WorldWideScience

Sample records for grant titled security

  1. Understanding Title V of the Social Security Act: A Guide to the Provisions of the Federal Maternal and Child Health Block Grant.

    Science.gov (United States)

    Health Resources and Services Administration (DHHS/PHS), Washington, DC. Maternal and Child Health Bureau.

    The Maternal and Child Health (MCH) Services Block Grant (Title V of the Social Security Act) has operated as a federal-state partnership since the Social Security Act was passed in 1935. Through Title V, the federal government pledged its support of state efforts to extend health and welfare services for mothers and children. Title V has been…

  2. 2 CFR 376.147 - Does an exclusion from participation in Federal health care programs under Title XI of the Social...

    Science.gov (United States)

    2010-01-01

    ... Federal health care programs under Title XI of the Social Security Act affect a person's eligibility to..., Medicaid, and other Federal health care programs under Title XI of the Social Security Act, 42 U.S.C. 1320a... Federal Agency Regulations for Grants and Agreements DEPARTMENT OF HEALTH AND HUMAN SERVICES...

  3. 75 FR 11627 - Order Granting Temporary Exemptions From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2010-03-11

    ... DEPARTMENT OF THE TREASURY Order Granting Temporary Exemptions From Certain Government Securities... Department of the Treasury (Treasury) is granting temporary exemptions from certain Government Securities Act...).pdf. \\8\\ 75 FR 4626, January 28, 2010 Order Granting a Temporary Exemption from Certain Government...

  4. 20 CFR 627.220 - Coordination with programs under title IV of the Higher Education Act including the Pell grant...

    Science.gov (United States)

    2010-04-01

    ... the Higher Education Act including the Pell grant program. 627.220 Section 627.220 Employees' Benefits... of the Higher Education Act including the Pell grant program. (a) Coordination. Financial assistance programs under title IV of the Higher Education Act of 1965, as amended (HEA) (the Pell Grant program, the...

  5. 75 FR 49017 - America's Marine Highway Grant Notice of Funding Availability

    Science.gov (United States)

    2010-08-12

    ... DEPARTMENT OF TRANSPORTATION Maritime Administration [Docket No. MARAD-2010-0035] America's Marine... America's Short Sea Transportation Grants for the Development of Marine Highways, amended Section 55601 of the 2007 Energy Independence and Security Act, titled Short Sea Transportation Program. Section 3515...

  6. 78 FR 17939 - Announcement of Funding Awards; Capital Fund Safety and Security Grants; Fiscal Year 2012

    Science.gov (United States)

    2013-03-25

    ...; Capital Fund Safety and Security Grants; Fiscal Year 2012 AGENCY: Office of the Assistant Secretary for... availability of the Safety and Security funds with PIH Notice 2012-38 (Notice), which was issued September 7... Fund Safety and Security grant program. FOR FURTHER INFORMATION CONTACT: For questions concerning the...

  7. 78 FR 56728 - Announcement of Funding Awards; Capital Fund Safety and Security Grants; Fiscal Year 2013

    Science.gov (United States)

    2013-09-13

    ...; Capital Fund Safety and Security Grants; Fiscal Year 2013 AGENCY: Office of the Assistant Secretary for... availability of the Safety and Security funds with PIH Notice 2013-10 (Notice), which was issued May 3, 2013... Fund Safety and Security grant program. FOR FURTHER INFORMATION CONTACT: For questions concerning the...

  8. 77 FR 23492 - Announcement of Funding Awards; Capital Fund Safety and Security Grants; Fiscal Year 2011

    Science.gov (United States)

    2012-04-19

    ...; Capital Fund Safety and Security Grants; Fiscal Year 2011 AGENCY: Office of the Assistant Secretary for... notified of the availability of the Safety and Security funds with PIH Notice 2011-56 (Notice), which was... award recipients under the Capital Fund Safety and Security grant program. FOR FURTHER INFORMATION...

  9. Significance of Hemispheric Security for Mexico

    Science.gov (United States)

    2003-04-07

    La Seguridad Internacional, la Nueva Geopolitica Continental y Mexico ,” Seminario Internacional sobre Misiones de Paz, Seguridad y Defensa, Rio de...USAWC STRATEGY RESEARCH PROJECT SIGNIFICANCE OF HEMISPHERIC SECURITY FOR MEXICO by LTC Enrique Garcia Jaramillo Cavalry, Mexican Army COL Joseph R...xx-xx-2002 to xx-xx-2003 4. TITLE AND SUBTITLE Significance of Hemispheric Security for Mexico Unclassified 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  10. 78 FR 25259 - Notice of Intent To Grant an Exclusive License; Integrata Security, LLC

    Science.gov (United States)

    2013-04-30

    ...; Integrata Security, LLC AGENCY: National Security Agency, DoD. ACTION: Notice. SUMMARY: The National Security Agency hereby gives notice of its intent to grant Integrata Security, LLC a revocable, non.... Patent No. 8,069,483 entitled: ``Device for and Method of Wireless Intrusion Detection,'' issued by the U...

  11. 76 FR 51075 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Granting Approval to...

    Science.gov (United States)

    2011-08-17

    ... Organizations; International Securities Exchange, LLC; Order Granting Approval to a Proposed Rule Change Relating to Appointments to Competitive Market Makers August 11, 2011. I. Introduction On June 10, 2011, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities...

  12. 75 FR 4626 - Order Granting a Temporary Exemption From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2010-01-28

    ... DEPARTMENT OF THE TREASURY Order Granting a Temporary Exemption From Certain Government Securities... Department of the Treasury (Treasury) is issuing a temporary exemption from certain Government Securities Act... accommodate customer clearing of credit default swaps that reference government securities. Treasury is also...

  13. 78 FR 9987 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-02-12

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security...

  14. 78 FR 22361 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-04-15

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security...

  15. 76 FR 43376 - Order Granting Temporary Exemptions From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2011-07-20

    .../gsareg.htm . As noted in its request, on July 16, 2011, ICE Trust reorganized its corporate structure... DEPARTMENT OF THE TREASURY Order Granting Temporary Exemptions From Certain Government Securities... temporary exemptions from certain Government Securities Act of 1986 provisions and regulations regarding...

  16. The Port Security Grant Program: Good Enough, or Can it be Made Better

    Science.gov (United States)

    2016-06-01

    Statement of William O. Jenkins , Jr., Director Homeland Security and Justice, GAO 12-526T (Washington, DC, 2012) 4- 11, http://www.gao.gov/assets/590...127 de Rugy, “What Does Homeland Security Spending Buy?,” 13. 128 Yacov Haimes, Joost Santos, Kenneth Crowther, Matthew Henry ...Preparedness Grants and Assessing National Capabilities: Continuing Challenges Impede FEMA’s Progress, Statement of William O. Jenkins , Jr

  17. 78 FR 8217 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-02-05

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias... the third column, the fourth line under the ``Summary'' heading, change ``SSR-13-Xp'' to ``SSR-13-1p...

  18. Matrix of Title V-Related And Air Grant-Eligible Activities

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Policy and Guidance Database available at www2.epa.gov/title-v-operating-permits/title-v-operating-permit-policy-and-guidance-document-index. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  19. State Implementation and Perceptions of Title I School Improvement Grants under the Recovery Act: One Year Later. Online Appendix--State Responses to Open-Ended Questions about the ARRA SIG Program

    Science.gov (United States)

    Center on Education Policy, 2012

    2012-01-01

    To learn more about states' experiences with implementing school improvement grants (SIGs) funded through the American Recovery and Reinvestment Act (ARRA), the Center on Education Policy (CEP) administered a survey to state Title I directors. (Title I of the Elementary and Secondary Education Act provides federal funds to schools in low-income…

  20. 25 CFR 23.21 - Noncompetitive tribal government grants.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Noncompetitive tribal government grants. 23.21 Section 23... ACT Grants to Indian Tribes for Title II Indian Child and Family Service Programs § 23.21 Noncompetitive tribal government grants. (a) Grant application information and technical assistance. Information...

  1. FEMA Grants Program Directorate - Preparedness (Non-Disaster) and Assistance to Firefighter Grants

    Data.gov (United States)

    Department of Homeland Security — The Grant Programs Directorate (GPD) strategically and effectively administers and manages FEMA grants to ensure critical and measurable results for customers and...

  2. 25 CFR 23.22 - Purpose of tribal government grants.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Purpose of tribal government grants. 23.22 Section 23.22... Grants to Indian Tribes for Title II Indian Child and Family Service Programs § 23.22 Purpose of tribal government grants. (a) Grants awarded under this subpart are for the establishment and operation of tribally...

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 89 ... Issue, Title ... of two-phased approaches to load balancing in cloud computing, Abstract ... Vol 19, No 1 (2012), Assessing Network Services and Security in ... Vol 23, No 1 (2016), Cloud model construct for transaction-based ...

  4. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 198 ... Issue, Title ... Vol 13, No 1 (2015), Biometric Enhancement of Home and Office Security to Reduce Assassinations in Nigeria, Abstract PDF ... Vol 9, No 1 (2013), Cloud Computing: Key to IT Development in West Africa ...

  5. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 198 of 198 ... Issue, Title ... scheme for QoS and energy conservation in cloud computing, Abstract PDF ... Vol 9, No 1 (2013), Performance and Security Evaluation of ... Vol 18, No 1 (2017), Reducing capital flight through local cloud ...

  6. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  7. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 643 ... Issue, Title. Vol 18, No 2 (2015), Contraceptive Knowledge and Compliance with Guidelines for Providing Contraceptive Services by Patent Medicine Vendors In Ibadan North Local Government Area, Nigeria, Abstract PDF. OO Ajayi, AJ Ajuwon. Vol 16, No 2 (2013), Coping Strategy for Food Security ...

  8. 20 CFR 638.528 - Social Security.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...

  9. 20 CFR 411.552 - What effect will the subsequent entitlement to title II benefits have on EN payments for title...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What effect will the subsequent entitlement to title II benefits have on EN payments for title XVI beneficiaries after they assign their ticket? 411.552 Section 411.552 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF...

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 198 ... Issue, Title ... Vol 7, No 1 (2013), Enterprise Cloud Adoption: Leveraging on the Business ... Load Balancing And Job Scheduling In Cloud Computing ... Vol 13, No 1 (2015), ICT-Based Framework for Improved Food Security in Nigeria ... Vol 5, No 1 (2012), IT-Based Solutions to the Electoral System in ...

  11. 40 CFR 35.3135 - Specific capitalization grant agreement requirements.

    Science.gov (United States)

    2010-07-01

    ... received a capitalization grant and, if the deposit was expended, it was expended in accordance with title... after it receives the payment, the RA may withhold future quarterly grant payments, and require... procedures regarding the commitment or expenditure of revenues. (h) State accounting and auditing procedures...

  12. FEMA Hazard Mitigation Grants Program Summary

    Data.gov (United States)

    Department of Homeland Security — The Hazard Mitigation Grant Program (HMGP, CFDA Number: 97.039) provides grants to States and local governments to implement long-term hazard mitigation measures...

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 286 ... Issue, Title. Vol 2, No 3-4 (2008), Impact of fire wood collection on trees species diversity in Bauchi state, Nigeria, Abstract. A Nura, A Ibrahim, I Mohammed, U Haruna. Vol 5, No 3 (2011), Impact of national special program for food security in Abia State, nigeria, Abstract. CO Emerole. Vol 5, No 1 (2011) ...

  14. Writing Cancer Grant Applications | Center for Cancer Research

    Science.gov (United States)

    This course focuses on how to write clear and persuasive grant applications. The purpose is to increase the quality of your grant application by successfully communicating scientific data and ideas. Emphasis is placed on how to use the title abstract and introduction sections to draw in reviewers and how to write an organized and focused proposal using specific scientific aims.

