.11 Initial determination of primary enforcement responsibility. (a) A...

  3. 34 CFR 99.67 - How does the Secretary enforce decisions?

    Science.gov (United States)

    2010-07-01

    ... PRIVACY What Are the Enforcement Procedures? § 99.67 How does the Secretary enforce decisions? (a) If an...: 34 CFR part 78 contains the regulations of the Education Appeal Board) (Authority: 20 U.S.C. 1232g(f... 34 Education 1 2010-07-01 2010-07-01 false How does the Secretary enforce decisions? 99.67...

  4. 33 CFR 148.320 - How is a license enforced, suspended, or revoked?

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false How is a license enforced, suspended, or revoked? 148.320 Section 148.320 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF... enforced, suspended, or revoked? MARAD may enforce, suspend, or revoke a license under 33 U.S.C. 1507(c)....

  5. Automated ship image acquisition

    Science.gov (United States)

    Hammond, T. R.

    2008-04-01

    The experimental Automated Ship Image Acquisition System (ASIA) collects high-resolution ship photographs at a shore-based laboratory, with minimal human intervention. The system uses Automatic Identification System (AIS) data to direct a high-resolution SLR digital camera to ship targets and to identify the ships in the resulting photographs. The photo database is then searchable using the rich data fields from AIS, which include the name, type, call sign and various vessel identification numbers. The high-resolution images from ASIA are intended to provide information that can corroborate AIS reports (e.g., extract identification from the name on the hull) or provide information that has been omitted from the AIS reports (e.g., missing or incorrect hull dimensions, cargo, etc). Once assembled into a searchable image database, the images can be used for a wide variety of marine safety and security applications. This paper documents the author's experience with the practicality of composing photographs based on AIS reports alone, describing a number of ways in which this can go wrong, from errors in the AIS reports, to fixed and mobile obstructions and multiple ships in the shot. The frequency with which various errors occurred in automatically-composed photographs collected in Halifax harbour in winter time were determined by manual examination of the images. 45% of the images examined were considered of a quality sufficient to read identification markings, numbers and text off the entire ship. One of the main technical challenges for ASIA lies in automatically differentiating good and bad photographs, so that few bad ones would be shown to human users. Initial attempts at automatic photo rating showed 75% agreement with manual assessments.

  6. AUTOMATED ANALYSIS OF BREAKERS

    Directory of Open Access Journals (Sweden)

    E. M. Farhadzade

    2014-01-01

    Full Text Available Breakers relate to Electric Power Systems’ equipment, the reliability of which influence, to a great extend, on reliability of Power Plants. In particular, the breakers determine structural reliability of switchgear circuit of Power Stations and network substations. Failure in short-circuit switching off by breaker with further failure of reservation unit or system of long-distance protection lead quite often to system emergency.The problem of breakers’ reliability improvement and the reduction of maintenance expenses is becoming ever more urgent in conditions of systematic increasing of maintenance cost and repair expenses of oil circuit and air-break circuit breakers. The main direction of this problem solution is the improvement of diagnostic control methods and organization of on-condition maintenance. But this demands to use a great amount of statistic information about nameplate data of breakers and their operating conditions, about their failures, testing and repairing, advanced developments (software of computer technologies and specific automated information system (AIS.The new AIS with AISV logo was developed at the department: “Reliability of power equipment” of AzRDSI of Energy. The main features of AISV are:· to provide the security and data base accuracy;· to carry out systematic control of breakers conformity with operating conditions;· to make the estimation of individual  reliability’s value and characteristics of its changing for given combination of characteristics variety;· to provide personnel, who is responsible for technical maintenance of breakers, not only with information but also with methodological support, including recommendations for the given problem solving  and advanced methods for its realization.

  7. A Logical Method for Policy Enforcement over Evolving Audit Logs

    CERN Document Server

    Garg, Deepak; Datta, Anupam

    2011-01-01

    We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Privacy Rule. The logic has three features that raise challenges for enforcement --- uninterpreted predicates (used to model subjective concepts in privacy policies), real-time temporal properties, and quantification over infinite domains (such as the set of messages containing personal information). The algorithm operates over audit logs that are inherently incomplete and evolve over time. In each iteration, the algorithm provably checks as much of the policy as possible over the current log and outputs a residual policy that can only be checked when the log is extended with additional information. We prove correctness and termination properties of the algorithm. While these results are developed in a general form, accounting for many different sources of incompleteness in audit logs, we also prove that for the special case of logs that m...

  8. Role of professional organizations in setting and enforcing ethical norms.

    Science.gov (United States)

    Perlis, Clifford; Shannon, Noah

    2012-01-01

    Self-regulating professions have historically used codes of conduct and codes of ethics to clarify the responsibilities of members to those they serve and to one another. These codes play an important role in safeguarding the professions' autonomy and in articulating standards for the profession. In medicine, many individual medical specialty associations, including the American Academy of Dermatology, maintain their own codes of ethics. These codes serve multiple purposes, including setting standards for the profession, educating members on their professional obligations, and communicating these standards to the public. They also generally provide a framework for enforcing code violations. The effectiveness of enforcement, however, may vary because of a code's specificity and because of limitations in sanctions available to the code's governing body. PMID:22330658

  9. Accountable Care Organizations and Antitrust Enforcement: Promoting Competition and Innovation.

    Science.gov (United States)

    Feinstein, Deborah L; Kuhlmann, Patrick; Mucchetti, Peter J

    2015-08-01

    The antitrust laws stand to protect consumers of health care services from conduct that would raise prices, lower quality, and decrease innovation by lessening competition. Importantly, though, vigorous antitrust enforcement does not impede accountable care organizations (ACOs) and similar collaborations that advance these same goals of better and more efficient care; in fact, by fostering competitive markets, the antitrust laws encourage such initiatives. This article summarizes the legal framework that the federal antitrust agencies - the Federal Trade Commission and the Antitrust Division of the US Department of Justice - use to analyze ACOs and other collaborations among health care providers. It outlines the guidance provided by the federal antitrust agencies concerning when ACOs and other provider collaborations likely would harm competition and consumers. In addition, it reviews common antitrust issues that can arise with ACOs and provides examples of enforcement actions that have prevented health care providers from taking or continuing anticompetitive actions. PMID:26124309

  10. ENFORCING ARBITRAL AWARDS IN ROMANIA - ALWAYS A CHALLENGE

    OpenAIRE

    Paul COMŞA

    2015-01-01

    Securing a favourable award from a foreign or domestic arbitral court proves to be in many cases only half the battle. As a rule, Romanian law and courts acknowledge the final, binding and enforceable nature of arbitration awards and state the principle that arbitration awards shall be freely implemented by parties. However, there are instances where the unsuccessful party does not voluntarily perform the obligations arising from the arbitral award. In these cases, before incurring legal expe...

  11. Contract innovation and legal evolution under imperfect enforcement

    OpenAIRE

    Gennaioli, Nicola; Giacomo A.M. Ponzetto

    2015-01-01

    We model optimal contracts and the evolution of precedents by introducing imperfect enforcement into a standard incomplete contracts setup. We assume that biased trial courts can refuse to verify novel evidence but are bound to respect precedents, namely to verify evidence that other judges verified in past cases. Despite judicial biases, optimal contracts are innovative (contingent on both precedents and novel evidence). Noisy evidence and judicial biases, however, introduce e...

  12. Competition Law Enforcement in Malaysia: Some Recent Developments

    OpenAIRE

    Lee, Cassey

    2014-01-01

    The enactment of the Competition Act 2010 represents a significant progress in the implementation of competition policy in Malaysia. The Malaysian Competition Commission has been fairly successful in its enforcement activities especially in price fixing cases involving trade associations. It has also investigated and issued proposed decisions in a number of high profile cases involving Malaysian Airlines, AirAsia, and Megasteel. Future challenges are likely to involve investigation of more co...

  13. Proportionality of Website Blocking: Internet Connectivity Providers as Copyright Enforcers

    OpenAIRE

    Savolla, Pekka

    2014-01-01

    Internet connectivity providers have been ordered to block access to websites facilitating copyright infringement in various EU countries.In this paper, the proportionality of these enforcement measures is analysed. After addressing preliminary questions, the recent ECJ ruling UPC Telekabel Wien (C-314/12) and then case law from all Member States are examined from the perspective of proportionality. Finally, five criteria are submitted for proportionality analysis, and a proportionality evalu...

  14. How traffic law enforcement can contribute to safer roads.

    OpenAIRE

    Adminaite, D. Jost, G. Stipdonk, H. & Ward, H.

    2016-01-01

    Exceeding speed limits, drink or distracted driving and failure to wear a seat belt are still the leading causes of death and serious injury on European roads. Despite legislation designed to prevent all four, many drivers involved in fatal traffic collisions clearly failed to comply with one or more road traffic laws at the time of their collision. Improvements in traffic law enforcement should be part of an integrated road safety policy and have been shown to lead to rapid reductions in dea...

  15. Why Enforcing Corporate Social Responsibility (CSR) is Morally Questionable

    OpenAIRE

    Masaka, Dennis

    2008-01-01

    Docketed literature on Corporate Social Responsibility (CSR) exhibits heated contentions on the nature of business-society relations. This paper seeks to explore this contentious issue in the light of contemporary incorporation of CSR in business strategic plans. It notes that enforcing CSR on business might lead to its manipulation to advance corporate organisations’ purely self-interested ends rather than pursuing intrinsic philanthropic activities for the good of society. An insig...

  16. Interactions of Transgender Latina Women with Law Enforcement

    OpenAIRE

    Galvan, Frank H.; Bazargan, Mohzen

    2012-01-01

    A new report, funded by the Williams Institute, reveals high levels of reported harassment and assault of Latina transgender women by law enforcement agencies and highlights steps that police departments should take to improve relations with the transgender community.    The report, “Interactions of Latina Transgender Women with Law Enforcement” is based on interviews with 220 Latina transgender women from the Los Angeles area. BIENESTAR, a non-profit social service organization comm...

  17. Lobbying on Regulatory Enforcement Actions: Evidence from Banking

    OpenAIRE

    Lambert, Thomas

    2016-01-01

    This paper analyzes the relationship between bank lobbying and supervisory decisions of regulators, and documents its moral hazard implications. Exploiting bank-level information on the universe of commercial and savings banks in the United States, I find that regulators are less likely to initiate enforcement actions against lobbying banks. In addition, I show that lobbying banks are riskier and reliably underperform their non-lobbying peers. Overall, these results appear rather inconsistent...

  18. Study on Game Theory of Social Law Enforcement

    Institute of Scientific and Technical Information of China (English)

    张国臣; 黎志成

    2003-01-01

    Based on the basis of the two-stage dynamic game of complete information and purely tactful perfect equilibrium theory, the non-cooperative gaming between the police department and the criminals is analyzed. Dynamic game can be proved to forecast and explain potential tactful choices of the police department and the criminals at various stages, so as to analyze the essence of the law enforcement by the theoretical models.

  19. The Patent Troll Business: An Efficient model to enforce IPR?

    OpenAIRE

    Pohlmann, Tim; Opitz, Marieke

    2010-01-01

    Patent trolls have many faces, since the media uses this expression in various ways. The patent troll phenomenon thus seems to be an ambiguous term that is discussed in several directions. This paper reveals that a patent troll as such has no distinct shape or appearance. Our analysis redeems a troll classification solely from firms’ market position, such as being non-practicing, and shows that a patent troll business can only be defined by the respective activities to enforce IPR. Using 1...