  15. 36 CFR 254.15 - Title standards.

    Science.gov (United States)

    2010-07-01

    ...) Conveyances of lands from the United States are made by patent, quitclaim deed, or deed and without express or implied warranties, except as to hazardous substances pursuant to § 254.3 of this subpart. (c) Title... of the existing use(s) authorized under the terms of the grant, permit, easement, or lease. The non...

  16. FEMA Hazard Mitigation Grants Program Summary - API

    Data.gov (United States)

    Department of Homeland Security — The Hazard Mitigation Grant Program (HMGP, CFDA Number: 97.039) provides grants to States and local governments to implement long-term hazard mitigation measures...

  17. 25 CFR 900.87 - How does an Indian tribe or tribal organization obtain title to property furnished by the Federal...

    Science.gov (United States)

    2010-04-01

    ... title to property furnished by the Federal government for use in the performance of a contract or grant... Government-Furnished Property § 900.87 How does an Indian tribe or tribal organization obtain title to property furnished by the Federal government for use in the performance of a contract or grant agreement...

  18. 76 FR 41813 - Renewal of Agency Information Collection for Higher Education Grant Program Application; Request...

    Science.gov (United States)

    2011-07-15

    ... Higher Education Grant Program Application; Request for Comments AGENCY: Bureau of Indian Affairs... and Budget (OMB) approval for the collection of information for the Higher Education Grant Program... Number: 1076-0101. Title: Higher Education Grant Application, 25 CFR part 40. Brief Description of...

  19. 7 CFR 3560.61 - Loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Loan security. 3560.61 Section 3560.61 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Direct Loan and Grant Origination § 3560.61 Loan security... collateral. (2) The amount of the loan against the collateral does not exceed its estimated security value...

  20. Comprehensive Social Service Programs for Handicapped Citizens through Title XX.

    Science.gov (United States)

    Roten, Shelby Jean

    Reviewed are present and potential services and social programs for handicapped children in Mississippi through purchase of service contracts under Title XX of the Social Security Act. Sections cover the following topics: background and purpose of Title XX which gives states greater control over social service programs, planning state supported…

  1. 1999 Horton Research Grants awarded

    Science.gov (United States)

    The Horton (Hydrology) Research Grant Committee presented three grants at the 1999 AGU Spring Meeting in Boston, Massachusetts, last June. S. Jean Birks is currently a Ph.D. candidate in the Earth Sciences Department at the University of Waterloo under the supervision of Tom Edwards and Victoria Remenda (Queen's University). The title of her Ph.D. dissertation is “Long-term Natural Tracer Migration in Thick Unfractured Clay: Implications for Reconstructing the Post-glacial Isotopic History of Precipitation from Aquitards in the Northern Great Plains.” Jean received her B.Sc. in geography and environmental science from McMaster University and her M.Sc. in hydrogeology from Queen's University.

  2. Title IV Indian Education Program Evaluation, 1985-86.

    Science.gov (United States)

    Albuquerque Public Schools, NM. Planning, Research and Accountability.

    Public schools in Albuquerque, New Mexico, used a Title IV Part A grant to assist American Indian elementary and secondary school students in receiving passing grades and improving school-related behaviors. Canoncito Navajo Reservation, the Isleta Pueblo, and urban Indian students in Albuquerque participated in the program. Personnel consisted of…

  3. 42 CFR 51.4 - Grants administration requirements.

    Science.gov (United States)

    2010-10-01

    ... Assistance through the Department of Health and Human Services—Effectuation of Title VI of the Civil Rights....4 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS REQUIREMENTS APPLICABLE TO THE PROTECTION AND ADVOCACY FOR INDIVIDUALS WITH MENTAL ILLNESS PROGRAM Basic Requirements § 51...

  4. 34 CFR 200.74 - Use of an alternative method to distribute grants to LEAs with fewer than 20,000 total residents.

    Science.gov (United States)

    2010-07-01

    ... LEAs for basic grants, concentration grants, targeted grants, and education finance incentive grants in... TITLE I-IMPROVING THE ACADEMIC ACHIEVEMENT OF THE DISADVANTAGED Improving Basic Programs Operated by... to the Secretary to use an alternative method to distribute basic grant, concentration grant...

  5. 20 CFR 410.561c - Defeat the purpose of title IV.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Defeat the purpose of title IV. 410.561c Section 410.561c Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY..., accident, and health insurance including premiums for supplementary medical insurance benefits under title...

  6. 78 FR 31972 - Notice of Proposed Information Collection for Public Comment; Request Voucher for Grant Payment...

    Science.gov (United States)

    2013-05-28

    ... Information Collection for Public Comment; Request Voucher for Grant Payment and Line of Credit Control System... information: Title Of Proposal: Request Voucher for Grant Payment and Line of Credit Control System (LOCCS... and proposed use: Payment request vouchers for distribution of grant funds using the automated Voice...

  7. 49 CFR 450.13 - Granting of delegation.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Granting of delegation. 450.13 Section 450.13... SECURITY SAFETY APPROVAL OF CARGO CONTAINERS GENERAL Procedure for Delegation to Approval Authorities § 450.13 Granting of delegation. (a) The Chief, Office of Operating and Environmental Standards (CG-522), U...

  8. 75 FR 62840 - Award of a Single-Source Expansion Supplement to the University of Southern Maine, Muskie School...

    Science.gov (United States)

    2010-10-13

    ... Indian Tribes to receive one-time development grants to be used to offset the cost of developing a title...(c)(2)(iii) of the Social Security Act, as amended by the Fostering Connections to Success and... of the Social Security Act and title IV-E provisions that provide foster care and adoption service...

  9. Statistics On Title II Direct Payments To Claimant Representatives

    Data.gov (United States)

    Social Security Administration — Every person has the right to be represented by an attorney or other representative while pursuing a claim or other rights. This dataset contains data around Title...

  10. Daily Public Assistance Grants Award Activity

    Data.gov (United States)

    Department of Homeland Security — Daily activity of Public Assistance Grant Awards, including FEMA Region, State, Disaster Declaration Number, Event description, Mission Assigned agency, Assistance...

  11. 20 CFR 628.315 - Education coordination and grants.

    Science.gov (United States)

    2010-04-01

    ... lifelong learning opportunities and services of demonstrated effectiveness, including basic education and... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Education coordination and grants. 628.315... UNDER TITLE II OF THE JOB TRAINING PARTNERSHIP ACT State Programs § 628.315 Education coordination and...

  12. Dos Idiomas, Un Mundo. Dual Language Project. Title VII Biennial Evaluation Report, 1995-97.

    Science.gov (United States)

    Ernest, Harishini M.; Gonzalez, Rosa M.

    This is an evaluation of the first 2 years of a 5-year comprehensive Bilingual Education grant funded by Title VII Part A of the Improving America's Schools Act of 1994 in the Austin Independent School District (AISD) (Texas). The grant awarded to the AISD funds a program of Developmental Bilingual Education at two elementary schools where more…

  13. U.S. statutes of general interest to safeguards and security officers

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1988-01-01

    A handbook of enforcement provisions of Federal law and regulations was prepared for use by U.S. DOE Security Inspectors. This handbook provides security inspectors for the U.S. Department of Energy, security officers at Nuclear Regulatory Licensee facilities, and others with a single document containing most of the Federal law provisions available to assist them in enforcing agency regulations. The handbook contains selected enforcement provisions of Titles 18, 42 and 50 of the United States Code (USC). Topical coverage of Title 18 includes Espionage and Misrepresentation or Impersonation; Theft and Embezzlement; Malicious Mischief; Conspiracy; Search and Seizure. A miscellaneous section deals with explosives, blackmail, firearms, and other subjects. Certain enforcement sections of Title 42 of the USC (The Atomic Energy Act) and of the Internal Security Act of the United States Code (Title 50) are also provided. Finally, relevant parts of the Federal Property Management Regulations of Title 50, Chapter 101 of the Code of Federal Regulations are presented. A comprehensive index is provided based on key words

  14. Title XVI / Supplemental Security Record Point In Time (SSRPT)

    Data.gov (United States)

    Social Security Administration — This is the point-in-time database to house temporary Supplemental Security Record (SSR) images produced during the course of the operating day before they can be...

  15. 75 FR 30845 - Request Voucher for Grant Payment and Line of Credit Control System (LOCCS) Voice Response System...

    Science.gov (United States)

    2010-06-02

    ... subject proposal. Payment request vouchers for distribution of grant funds using the automated Voice... Lists the Following Information Title of Proposal: Request Voucher for Grant Payment and Line of Credit... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5376-N-46] Request Voucher for Grant...

  16. 44 CFR 78.9 - Planning grant approval process.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION ASSISTANCE § 78.9 Planning grant approval process. The State POC will evaluate and approve applications for Planning Grants. Funds will be provided only for the flood portion of any mitigation plan, and...

  17. 77 FR 38771 - Prospective Grant of Exclusive Patent License

    Science.gov (United States)

    2012-06-29

    ... Exclusive Patent License AGENCY: National Institute of Standards and Technology, Department of Commerce. ACTION: Notice of prospective grant of exclusive patent license. SUMMARY: This is a notice in accordance... embodied in U.S. Patent Application No. 13/346,999 titled ``Chirped-Pulse Terahertz Spectroscopy for...

  18. GCC Dacotah Cement Manufacturing, Order Partially Granting and Partially Denying Petition for Objection to Title V Operating Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  19. 7 CFR 1780.14 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...

  20. 25 CFR 23.32 - Purpose of off-reservation grants.

    Science.gov (United States)

    2010-04-01

    ... Indian foster and adoptive children with the goal of strengthening and stabilizing Indian families; (c... Grants to Off-Reservation Indian Organizations for Title II Indian Child and Family Service Programs § 23... family service programs for the purpose of stabilizing Indian families and tribes, preventing the breakup...

  1. 75 FR 14455 - Notice of Proposed Information Collection: Comment Request; Request Voucher for Grant Payment and...

    Science.gov (United States)

    2010-03-25

    ... Information Collection: Comment Request; Request Voucher for Grant Payment and Line of Credit Control System... Notice also lists the following information: Title of proposal: Request Voucher for Grant Payment and..., if applicable: 2535-0102. Description of the need for the information and proposed use: Payment...

  2. 75 FR 32857 - Academic Competitiveness Grant (ACG) and National Science and Mathematics Access To Retain Talent...

    Science.gov (United States)

    2010-06-10

    ... and Mathematics Access To Retain Talent Grant (National Smart Grant) Programs CFR Correction In Title 34 of the Code of Federal Regulations, Part 400 to End, revised as of July 1, 2009, on page 978, in...; 8:45 am] BILLING CODE 1505-01-D ...

  3. 7 CFR 3560.610 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  4. 76 FR 15368 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-03-21

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures... concerning the following information collection. Title of Proposal: Minimum Security Devices and Procedures... security devices and procedures to discourage robberies, burglaries, and larcenies, and to assist in the...

  5. Water Resources Research Grant Program project descriptions, fiscal year 1987

    Science.gov (United States)

    ,

    1987-01-01

    This report contains information on the 34 new projects funded by the United States Geological Survey 's Water Resources Research Grant Program in fiscal year 1987 and on 3 projects completed during the year. For the new projects, the report gives the grant number, project title, performing organization, principal investigator(s), and a project description that includes: (1) identification of water related problems and problem-solution approach (2) contribution to problem solution, (3) objectives, and (4) approach. The 34 projects include 12 in the area of groundwater quality problems, 12 in the science and technology of water quality management, 1 in climate variability and the hydrologic cycle, 4 in institutional change in water resources management, and 5 in surface water management. For the three completed projects, the report furnishes the grant number; project title; performing organization; principal investor(s); starting data; data of receipt of final report; and an abstract of the final report. Each project description provides the information needed to obtain a copy of the final report. The report contains tables showing: (1) proposals received according to area of research interest, (2) grant awards and funding according to area of research interest, (3) proposals received according to type of submitting organization, and (4) awards and funding according to type of organization. (Author 's abstract)

  6. 20 CFR 664.820 - Who is eligible to receive services under Youth Opportunity Grants?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Who is eligible to receive services under Youth Opportunity Grants? 664.820 Section 664.820 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR YOUTH ACTIVITIES UNDER TITLE I OF THE WORKFORCE INVESTMENT ACT Youth Opportunity Grants § 664.820 Who is eligible to...

  7. 78 FR 35179 - Negotiated Rulemaking Committee, Negotiator Nominations and Schedule of Committee Meetings-Title...

    Science.gov (United States)

    2013-06-12

    ... title IV Federal Student Aid programs; regulations designed to prevent fraud; State authorization for... Against Women Reauthorization Act of 2013 to the campus safety and security reporting requirements in the... regulations designed to prevent fraud and otherwise ensure proper use of title IV Federal Student Aid program...

  8. 77 FR 65673 - Prospective Grant of Exclusive Patent License

    Science.gov (United States)

    2012-10-30

    ... Exclusive Patent License AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice of prospective grant of exclusive patent license. SUMMARY: This is a notice in accordance with 35 U.S.C. 209(e.... Patent Application No. 61/625,511 titled ``UV-Assisted Alcohol Sensing with Zinc Oxide Functionalized...

  9. 77 FR 48130 - Prospective Grant of Exclusive Patent License

    Science.gov (United States)

    2012-08-13

    ... Exclusive Patent License AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice of prospective grant of exclusive patent license. SUMMARY: This is a notice in accordance with 35 U.S.C. 209(e... Provisional Application for Patent Application No. 61,638,362 titled ``Flow Cytometer Systems and Associated...

  10. Multidisciplinary Rural Studies in the Land Grant University Context.

    Science.gov (United States)

    Brown, David L; Ranney, Christine

    1991-01-01

    Proposes a multidisciplinary graduate program in rural studies within the land grant university context. Requires a universitywide Rural Studies Center to coordinate efforts across the various colleges. Students could earn dual-title master's and Ph.D. degrees in rural studies and applied economics, sociology, geography, public administration,…

  11. Ex-Post Analysis of Land Title Registration in Ghana Since 2008 Merger

    Directory of Open Access Journals (Sweden)

    Richmond J. Ehwi

    2016-04-01

    Full Text Available Land ownership and security of title have continued to dominate land management discourses in many developing economies, leading to a proliferation of studies that explore, among other things, the nexus between land title registration and land security, women’s access to land, innovation in agriculture, access to finance, and economic development. For many years, Ghana experienced minimal success in formalizing land ownership and title registration. However, public confidence and expectations were raised once more in 2008 with the merger of four disparate land agencies into the New Lands Commission (NLC under the overarching ambit of the Land Administration Project (LAP. This article contributes to existing studies by evaluating the impact of the 2008 merger. This is accomplished by matching the project’s stated objectives with actual outcomes and situating the findings in the broader theoretical debate about land title registration and economic development. Using data gathered through interviews with officials of the Greater Accra Lands Commission and with prospective land title holders, the study concludes that there have not been any great gains in achieving the complete digitization of the title registration process and follow-up procedures. However, there has been a reduction in the turn-around time for processing land documents, from more than 36 months to about 3 months, as well as increased public awareness about the process of title registration. The study recommends further training of staff members of the NLC in handling the digitization process, institutionalization of anti-corruption and anti-bribery practices, and the introduction of a well-functioning customer feedback system.

  12. National Security Education Program: Background and Issues

    National Research Council Canada - National Science Library

    Kuenzi, Jeffrey J; Riddle, Wayne C

    2005-01-01

    ... (NSEA, Title VIII of P.L. 102-183), provides aid for international education and foreign language studies by American undergraduate and graduate students, plus grants to institutions of higher education...

  13. 76 FR 30243 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-05-24

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures.... Title of Proposal: Minimum Security Devices and Procedures. OMB Number: 1550-0062. Form Number: N/A... respect to the installation, maintenance, and operation of security devices and procedures to discourage...

  14. 76 FR 36566 - Notice of Submission of Proposed Information Collection to OMB “Logic Model” Grant Performance...

    Science.gov (United States)

    2011-06-22

    ... Proposed Information Collection to OMB ``Logic Model'' Grant Performance Report Standard AGENCY: Office of... lists the following information: Title of Proposal: ``Logic Model'' Grant Performance Report Standard. OMB Approval Number: 2535-0114. Form Numbers: HUD 96010, each program utilizing the Logic Model will...

  15. 7 CFR 3550.108 - Security requirements (loans only).

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security requirements (loans only). 3550.108 Section..., DEPARTMENT OF AGRICULTURE DIRECT SINGLE FAMILY HOUSING LOANS AND GRANTS Section 504 Origination and Section 306C Water and Waste Disposal Grants § 3550.108 Security requirements (loans only). When the total...

  16. 44 CFR 78.7 - Grant application procedures.

    Science.gov (United States)

    2010-10-01

    ... OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION ASSISTANCE § 78.7 Grant application procedures. States will apply for Technical Assistance and...

  17. 44 CFR 78.8 - Grant funding limitations.

    Science.gov (United States)

    2010-10-01

    ... OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION ASSISTANCE § 78.8 Grant funding limitations. (a) The Administrator will allocate the available...

  18. 7 CFR 3560.560 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3560.560 Section 3560.560 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, DEPARTMENT OF AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Off-Farm Labor Housing § 3560.560 Security. The security...

  19. Modernizing insecurity: the land titling project in Honduras.

    NARCIS (Netherlands)

    Jansen, K.; Roquas, E.

    1998-01-01

    The Honduran land titling project (the Proyecto de Titulación de Tierra para los Pequeños Productores), initiated in 1982, was intended to enhance security in land rights, to facilitate credit and to improve agricultural productivity. This study explores how the project has operated in one village,

  20. Information security management with ITIL V3

    CERN Document Server

    Cazemier, Jacques A; Peters, Louk

    2010-01-01

    This groundbreaking new title looks at Information Security from defining what security measures positively support the business, to implementation to maintaining the required level and anticipating required changes. It covers:Fundamentals of information security ? providing readers insight and give background about what is going to be managed. Topics covered include: types of security controls, business benefits and the perspectives of business, customers, partners, service providers, and auditors.Fundamentals of management of information security - explains what information security manageme

  1. 14 CFR 1260.31 - National security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance of...

  2. 31 CFR 306.100 - Transferable securities.

    Science.gov (United States)

    2010-07-01

    ... SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT GENERAL REGULATIONS GOVERNING U.S... recognize valid judicial proceedings affecting the ownership of or interest in transferable securities, upon... established. 10 10 Title in a finder claiming ownership of a registered security will not be recognized. A...

  3. Chemical Facility Security: Regulation and Issues for Congress

    National Research Council Canada - National Science Library

    Shea, Dana A; Tatelman, Todd B

    2007-01-01

    The Department of Homeland Security (DHS) has proposed security regulations for chemical facilities, implementing the statutory authority granted in the Homeland Security Appropriations Act, 2007 (P.L...

  4. FEMA Hazard Mitigation Grant Program - Property Acquisitions

    Data.gov (United States)

    Department of Homeland Security — HMGP provides grants to states and local governments to implement long-term hazard mitigation measures after a major disaster declaration. The HMGP is one of three...

  5. 25 CFR 40.4 - Security.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Security. 40.4 Section 40.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION ADMINISTRATION OF EDUCATIONAL LOANS, GRANTS AND OTHER ASSISTANCE FOR HIGHER EDUCATION § 40.4 Security. If a borrower or cosigner has security to offer for an...

  6. 75 FR 28777 - Information Collection; Financial Information Security Request Form

    Science.gov (United States)

    2010-05-24

    ... Collection; Financial Information Security Request Form AGENCY: Forest Service, USDA. ACTION: Notice; Request... currently approved information collection; Financial Information Security Request Form. DATES: Comments must... Standard Time, Monday through Friday. SUPPLEMENTARY INFORMATION: Title: Financial Information Security...

  7. 78 FR 46360 - 30-Day Notice of Proposed Information Collection: Request Voucher for Grant Payment and Line of...

    Science.gov (United States)

    2013-07-31

    ... Information Collection: Request Voucher for Grant Payment and Line of Credit Control System (LOCCS) Voice.... Description of the need for the information and proposed use: Payment request vouchers for distribution of.... A. Overview of Information Collection Title of Information Collection: Request Voucher for Grant...

  8. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  9. 7 CFR 772.6 - Subordination of security.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.6 Subordination of security. (a) Eligibility. The Agency shall grant a subordination of Minor Program loan security when the transaction will... still be adequately secured after the subordination, or the value of the loan security will be increased...

  10. 77 FR 71609 - Self-Help Homeownership Opportunity Program (SHOP) Grant Monitoring

    Science.gov (United States)

    2012-12-03

    ... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5603-N-89] Self-Help Homeownership Opportunity Program (SHOP) Grant Monitoring AGENCY: Office of the Chief Information Officer, HUD. ACTION... electronic submission of responses. This notice also lists the following information: Title of Proposed: Self...

  11. 76 FR 28960 - National Security Education Board Members Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  12. 77 FR 27739 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-05-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  13. 75 FR 40864 - Notice of Fiscal Year 2010 Border Grant Funding and Solicitation for Applications

    Science.gov (United States)

    2010-07-14

    ... Federal Grant Web site, http://www.grants.gov . Eligible projects for funding with BEG are identified in... applications for BEG funding at the Federal Grant Web site, http://www.grants.gov . FOR FURTHER INFORMATION... the MOE explanation, http://www.fmcsa.dot.gov/safety-security/grants/beg/moe.aspx . The Border...

  14. Fourth Dutch Process Security Control Event

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Zielstra, A.

    2010-01-01

    On December 1st, 2009, the fourth Dutch Process Control Security Event took place in Baarn, The Netherlands. The security event with the title ‘Manage IT!’ was organised by the Dutch National Infrastructure against Cybercrime (NICC). Mid of November, a group of over thirty people participated in the

  15. LJ Best of 2009 Business Books: 32 Titles

    Science.gov (United States)

    Cords, Sarah Statz

    2010-01-01

    It should come as no surprise that a large share of this year's business books focus squarely on the 2008-09 financial crisis and security-backed mortgage implosion. Investing books followed the trend as either alarmist titles advocating selling stocks, or books urging readers to take advantage of this time to buy undervalued investments. An…

  16. Student Experiential Opportunities in National Security Careers

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  17. 44 CFR 78.10 - Project grant approval process.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION ASSISTANCE § 78.10 Project grant approval process. The State POC will solicit applications from...

  18. SSA Unified Measurement System (SUMS) Title XVI Post-Eligibility Operational Data Store (PEODS)

    Data.gov (United States)

    Social Security Administration — Current store for information on post entitlement claims for title 16 for redeterminations and limited issues. Also includes information from Starz and Stripes field...

  19. 76 FR 52377 - Colorado Wyoming Reserve Co., Grant Life Sciences, Inc., NOXSO Corp., Omni Medical Holdings, Inc...