  20. Endogenous Enforcement and Effectiveness of China's Pollution Levy System

    OpenAIRE

    WANG Hua; Wheeler, David

    2000-01-01

    The authors investigate two aspects of China's pollution levy system, which was first implemented about 20 years ago. First, they analyze what determines differences in enforcement of the pollution levy in various urban areas. They find that collection of the otherwise uniform pollution levy is sensitive to differences in economic development and environmental quality. Air and water pollution levies are higher in areas that are heavily polluted. Second, they analyze the impact of pollution ch...

  1. Punitive Police? Agency Costs, Law Enforcement, and Criminal Procedure

    OpenAIRE

    Dharmapala, Dhammika; Garoupa, Nuno; Richard H. McAdams

    2015-01-01

    Criminal law enforcement depends on the actions of public agents such as police officers, but the resulting agency problems have been neglected in the law and economics literature (especially outside the specific context of corruption). We develop an agency model of police behavior that emphasizes intrinsic motivation and self-selection. Drawing on experimental evidence on punishment preferences, in which subjects reveal a heterogeneous preference for punishing wrongdoers, our model identifie...

  2. Large Enforced Sparse Non-Negative Matrix Factorization

    OpenAIRE

    Gavin, Brendan; Gadepally, Vijay; Kepner, Jeremy

    2015-01-01

    Non-negative matrix factorization (NMF) is a common method for generating topic models from text data. NMF is widely accepted for producing good results despite its relative simplicity of implementation and ease of computation. One challenge with applying NMF to large datasets is that intermediate matrix products often become dense, stressing the memory and compute elements of a system. In this article, we investigate a simple but powerful modification of a common NMF algorithm that enforces ...

  3. Policy Enforcing and Revoking Mechanism on Trusted Ad Hoc Networks

    OpenAIRE

    Sujatha J; Mr. Manoj Challa

    2013-01-01

    In ad hoc networking the polices are vulnerable to a wide range of security in network attacks.The design of enforcing and revoking policy mechanisms is a challenging task, especially in comparison tosecuring the ad hoc network. In this paper, the designed and implemented mechanism to provide a trustedcommunication for file sharing in ad-hoc network is explained, where the mechanism has been developedwith the help of polices where each policy is a combination of set of parameters. Simulation ...

  4. Enforcement aspects of conservation policies: compensation payments versus reserves.

    OpenAIRE

    Rousseau, Sandra

    2008-01-01

    This model explicitly incorporates the dynamic aspects of conservation programs with incomplete compliance and it allows landholders’ behavior to change over time. A distinction is made between initial and continuing compliance. We find that incomplete and instrument-specific enforcement can have a significant impact on the choice between subsidy schemes and reserves for conservation policies. The results suggest that it is useless to design a conservation scheme for landholders, if the regul...

  5. Exploring and Enforcing Application Security Guarantees vis Program Dependence

    OpenAIRE

    Johnson, Andrew; Waye, Lucas Reed; Moore, Scott David; Chong, Stephen N

    2014-01-01

    We present Pidgin, a program analysis and understanding tool that allows developers to explore the information flows that exist in programs and specify and enforce security policies that restrict these information flows. Pidgin uses program-dependence graphs (PDGs) to precisely capture the information flows within a program. PDGs can be queried using a custom query language to explore and describe information flows in programs. A developer can specify strong information security policies by a...

  6. Enforcing Privacy for Teenagers in Online Inquiry Learning Spaces

    OpenAIRE

    Na LI; Holzer, Adrian; Govaerts, Sten; Gillet, Denis

    2014-01-01

    In the Go-Lab European project, we are investigating an online lab portal that enables students to perform personalized scientific experiments with online labs. To protect sensitive student data, such as user activity data and learning preferences, this paper presents a classroom-like pseudonymity approach that fulfills the specific requirements of the Go-Lab portal: (1) enforcing student privacy, (2) enabling personalization, and (3) providing a teenager-friendly design.

  7. Bankruptcy Risk, Limited Liability and Imperfectly Enforced Emissions Taxes

    OpenAIRE

    John Stranlund; Wei Zhang

    2009-01-01

    Under reasonable conditions, noncompliance with an emissions tax has no effect on environmental outcomes or the efficient allocation of individual emissions control. Moreover, differences in individual tax violations are independent of firm-level differences. All of these desirable characteristics disappear when some firms under an emissions tax risk bankruptcy. The combination of imperfect enforcement, bankruptcy risk, and limited liability in bankrupt states produces an inefficient distribu...

  8. "Contract Enforcement in the Early Transition to a Market Economy."

    OpenAIRE

    Jeffrey B Miller; Kenneth Koford

    2005-01-01

    How were contracts among firms enforced in the early phase of a transition economy when firms lacked experience with commercial contracts or legal procedures? What were their views of their new business environment? We interviewed a sample of Bulgarian firms, including private, state-owned and cooperative firms in 1994. Consistent with Williamson’s (1994) theories, complex contracts were quite limited, sometimes implying the breakdown of important markets, but we also found that even spot-mar...

  9. FDA's Use of Negative Publicity as an Enforcement Mechanism

    OpenAIRE

    Blevins, Kelly C.

    2003-01-01

    This paper analyzes FDA’s use of negative publicity as an enforcement mechanism, both generally and in the specific instance of the agency’s regulation of phenylpropanolamine (“PPAâ€). While FDA does have explicit statutory authority to issue negative publicity in limited situations, both the agency and the courts have broadly interpreted FDA’s power to extend beyond these statutory limits. In practice, whi...

  10. Judicial Enforcement of Economic, Social and Cultural Right

    OpenAIRE

    Aulona Haxhiraj

    2013-01-01

    Economic, social and cultural right (“social right”) have historically been viewed as distinct in natyre and scope from civil and political right. Rather than being viewed as judicially enforceable rights of immeadiate application, such rights have widely been considered non-justiciable programmatic goals to be archieved progressively within available resources, through political processes. The purpose of this paper is to provide the legal and analytical tools to understand why this dichotomy...

  11. The Budget Enforcement Act in 1991: Isometric Budgeting

    OpenAIRE

    Doyle, Richard; McCaffery, Jerry

    1992-01-01

    The immediate effect of the Budget Enforcement Act (BEA) of 1990 was to cancel a pending $110 billion sequester and to change the Gramm-Rudman-Hollings deficit targets. These and other changes allowed Congress and the administration to escape responsibility for increases in the deficit if discretionary spending was kept within the caps and no new entitlement programs or revenue enhancements were added. This assumption and others relating to the empowerment of the Appropriations...

  12. Some Surprising Effects of Better Law Enforcement Against Child Trafficking

    OpenAIRE

    Dessy, Sylvain E.; Ste´phane Pallage

    2006-01-01

    In this note, we highlight some economic effects of the existence of child trafficking. We show that the risk of child trafficking on the labor market acts as a deterrent to supply child labor, unless household survival is at stake. Better law enforcement against child trafficking, by raising the expected gains parents derive from sending their children to work, might have the undesirable effect of causing a rise in the number of child laborers and possibly in the incidence of child trafficki...

  13. PROGRESSIVE LAW ENFORCEMENT TOWARDS HUMAN RIGHTS VIOLATION IN KOTA KUPANG

    Directory of Open Access Journals (Sweden)

    Joni Efraim Liunima

    2016-01-01

    Full Text Available Copyright is creator intellectual wealth so it needs to be protected by the State as a form of responsibility. Responding that problem comes into the world Law Number 28 Year 2014 concerning Copyrights and all violations in UUHC is formulated as delict complaint. Consequence of delict complaint is not all of copyright violations can be asked for the responsibility because law agencies are passive and limited by space and time. Answering that jurisdictional problem then researcher used empirical law research method. The result showed that civil servants investigator (PPNS Kanwil Kemenkumham NTT and also Kupang Kota Police Resort have done progressive step such as appealing, warning, calling, making statement, stocktaking and confiscation whereas the obstacle factor of progressive law enforcement is knowledge, mindset and in the formula of UUHC there is no section which formulate what the step can be done if criminal matters happen so the suggestions given is law enforcement agencies need an explanation about progressive law enforcement and it is better if in UUHC need to be formulated a step which will be taken if criminal matters happen

  14. Judicial Enforcement of Economic, Social and Cultural Right

    Directory of Open Access Journals (Sweden)

    Aulona Haxhiraj

    2013-07-01

    Full Text Available Economic, social and cultural right (“social right” have historically been viewed as distinct in natyre and scope from civil and political right. Rather than being viewed as judicially enforceable rights of immeadiate application, such rights have widely been considered non-justiciable programmatic goals to be archieved progressively within available resources, through political processes. The purpose of this paper is to provide the legal and analytical tools to understand why this dichotomy is false. The paper will consider the international normative framework for the legal protection of social rights, the specific content of state obligations under treaties dealing with such rights, how the international social rights monitoring system functions, and the various obstacles and opportunities currently facing the judicial enforceability of social rights. In every society there is violation which implies its citizen not get proper social right, economical right and cultural right. Proper implementation and adoption of judicial enforcement can reduce this violation rate and established social peace. Step mentioned in the above might not perfect but it might be small starting and ensure social, culture & economical right for the people living in the society.

  15. Programmable automation systems in PSA

    International Nuclear Information System (INIS)

    The Finnish safety authority (STUK) requires plant specific PSAs, and quantitative safety goals are set on different levels. The reliability analysis is more problematic when critical safety functions are realized by applying programmable automation systems. Conventional modeling techniques do not necessarily apply to the analysis of these systems, and the quantification seems to be impossible. However, it is important to analyze contribution of programmable automation systems to the plant safety and PSA is the only method with system analytical view over the safety. This report discusses the applicability of PSA methodology (fault tree analyses, failure modes and effects analyses) in the analysis of programmable automation systems. The problem of how to decompose programmable automation systems for reliability modeling purposes is discussed. In addition to the qualitative analysis and structural reliability modeling issues, the possibility to evaluate failure probabilities of programmable automation systems is considered. One solution to the quantification issue is the use of expert judgements, and the principles to apply expert judgements is discussed in the paper. A framework to apply expert judgements is outlined. Further, the impacts of subjective estimates on the interpretation of PSA results are discussed. (orig.) (13 refs.)

  16. International Conference Automation : Challenges in Automation, Robotics and Measurement Techniques

    CERN Document Server

    Zieliński, Cezary; Kaliczyńska, Małgorzata

    2016-01-01

    This book presents the set of papers accepted for presentation at the International Conference Automation, held in Warsaw, 2-4 March of 2016. It presents the research results presented by top experts in the fields of industrial automation, control, robotics and measurement techniques. Each chapter presents a thorough analysis of a specific technical problem which is usually followed by numerical analysis, simulation, and description of results of implementation of the solution of a real world problem. The presented theoretical results, practical solutions and guidelines will be valuable for both researchers working in the area of engineering sciences and for practitioners solving industrial problems. .

  17. Sub-Federal Enforcement of Immigration Law: An Introduction to the Problem of Pretextual Enforcement and Inadequate Remedies

    OpenAIRE

    Carrie Rosenbaum

    2014-01-01

    Sub-federal enforcement of immigration law has expanded significantly in the last decade raising questions concerning policing, rights violations, and remedies. While the Fourth Amendment has historically provided an avenue for potentially suppressing evidence obtained in violation of a criminal defendant’s civil rights, its applicability in the immigration removal context has been circumscribed. Thus, the avenues to protect the rights of unauthorized noncitizens in immigration removal proc...