    Science.gov (United States)

    2011-08-22

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Colorado Wyoming Reserve Co., Grant Life Sciences, Inc., NOXSO Corp., Omni Medical Holdings, Inc., and TSI, Inc., Order of Suspension of Trading... Commission that there is a lack of current and accurate information concerning the securities of Grant Life...

  20. Navigating the Road to Success: A Systematic Approach to Preparing Competitive Grant Proposals

    Directory of Open Access Journals (Sweden)

    Theresa Mackenzie

    2007-03-01

    Full Text Available Purpose Difficulty in securing research funding has been cited as one barrier to the involvement of more librarians and information professionals in conducting original research. This article seeks to support the work of librarians who wish to secure research funding by describing a systematic approach to the creation of successful grant applications.Approach The authors draw on more than fifteen years collective experience in supporting the development of successful research grant proposals. Eleven grant‐writing best practicesor ‘key approaches’ are described, and a planning timeline is suggested.Conclusions: Use of these best practices can assist researchers in creating successful research grant proposals that will also help streamline the research process once it is underway. It is important to recognize the competitive nature of research grant competitions, obtain feedback from an internal review panel, and use feedback from funding agencies to strengthen future grant applications.

  1. Bibliography on peace, security, and international conflict management

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    This bibliography presents an annotated list of approximately one hundred titles for public libraries seeking to serve the college-educated nonspecialist in the fields of peace, security, and international conflict management. representative titles have been selected in eight subject areas: (1) arms control, disarmament, and proliferation; (2) causes and nature of international conflict; (3) conflict management, diplomacy, and negotiation; (4) human rights and ethnic and religious conflicts; (5) international law and international order; (6) international organizations and transnationalism; (7) other approaches to, and overviews of, security and peace; and (8) religion and ethics. Three criteria determined selection of titles: the book is in print and is expected to remain in print for the foreseeable future; the book is of interest to the college-educated lay reader with a serious interest in the subject; and the list, as a whole, illustrates the full spectrum of debate, both in selection of topics and selection of titles. As an aid to the identification and acquisition of any of these materials, the editors have provided a bibliographic citation with an annotation that includes the following: author, title, statement of responsibility, publisher, publication information, pagination, and ISBN or ISSN

  2. Dos Idiomas, Un Mundo Dual Language Project Title VII Third-Year Evaluation Report, 1997-98. Publication Number 97.21.

    Science.gov (United States)

    Liberty, Paul; Gonzalez, Rosa Maria

    An evaluation was conducted of the third year of a 5-year comprehensive bilingual education grant funded by Title VII of the Improving America's Schools Act of 1994. The grant funds a program of developmental bilingual education at two elementary schools in the Austin Independent School District (Texas). More than 25% of the students at each…

  3. 77 FR 1642 - Food Distribution Program on Indian Reservations: Income Deductions and Resource Eligibility

    Science.gov (United States)

    2012-01-11

    ..., Grant programs, Social programs, Indians, Reporting and recordkeeping requirements, Surplus agricultural... retroactive Social Security payments. The amendment would remove the language that provides these payments are... beneficiary is disabled; (e) Medicare premiums related to coverage under Title XVIII of the Social Security...

  4. 20 CFR 404.508 - Defeat the purpose of Title II.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Defeat the purpose of Title II. 404.508 Section 404.508 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... and necessary expenses include: (1) Fixed living expenses, such as food and clothing, rent, mortgage...

  5. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  6. Using Title XX to Serve Children and Youth.

    Science.gov (United States)

    Twiname, John D.; And Others

    With the passage in early 1975 of the social service amendments to the Social Security Act, referred to as Title XX, a major new opportunity to serve children and youth has emerged. Seizing the opportunity will be largely dependent on the well-prepared presentation of a case for the needs of young people by dedicated advocates in every state.…

  7. 2014 Salish Kootenai College Equipment Grant

    Science.gov (United States)

    2016-09-14

    SECURITY CLASSIFICATION OF: Experiments to test pure protein on live human cells in vitro require the removal of all contaminants from protein...Title Experiments to test pure protein on live human cells in vitro require the removal of all contaminants from protein expression. In order to do so...scholarships or fellowships for further studies in science, mathematics , engineering or technology fields: Student Metrics This section only applies

  8. The Impact and Effectiveness of the Child Support Grant in ...

    African Journals Online (AJOL)

    For the first time in South Africa's history, the Constitution compels the state to ensure the progressive realisation of a social security grant. The country's constitution commits the state to developing a comprehensive social security system for all South Africans. This study investigates the impact and effectiveness of the Child ...

  9. Aboriginal Determination: Native Title Claims and Barriers to Recognition

    Directory of Open Access Journals (Sweden)

    Zia Akhtar

    2011-09-01

    Full Text Available The Australian government has proposed a referendum in 2012 to decide the constitutional status of its indigenous people. There is at present no mechanism to define the indigenous people as a domestic or foreign entity of the Commonwealth. This is an important issue because other settler governments have developed a framework to implement their relationship with the native people. As a result, it is difficult prove title to land that has been abrogated by the deeds of the settlers. In Mabo v Queensland (2,the Commonwealth government was found to have breached its fiduciary duty to the Aboriginal peoples. The judgment led to the Native Title Act 1993 that established the process of asserting native rights that were held to coexist with pastoral ownership. The promulgation of the Native Title Amendment Act 1998 reversed this process and augmented the powers of non-native landlords by providing the device to extinguish native rights. In Western Australia v Ward, a mining lease was held to have precedence over native title that was adjudged to be part of a bundle of rights. In implementing the Native Title Act the issue turns on the determination of the ties to land/ sea that the government allows to the Aboriginal peoples. The judgment in Harrington-Smith on behalf of the Wongatha People v Western Australia indicates that title can be excluded on procedural grounds and that there was an incompatibility between the claims of the Aboriginal peoples and the settlers’ claims. The road map towards a more effective regime of proving title can be achieved if the Aboriginal peoples are granted recognition as a nation in the Constitution and a treaty is signed with them.

  10. 8 CFR 209.2 - Adjustment of status of alien granted asylum.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Adjustment of status of alien granted asylum. 209.2 Section 209.2 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS ADJUSTMENT OF STATUS OF REFUGEES AND ALIENS GRANTED ASYLUM § 209.2 Adjustment of status of alien...

  11. A Proposal for the Distribution of Federal Block Grant Funds in Illinois.

    Science.gov (United States)

    Hickrod, G. Alan; And Others

    It is proposed that federal block grants to Illinois be distributed to school districts according to four characteristics of those districts. Funds will be distributed inversely proportional to property valuation per pupil, directly proportional to percentage of minority children, directly proportional to percentage of poverty children (Title I…

  12. 77 FR 29617 - Intent to Grant a Partially Exclusive Patent License

    Science.gov (United States)

    2012-05-18

    ... the Air Force announces its intention to grant SCADA Security Innovation, Inc., a Delaware corporation, having a place of business at 33 West First Street, Dayton, Ohio 45402, a partially exclusive license, the exclusive portion limited to the field of cyber security for embedded applications outside of...

  13. 19 CFR 127.41 - Government title to unclaimed and abandoned merchandise.

    Science.gov (United States)

    2010-04-01

    ... SECURITY; DEPARTMENT OF THE TREASURY GENERAL ORDER, UNCLAIMED, AND ABANDONED MERCHANDISE Title to Unclaimed... part, at which time merchandise having thus remained in Customs custody is considered as unclaimed and abandoned, the port director, with the concurrence of the Assistant Commissioner, Office of Field Operations...

  14. Security of supply in Ireland 2006

    International Nuclear Information System (INIS)

    Bazilian, Morgan; O'Leary, Fergal; O Gallachoir, Brian; Howley, Martin

    2006-12-01

    This is the second annual report on the title theme from SEI. Since SEI's initial security of supply publication there has been considerable attention paid to the security of supply aspects of energy policy worldwide. This reports updates and refines the metrics used to consider security of supply in Ireland. It also presents new analysis in three areas; the development of a supply/demand index, use of mean variance portfolio analysis for the electricity sector and a high oil price energy forecast scenario

  15. Special Project Grants Awarded for Improvement in Nurse Training. A Listing.

    Science.gov (United States)

    National Institutes of Health (DHEW), Bethesda, MD. Div. of Nursing.

    This current directory lists alphabetically by state, special projects funded by the Title II Nurse Training Act of the Health Manpower Act of 1968, which are awarded for improvement programs in nurse training. Projects funded through June 1971 are listed and briefly annotated, including planning grants awarded for the first time during the fiscal…

  16. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.

    Science.gov (United States)

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.

  17. 20 CFR 416.1250 - How we count grants, scholarships, fellowships or gifts.

    Science.gov (United States)

    2010-04-01

    ..., fellowships or gifts. 416.1250 Section 416.1250 Employees' Benefits SOCIAL SECURITY ADMINISTRATION... grants, scholarships, fellowships or gifts. (a) When we determine your resources (or your spouse's, if any), we will exclude for 9 months any portion of any grant, scholarship, fellowship, or gift that you...

  18. 20 CFR 669.520 - What information is required in the NFJP grant plans?

    Science.gov (United States)

    2010-04-01

    ... grant plans? 669.520 Section 669.520 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR NATIONAL FARMWORKER JOBS PROGRAM UNDER TITLE I OF THE WORKFORCE INVESTMENT ACT..., including the specific goals of the grantee's program for the two Program Years involved; (e) The method the...

  19. 49 CFR 172.802 - Components of a security plan.

    Science.gov (United States)

    2010-10-01

    ... from origin to destination, including shipments stored incidental to movement. (b) The security plan must also include the following: (1) Identification by job title of the senior management official... business and must make the security plan available upon request, at a reasonable time and location, to an...

  20. Cyber Security Applications: Freeware & Shareware

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…

  1. Selected text of Atomic Energy Act, Executive Orders and other laws of general interest to safeguards and security executives

    International Nuclear Information System (INIS)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three report set, BNL 52201 contains detailed information for use by executives. BNL 52202 is titled, U.S. Statutes of General Interest to Safeguards and Security Officers, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled, U.S.Statutes for Enforcement by Security Inspectors, and only contains statutes to be applied by uniformed security inspectors. These are a newly updated version of a set of documents of similar titles published in September 1988, which were an updated version of an original set of documents published in November 1983

  2. Wisconsin Public Service - Weston Generating Station; Order Denying in Part and Granting in Part a Petition for Objection to the Title V Operating Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database.

  3. Public Service Company, Fort St. Vrain Station, Order Granting in Part and Denying in Part Petition for Objection to Title V Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  4. 20 CFR 664.810 - How does a Local Board or other entity become eligible to receive a Youth Opportunity Grant?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false How does a Local Board or other entity become eligible to receive a Youth Opportunity Grant? 664.810 Section 664.810 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR YOUTH ACTIVITIES UNDER TITLE I OF THE WORKFORCE INVESTMENT ACT Youth Opportunity Grants § 664.810...

  5. Natural Resources Management for Sustainable Food Security in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Natural Resources Management for Sustainable Food Security in the Sahel ... as well as strategies for managing the resource base with a view to improving food security. ... InnoVet-AMR grants to support development of innovative veterinary ...

  6. 77 FR 56712 - Agency Information Collection (Homeless Providers Grant and Per Diem Program) Activities Under...

    Science.gov (United States)

    2012-09-13

    ... Providers Grant and Per Diem Program) Activities Under OMB Review AGENCY: Veterans Health Administration... Resources and Housing Branch, New Executive Office Building, Room 10235, Washington, DC 20503, (202) 395... . Please refer to ``OMB Control No. 2900-0554.'' SUPPLEMENTARY INFORMATION: Titles: a. Homeless Providers...

  7. The Trouble with Title XX: A Review of Child Daycare Policy.

    Science.gov (United States)

    Morgan, Gwen G.

    This discussion of government policy concerning child day care calls for a shift from provider-oriented to consumer-oriented services funded under Title XX of the Social Security Amendments. Three general views of child day care are described: the social services view, the school-oriented view, and a newer, parent-supportive, consumer-oriented…

  8. 75 FR 28825 - Order Granting Temporary Conditional Exemption for Nationally Recognized Statistical Rating...

    Science.gov (United States)

    2010-05-24

    ... accessed information for [Insert Number] issued securities and money market instruments through Internet... the arranger will, among other things, disclose on a password-protected Internet Web site the... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62120; File No. S7-04-09] Order Granting...

  9. 78 FR 10211 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Securities...

    Science.gov (United States)

    2013-02-13

    ... for OMB Review; Comment Request; Securities Lending by Employee Benefit Plans ACTION: Notice. SUMMARY: The Department of Labor (DOL) is submitting the Employee Benefits Security Administration (EBSA) sponsored information collection request (ICR) titled, ``Securities Lending by Employee Benefit Plans,'' to...

  10. 17 CFR 405.2 - Reports to be made by registered government securities brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... government securities broker or dealer shall file Part I of Form BD-Y2K (§ 249.618 of this title) prepared as..., shall file Part II of Form BD-Y2K (§ 249.618 of this title). Part II of Form BD-Y2K shall address each... registered government securities broker or dealer that was not required to file Part II of Form BD-Y2K under...

  11. Radioactive Waste SECURITY

    International Nuclear Information System (INIS)

    Brodowski, R.; Drapalik, M.; Gepp, C.; Gufler, K.; Sholly, S.

    2010-01-01

    The purpose of this work is to investigate the safety requirements for a radioactive waste repository, the fundamental problems involved and the legislative rules and arrangements for doing so. As the title already makes clear, the focus of this work is on aspects that can be assigned to the security sector - ie the security against the influence of third parties - and are to be distinguished from safety measures for the improvement of the technical safety aspects. In this context, mention is made of events such as human intrusion into guarded facilities, whereas e.g. a geological analysis on seismic safety is not discussed. For a variety of reasons, the consideration of security nuclear waste repositories in public discussions is increasingly taking a back seat, as ia. Terrorist threats can be considered as negligible risk or well calculable. Depending on the type of storage, different security aspects still have to be considered. (roessner)

  12. Finding Federal Money for Children's Services: Financing Services for Children through Title XX and Other Programs. Manual 1.

    Science.gov (United States)

    Copeland, William C.

    This is the first manual of a 4-part series on how to find, obtain, contract for and manage Federal money for children's services. The first manual concentrates on ways to locate funds for new and existing programs. Emphasis is on Title XX of the Social Security Act, but attention is given also to alternative sources where Title XX funds are not…

  13. Advances in Intelligence and Security Informatics

    CERN Document Server

    Mao, Wenji

    2012-01-01

    The Intelligent Systems Series comprises titles that present state of the art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. Traditionally, Intelligence and Security Informatics (ISI) research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection and emergency responses for security informatics. With the continuous advance of IT technologies and the increasing sophistication of national and international securi

  14. 75 FR 66363 - School Improvement Grants; American Recovery and Reinvestment Act of 2009 (ARRA); Title I of the...

    Science.gov (United States)

    2010-10-28

    ... behavioral supports or taking steps to eliminate bullying and student harassment; or (D) Expanding the school... DEPARTMENT OF EDUCATION [Docket ID ED-2009-OESE-0010] RIN 1810-AB06 School Improvement Grants... Act of 1965, as Amended (ESEA) ACTION: Final requirements for School Improvement Grants authorized...

  15. 41 CFR 109-40.305-50 - Negotiations involving national security.

    Science.gov (United States)

    2010-07-01

    ... national security. 109-40.305-50 Section 109-40.305-50 Public Contracts and Property Management Federal... Management § 109-40.305-50 Negotiations involving national security. Title 49 U.S.C., section 10721(b)(2... rate established * * * for transportation provided to the U.S. Government would endanger the National...

  16. 76 FR 45309 - Social Security Ruling 11-1p; Titles II and XVI: Procedures for Handling Requests To File...

    Science.gov (United States)

    2011-07-28

    ... request to file a disability claim when you have a pending claim of the same title and benefit type in our... time. If you want to file a new disability claim under the same title and of the same type as a... Pending Disability Claim Instead of Filing a New Claim Under the Same Title and of the Same Type If you...

  17. 20 CFR 667.220 - What Workforce Investment Act title I functions and activities constitute the costs of...

    Science.gov (United States)

    2010-04-01

    ... time worked or other equitable cost allocation methods. (3) Specific costs charged to an overhead or... workforce investment boards, direct recipients, including State grant recipients under subtitle B of title I... identified in paragraph (b) of this section and which are not related to the direct provision of workforce...

  18. Risk Analysis and Security Countermeasure Selection

    CERN Document Server

    Norman, Thomas L

    2009-01-01

    Explains how to evaluate the appropriateness of security countermeasures, from a cost-effectiveness perspective. This title guides readers from basic principles to complex processes in a step-by-step fashion, evaluating DHS-approved risk assessment methods, including CARVER, API/NPRA, RAMCAP, and various Sandia methodologies

  19. Comparing the characteristics of highly cited titles and highly alted titles

    Energy Technology Data Exchange (ETDEWEB)

    Didegah, F.; Bowman, T.D.; Bowman, S.; Hartley, J.

    2016-07-01

    This study examines differences in the types of titles for articles that show high altmetric activity (highly alted articles) versus highly cited articles. This work expands on previous research on document titles in combination with a grounded theory approach to develop a codebook in which articles were manually coded based on 11 characteristics. The results show that there are differences and similarities in titles across many of the examined characteristics; highly cited titles and highly mentioned titles on Wikipedia have some similar characteristics such as they have the the highest percentage of substantive words; in addition, there are no or very few titles referencing outside or with humor/lightness on both platforms. Twitter and Facebook also showed some similarities having the highest percentage of humorous/light titles and lowest percentage of substantive words in their titles. (Author)

  20. Proactive Security Testing and Fuzzing

    Science.gov (United States)

    Takanen, Ari

    Software is bound to have security critical flaws, and no testing or code auditing can ensure that software is flaw-less. But software security testing requirements have improved radically during the past years, largely due to criticism from security conscious consumers and Enterprise customers. Whereas in the past, security flaws were taken for granted (and patches were quietly and humbly installed), they now are probably one of the most common reasons why people switch vendors or software providers. The maintenance costs from security updates often add to become one of the biggest cost items to large Enterprise users. Fortunately test automation techniques have also improved. Techniques like model-based testing (MBT) enable efficient generation of security tests that reach good confidence levels in discovering zero-day mistakes in software. This technique is called fuzzing.

  1. Do vehicle grants and vehicle adaptations grants promote transport mobility and community access for children with disabilities in Sweden?

    Science.gov (United States)

    Sjödin, Linda; Buchanan, Angus; Mundt, Beate; Karlsson, Emelie; Falkmer, Torbjörn

    2012-02-01

    A vast majority of the journeys made by children with disabilities in Sweden are in the family car, which usually is bought and adapted for the child with governmental subsidies. Despite the important philosophical views about accessible vehicles, little is known about the impact of vehicle adaptations on families' lives. The aim of the study was to investigate parent views about the impact of vehicle grants and vehicle adaptation grants on their children's transport mobility and community access. In total, 434 parents of children with disabilities in Sweden who had received vehicle grants and/or vehicle adaptation grants between 1998-2007 responded to a questionnaire comprising questions with both pre-selected and open-ended answers. A non-responder analysis was performed. Children with disabilities were found to increase their transport mobility and community access in society as vehicle grants and/or vehicle adaptation grants were given to their parents. Their travel patterns and their travel priorities with their family car indicated that family friends and relatives and leisure activities were frequently visited and prioritised destinations. The grants were linked to access to social and family activities, provided environmental gains and led to increased experienced security. The results also showed that the potential to make spontaneous trips had increased substantially and that families experienced feelings of freedom and enhanced community access. The non-responder analysis confirmed these results. According to parents, vehicle grants and vehicle adaptation grants for children with disabilities have a positive impact on the children's transport mobility and community access. © 2011 The Authors. Australian Occupational Therapy Journal © 2011 Occupational Therapy Australia.

  2. 76 FR 60067 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-012...

    Science.gov (United States)

    2011-09-28

    ... 1974; Department of Homeland Security Federal Emergency Management Agency--012 Suspicious Activity... establish a new system of records titled, ``Department of Homeland Security/Federal Emergency Management... Department of Homeland Security/Federal Emergency Management Agency to collect, maintain, and retrieve...

  3. 76 FR 40714 - Decision and Order Granting a Waiver to Mitsubishi Electric & Electronics USA, Inc. From the...

    Science.gov (United States)

    2011-07-11

    ... and Order Granting a Waiver to Mitsubishi Electric & Electronics USA, Inc. From the Department of... Mitsubishi Electric & Electronics USA, Inc. (Mitsubishi) a waiver from the existing DOE test procedures... Matter of: Mitsubishi Electric & Electronics USA, Inc. (Mitsubishi) (Case No. CAC-030). Background Title...

  4. 77 FR 17360 - Reform of Federal Policies Relating to Grants and Cooperative Agreements; Cost Principles And...

    Science.gov (United States)

    2012-03-26

    ... II Reform of Federal Policies Relating to Grants and Cooperative Agreements; Cost Principles And...; cost principles and administrative requirements (including Single Audit Act). The original comment...-idx?c=ecfr&tpl=/ecfrbrowse/Title02/2cfrv1_02.tpl . The Cost Principles for Hospitals are in the...

  5. 76 FR 70117 - Notice of Intent To Grant an Exclusive License; Voltage Networking, LLC

    Science.gov (United States)

    2011-11-10

    ...; Voltage Networking, LLC AGENCY: National Security Agency, Department of Defense (DoD). ACTION: Notice. SUMMARY: The National Security Agency hereby gives notice of its intent to grant Voltage Networking, LLC a... described in the following: Patent No. 6,835,581 entitled ``Method of coating optical device facets with...

  6. 78 FR 36711 - Food and Drug Administration Safety and Innovation Act Title VII-Drug Supply Chain; Standards for...

    Science.gov (United States)

    2013-06-19

    ... inspections, and drive safety and quality throughout the supply chain. Implementation of these authorities... authorities granted to FDA under Title VII and their importance in ensuring drug safety, effectiveness, and.... FDA-2013-N-0683, FDA-2013-N-0684, and FDA-2013-N-0685] Food and Drug Administration Safety and...

  7. Supplemental Security Income (SSI) / Internal Revenue Service (IRS) 1099

    Data.gov (United States)

    Social Security Administration — A finder file from SSA's Title XVI database is provided to the IRS. The IRS discloses 1099 information to SSA for use in verifying eligibility, amount, and benefits...

  8. 78 FR 43890 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-006...

    Science.gov (United States)

    2013-07-22

    ... titled, ``Department of Homeland Security/Federal Emergency Management Agency--006 Citizen Corps Database... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0049] Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency--006 Citizen Corps Program...

  9. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  10. Audit-Proof Contracting for Federal Money for Children's Services: Financing Services for Children through Title XX and Other Programs. Manual 3.

    Science.gov (United States)

    Copeland, William C.