  18. Computer automation and artificial intelligence

    International Nuclear Information System (INIS)

    Rapid advances in computing, resulting from micro chip revolution has increased its application manifold particularly for computer automation. Yet the level of automation available, has limited its application to more complex and dynamic systems which require an intelligent computer control. In this paper a review of Artificial intelligence techniques used to augment automation is presented. The current sequential processing approach usually adopted in artificial intelligence has succeeded in emulating the symbolic processing part of intelligence, but the processing power required to get more elusive aspects of intelligence leads towards parallel processing. An overview of parallel processing with emphasis on transputer is also provided. A Fuzzy knowledge based controller for amination drug delivery in muscle relaxant anesthesia on transputer is described. 4 figs. (author)

  19. Manual versus automated blood sampling

    DEFF Research Database (Denmark)

    Teilmann, A C; Kalliokoski, Otto; Sørensen, Dorte B;

    2014-01-01

    corticosterone metabolites, and expressed more anxious behavior than did the mice of the other groups. Plasma corticosterone levels of mice subjected to tail blood sampling were also elevated, although less significantly. Mice subjected to automated blood sampling were less affected with regard to the parameters......Facial vein (cheek blood) and caudal vein (tail blood) phlebotomy are two commonly used techniques for obtaining blood samples from laboratory mice, while automated blood sampling through a permanent catheter is a relatively new technique in mice. The present study compared physiological parameters......, glucocorticoid dynamics as well as the behavior of mice sampled repeatedly for 24 h by cheek blood, tail blood or automated blood sampling from the carotid artery. Mice subjected to cheek blood sampling lost significantly more body weight, had elevated levels of plasma corticosterone, excreted more fecal...

  20. Unmet needs in automated cytogenetics

    International Nuclear Information System (INIS)

    Though some, at least, of the goals of automation systems for analysis of clinical cytogenetic material seem either at hand, like automatic metaphase finding, or at least likely to be met in the near future, like operator-assisted semi-automatic analysis of banded metaphase spreads, important areas of cytogenetic analsis, most importantly the determination of chromosomal aberration frequencies in populations of cells or in samples of cells from people exposed to environmental mutagens, await practical methods of automation. Important as are the clinical diagnostic applications, it is apparent that increasing concern over the clastogenic effects of the multitude of potentially clastogenic chemical and physical agents to which human populations are being increasingly exposed, and the resulting emergence of extensive cytogenetic testing protocols, makes the development of automation not only economically feasible but almost mandatory. The nature of the problems involved, and acutal of possible approaches to their solution, are discussed

  1. Network based automation for SMEs

    DEFF Research Database (Denmark)

    Shahabeddini Parizi, Mohammad; Radziwon, Agnieszka

    2016-01-01

    The implementation of appropriate automation concepts which increase productivity in Small and Medium Sized Enterprises (SMEs) requires a lot of effort, due to their limited resources. Therefore, it is strongly recommended for small firms to open up for the external sources of knowledge, which...... could be obtained through network interaction. Based on two extreme cases of SMEs representing low-tech industry and an in-depth analysis of their manufacturing facilities this paper presents how collaboration between firms embedded in a regional ecosystem could result in implementation of new...... other members of the same regional ecosystem. The findings highlight two main automation related areas where manufacturing SMEs could leverage on external sources on knowledge – these are assistance in defining automation problem as well as appropriate solution and provider selection. Consequently, this...

  2. Design automation for integrated circuits

    Science.gov (United States)

    Newell, S. B.; de Geus, A. J.; Rohrer, R. A.

    1983-04-01

    Consideration is given to the development status of the use of computers in automated integrated circuit design methods, which promise the minimization of both design time and design error incidence. Integrated circuit design encompasses two major tasks: error specification, in which the goal is a logic diagram that accurately represents the desired electronic function, and physical specification, in which the goal is an exact description of the physical locations of all circuit elements and their interconnections on the chip. Design automation not only saves money by reducing design and fabrication time, but also helps the community of systems and logic designers to work more innovatively. Attention is given to established design automation methodologies, programmable logic arrays, and design shortcuts.

  3. Automated synthesis of sialylated oligosaccharides

    Directory of Open Access Journals (Sweden)

    Davide Esposito

    2012-09-01

    Full Text Available Sialic acid-containing glycans play a major role in cell-surface interactions with external partners such as cells and viruses. Straightforward access to sialosides is required in order to study their biological functions on a molecular level. Here, automated oligosaccharide synthesis was used to facilitate the preparation of this class of biomolecules. Our strategy relies on novel sialyl α-(2→3 and α-(2→6 galactosyl imidates, which, used in combination with the automated platform, provided rapid access to a small library of conjugation-ready sialosides of biological relevance.

  4. Agile Data: Automating database refactorings

    Directory of Open Access Journals (Sweden)

    Bruno Xavier

    2014-09-01

    Full Text Available This paper discusses an automated approach to database change management throughout the companies’ development workflow. By using automated tools, companies can avoid common issues related to manual database deployments. This work was motivated by analyzing usual problems within organizations, mostly originated from manual interventions that may result in systems disruptions and production incidents. In addition to practices of continuous integration and continuous delivery, the current paper describes a case study in which a suggested pipeline is implemented in order to reduce the deployment times and decrease incidents due to ineffective data controlling.

  5. Automation system for experiment control

    International Nuclear Information System (INIS)

    An automated multi-level system designed for acquisition, accumulation, sorting and processing of information obtained in the course of an experiment is discussed. Intelligent terminals are established at each nuclear installation, which are interconnected with measuring equipment of the corresponding installation. The intelligent terminals operating in the interactive real-time mode permit to use through data links computing facilities and storage of the processing centre. On the top level of the automated system the third generation M4030 computer with 256 Kbyte internal memory is employed. The intelligent terminals are created on the basis of the Ryad-1010 and M-400 computers

  6. Status of automated tensile machine

    International Nuclear Information System (INIS)

    The objective of this work is to develop the Monbusho Automated Tensile machine (MATRON) and install and operate it at the Pacific Northwest Laboratory (PNL). The machine is designed to provide rapid, automated testing of irradiated miniature tensile specimen in a vacuum at elevated temperatures. The MATRON was successfully developed and shipped to PNL for installation in a hot facility. The original installation plan was modified to simplify the current and subsequent installations, and the installation was completed. Detailed procedures governing the operation of the system were written. Testing on irradiated miniature tensile specimen should begin in the near future

  7. Design automation, languages, and simulations

    CERN Document Server

    Chen, Wai-Kai

    2003-01-01

    As the complexity of electronic systems continues to increase, the micro-electronic industry depends upon automation and simulations to adapt quickly to market changes and new technologies. Compiled from chapters contributed to CRC's best-selling VLSI Handbook, this volume covers a broad range of topics relevant to design automation, languages, and simulations. These include a collaborative framework that coordinates distributed design activities through the Internet, an overview of the Verilog hardware description language and its use in a design environment, hardware/software co-design, syst

  8. Automated Podcasting System for Universities

    Directory of Open Access Journals (Sweden)

    Ypatios Grigoriadis

    2013-03-01

    Full Text Available This paper presents the results achieved at Graz University of Technology (TU Graz in the field of automating the process of recording and publishing university lectures in a very new way. It outlines cornerstones of the development and integration of an automated recording system such as the lecture hall setup, the recording hardware and software architecture as well as the development of a text-based search for the final product by method of indexing video podcasts. Furthermore, the paper takes a look at didactical aspects, evaluations done in this context and future outlook.

  9. 2013 Chinese Intelligent Automation Conference

    CERN Document Server

    Deng, Zhidong

    2013-01-01

    Proceedings of the 2013 Chinese Intelligent Automation Conference presents selected research papers from the CIAC’13, held in Yangzhou, China. The topics include e.g. adaptive control, fuzzy control, neural network based control, knowledge based control, hybrid intelligent control, learning control, evolutionary mechanism based control, multi-sensor integration, failure diagnosis, and reconfigurable control. Engineers and researchers from academia, industry, and government can gain an inside view of new solutions combining ideas from multiple disciplines in the field of intelligent automation.   Zengqi Sun and Zhidong Deng are professors at the Department of Computer Science, Tsinghua University, China.

  10. 2013 Chinese Intelligent Automation Conference

    CERN Document Server

    Deng, Zhidong

    2013-01-01

    Proceedings of the 2013 Chinese Intelligent Automation Conference presents selected research papers from the CIAC’13, held in Yangzhou, China. The topics include e.g. adaptive control, fuzzy control, neural network based control, knowledge based control, hybrid intelligent control, learning control, evolutionary mechanism based control, multi-sensor integration, failure diagnosis, and reconfigurable control. Engineers and researchers from academia, industry, and government can gain an inside view of new solutions combining ideas from multiple disciplines in the field of intelligent automation. Zengqi Sun and Zhidong Deng are professors at the Department of Computer Science, Tsinghua University, China.

  11. Toward designing for trust in database automation

    International Nuclear Information System (INIS)

    Appropriate reliance on system automation is imperative for safe and productive work, especially in safety-critical systems. It is unsafe to rely on automation beyond its designed use; conversely, it can be both unproductive and unsafe to manually perform tasks that are better relegated to automated tools. Operator trust in automated tools mediates reliance, and trust appears to affect how operators use technology. As automated agents become more complex, the question of trust in automation is increasingly important. In order to achieve proper use of automation, we must engender an appropriate degree of trust that is sensitive to changes in operating functions and context. In this paper, we present research concerning trust in automation in the domain of automated tools for relational databases. Lee and See have provided models of trust in automation. One model developed by Lee and See identifies three key categories of information about the automation that lie along a continuum of attributional abstraction. Purpose-, process-and performance-related information serve, both individually and through inferences between them, to describe automation in such a way as to engender r properly-calibrated trust. Thus, one can look at information from different levels of attributional abstraction as a general requirements analysis for information key to appropriate trust in automation. The model of information necessary to engender appropriate trust in automation [1] is a general one. Although it describes categories of information, it does not provide insight on how to determine the specific information elements required for a given automated tool. We have applied the Abstraction Hierarchy (AH) to this problem in the domain of relational databases. The AH serves as a formal description of the automation at several levels of abstraction, ranging from a very abstract purpose-oriented description to a more concrete description of the resources involved in the automated process

  12. Automated Ply Inspection (API) for AFP Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Automated Ply Inspection (API) system autonomously inspects layups created by high speed automated fiber placement (AFP) machines. API comprises a high accuracy...

  13. Laboratory automation and LIMS in forensics

    DEFF Research Database (Denmark)

    Stangegaard, Michael; Hansen, Anders Johannes; Morling, Niels

    2013-01-01

    Implementation of laboratory automation and LIMS in a forensic laboratory enables the laboratory, to standardize sample processing. Automated liquid handlers can increase throughput and eliminate manual repetitive pipetting operations, known to result in occupational injuries to the technical staff...

  14. Assessing peak aerobic capacity in Dutch law enforcement officers

    Directory of Open Access Journals (Sweden)

    Harriet Wittink

    2015-06-01

    Full Text Available Objectives: To cross-validate the existing peak rate of oxygen consumption (VO2peak prediction equations in Dutch law enforcement officers and to determine whether these prediction equations can be used to predict VO2peak for groups and in a single individual. A further objective was to report normative absolute and relative VO2peak values of a sample of law enforcement officers in the Netherlands. Material and Methods: The peak rate of oxygen consumption (ml×kg–1×min–1 was measured using a maximal incremental bicycle test in 1530 subjects, including 1068 male and 461 female police officers. Validity of the prediction equations for groups was assessed by comparing predicted VO2peak with measured VO2peak using paired t-tests. For individual differences limits of agreement (LoA were calculated. Equations were considered valid for individuals when the difference between measured and predicted VO2peak did not exceed ±1 metabolic equivalent (MET in 95% of individuals. Results: None of the equations met the validity criterion of 95% of individuals having ±1 MET difference or less than the measured value. Limits of agreement (LoAs were large in all predictions. At the individual level, none of the equations were valid predictors of VO2peak (ml×kg–1×min–1. Normative values for Dutch law enforcement officers were presented. Conclusions: Substantial differences between measured and predicted VO2peak (ml×kg–1×min–1 were found. Most tested equations were invalid predictors of VO2peak at group level and all were invalid at individual levels.