    This is the third of a 3-part series on how to locate, obtain, and manage Federal money for children's services. This manual concentrates on the contracting of money for specific programs. Emphasis is on Title XX of the Social Security Act, but attention is given also to alternative sources where Title XX funds are not sufficient. Although useful…

  11. Experiencing Security in Interaction Design

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne

    2011-01-01

    Security is experienced differently in different contexts. This paper argues that in everyday situations, users base their security decisions on a mix of prior experiences. When approaching security and interaction design from an experience approach, tools that help bring out such relevant...... experiences for design are needed. This paper reports on how Prompted exploration workshops and Acting out security were developed to target such experiences when iteratively designing a mobile digital signature solution in a participatory design process. We discuss how these tools helped the design process...... and illustrate how the tangibility of such tools matters. We further demonstrate how the approach grants access to non-trivial insights into people's security experience. We point out how the specific context is essential for exploring the space between experience and expectations, and we illustrate how people...

  12. 25 CFR 900.91 - Who takes title to property purchased with funds under a self-determination contract or grant...

    Science.gov (United States)

    2010-04-01

    ..., DEPARTMENT OF HEALTH AND HUMAN SERVICES CONTRACTS UNDER THE INDIAN SELF-DETERMINATION AND EDUCATION... self-determination contract or grant agreement pursuant to section 105(f)(2)(A) of the Act? 900.91... property purchased with funds under a self-determination contract or grant agreement pursuant to section...

  13. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  14. 77 FR 40590 - Notice of Submission for OMB Review; Institute of Education Sciences; Pell Grant Experiments Study

    Science.gov (United States)

    2012-07-10

    ... (FAFSA) applications, PGE school administrative records, Social Security Administration earnings... operate through a set of Pell grant experiment (PGE) schools that provide education and training services... grant access. The first experiment will involve roughly 28 PGE schools with an average of 100 students...

  15. SPARCHS: Symbiotic, Polymorphic, Automatic, Resilient, Clean-Slate, Host Security

    Science.gov (United States)

    2016-03-01

    SPARCHS: SYMBIOTIC , POLYMORPHIC, AUTOMATIC, RESILIENT, CLEAN-SLATE, HOST SECURITY COLUMBIA UNIVERSITY MARCH 2016 FINAL... SYMBIOTIC , POLYMORPHIC, AUTOTOMIC, RESILIENT, CLEAN-SLATE, HOST SECURITY 5a. CONTRACT NUMBER N/A 5b. GRANT NUMBER FA8750-10-2-0253 5c. PROGRAM...17 4.2.3 SYMBIOTIC EMBEDDED MACHINES

  16. 38 CFR 36.4327 - Release of security.

    Science.gov (United States)

    2010-07-01

    ... this section or in paragraphs (e) and (f) of § 36.4822, the holder shall not release a lien or other right in or to real property held as security for a guaranteed or insured loan, or grant a fee or other... approval of the Secretary, release the lien on a portion of the property securing the loan provided: (i...

  17. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  18. Cartel law as an instrument for ensuring security of energy supply; Kartellrecht als Instrument der sicheren Energieversorgung

    Energy Technology Data Exchange (ETDEWEB)

    Roth, W.H. [Bonn Univ. (Germany). Inst. fuer Internationales Privatrecht und Rechtsvergleichung

    2007-07-01

    The title of this paper - cartel law as an instrument for ensuring security of supply - may seem surprising to some. After all, the concepts of security of supply and cartel law are generally viewed as conflicting with one another, as when prohibitive or interdictive norms of cartel law are restricted or suspended in the name of ensuring security of supply. The title implies that there is also another perspective on this relationship, namely that cartel is geared to the goal of maintaining a viable competitive environment. To the extent that competition serves the purpose of ensuring consumers' greatest possible security of supply, even though this may not be its only purpose, any economic system that is driven by competition will also work towards ensuring the security of the energy supply. Seen from this perspective the paper's title is aptly worded, speaking of security of supply through competition rather than through its (justified) restriction. The creation of a European internal energy market in which energy resources are offered and demanded across borders will contribute to ensuring the security of the energy supply. To the extent that cartel law acts towards keeping markets open and safeguarding competition it will also serve the purpose of ensuring security of supply. This applies in particular in cases where contractual bonds act as a repellent, preventing other suppliers from entering the market and thus also counteracting the diversification of buying sources.

  19. 20 CFR 667.200 - What general fiscal and administrative rules apply to the use of WIA title I funds?

    Science.gov (United States)

    2010-04-01

    ... 29 CFR 97.36(b)(3) (as appropriate), which address codes of conduct and conflict of interest issues... training and related services, by itself, violates these conflict of interest provisions. (5) The addition... workplace requirements. All WIA title I grant recipients and subrecipients must comply with the government...

  20. P.L. 110-140, "Energy Independence and Security Act of 2007", 2007

    Energy Technology Data Exchange (ETDEWEB)

    None

    2007-12-19

    The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.

  1. 77 FR 27801 - Notice of Proposed Revisions for the LSC Grant Assurances for Calendar Year 2013 Funding

    Science.gov (United States)

    2012-05-11

    ... recipient's chief executive officer (CEO). The proposed change specifies that LSC recipients must provide... incorporates the full title of the LSC CSR Handbook. Grant Assurance 5 informs LSC recipients of financial... guidelines for planning the orderly conclusion of its role and responsibility as an LSC grantee. The proposed...

  2. 75 FR 52932 - Notice of Intent To Grant an Exclusive License; Doar, Pekuin, Sall Limited Liability Company

    Science.gov (United States)

    2010-08-30

    ... DEPARTMENT OF DEFENSE National Security Agency Notice of Intent To Grant an Exclusive License; Doar, Pekuin, Sall Limited Liability Company AGENCY: National Security Agency, DoD. ACTION: Notice... Limited Liability Company a revocable, non- assignable, exclusive, license to practice the following...

  3. Maternal Brain-Reactive Antibodies and Autism Spectrum Disorder

    Science.gov (United States)

    2015-10-01

    AWARD NUMBER: W81XWH-14-1-0369 TITLE: Maternal Brain-Reactive Antibodies and Autism Spectrum Disorder PRINCIPAL INVESTIGATOR: Betty Diamond...Sep 2015 4. TITLE AND SUBTITLE Maternal Brain-Reactive Antibodies and Autism Spectrum 5a. CONTRACT NUMBER Disorder 5b. GRANT NUMBER W81XWH-14-1...to approximately 5% of cases of ASD. 15. SUBJECT TERMS Fetal brain; Autism spectrum disorder ; antibody; B cells; Caspr2 16. SECURITY CLASSIFICATION

  4. 77 FR 25188 - Extension of Agency Information Collection Activity Under OMB Review: Enhanced Security...

    Science.gov (United States)

    2012-04-27

    ... general aviation (GA) aircraft operators who wish to fly into and/or out of Ronald Reagan Washington.... Information Collection Requirement Title: Enhanced Security Procedures at Ronald Reagan Washington National...] Extension of Agency Information Collection Activity Under OMB Review: Enhanced Security Procedures at Ronald...

  5. Citizen-based Strategies to Improve Community Security: Working ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Citizen-based Strategies to Improve Community Security: Working with Vulnerable Populations to Address Urban Violence in Medellin ... Water Resources Association, in close collaboration with IDRC, is holding a webinar titled “Climate change and adaptive water management: Innovative solutions from the Global South”.

  6. Homeland Security. Management Challenges Facing Federal Leadership

    Science.gov (United States)

    2002-12-01

    Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future

  7. Citgo Refining and Chemicals, West Plant, Corpus Chrisit, Texas, Order Granting in Part and Denying in Part Petition for Objection to the Title V Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  8. 75 FR 67697 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-11-03

    ... OF INDIVIDUALS COVERED BY THE SYSTEM: Individuals and institutions who apply for recruitment...). CATEGORIES OF RECORDS IN THE SYSTEM: Individual information to include: Title, full name, Social Security... awarding of recruitment scholarships, retention scholarships or grants under the DoD Information Assurance...

  9. [Evolution of worker's health in the social security medical examination in Brazil].

    Science.gov (United States)

    Pinto Júnior, Afrânio Gomes; Braga, Ana Maria Cheble Bahia; Roselli-Cruz, Amadeu

    2012-10-01

    In order to analyze the practice of the social security medical examination starting from the introduction of the worker's health paradigms, data was gathered on the granting of social security disability benefits to assess worker illness based on notification of work-related accidents in the cement industries of Rio de Janeiro. From 2007 to 2009 there was only one notification, which involved a worker handling toxic waste instead of the energy matrix. However, the analysis revealed sources and mechanisms of illness overlooked in the social security medical examination, which is still focused on the one-cause-only logic of occupational medicine. To achieve the worker's health paradigms, changes are required to alter the way of conducting the social security medical examination, by re-establishing partnerships, training human resources, adopting epidemiological indicators, as well as setting and assessing social security goals that transcend the mere granting of disability benefits.

  10. Cyber indicators of compromise: a domain ontology for security information and event management

    Science.gov (United States)

    2017-03-01

    heuristics, mapping, and detection. CybOX is aimed at supporting a broad range of important cyber security domains to include [31]: • Digital...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE CYBER INDICATORS OF COMPROMISE: A DOMAIN ONTOLOGY FOR SECURITY INFORMATION AND...Distribution is unlimited. CYBER INDICATORS OF COMPROMISE: A DOMAIN ONTOLOGY FOR SECURITY INFORMATION AND EVENT MANAGEMENT Marsha D. Rowell

  11. Private Military and Security Companies - Counterinsurgency and Nation Building Strategy

    Science.gov (United States)

    2013-04-25

    cans, and bought war bonds is long gone. One advantage that the private sector brings to public wars is capacity. Companies like Kellogg and Brown...1 Anne-Marie Buzatu, and Benjamin S . Buckland, “Private Military & Security Companies : Future Challenges in...From  -­‐  To)   September 2012 - April 2013 4.  TITLE  AND  SUBTITLE   Private Military and Security Companies - Counterinsurgency and

  12. PRESENTATION OF STATE SUPPORT (GRANTS IN ACCOUNTING POLICY OF POLAND

    Directory of Open Access Journals (Sweden)

    K. Zuk

    2014-01-01

    Full Text Available Since admission of Poland to the European Union Polish enterprises can make use of the state support in various forms including support in investments, investigations and developments, consulting, higher qualification, financing of exhibition participation, salary additional payments for invalid workers, repayment of loan portions. The purpose of the given publication is to make an analysis of accounting method for state support which is granted for an organization within the frameworks of the accounting policy depending on the obtained grants.Enterprises must select themselves a grant accounting form as in account books so while presenting financial reporting and these accounting and reporting forms must be reflected in the enterprise policy of accounting. The enterprise accounting policy indicates principles for creation of reserves and conditional obligations related with grants. Enterprises can use some simplifications and they can exclude creation of reserves and withhold conditional obligations concerning the grants if these measures are considered as insignificant.In accordance with the enterprise accounting policy account books must contain recordings on grant provision when a grant is transferred to the bank account or when an enterprise receives a written notice confirming final decision about payments from a financing institution. The accounting policy must determine principles of bank operation break-up on grant accounts and security system of data and files including accounting documents, accounts and other documents related to the obtained grant and the required archivation term

  13. Book Review: Untitled: Securing Land Tenure in Urban and Rural ...

    African Journals Online (AJOL)

    Abstract. Book Title: Untitled: Securing Land Tenure in Urban and Rural South Africa. Book Authors: Hornby D, Kingwill R, Royston L & Cousins B (Eds.) (2017 University of KwaZulu-Natal Press) ISBN: 1869143507 ...

  14. Energy supply security and foreign policy

    International Nuclear Information System (INIS)

    2006-05-01

    The title memo has been sent to the Dutch Lower House. This memo reflects the response of the cabinet to the advice on Energetic Foreign Policy of the Dutch Advisory Council on International Affairs (AIV) and the Dutch Energy Council (AER). Moreover, the development of foreign policy with respect to energy supply security is depicted. [mk] [nl

  15. Peace, Human Security and Sustainable Development in Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Peace, Human Security and Sustainable Development in Africa ... into a sustainable livelihood for some of the poorest communities in Africa. ... Project status ... IDRC congratulates first cohort of Women in Climate Change Science Fellows ... titled “Climate change and adaptive water management: Innovative solutions from ...

  16. [Universalization of health or of social security?].

    Science.gov (United States)

    Levy-Algazi, Santiago

    2011-01-01

    This article presents an analysis of the architecture of Mexico's health system based on the main economic problem, failing to achieve a GDP growth rate to increase real wages and give workers in formal employment coverage social security. This analysis describes the relationship between social security of the population and employment status of it (either formal or informal employment) and the impact that this situation poses to our health system. Also, it ends with a reform proposal that will give all workers the same social rights, ie to grant universal social security.

  17. 42 CFR 476.86 - Correlation of Title XI functions with Title XVIII functions.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Correlation of Title XI functions with Title XVIII functions. 476.86 Section 476.86 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF...) Qio Review Functions § 476.86 Correlation of Title XI functions with Title XVIII functions. (a...

  18. Norms Versus Security: What is More Important to Japan’s View of Nuclear Weapons

    Science.gov (United States)

    2017-03-01

    SECURITY : WHAT IS MORE IMPORTANT TO JAPAN’S VIEW OF NUCLEAR WEAPONS? by Calvin W. Dillard March 2017 Thesis Advisor: S. Paul Kapur Second...TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE NORMS VERSUS SECURITY : WHAT IS MORE IMPORTANT TO JAPAN’S VIEW OF NUCLEAR WEAPONS... security concerns and technology are important in determining whether a nation will create a weapons program while politics, economics, and security

  19. Genetic Modeling of Radiation Injury in Prostate Cancer Patients Treated with Radiotherapy

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-15-1-0681 TITLE: Genetic Modeling of Radiation Injury in Prostate Cancer Patients Treated with Radiotherapy PRINCIPAL...TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER W81XWH-15-1-0681Genetic Modeling of Radiation Injury in Prostate Cancer Patients Treated...effects, urinary morbidity, rectal injury, sexual dysfunction 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF

  20. Using a student-faculty collaborative learning model to teach grant development in graduate nursing education.

    Science.gov (United States)

    Falk, Nancy L; Phillips, Kathleen M; Hymer, Regina; Acquaviva, Kimberly D; Schumann, Mary Jean

    2014-05-01

    Graduate nurses are employed in clinical, research, educational, and policy roles. As leaders, they are expected to develop and sustain projects that support translating research to practice and policy. Funding to support initiatives is tight and requires innovative solutions to cover salaries, benefits, equipment purchases, and other program expenses. In an effort to teach grant writing while developing skilled leaders who are effective and competitive in securing funds, the George Washington University School of Nursing offers a graduate-level grant writing course. In the summer of 2011, a collaborative learning model was developed within the course. The joint approach was foundational to securing an Agency for Healthcare Research and Quality grant to support development and implementation of a patient engagement project by the Nursing Alliance for Quality Care. This article describes the project and offers hints for those seeking to develop a collaborative educational experience that affords new leadership skills for RNs from all backgrounds. Copyright 2014, SLACK Incorporated.

  1. 20 CFR 404.1342 - Limits on granting World War II and post-World War II wage credits.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Limits on granting World War II and post-World War II wage credits. 404.1342 Section 404.1342 Employees' Benefits SOCIAL SECURITY ADMINISTRATION... Uniformed Services Amounts of Wage Credits and Limits on Their Use § 404.1342 Limits on granting World War...

  2. 78 FR 37244 - Submission for Review: We Need Important Information About Your Eligibility for Social Security...

    Science.gov (United States)

    2013-06-20

    ... Important Information About Your Eligibility for Social Security Disability Benefits, RI 98-7. As required... Personnel Management. Title: We Need Important Information About Your Eligibility for Social Security... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need Important Information About Your...

  3. A TALE OF TWO CULTURES: BREXIT AND THE FUTURE OF UK-EUROPEAN SECURITY COOPERATION

    Science.gov (United States)

    2017-06-01

    states were particularly sensitive to this issue given the lack of clear UN Security Council authorization and the fact that the purpose of intervention ...Finnemore, The Purpose of Intervention : Changing Beliefs About the Use of Force (Cornell Studies in Security Affairs) (Cornell University Press, 2004...position in all other international organizations, including within the UN Security Council as appropriate. Furthermore, Title V establishes a

  4. 17 CFR 402.2d - Appendix D-Modification of § 240.15c3-1d of this title, relating to satisfactory subordination...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Appendix D-Modification of § 240.15c3-1d of this title, relating to satisfactory subordination agreements, for purposes of § 402.2...—Modification of § 240.15c3-1d of this title, relating to satisfactory subordination agreements, for purposes of...

  5. 20 CFR 404.535 - How much will we withhold from your title VIII and title XVI benefits to recover a title II...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How much will we withhold from your title... Officer § 404.535 How much will we withhold from your title VIII and title XVI benefits to recover a title II overpayment? (a) If past-due benefits are payable to you, we will withhold the lesser of the...

  6. Security Gaps In Authentication Factor Credentials

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Authentication factors refer to user login credentials that a user supplies to an authentication process for it to decide whether to grant or deny access. While two-factor and three-factor authentication generally provides better security than one-factor authentication the aim of this paper is to review security in individual authentication factor credentials that are in use nowadays. These credentials will be discussed in factor categories knowledge factor possession factor and inherence factor. The paper details current security gaps and some novel approaches to diminish the gaps in these authentication factors. We believe that our recommendations will inspire development of better authentication credentials and systems.

  7. 77 FR 24752 - Self-Regulatory Organizations; EDGA Exchange, Inc.; EDGX Exchange, Inc.; International Securities...

    Science.gov (United States)

    2012-04-25

    ... Securities Holdings, Inc. (``ISE Holdings'') to a newly formed Swiss corporation, Eurex Global Derivatives AG... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66834; File Nos. SR-EDGA-2012-08; SR-EDGX-2012....; International Securities Exchange, LLC; Order Granting Approval of Proposed Rule Change Relating to a Corporate...

  8. Energy symposium 2007 - energy secured?... for what price. Summary of the congress contributions

    International Nuclear Information System (INIS)

    2008-01-01

    With its topical title ''Energy secured?.. for what price'' the 2007 Energy Symposium has added yet another milestone to its success story. Energy is a fundamental aspect of our industrial society. It is of essential importance that the demand for low-cost energy is strategically secured. Energy prices are basic to calculations on products that have to be sold and exported. They are therefore also an essential factor in securing Europe as an industrial region

  9. 75 FR 66267 - Delegation of Authority and Assignment of Responsibility; Secretary's Order 6-2010

    Science.gov (United States)

    2010-10-27

    ... Business Act, as amended, 15 U.S.C. 644(n). (14) Social Security Act of 1935, as amended, Title III-Grants... Part V Department of Labor Delegation of Authority and Assignment of Responsibility; Secretary's... of Responsibility; Secretary's Order 6-2010 Subject: Delegation of Authority and Assignment of...

  10. The International Traffic in Arms Regulations: An Impediment to National Security

    Science.gov (United States)

    2008-05-02

    00-00-2007 to 00-00-2008 4. TITLE AND SUBTITLE The International Traffic in Arms Regulations: An Impediment to National Security 5a . CONTRACT...2008 2. REPORT TYPE Program Research Paper 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a . CONTRACT NUMBER The International Traffic in Arms...certain level of ITAR problems, such as on Koreasat 5 with its dual civil and military uses, U.S. companies will often choose not to expend the bid and

  11. Towards improving security measures in Nigeria University Libraries ...

    African Journals Online (AJOL)

    A questionnaire designed by the researchers titled “Towards Improving Security Measures in Nigerian University Libraries (TISMINUL)” was used to collect the needed data. The questionnaire was designed in two parts. Part one was to gather information on the size of collection, frequency of stock taking and book loss.

  12. A Learning-Based Approach to Reactive Security

    Science.gov (United States)

    Barth, Adam; Rubinstein, Benjamin I. P.; Sundararajan, Mukund; Mitchell, John C.; Song, Dawn; Bartlett, Peter L.

    Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.

  13. Status of Educational Efforts in National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  14. A 25-year analysis of the American College of Gastroenterology Research Grant Program:

    Science.gov (United States)

    Crockett, Seth D.; Dellon, Evan S.; Bright, Stephanie D.; Shaheen, Nicholas J.

    2011-01-01

    Introduction The American College of Gastroenterology (ACG) has awarded research grants for 25 years. We assessed the characteristics of grant recipients, their current academic status, and the likelihood of publication resulting from the grant. Methods Demographic data, year and amount of award, title of project, and recipient’s institution were extracted from ACG databases. Using ACG reports and medical literature search engines, we assessed publication based on grant-funded research, as well as career publication record. We also determined the current position of awardees. Similar analysis was performed for recipients of junior investigator awards. Results A total of 396 clinical research awards totaling $5,374,497 ($6,867,937 in 2008 dollars) were awarded to 341 recipients in the 25 years between 1983 and 2008. The most commonly funded areas of research were endoscopy (22% of awards) and motility/functional disorders (21%). At least one peer-reviewed publication based on grant-funded research occurred in 255 of the awards (69%). Higher award value was associated with subsequent publication. Of 341 past awardees, 195 (62%) are currently in academic positions. Factors associated with staying in academics included higher award value (pacademics. Overall, the mean cost in grant dollars per published paper based on the research was $14,875. Conclusion The majority of ACG grant recipients published the results of their research and remained in academics. Higher amount of award, holding an advanced degree, and publication were associated with careers in academics. The ACG research grant award program is an important engine of investigation, publications, and academic career development in the field of gastroenterology. PMID:19319125

  15. Questions for private security companies and agencies

    OpenAIRE

    2013-01-01

    The French Institute for Research in Africa (IFRA) and The Centre for Urban and Regional Planning, both at the University of Ibadan are conducting a research titled, "Architecture of Fear: Urban Design, Planning and Construction Reaction to Urban Violence". It is purely an academic exercise which will have policy implication towards reducing the present high rate of crime in the country. 1. Name of Security Agency/Company…………………. 2. Address……………………………………………….. 3. Type of security services pro...

  16. 77 FR 17530 - Order Granting an Application of Edward Jones & Co. LLP Exemption From Exchange Act Section 11(d...

    Science.gov (United States)

    2012-03-26

    ...'') requested that the Securities and Exchange Commission (``Commission'') issue to Edward Jones an exemption... subject to the conditions contained in this order, is exempt from the new issue lending restriction of... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66624] Order Granting an Application of Edward...

  17. 75 FR 62395 - Calculation of Annual Federal Medical Assistance Percentages for Indian Tribes for Use in the...

    Science.gov (United States)

    2010-10-08

    ... IV-E plan development grants intended to assist Indian Tribes to develop their programs and prepare... the Social Security Act.) B. Calculation of FMAP for Indian Tribes The formula for calculating FMAP... Percentages for Indian Tribes for Use in the Title IV-E Foster Care, Adoption Assistance, and Kinship...

  18. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  19. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    Science.gov (United States)

    2004-06-01

    Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution

  20. 78 FR 14847 - Topaz Exchange, LLC; Notice of Filing of Application for Registration as a National Securities...

    Science.gov (United States)

    2013-03-07

    ...; Notice of Filing of Application for Registration as a National Securities Exchange Under Section 6 of the... the Securities Exchange Act of 1934 (``Exchange Act''), seeking registration as a national securities... Topaz Exchange's request to be registered as a national securities exchange. The Commission will grant...