  15. Applications for mini VTOL UAV for law enforcement

    Science.gov (United States)

    Murphy, Douglas W.; Cycon, James

    1999-01-01

    Remotely operated vehicle systems, ground and air, have great potential for supporting law enforcement operations. These systems with their onboard sensors, can assist in collecting evidence, performing long-term surveillance or in assessing hazardous situations prior to committing personnel. Remote ground vehicles are presently used by many police departments for ordnance clearing missions. Unmanned ground vehicles (UGVs) typically offer long endurance, and are intuitive to operate, but can be severely limited in where they can go by terrain and obstacles. Unmanned air vehicles (UAVs) have 3-D mobility, but have landing and takeoff restrictions, mission time limitations, and typically are demanding to operate. A new capability has been demonstrated for the U.S. military that shows great promise for aiding police agencies. This concept uses a shrouded rotor, vertical take off and landing (VTOL), an unmanned air vehicle to provide mobility to sensors and other payloads. This system can either perform surveillance from the air or travel to a remote location and land to position onboard sensors to perform long-term surveillance from the ground. This mobility platform concept can also be used to position packages (e.g., communications repeaters) or deliver and deploy non-lethal agents. This paper presents the concept of a small, UAV, VTOL, sensor mobility system for support of law enforcement operations. It then discusses operational feasibility and briefly reviews demonstrations of surveillance and sensor placement operations in military urban terrain scenarios performed by the Space and Naval Warfare (SPAWAR) Systems Center San Diego (SSCSD) and Sikorsky Aircraft with their full-size Cypher UAV. We then discuss the practicality of reducing the size of this capability to a system small enough to be transported in standard police vehicles and which can be easily operated by law enforcement personnel.

  16. Towards Automated System Synthesis Using SCIDUCTION

    OpenAIRE

    Jha, Susmit Kumar

    2011-01-01

    Automated synthesis of systems that are correct by construction has been a long-standing goal of computer science. Synthesis is a creative task and requires human intuition and skill. Its complete automation is currently beyond the capacity of programs that do automated reasoning. However, there is a pressing need for tools and techniques that can automate non-intuitive and error-prone synthesis tasks. This thesis proposes a novel synthesis approach to solve such tasks in the synthesis of pro...

  17. GUI test automation for Qt application

    OpenAIRE

    Wang, Lei

    2015-01-01

    GUI test automation is a popular and interesting subject in the testing industry. Many companies plan to start test automation projects in order to implement efficient, less expensive software testing. However, there are challenges for the testing team who lack experience performing GUI tests automation. Many GUI test automation projects have ended in failure due to mistakes made during the early stages of the project. The major work of this thesis is to find a solution to the challenges of e...

  18. Automated Integrated Analog Filter Design Issues

    OpenAIRE

    Karolis Kiela; Romualdas Navickas

    2015-01-01

    An analysis of modern automated integrated analog circuits design methods and their use in integrated filter design is done. Current modern analog circuits automated tools are based on optimization algorithms and/or new circuit generation methods. Most automated integrated filter design methods are only suited to gmC and switched current filter topologies. Here, an algorithm for an active RC integrated filter design is proposed, that can be used in automated filter designs. The algorithm is t...

  19. REDISAIN FAX COURT IN THE ENFORCEMENT FOR TAX LAW FRAMEWORK

    OpenAIRE

    Muhammad Djafar Saidi; Ruslan Hambali; Muchsin Salnia; Eka Merdekawati Djafar

    2013-01-01

    The research located at legal region of municipality of Jakarta, with considered that tax court include in ministry of finance of Indonesia republic and court of law of Indonesia republic are located in Jakarta. Tax court include in manistry of finance of Indonesia republik and court of law of Indonesia republic were expected to have relation to efforts in design the tax court in the enforcement of tax law framewark. The aim of the research are 1) to identify the position of tax court in Indo...

  20. Analytical challenges: bridging the gap from regulation to enforcement.

    Science.gov (United States)

    Van den Eede, Guy; Kay, Simon; Anklam, Elke; Schimmel, Heinz

    2002-01-01

    An overview is presented of the analytical steps that may be needed to determine the presence of genetically modified organisms (GMOs) or for analysis of GMO-derived produce. The analytical aspects necessary for compliance with labeling regulations are discussed along with bottlenecks that may develop when a plant product or a food sample is analyzed for conformity with current European Union GMO legislation. In addition to sampling and testing, other topics deal with complications that arise from biological and agricultural realities that may influence testing capabilities. The issues presented are intended to serve as elements to examine the different challenges that enforcement laboratories might face. PMID:12083271

  1. Privacy Enforcement in a Cost-Effective Smart Grid

    DEFF Research Database (Denmark)

    Mikkelsen, Søren Aagaard

    In this technical report we present the current state of the research conducted during the first part of the PhD period. The PhD thesis “Privacy Enforcement in a Cost-Effective Smart Grid” focuses on ensuring privacy when generating market for energy service providers that develop web services...... for the residential domain in the envisaged smart grid. The PhD project is funded and associated to the EU project “Energy Demand Aware Open Services for Smart Grid Intelligent Automation” (Smart HG) and therefore introduces the project on a system-level. Based on this, we present some of the integration, security...

  2. Children's Norm Enforcement in Their Interactions With Peers

    OpenAIRE

    Köymen, Bahar; Lieven, Elena; Denis A Engemann; Rakoczy, Hannes; Warneken, Felix; Tomasello, Michael

    2014-01-01

    This study investigates how children negotiate social norms with peers. In Study 1, 48 pairs of 3- and 5-year-olds (N = 96) and in Study 2, 48 pairs of 5- and 7-year-olds (N = 96) were presented with sorting tasks with conflicting instructions (one child by color, the other by shape) or identical instructions. Three-year-olds differed from older children: They were less selective for the contexts in which they enforced norms, and they (as well as the older children to a lesser extent) used gr...

  3. Automated activation-analysis system

    International Nuclear Information System (INIS)

    An automated delayed neutron counting and instrumental neutron activation analysis system has been developed at Los Alamos National Laboratory's Omega West Reactor (OWR) to analyze samples for uranium and 31 additional elements with a maximum throughput of 400 samples per day. The system and its mode of operation for a large reconnaissance survey are described

  4. Automated Analysis of Infinite Scenarios

    DEFF Research Database (Denmark)

    Buchholtz, Mikael

    The security of a network protocol crucially relies on the scenario in which the protocol is deployed. This paper describes syntactic constructs for modelling network scenarios and presents an automated analysis tool, which can guarantee that security properties hold in all of the (infinitely many...

  5. Automated visual inspection of textile

    DEFF Research Database (Denmark)

    Jensen, Rune Fisker; Carstensen, Jens Michael

    A method for automated inspection of two types of textile is presented. The goal of the inspection is to determine defects in the textile. A prototype is constructed for simulating the textile production line. At the prototype the images of the textile are acquired by a high speed line scan camera...

  6. Automation of Space Inventory Management

    Science.gov (United States)

    Fink, Patrick W.; Ngo, Phong; Wagner, Raymond; Barton, Richard; Gifford, Kevin

    2009-01-01

    This viewgraph presentation describes the utilization of automated space-based inventory management through handheld RFID readers and BioNet Middleware. The contents include: 1) Space-Based INventory Management; 2) Real-Time RFID Location and Tracking; 3) Surface Acoustic Wave (SAW) RFID; and 4) BioNet Middleware.

  7. Distribution system analysis and automation

    CERN Document Server

    Gers, Juan

    2013-01-01

    A comprehensive guide to techniques that allow engineers to simulate, analyse and optimise power distribution systems which combined with automation, underpin the emerging concept of the "smart grid". This book is supported by theoretical concepts with real-world applications and MATLAB exercises.

  8. Automating the conflict resolution process

    Science.gov (United States)

    Wike, Jeffrey S.

    1991-01-01

    The purpose is to initiate a discussion of how the conflict resolution process at the Network Control Center can be made more efficient. Described here are how resource conflicts are currently resolved as well as the impacts of automating conflict resolution in the ATDRSS era. A variety of conflict resolution strategies are presented.

  9. Automated Clustering of Similar Amendments

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The Italian Senate is clogged by computer-generated amendments. This talk will describe a simple strategy to cluster them in an automated fashion, so that the appropriate Senate procedures can be used to get rid of them in one sweep.

  10. Feasibility Analysis of Crane Automation

    Institute of Scientific and Technical Information of China (English)

    DONG Ming-xiao; MEI Xue-song; JIANG Ge-dong; ZHANG Gui-qing

    2006-01-01

    This paper summarizes the modeling methods, open-loop control and closed-loop control techniques of various forms of cranes, worldwide, and discusses their feasibilities and limitations in engineering. Then the dynamic behaviors of cranes are analyzed. Finally, we propose applied modeling methods and feasible control techniques and demonstrate the feasibilities of crane automation.

  11. Automation; The New Industrial Revolution.

    Science.gov (United States)

    Arnstein, George E.

    Automation is a word that describes the workings of computers and the innovations of automatic transfer machines in the factory. As the hallmark of the new industrial revolution, computers displace workers and create a need for new skills and retraining programs. With improved communication between industry and the educational community to…

  12. Automation of Feynman diagram evaluations

    International Nuclear Information System (INIS)

    A C-program DIANA (DIagram ANAlyser) for the automation of Feynman diagram evaluations is presented. It consists of two parts: the analyzer of diagrams and the interpreter of a special text manipulating language. This language can be used to create a source code for analytical or numerical evaluations and to keep the control of the process in general

  13. Automated methods of corrosion measurement

    DEFF Research Database (Denmark)

    Andersen, Jens Enevold Thaulov; Bech-Nielsen, Gregers; Reeve, John Ch;

    1997-01-01

    to revise assumptions regarding the basis of the method, which sometimes leads to the discovery of as-yet unnoticed phenomena. The present selection of automated methods for corrosion measurements is not motivated simply by the fact that a certain measurement can be performed automatically...

  14. Teacherbot: Interventions in Automated Teaching

    Science.gov (United States)

    Bayne, Sian

    2015-01-01

    Promises of "teacher-light" tuition and of enhanced "efficiency" via the automation of teaching have been with us since the early days of digital education, sometimes embraced by academics and institutions, and sometimes resisted as a set of moves which are damaging to teacher professionalism and to the humanistic values of…

  15. Automation, Labor Productivity and Employment

    DEFF Research Database (Denmark)

    Kromann, Lene; Rose Skaksen, Jan; Sørensen, Anders

    CEBR fremlægger nu den første rapport i AIM-projektet. Rapporten viser, at der er gode muligheder for yderligere automation i en stor del af de danske fremstillingsvirksomheder. For i dag er gennemsnitligt kun omkring 30 % af virksomhedernes produktionsprocesser automatiserede. Navnlig procesområ...

  16. CCD characterization and measurements automation

    Czech Academy of Sciences Publication Activity Database

    Kotov, I.V.; Frank, J.; Kotov, A.I.; Kubánek, Petr; O´Connor, P.; Prouza, Michael; Radeka, V.; Takacs, P.

    2012-01-01

    Roč. 695, Dec (2012), 188-192. ISSN 0168-9002 R&D Projects: GA MŠk ME09052 Institutional research plan: CEZ:AV0Z10100502 Keywords : CCD * characterization * test automation Subject RIV: BN - Astronomy, Celestial Mechanics, Astrophysics Impact factor: 1.142, year: 2012

  17. Adaptation : A Partially Automated Approach

    NARCIS (Netherlands)

    Manjing, Tham; Bukhsh, F.A.; Weigand, H.

    2014-01-01

    This paper showcases the possibility of creating an adaptive auditing system. Adaptation in an audit environment need human intervention at some point. Based on a case study this paper focuses on automation of adaptation process. It is divided into solution design and validation parts. The artifact

  18. Automating the radiographic NDT process

    International Nuclear Information System (INIS)

    Automation, the removal of the human element in inspection has not been generally applied to film radiographic NDT. The justification for automation is not only productivity but also reliability of results. Film remains in the automated system of the future because of its extremely high image content, approximately 3x10 (to the power of nine) bits per 14x17. This is equivalent to 2200 computer floppy disks parts handling systems and robotics applied for manufacturing and some NDT modalities, should now be applied to film radiographic NDT systems. Automatic film handling can be achieved with the daylight NDT film handling system. Automatic film processing is becoming the standard in industry and can be coupled to the daylight system. Robots offer the opportunity to automate fully the exposure step. Finally, a computer aided interpretation appears on the horizon. A unit which laser scans a 14x27 (inch) film in 6-8 seconds can digitize film in information for further manipulation and possible automatic interrogations (computer aided interpretation). The system called FDRS (for film digital radiography system) is moving toward 50 micron (16 lines/mm) resolution. This is believed to meet the need of the majority of image content needs. (Author). 4 refs.; 21 figs

  19. Automating Shallow Seismic Imaging

    Energy Technology Data Exchange (ETDEWEB)

    Steeples, Don W.

    2004-12-09

    This seven-year, shallow-seismic reflection research project had the aim of improving geophysical imaging of possible contaminant flow paths. Thousands of chemically contaminated sites exist in the United States, including at least 3,700 at Department of Energy (DOE) facilities. Imaging technologies such as shallow seismic reflection (SSR) and ground-penetrating radar (GPR) sometimes are capable of identifying geologic conditions that might indicate preferential contaminant-flow paths. Historically, SSR has been used very little at depths shallower than 30 m, and even more rarely at depths of 10 m or less. Conversely, GPR is rarely useful at depths greater than 10 m, especially in areas where clay or other electrically conductive materials are present near the surface. Efforts to image the cone of depression around a pumping well using seismic methods were only partially successful (for complete references of all research results, see the full Final Technical Report, DOE/ER/14826-F), but peripheral results included development of SSR methods for depths shallower than one meter, a depth range that had not been achieved before. Imaging at such shallow depths, however, requires geophone intervals of the order of 10 cm or less, which makes such surveys very expensive in terms of human time and effort. We also showed that SSR and GPR could be used in a complementary fashion to image the same volume of earth at very shallow depths. The primary research focus of the second three-year period of funding was to develop and demonstrate an automated method of conducting two-dimensional (2D) shallow-seismic surveys with the goal of saving time, effort, and money. Tests involving the second generation of the hydraulic geophone-planting device dubbed the ''Autojuggie'' showed that large numbers of geophones can be placed quickly and automatically and can acquire high-quality data, although not under rough topographic conditions. In some easy

  20. You're a What? Automation Technician

    Science.gov (United States)

    Mullins, John

    2010-01-01

    Many people think of automation as laborsaving technology, but it sure keeps Jim Duffell busy. Defined simply, automation is a technique for making a device run or a process occur with minimal direct human intervention. But the functions and technologies involved in automated manufacturing are complex. Nearly all functions, from orders coming in…

  1. Library Automation : Change for Productivity in Service

    OpenAIRE

    M.A. Gopinath

    1995-01-01

    Library operations, in the context of the automation necessitate for an integrated approach and change in the perception of library's work. It examines the functional aspects, social aspects and system dynamics of library automation. Some strategies for library automation are suggested.

  2. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    Science.gov (United States)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  3. Piracy in cyber space: consumer complicity, pirates and enterprise enforcement

    Science.gov (United States)

    Chaudhry, Peggy E.; Chaudhry, Sohail S.; Stumpf, Stephen A.; Sudler, Hasshi

    2011-05-01

    This article presents an overview of the growth of internet piracy in the global marketplace. The ethical perceptions (or lack of) of the younger generation is addressed, in terms of their willingness to consume counterfeit goods on the web. Firms face the task of educating the consumer that downloading music, software, movies and the like, without compensation, is unethical. This awareness is critical for decreasing the demand for counterfeit goods in the virtual marketplace, where a consumer can exhibit a rogue behaviour with a limited fear of prosecution. We address the pyramid of internet piracy, which encompasses sophisticated suppliers/facilitators, such as the Warez group. Recent sting operations, such as Operation Buccaneer, are also depicted to highlight successful tactical manoeuvres of enforcement agencies. An overview of the Digital Millennium Copyright Act and the No Electronic Theft Act is included to debate the controversy surrounding this legislation. A discussion of enterprise enforcement mechanisms and novel anti-piracy technology for cyberspace is provided to reveal some of the tools used to fight the pirates, such as innovations in digital watermarking and NEC's recently announced video content identification technology. Enterprise information systems and its interdependence on the internet are also demanding new technologies that enable internet investigators to rapidly search, verify and potentially remove pirated content using web services. The quality of service of web services designed to efficiently detect pirated content is a growing consideration for new anti-piracy technology.

  4. LiveWall Operational Evaluation: Seattle Law Enforcement Pilot

    Energy Technology Data Exchange (ETDEWEB)

    Barr, Jonathan L.; Burtner, Edwin R.; Stein, Steven L.

    2013-10-01

    The LiveWall concept envisioned as an outgrowth of the Precision Information Environment (PIE) project allows communications between separate groups using interactive video, audio, and a shared desktop environment; this allows everyone to participate and collaborate in real time, regardless of location. The LiveWall concept provides a virtual window to other locations, where all parties can interact and collaboratively work with each other. This functionality is intended to improve multi-site coordination amongst emergency operations centers (EOC), field operations sites and across organizations and jurisdictions to accommodate communications during routine and emergency events. For the initial LiveWall operational evaluation PNNL partnered with the Seattle Police Department (SPD). This partnership allowed for the creation of an excellent LiveWall test bed specific to law enforcement. This partnership made it possible to test the LiveWall concept with scenarios involving the many facets of the law enforcement work done by SPD. PNNL and SPD agreed that integrating the systems into operations for a real event would be the best test of the technology and give SPD staff greater visibility into the functionality and benefits offered by the LiveWall concept.

  5. An Overview of the IP Enforcement System in China

    Institute of Scientific and Technical Information of China (English)

    Wu Yuhe

    2005-01-01

    @@ For more than two decades after the Trademark Law of the People's Republic of China entered into force in 1983,China has formulated a series of IP-related laws and regulations, including among other things, the Patent Law, Trademark Law, Copyright Law and Unfair Competition Law. Besides, it has acceded to many international IP treaties and established an adequate system for IP protection. In particular, China has drawn more on the mature practices of the Western countries with respect to the conditions and requirements for grant of the intellectual property rights, which has made the legal system for the protection of the intellectual property rights in China readily understandable and acceptable to foreign interested parties. By contrast, China has mostly followed the existing civil, administrative and criminal liability system in its construction of the IP-related enforcement system, thus rendering it more "characteristic of China". In fact, this "unique"system provides interested parties with more opportunities and approaches for them to enforce their rights.

  6. Electronic aroma detection technology for forensic and law enforcement applications

    Energy Technology Data Exchange (ETDEWEB)

    Barshick, S.-A.; Griest, W.H.; Vass, A.A.

    1996-12-31

    A major problem hindering criminal investigations is the lack of appropriate tools for proper crime scene investigations. Often locating important pieces of evidence means relying on the ability of trained detection canines. Development of analytical technology to uncover and analyze evidence, potentially at the scene, could serve to expedite criminal investigations, searches, and court proceedings. To address this problem, a new technology based on gas sensor arrays was investigated for its applicability to forensic and law enforcement problems. The technology employs an array of sensors that respond to volatile chemical components yielding a characteristic `fingerprint` pattern representative of the vapor- phase composition of a sample. Sample aromas can be analyzed and identified using artificial neural networks that are trained on known aroma patterns. Several candidate applications based on known technological needs of the forensic and law enforcement communities have been investigated. These applications have included the detection of aromas emanating from cadavers to aid in determining time since death, drug detection for deterring the manufacture, sale, and use of drugs of abuse, and the analysis of fire debris for accelerant identification. The results to date for these applications have been extremely promising and demonstrate the potential applicability of this technology for forensic use.

  7. General considerations on the enforcement (application of law

    Directory of Open Access Journals (Sweden)

    Berlingher Remus Daniel

    2016-06-01

    Full Text Available Law is a system of norms developed and/or recognized by the state as norms guiding human behaviour according to the values of that particular society, establishing rights and obligations, principles and definitions, structures and relationships of social organization and activity that must be obeyed and which, when necessary, are insured by the coercive force of the state. Thus, the development of this system of norms is not an end in itself, but is intended to regulate all social relations, guide human behaviours and achieve the aims of the law. The enforcement of law is the process of translating legal rules into practice, through which the subjects of law obey and execute legal norms, and state authorities apply them, depending on their competence. The enforcement of law depends on a number of factors that shape law, such as its natural framework of existence, the historical context and the ethnic and national particularities of that community’s development, the economic factor or framework, the framework and particularities of the political system, the cultural-ideological framework or factor, the international framework or factor, etc.

  8. Automation for a base station stability testing

    OpenAIRE

    Punnek, Elvis

    2016-01-01

    This Batchelor’s thesis was commissioned by Oy LM Ericsson Ab Oulu. The aim of it was to help to investigate and create a test automation solution for the stability testing of the LTE base station. The main objective was to create a test automation for a predefined test set. This test automation solution had to be created for specific environments and equipment. This work included creating the automation for the test cases and putting them to daily test automation jobs. The key factor...

  9. DO NON-ENFORCEABLE CONTRACTS MATTER? EVIDENCE FROM AN INTERNATIONAL LAB EXPERIMENT Department

    OpenAIRE

    Alexander W. Cappelen; Hagen, Rune Jansen; Sørensen, Erik Ø.; Tungodden, Bertil

    2012-01-01

    Many verifiable contracts are impossible or difficult to enforce. This applies to contracts among family and friends, contracts regulating market transactions, and sovereign debt contracts. Do such non-enforceable contracts matter? We use a version of the trust game with participants from Norway and Tanzania to study repayment decisions in the presence of non-enforceable loan contracts. Our main finding is that the specific content of the contract has no effect on loan repayment. Rather, the ...

  10. Challenges to the enforcement of foreign arbitral awards in the states of the Gulf Cooperation Council

    OpenAIRE

    Almutawa, Ahmed

    2014-01-01

    The topic of this thesis is the enforcement of foreign arbitral awards in the GCC states with the aim of offering a proposal for unifying the substantive and procedural rules for enforcing foreign arbitral awards under the ambit of the New York Convention for the Recognition and Enforcement of Foreign Arbitral Awards, the Riyadh Convention, and the ICSID Convention to which all the GCC states are signatories. The significance of this thesis is its comprehensive comparison of the Shari’a, inte...

  11. CHILD SUPPORT ENFORCEMENT AND DOMESTIC VIOLENCE AMONG NON-COHABITING COUPLES

    OpenAIRE

    Angela R. Fertig; Irwin Garfinkel; McLanahan, Sara S.

    2006-01-01

    Some advocates worry that stronger child support enforcement may increase domestic violence. The predictions of a simple economic model are ambiguous; stronger enforcement may increase the mother’s bargaining power, which reduces violence, but may also increase the father’s opportunity and motive for violence thereby increasing violence. This paper examines whether enforcement is associated with domestic violence using the Fragile Families and Child Wellbeing Study. We find that stricter enfo...

  12. Ways of increasing the safety of small arms employment by law enforcement forces

    OpenAIRE

    Біленко, Олександр Іванович; Кириченко, Олександр Олександрович

    2014-01-01

    Various law enforcement forces play an important role in ensuring state law and order. The tasks of these forces differ greatly, ranging from national defense to protection of life, health and rights of individual citizens. The difference in goals and terms of their achievement is reflected in the ways of performing tasks and constraints, imposed in this case. The purpose of arms employment by the law enforcement forces is to stop an offense that prevents losses among law enforcement officers...

  13. Infrastructural support for enforcing and managing distributed application-level policies

    OpenAIRE

    Goovaerts, Tom; De Win, Bart; Joosen, Wouter

    2008-01-01

    State-of-the-art security mechanisms are often enforced in isolation from each other, which limits the kinds of policies that can be enforced in distributed and heterogeneous settings. More specifically, it is hard to enforce application-level policies that affect, or use information from multiple distributed components. This paper proposes the concept of a Security Service Bus (SSB), which is a dedicated communication channel between the applications and the different security mechanisms. Th...

  14. Estimating the Causal Effect of Enforcement on Minimum Wage Compliance : The Case of South Africa

    OpenAIRE

    Haroon Bhorat; Ravi Kanbur; Natasha Mayet

    2011-01-01

    This paper attempts to estimate the causal effect of government enforcement on compliance with minimum wages in South Africa, a country where considerable non-compliance exists. The number of labour inspectors per capita is used as a proxy for enforcement, whilst non-compliance is measured using an index of violation that measures both the proportion of individuals violated, as well as the average depth of individual violation. Due to the potential simultaneity between enforcement and complia...

  15. A Note on the Impact of Law Enforcement Design on Legal Compliance

    OpenAIRE

    Lisa Bruttel; Tim Friehe

    2010-01-01

    This exploratory note presents experimental evidence on how the design of law enforcement impacts legal compliance and detection avoidance. The experiment varies the enforcer's identity and the use of fine revenue. The data show that the level of detection avoidance is indeed influenced by the design of law enforcement. There also are observable differences in legal compliance across treatments, but they are not statistically significant.

  16. Post-Crackdown Effectiveness of Field-Based Forest Law Enforcement in the Brazilian Amazon

    OpenAIRE

    Börner, Jan; Kis-Katos, Krisztina; Hargrave, Jorge; König, Konstantin

    2015-01-01

    Regulatory enforcement of forest conservation laws is often dismissed as an ineffective approach to reducing tropical forest loss. Yet, effective enforcement is often a precondition for alternative conservation measures, such as payments for environmental services, to achieve desired outcomes. Fair and efficient policies to reducing emissions from deforestation and forest degradation (REDD) will thus crucially depend on understanding the determinants and requirements of enforcement effectiven...

  17. The Welfare Cost of Market Incompleteness: Opitmal Financial Contracts with Non-Enforceability Constraints

    OpenAIRE

    Thomas Cooley; Ramon Marimon; Vincenzo Quadrini

    2000-01-01

    In this paper we develop a general equilibrium model in which firms finance investment by signing long-term contracts with a financial intermediary. Due to enforceability problems, financial contracts are constrained optimal, that is, they maximize the surplus of the contract subject to incentive compatibility constraints. By comparing this model with an alternative model in which contracts are fully enforceable, we evaluate the quantitative importance of non-enforceability for the aggregate ...

  18. Accounting for enforcement costs in the spatial allocation of marine zones.

    Science.gov (United States)

    Davis, Katrina; Kragt, Marit; Gelcich, Stefan; Schilizzi, Steven; Pannell, David

    2015-02-01

    Marine fish stocks are in many cases extracted above sustainable levels, but they may be protected through restricted-use zoning systems. The effectiveness of these systems typically depends on support from coastal fishing communities. High management costs including those of enforcement may, however, deter fishers from supporting marine management. We incorporated enforcement costs into a spatial optimization model that identified how conservation targets can be met while maximizing fishers' revenue. Our model identified the optimal allocation of the study area among different zones: no-take, territorial user rights for fisheries (TURFs), or open access. The analysis demonstrated that enforcing no-take and TURF zones incurs a cost, but results in higher species abundance by preventing poaching and overfishing. We analyzed how different enforcement scenarios affected fishers' revenue. Fisher revenue was approximately 50% higher when territorial user rights were enforced than when they were not. The model preferentially allocated area to the enforced-TURF zone over other zones, demonstrating that the financial benefits of enforcement (derived from higher species abundance) exceeded the costs. These findings were robust to increases in enforcement costs but sensitive to changes in species' market price. We also found that revenue under the existing zoning regime in the study area was 13-30% lower than under an optimal solution. Our results highlight the importance of accounting for both the benefits and costs of enforcement in marine conservation, particularly when incurred by fishers. PMID:25103090

  19. The Impact of Financial Reporting Enforcement and IFRS Adoption on Executive Compensation

    DEFF Research Database (Denmark)

    Banghøj, Jesper; Marton, Jan; Plenborg, Thomas

    This study examines whether both IFRS adoption and the level of financial reporting enforcement impact the contractual usefulness of financial statements, as reflected in payperformance sensitivity. Using a sample of 8,440 executive year observations from 522 firms in 16 European countries we find....... This suggests that the impact of enforcement on pay‐performance sensitivity vanishes after the implementation of IFRS. These results indicate that IFRS dominate enforcement when it comes to the contractual usefulness of financial statements. The findings should be of interest to both enforcement...... authorities and accounting standard setters....

  20. An Overview of Moonlight Applications Test Automation

    Directory of Open Access Journals (Sweden)

    Appasami Govindasamy

    2010-09-01

    Full Text Available Now-a-days web applications are developed by new technologies like Moonlight, Silverlight, JAVAFX, FLEX, etc. Silverlight is Microsoft's cross platform runtime and development technology for running Web-based multimedia applications in windows platform. Moonlight is an open-source implementation of the Silverlight development platform for Linux and other Unix/X11-based operating systems. It is a new technology in .Net 4.0 to develop rich interactive and attractive platform independent web applications. User Interface Test Automation is very essential for Software industries to reduce test time, cost and man power. Moonlight is new .NET technology to develop rich interactive Internet applications with the collaboration of Novel Corporation. Testing these kinds of applications are not so easy to test, especially the User interface test automation is very difficult. Software test automation has the capability to decrease the overall cost of testing and improve software quality, but most testing organizations have not been able to achieve the full potential of test automation. Many groups that implement test automation programs run into a number of common pitfalls. These problems can lead to test automation plans being completely scrapped, with the tools purchased for test automation becoming expensive. Often teams continue their automation effort, burdened with huge costs in maintaining large suites of automated test scripts. This paper will first discuss some of the key benefits of software test automation, and then examine the most common techniques used to implement software test automation of Moonlight Applications Test Automation. It will then discuss test automation and their potential. Finally, it will do test automation.

  1. Peripheral DSA with automated stepping

    International Nuclear Information System (INIS)

    Peripheral digital angiography can now be applied with automated stepping to evaluate the complete lower extremity, with one single injection of contrast medium. In general, good-quality images have been obtained. In some cases, a stationary run had to be carried out with a digital subtraction angiographic (DSA) technique. The authors report a further improvement of this method: it allows angiographic evaluation of the complete lower extremity with DSA technique after a single contrast medium injection of 60 mL. Altogether, 25 examinations were evaluated and compared with results of the nonsubtracted technique. With the DSA-technique, additional series could be reduced to only those where significant differences in flow between the extremities necessitated different timing, as known from conventional angiography as well. In conclusion, the use of DSA technique with automated stepping may totally replace conventional angiography of the peripheral arteries

  2. Automated nanomanipulation for nanodevice construction

    International Nuclear Information System (INIS)

    Nanowire field-effect transistors (nano-FETs) are nanodevices capable of highly sensitive, label-free sensing of molecules. However, significant variations in sensitivity across devices can result from poor control over device parameters, such as nanowire diameter and the number of electrode-bridging nanowires. This paper presents a fabrication approach that uses wafer-scale nanowire contact printing for throughput and uses automated nanomanipulation for precision control of nanowire number and diameter. The process requires only one photolithography mask. Using nanowire contact printing and post-processing (i.e. nanomanipulation inside a scanning electron microscope), we are able to produce devices all with a single-nanowire and similar diameters at a speed of ∼1 min/device with a success rate of 95% (n = 500). This technology represents a seamless integration of wafer-scale microfabrication and automated nanorobotic manipulation for producing nano-FET sensors with consistent response across devices. (paper)

  3. CCD characterization and measurements automation

    International Nuclear Information System (INIS)

    Modern mosaic cameras have grown both in size and in number of sensors. The required volume of sensor testing and characterization has grown accordingly. For camera projects as large as the LSST, test automation becomes a necessity. A CCD testing and characterization laboratory was built and is in operation for the LSST project. Characterization of LSST study contract sensors has been performed. The characterization process and its automation are discussed, and results are presented. Our system automatically acquires images, populates a database with metadata information, and runs express analysis. This approach is illustrated on 55Fe data analysis. 55Fe data are used to measure gain, charge transfer efficiency and charge diffusion. Examples of express analysis results are presented and discussed.

  4. Automating occupational protection records systems

    International Nuclear Information System (INIS)

    Occupational protection records have traditionally been generated by field and laboratory personnel, assembled into files in the safety office, and eventually stored in a warehouse or other facility. Until recently, these records have been primarily paper copies, often handwritten. Sometimes, the paper is microfilmed for storage. However, electronic records are beginning to replace these traditional methods. The purpose of this paper is to provide guidance for making the transition to automated record keeping and retrieval using modern computer equipment. This paper describes the types of records most readily converted to electronic record keeping and a methodology for implementing an automated record system. The process of conversion is based on a requirements analysis to assess program needs and a high level of user involvement during the development. The importance of indexing the hard copy records for easy retrieval is also discussed. The concept of linkage between related records and its importance relative to reporting, research, and litigation will be addressed. 2 figs

  5. GUI test automation with SWTBot

    OpenAIRE

    Mazurkiewicz, Milosz

    2010-01-01

    In this thesis the author presents theoretical background of GUI test automation as well as technologies, tools and methodologies required to fully understand the test program written in SWTBot. Practical part of the thesis was to implement a program testing File Menu options of Pegasus RCP application developed in Nokia Siemens Networks. Concluding this dissertation, in the author’s opinion test programs written using SWTBot are relatively easy to read and intuitive for people familiar w...

  6. Automated Periodontal Diseases Classification System

    OpenAIRE

    Aliaa A. A. Youssif; Abeer Saad Gawish,; Mohammed Elsaid Moussa

    2012-01-01

    This paper presents an efficient and innovative system for automated classification of periodontal diseases, The strength of our technique lies in the fact that it incorporates knowledge from the patients' clinical data, along with the features automatically extracted from the Haematoxylin and Eosin (H&E) stained microscopic images. Our system uses image processing techniques based on color deconvolution, morphological operations, and watershed transforms for epithelium & connective tissue se...

  7. Automated Scheduling Via Artificial Intelligence

    Science.gov (United States)

    Biefeld, Eric W.; Cooper, Lynne P.

    1991-01-01

    Artificial-intelligence software that automates scheduling developed in Operations Mission Planner (OMP) research project. Software used in both generation of new schedules and modification of existing schedules in view of changes in tasks and/or available resources. Approach based on iterative refinement. Although project focused upon scheduling of operations of scientific instruments and other equipment aboard spacecraft, also applicable to such terrestrial problems as scheduling production in factory.

  8. System of automated map design

    International Nuclear Information System (INIS)

    Preprint 'System of automated map design' contains information about the program shell for construction of territory map, performing level line drawing of arbitrary two-dimension field (in particular, the radionuclide concentration field). The work schedule and data structures are supplied, as well as data on system performance. The preprint can become useful for experts in radioecology and for all persons involved in territory pollution mapping or multi-purpose geochemical mapping. (author)

  9. Magnetic Resonance Connectome Automated Pipeline

    OpenAIRE

    Gray, William R.; Bogovic, John A.; Vogelstein, Joshua T; Landman, Bennett A.; Prince, Jerry L.; Vogelstein, R. Jacob

    2011-01-01

    This manuscript presents a novel, tightly integrated pipeline for estimating a connectome, which is a comprehensive description of the neural circuits in the brain. The pipeline utilizes magnetic resonance imaging (MRI) data to produce a high-level estimate of the structural connectivity in the human brain. The Magnetic Resonance Connectome Automated Pipeline (MRCAP) is efficient and its modular construction allows researchers to modify algorithms to meet their specific requirements. The pipe...

  10. Automation of painted slate inspection

    OpenAIRE

    Carew, Tim

    2002-01-01

    This thesis is concerned with the problem of how to detect visual defects on painted slates using an automated visual inspection system. The vision system that has been developed consists of two major components. The first component addresses issues such as the mechanical implementation and interfacing the inspection system with the optical and sensing equipment whereas the second component involves the development of an image processing algorithm able to identify the visual defects present o...

  11. Automated diagnostics of electronic systems

    OpenAIRE

    Drees, Arto

    2014-01-01

    This thesis was commissioned by Nokia Networks as a part of a wider ongoing quality project. The main objective for this thesis and the quality project was to improve diagnostic accuracy on a certain base station product by targeting the most misdiagnosed faults and to reduce unnecessary component replacement. To achieve the objective, an early version of an automated diagnostic tool was developed. The tool was developed using Microsoft Visual Studio and C# programming language. The tool ...

  12. Automated Analysis of Corpora Callosa

    DEFF Research Database (Denmark)

    Stegmann, Mikkel Bille; Davies, Rhodri H.

    2003-01-01

    This report describes and evaluates the steps needed to perform modern model-based interpretation of the corpus callosum in MRI. The process is discussed from the initial landmark-free contours to full-fledged statistical models based on the Active Appearance Models framework. Topics treated...... include landmark placement, background modelling and multi-resolution analysis. Preliminary quantitative and qualitative validation in a cross-sectional study show that fully automated analysis and segmentation of the corpus callosum are feasible....

  13. Small Business Innovations (Automated Information)

    Science.gov (United States)

    1992-01-01

    Bruce G. Jackson & Associates Document Director is an automated tool that combines word processing and database management technologies to offer the flexibility and convenience of text processing with the linking capability of database management. Originally developed for NASA, it provides a means to collect and manage information associated with requirements development. The software system was used by NASA in the design of the Assured Crew Return Vehicle, as well as by other government and commercial organizations including the Southwest Research Institute.

  14. Method development in automated mineralogy

    OpenAIRE

    Sandmann, Dirk

    2015-01-01

    The underlying research that resulted in this doctoral dissertation was performed at the Division of Economic Geology and Petrology of the Department of Mineralogy, TU Bergakademie Freiberg between 2011 and 2014. It was the primary aim of this thesis to develop and test novel applications for the technology of ‘Automated Mineralogy’ in the field of economic geology and geometallurgy. A “Mineral Liberation Analyser” (MLA) instrument of FEI Company was used to conduct most analytical studies. T...

  15. Efficient And Maintainable Test Automation

    OpenAIRE

    Ahmed, Abdifatah; Lindhe, Magnus

    2002-01-01

    More and more companies experience problems with maintainability and time-consuming development of automated testing tools. The MPC department at Ericsson Software Technology AB use methods and tools often developed during time pressure that results in time-consuming testing and requires more effort and resources than planned. The tools are also such nature that they are hard to expand, maintain and in some cases they have been thrown out between releases. For this reason, we could identify t...

  16. Automated minimax design of networks

    DEFF Research Database (Denmark)

    Madsen, Kaj; Schjær-Jacobsen, Hans; Voldby, J

    1975-01-01

    A new gradient algorithm for the solution of nonlinear minimax problems has been developed. The algorithm is well suited for automated minimax design of networks and it is very simple to use. It compares favorably with recent minimax and leastpth algorithms. General convergence problems related...... to minimax design of networks are discussed. Finally, minimax design of equalization networks for reflectiontype microwave amplifiers is carried out by means of the proposed algorithm....

  17. Enforcement of social rights - Upholding of obligations in Denmark

    DEFF Research Database (Denmark)

    Jacqueson, Catherine

    2015-01-01

    This paper looks at the Danish system of remedies in order to assess how the social rights of Union citizens are enforced and upheld in Denmark. Decisions in the social field broadly understood - including social assistance, education, housing and health care - are adopted by various bodies and can...... Denmark (section 1.4). In all the mentioned areas of social law, the Parliamentary Ombudsman can be seized where administrative remedies have been exhausted (section 1.5). Finally, several public bodies are responsible for ensuring supervision of public authorities in the social field (section 1.6)....... be appealed before different complaints board. Recourse to ordinary courts is nevertheless also always possible (section 1.2) and legal aid might be obtained under strict conditions (section 1.3). Yet, the administrative complaints system is a corner stone in the protection of social rights in...

  18. Eyesafe laser application in military and law enforcement training

    Science.gov (United States)

    Mosbrooker, Michael L.

    1991-04-01

    Training is a process of imparting a particular set of skills to a target group either by having them perform an actual task until proficiency is gained or by performing a similar task until confidence of proficiency is attained. Doing an actual task may be preferred but many factors may dictate that this objective is not feasible. The armed services and civilian law enforcement groups must train to use their weapons but often weapon characteristics, expense and the availability of appropriate facilities dictate that some sort of simulation be employed. Eyesafe laser are playing a major role in this sort of simulation. Present uses include their employment as replacements for non-eyesafe lasers in determining the distance to a target, designating a target for laser energy seeking munitions and to signal the arrival of a munition at a target is a benign manner compared to what the replicated munition would do were it used instead.

  19. Carving and adaptive drainage enforcement of grid digital elevation models

    Science.gov (United States)

    Soille, Pierre; Vogt, Jürgen; Colombo, Roberto

    2003-12-01

    An effective and widely used method for removing spurious pits in digital elevation models consists of filling them until they overflow. However, this method sometimes creates large flat regions which in turn pose a problem for the determination of accurate flow directions. In this study, we propose to suppress each pit by creating a descending path from it to the nearest point having a lower elevation value. This is achieved by carving, i.e., lowering, the terrain elevations along the detected path. Carving paths are identified through a flooding simulation starting from the river outlets. The proposed approach allows for adaptive drainage enforcement whereby river networks coming from other data sources are imposed to the digital elevation model only in places where the automatic river network extraction deviates substantially from the known networks. An improvement to methods for routing flow over flat regions is also introduced. Detailed results are presented over test areas of the Danube basin.

  20. Cross-Generational Reproductive Fitness Enforced by Microchimeric Maternal Cells.

    Science.gov (United States)

    Kinder, Jeremy M; Jiang, Tony T; Ertelt, James M; Xin, Lijun; Strong, Beverly S; Shaaban, Aimen F; Way, Sing Sing

    2015-07-30

    Exposure to maternal tissue during in utero development imprints tolerance to immunologically foreign non-inherited maternal antigens (NIMA) that persists into adulthood. The biological advantage of this tolerance, conserved across mammalian species, remains unclear. Here, we show maternal cells that establish microchimerism in female offspring during development promote systemic accumulation of immune suppressive regulatory T cells (Tregs) with NIMA specificity. NIMA-specific Tregs expand during pregnancies sired by males expressing alloantigens with overlapping NIMA specificity, thereby averting fetal wastage triggered by prenatal infection and non-infectious disruptions of fetal tolerance. Therefore, exposure to NIMA selectively enhances reproductive success in second-generation females carrying embryos with overlapping paternally inherited antigens. These findings demonstrate that genetic fitness, canonically thought to be restricted to Mendelian inheritance, is enhanced in female placental mammals through vertically transferred maternal cells that promote conservation of NIMA and enforce cross-generational reproductive benefits. PMID:26213383

  1. Enforcing patents in the era of 3D printing

    DEFF Research Database (Denmark)

    Ballardini, Rosa Maria; Norrgård, Marcus; Minssen, Timo

    2015-01-01

    , although the internet platforms and CAD files repositories will play a major role in the development and spreading of the 3DP technology, they will likely to be at the center of major law disputes unless they carefully consider the scope of their activities (host and/or customize and/or print) in light......This article explores relevant laws and doctrines of patent infringement in Europe with a special emphasis on 3D printing (3DP) technologies. Considering the difficulties that patent owners might face in pursuing direct patent infringement actions in the rapidly evolving era of 3DP, we suggest...... of IP law. Enforcing patents in the era of 3D printing Rosa Maria Ballardini, Marcus Norrgård, and Timo Minssen Journal of Intellectual Property Law & Practice 2015 10: 850-866...

  2. Battered police: risk factors for violence against law enforcement officers.

    Science.gov (United States)

    Covington, Michele W; Huff-Corzine, Lin; Corzine, Jay

    2014-01-01

    Although we hear more about violence committed by the police, violence against police officers is also a major problem in the United States. Using data collected from the Orlando, Florida Police Department files, this study examines situational variables, offender characteristics, and officer demographics that may correlate with violence directed at law enforcement officers. Logistic regression results indicate that battery against one or more police officers is significantly more likely when multiple officers are involved, when offenders are women, when offenders are larger than average as measured by body mass index (BMI), and when offenders are known to have recently consumed alcohol. We close with a discussion of policy implications and directions for future research. PMID:24672993

  3. The ionizing radiations. Institutional landscape and enforceable regulation

    International Nuclear Information System (INIS)

    The principal actors of radiation protection are listed: international actors, European actors, French actors, the principal institutional actors with the nuclear safety authority (A.S.N.), the institute of radiation protection and nuclear safety (I.R.S.N.), the French surveillance and sanitary safety plan with the sanitary surveillance Institute (I.n.V.S.), the French sanitary safety agency of health products (A.F.S.S.A.P.S.), the French sanitary safety agency of food (A.F.S.S.A.), the French sanitary safety agency of environment (A.F.S.S.E.) the operators. About the legislation and the enforceable regulation we have a general overview, rules coming from the directives transpositions and the new regulations. Some detailed analysis of legislative texts are given with the dispositions of the public health code on the population protection and the dispositions of the employment code on the workers protection. (N.C.)

  4. Socio-Economic Rights: Legally Enforceable or Just Aspirational?

    Directory of Open Access Journals (Sweden)

    Ilias Trispiotis

    2010-04-01

    Full Text Available Although the Universal Declaration of Human Rights of 1948 cited social welfare rights without distinguishing them from civil and political rights, the separation has been widely accepted by judges, scholars and politicians. Historically, the classification of human rights into two groups, with the relegation of socio-economic rights into a lower category of human rights, emerged and developed mainly after the 1950s during the Cold War and ultimately led to the adoption of two separate UN Covenants, with different formulation and enforcement mechanisms for each set of rights; the causes and purposes of that classification are well-documented (Cranston 1973; Alston 1990; Sadurski 2005 and profoundly political. Scholars and judges have taken significant steps in the last thirty years to cast light on the legal nature of socio-economic rights. Nonetheless, there is still incredulity concerning not only their normative constitutional role, but also their judicial enforceability. Although much ink has been spilt, socio-economic rights are a hot topic again today, due to the current global economic recession and the – often controversial – state actions (or non-actions that affect the social welfare of millions. Is there any role for the judiciary within this conquered-by-state-policy realm? The goal of this paper is to defend the justiciability of socio-economic rights. To this end, I will present the arguments against their justiciability, after which I will comparatively examine the socio-economic rights jurisprudence, being careful not to get lost in the jurisprudential labyrinth.

  5. The contaminant analysis automation robot implementation for the automated laboratory

    International Nuclear Information System (INIS)

    The Contaminant Analysis Automation (CAA) project defines the automated laboratory as a series of standard laboratory modules (SLM) serviced by a robotic standard support module (SSM). These SLMs are designed to allow plug-and-play integration into automated systems that perform standard analysis methods (SAM). While the SLMs are autonomous in the execution of their particular chemical processing task, the SAM concept relies on a high-level task sequence controller (TSC) to coordinate the robotic delivery of materials requisite for SLM operations, initiate an SLM operation with the chemical method dependent operating parameters, and coordinate the robotic removal of materials from the SLM when its commands and events has been established to allow ready them for transport operations as well as performing the Supervisor and Subsystems (GENISAS) software governs events from the SLMs and robot. The Intelligent System Operating Environment (ISOE) enables the inter-process communications used by GENISAS. CAA selected the Hewlett-Packard Optimized Robot for Chemical Analysis (ORCA) and its associated Windows based Methods Development Software (MDS) as the robot SSM. The MDS software is used to teach the robot each SLM position and required material port motions. To allow the TSC to command these SLM motions, a hardware and software implementation was required that allowed message passing between different operating systems. This implementation involved the use of a Virtual Memory Extended (VME) rack with a Force CPU-30 computer running VxWorks; a real-time multitasking operating system, and a Radiuses PC compatible VME computer running MDS. A GENISAS server on The Force computer accepts a transport command from the TSC, a GENISAS supervisor, over Ethernet and notifies software on the RadiSys PC of the pending command through VMEbus shared memory. The command is then delivered to the MDS robot control software using a Windows Dynamic Data Exchange conversation

  6. How to assess sustainability in automated manufacturing

    DEFF Research Database (Denmark)

    Dijkman, Teunis Johannes; Rödger, Jan-Markus; Bey, Niki

    2015-01-01

    The aim of this paper is to describe how sustainability in automation can be assessed. The assessment method is illustrated using a case study of a robot. Three aspects of sustainability assessment in automation are identified. Firstly, we consider automation as part of a larger system that...... fulfills the market demand for a given functionality. Secondly, three aspects of sustainability have to be assessed: environment, economy, and society. Thirdly, automation is part of a system with many levels, with different actors on each level, resulting in meeting the market demand. In this system......, (sustainability) specifications move top-down, which helps avoiding sub-optimization and problem shifting. From these three aspects, sustainable automation is defined as automation that contributes to products that fulfill a market demand in a more sustainable way. The case study presents the carbon footprints of...

  7. 40 CFR Appendix A to Subpart E of... - Plans for Selective Enforcement Auditing

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Plans for Selective Enforcement Auditing A Appendix A to Subpart E of Part 1068 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR POLLUTION CONTROLS GENERAL COMPLIANCE PROVISIONS FOR ENGINE PROGRAMS Selective Enforcement Auditing Pt. 1068, Subpt. E, App....

  8. Post-crackdown effectiveness of field-based forest law enforcement in the Brazilian Amazon.

    Directory of Open Access Journals (Sweden)

    Jan Börner

    Full Text Available Regulatory enforcement of forest conservation laws is often dismissed as an ineffective approach to reducing tropical forest loss. Yet, effective enforcement is often a precondition for alternative conservation measures, such as payments for environmental services, to achieve desired outcomes. Fair and efficient policies to reducing emissions from deforestation and forest degradation (REDD will thus crucially depend on understanding the determinants and requirements of enforcement effectiveness. Among potential REDD candidate countries, Brazil is considered to possess the most advanced deforestation monitoring and enforcement infrastructure. This study explores a unique dataset of over 15 thousand point coordinates of enforcement missions in the Brazilian Amazon during 2009 and 2010, after major reductions of deforestation in the region. We study whether local deforestation patterns have been affected by field-based enforcement and to what extent these effects vary across administrative boundaries. Spatial matching and regression techniques are applied at different spatial resolutions. We find that field-based enforcement operations have not been universally effective in deterring deforestation during our observation period. Inspections have been most effective in reducing large-scale deforestation in the states of Mato Grosso and Pará, where average conservation effects were 4.0 and 9.9 hectares per inspection, respectively. Despite regional and actor-specific heterogeneity in inspection effectiveness, field-based law enforcement is highly cost-effective on average and might be enhanced by closer collaboration between national and state-level authorities.

  9. 34 CFR 99.8 - What provisions apply to records of a law enforcement unit?

    Science.gov (United States)

    2010-07-01

    ... unit? 99.8 Section 99.8 Education Office of the Secretary, Department of Education FAMILY EDUCATIONAL RIGHTS AND PRIVACY General § 99.8 What provisions apply to records of a law enforcement unit? (a)(1) Law enforcement unit means any individual, office, department, division, or other component of an...

  10. Enforcement actions: significant actions resolved. Quarterly progress report, October-December 1985. Volume 4, No. 4

    International Nuclear Information System (INIS)

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October - December 1985) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory commission to licensees with respects to these enforcement actions, and the licensees' responses

  11. 40 CFR 51.364 - Enforcement against contractors, stations and inspectors.

    Science.gov (United States)

    2010-07-01

    ... Inspection/Maintenance Program Requirements § 51.364 Enforcement against contractors, stations and inspectors. Enforcement against licensed stations or contractors, and inspectors shall include swift, sure, effective, and consistent penalties for violation of program requirements. (a) Imposition of penalties. A penalty...

  12. 40 CFR 35.6155 - State, political subdivision or Indian Tribe-lead enforcement Cooperative Agreements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false State, political subdivision or Indian Tribe-lead enforcement Cooperative Agreements. 35.6155 Section 35.6155 Protection of Environment... § 35.6155 State, political subdivision or Indian Tribe-lead enforcement Cooperative Agreements. (a)...

  13. Post-crackdown effectiveness of field-based forest law enforcement in the Brazilian Amazon.

    Science.gov (United States)

    Börner, Jan; Kis-Katos, Krisztina; Hargrave, Jorge; König, Konstantin

    2015-01-01

    Regulatory enforcement of forest conservation laws is often dismissed as an ineffective approach to reducing tropical forest loss. Yet, effective enforcement is often a precondition for alternative conservation measures, such as payments for environmental services, to achieve desired outcomes. Fair and efficient policies to reducing emissions from deforestation and forest degradation (REDD) will thus crucially depend on understanding the determinants and requirements of enforcement effectiveness. Among potential REDD candidate countries, Brazil is considered to possess the most advanced deforestation monitoring and enforcement infrastructure. This study explores a unique dataset of over 15 thousand point coordinates of enforcement missions in the Brazilian Amazon during 2009 and 2010, after major reductions of deforestation in the region. We study whether local deforestation patterns have been affected by field-based enforcement and to what extent these effects vary across administrative boundaries. Spatial matching and regression techniques are applied at different spatial resolutions. We find that field-based enforcement operations have not been universally effective in deterring deforestation during our observation period. Inspections have been most effective in reducing large-scale deforestation in the states of Mato Grosso and Pará, where average conservation effects were 4.0 and 9.9 hectares per inspection, respectively. Despite regional and actor-specific heterogeneity in inspection effectiveness, field-based law enforcement is highly cost-effective on average and might be enhanced by closer collaboration between national and state-level authorities. PMID:25875656

  14. Enforcement of radiation safety standards and experience in the regulatory control of exposures

    International Nuclear Information System (INIS)

    Regulatory provisions for radiation protection and their enforcement in India are discussed in this paper. The rules and regulations framed for radiation safety cover all the nuclear fuel cycle activities as well as the application of radiation sources in industrial, medical and research institutions. The enforcement aspects and experience in the control of exposures are presented. (author)

  15. 28 CFR 16.98 - Exemption of the Drug Enforcement Administration (DEA)-limited access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of the Drug Enforcement Administration (DEA)-limited access. 16.98 Section 16.98 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION... identity of confidential sources, witnesses, and law enforcement personnel; and of information that...

  16. 5 CFR 842.208 - Firefighters, law enforcement officers, and nuclear materials couriers.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Firefighters, law enforcement officers... ANNUITY Eligibility § 842.208 Firefighters, law enforcement officers, and nuclear materials couriers. (a... misconduct, is entitled to an annuity— (1) After completing any combination of service as a...

  17. 78 FR 16875 - Request of the U.S. Intellectual Property Enforcement Coordinator for Public Comments...

    Science.gov (United States)

    2013-03-19

    ... BUDGET Request of the U.S. Intellectual Property Enforcement Coordinator for Public Comments: Legislative... of the President, Office of Management and Budget, Office of the U.S. Intellectual Property... . In the strategy, the U.S. Intellectual Property Enforcement Coordinator (IPEC) committed to a...

  18. 7 CFR 400.142 - Past-due legally enforceable debt eligible for refund offset.

    Science.gov (United States)

    2010-01-01

    ...) FEDERAL CROP INSURANCE CORPORATION, DEPARTMENT OF AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Debt Management-Regulations for the 1986 and Succeeding Crop Years § 400.142 Past-due legally enforceable debt... 7 Agriculture 6 2010-01-01 2010-01-01 false Past-due legally enforceable debt eligible for...

  19. Enforcement actions: Significant actions resolved individual actions. Semiannual progress report, January 1996--June 1996

    International Nuclear Information System (INIS)

    This document summarizes significant enforcement actions that have been resolved during the period of January-June 1996. The report includes copies of Orders and Notices of Violations sent by the Nuclear Regulatory Commission to individuals with respect to the enforcement actions

  20. 75 FR 15597 - Ensuring Enforcement and Implementation of Abortion Restrictions in the Patient Protection and...

    Science.gov (United States)

    2010-03-29

    ... person. (Presidential Sig.) THE WHITE HOUSE, Washington, March 24, 2010. [FR Doc. 2010-7154 Filed 3-26-10... Executive Order 13535--Ensuring Enforcement and Implementation of Abortion Restrictions in the Patient... ] Executive Order 13535 of March 24, 2010 Ensuring Enforcement and Implementation of Abortion Restrictions...