  1. 31 CFR 356.0 - What authority does the Treasury have to sell and issue securities?

    Science.gov (United States)

    2010-07-01

    ... to sell and issue securities? 356.0 Section 356.0 Money and Finance: Treasury Regulations Relating to... sell and issue securities? Chapter 31 of Title 31 of the United States Code authorizes the Secretary of... AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS (DEPARTMENT OF THE TREASURY...

  2. Browse Title Index

    African Journals Online (AJOL)

    2004): Special Issue 2004, Differential production of immune parameters by mouse strains ... agglutination and complement fixation tests in the field diagnosis ... List All Titles · Free To Read Titles This Journal is Open Access.

  3. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  4. 76 FR 18812 - Submission for Review: We Need the Social Security Number of the Person Named Below, RI 38-45

    Science.gov (United States)

    2011-04-05

    ... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need the Social Security Number of the... request (ICR) 3206-0144, We Need the Social Security Number of the Person Named Below, RI 38-45. As... Operations, Retirement Services, Office of Personnel Management. Title: We Need the Social Security Number of...

  5. Cybersecurity Lanes in the Road for the Department of Homeland Security

    Science.gov (United States)

    2016-06-01

    imposing censorship here in the United States.”66 According to President Obama the main goal of the attack was for North Korea to impose restrictions on...was Congress passing Public Law 107–56 in October 2001, titled “The Uniting and Strengthening America by Providing Appropriate Tools Required to...Department of Homeland Security, modified October 2014, http://www.dhs.gov/creation-department-homeland-security. 80 Uniting and Strengthening America by

  6. INIS: Authority List for Journal Titles

    International Nuclear Information System (INIS)

    1992-01-01

    This is the nineteenth revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). It lists 10,797 journal titles which have contained articles within the scope of INIS. The purpose of this Authority List is to provide descriptive cataloguers with a standard abbreviation for journal titles and to assist users of INIS products with a tool for verifying the full title of a journal. A journal, or periodical, is generally published within a defined, fixed interval between issues, which usually has more than one issue a year, and which usually includes a mixture of articles, letters, summaries, etc. Within this definition, annuals such as Annual Review of Nuclear Science are included. Series titles as, for example the McGraw-Hill Series in Nuclear Engineering, are not included in this Authority. Entries: Each entry consists of: - the full journal title (highlighted); - the abbreviated title; - ISSN, if available; - CODEN, if available; - additional information related to the journal title. Arrangement: In Part I, the full journal titles are grouped by country or international organization name and ordered alphabetically, followed by the ISSN, the CODEN in square brackets if available, and then the abbreviated title. The abbreviated title is based on the rules of ISO 4: Documentation - International Code for the Abbreviation of Titles of Periodicals. The abbreviations of the words are taken from the ISDS List of Periodical Title Word Abbreviation. In Part II, the order of the citations is reversed: the abbreviated journal titles are arranged alphabetically, followed by country code. Then the full journal titles are followed by the country of publication, and if available, ISSN and CODEN. Additional Information: There is important information related to the journal titles which are fundamental for tracing the history of the title and the present status. They are listed below and are entered whenever applicable: - Ceased publication; - Superseded by

  7. Title IX Resource Guide

    Science.gov (United States)

    Office for Civil Rights, US Department of Education, 2015

    2015-01-01

    Title IX of the Education Amendments of 1972 (Title IX) prohibits discrimination based on sex in education programs and activities in federally funded schools at all levels. If any part of a school district or college receives any Federal funds for any purpose, all of the operations of the district or college are covered by Title IX. The essence…

  8. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  9. 75 FR 4595 - BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities...

    Science.gov (United States)

    2010-01-28

    ....; Notice of Filing of Application for Registration as a National Securities Exchange Under Section 6 of the... the Securities Exchange Act of 1934 (``Exchange Act''), seeking registration as a national securities... determination about whether to grant BATS Y Exchange's request to be registered as a national securities...

  10. Getting to one from title 10 + title 32 unity of effort in the homeland

    OpenAIRE

    Prosch, Caroline Ross.

    2011-01-01

    CHDS State/Local Approved for public release; distribution is unlimited This thesis bridges the knowledge gap between Title 10 Active Duty and Title 32 National Guard in order to breakdown cultural barriers and reach unity of effort for response operations in the homeland. Regrettably, a unified response was missing among Title 10 Active Duty and Title 32 National Guard members following Hurricane Katrina. Since then, initiatives based in doctrine, statutes and formal recommendations...

  11. Browse Title Index

    African Journals Online (AJOL)

    Items 601 - 650 of 788 ... Browse Title Index ... Issue, Title ... Vol 14, No 1 (2006), Social science research: a critique of quantitative and qualitative methods ... Vol 18, No 1 (2010), Stress among part-time business students: a study in a Ghanaian ...

  12. 28 CFR 90.100 - What is the scope of the grant program?

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false What is the scope of the grant program... program? This Subpart implements the Higher Education Amendments of 1998, Part E, section 826 (Pub. L. 105... administrators, security personnel, and regional crisis centers affiliated with the institution for two broad...

  13. 20 CFR 408.931 - How much will we withhold from your title II and title XVI benefits to recover a title VIII...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How much will we withhold from your title II... and Overpayments Adjustment of Title II Benefits § 408.931 How much will we withhold from your title...-due benefits. (b)(1) We will collect the overpayment from current monthly benefits due in a month...

  14. Economy Over Security: Why Crises Fail to Impact Economic Behavior in East Asia

    Science.gov (United States)

    2017-12-01

    SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST ASIA by Aaron R. Sipos December 2017 Thesis Advisor: Michael Glosny Second...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ECONOMY OVER SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST...release. Distribution is unlimited. 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) This study examines changes in economic behavior in

  15. Empirical Analysis of Using Erasure Coding in Outsourcing Data Storage With Provable Security

    Science.gov (United States)

    2016-06-01

    computing and communication technologies become powerful and advanced , people are exchanging a huge amount of data, and they are de- manding more storage...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS EMPIRICAL ANALYSIS OF USING ERASURE CODING IN OUTSOURCING DATA STORAGEWITH PROVABLE SECURITY by...2015 to 06-17-2016 4. TITLE AND SUBTITLE EMPIRICAL ANALYSIS OF USING ERASURE CODING IN OUTSOURCING DATA STORAGE WITH PROVABLE SECURITY 5. FUNDING

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 229 ... Browse Title Index ... Issue, Title. Vol 14, No 2 ... Vol 15, No 1 (2017), Qualitative and quantitative methods of suicide research in old age, Abstract PDF ... Vol 11, No 2 (2013), Simple Algorithm in the Management of Fetal ...

  17. 75 FR 63873 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Science.gov (United States)

    2010-10-18

    ... affiliated with a broad range of other entities in increasingly diverse organizational structures. Some of... Business October 12, 2010. I. Introduction On August 25, 2010, the Municipal Securities Rulemaking Board... contributions and prohibitions on municipal securities business. The proposed rule change was published for...

  18. 77 FR 32704 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Science.gov (United States)

    2012-06-01

    ... securities owned or under management by the institutional customer. The MSRB stated that FINRA Rule 2111....19b-4. \\3\\ The implementation date for Financial Industry Regulatory Authority (``FINRA'') Rule 2111... General Counsel, Securities Industry and Financial Markets Association, dated May 4, 2012 (``SIFMA Letter...

  19. 20 CFR 606.1 - Purpose and scope.

    Science.gov (United States)

    2010-04-01

    ... standards for grant of such relief in the form of— (i) A cap on tax credit reduction, (ii) Avoidance of tax... Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR TAX CREDITS UNDER THE FEDERAL UNEMPLOYMENT TAX ACT; ADVANCES UNDER TITLE XII OF THE SOCIAL SECURITY ACT General § 606.1 Purpose...

  20. Mapping goal alignment of deployment programs for alternative fuel technologies: An analysis of wide-scope grant programs in the United States

    International Nuclear Information System (INIS)

    Sobin, Nathaniel; Molenaar, Keith; Cahill, Eric

    2012-01-01

    Governments have attempted to advance alternative fuels (AFs) in the on-road transportation sector with the goal of addressing multiple environmental, energy security, economic growth, and technology transition objectives. However there is little agreement, at all governmental levels, on how to prioritize goals and how to measure progress towards goals. Literature suggests that a consistent, aligned, and prioritized approach will increase the effectiveness of deployment efforts. While literature states that goal alignment and prioritization should occur, there are few studies suggesting how to measure the alignment of deployment programs. This paper presents a methodology for measuring goal alignment by applying the theories of goal ambiguity. It then demonstrates this methodology within the context of fuel- and project-neutral (wide-scope) grant programs directed toward AF deployment. This paper analyzes forty-seven (47) wide-scope federal, state, and regional grant programs in the United States, active between 2006 and 2011. On the whole, governments most use deployment grant programs to address environmental concerns and are highly aligned in doing so between agency levels. In contrast, there is much less consensus (and therefore goal alignment) on whether or how governments should address other priorities such as energy security, economic growth, and technology transition. - Highlights: ► Grants that deploy AFs most often address environmental goals and are highly aligned in doing so. ► Economic growth goals are most often addressed by federal AF deployment grant programs. ► Energy security goals are most often addressed by state and regional AF deployment grant programs. ► Technology transition goals are the least aligned when considering alignment across agencies.

  1. 76 FR 39927 - Order Granting Temporary Exemptions Under the Securities Exchange Act of 1934 in Connection With...

    Science.gov (United States)

    2011-07-07

    ... defined as a person ``in the business of effecting transactions in securities for the account of others... the business of buying and selling securities (not including security-based swaps, other than security... the purpose of using any facility of an exchange * * * to effect any transaction in a security, or to...

  2. Nuclear security education and training at Naif Arab University for Security Sciences

    International Nuclear Information System (INIS)

    Amjad Fataftah

    2009-01-01

    Naif Arab University for Security Sciences (NAUSS) was established in 1978 as an Arab institution specialized in security sciences to fulfill the needs of the Arab law enforcement agencies for an academic institution that promotes research in security sciences, offers graduate education programs and conduct short-term training courses, which should contribute to the prevention and control of crimes in the Arab world. NAUSS and the IAEA organized the first workshop on nuclear security on November, 2006, which aimed to explore and improve the nuclear security culture awareness through the definitions of the nuclear security main pillars, Prevention, Detection and Response. In addition, NAUSS and IAEA organized a very important training course on April, 2008 on combating nuclear terrorism titled P rotection against nuclear terrorism: Protection of radioactive sources . In the past two years, IAEA has put tremendous efforts to develop an education program in nuclear security, which may lead into Master's degree in nuclear security, where NAUSS helped in this project through the participation in the IAEA organized consultancy and technical meetings for the development of this program along with many other academic, security and law enfacement experts and lawyers from many different institution in the world. NAUSS and IAEA drafted a work plan for the next coming two years which should lead into the gradual implementation of these educational programs at NAUSS. NAUSS also continues to participate in several local conferences and symposiums related to the peaceful application of nuclear power in the gulf region, and the need for a human resources development programs to fulfill the scientific and security needs which will arise from building nuclear power plants. NAUSS participated in the International Symposium on the Peaceful Application of Nuclear Technology in the GCC countries, organized by King Abdulaziz University in the city of Jeddah, Saudi Arabia. Also NAUSS

  3. 76 FR 50226 - Announcement of a Single Source Grant Award to the Tribal Law and Policy Institute

    Science.gov (United States)

    2011-08-12

    ... Visiting Program. CFDA Number: 93.508. Statutory Authority: Social Security Act, Title V, Section 511 (42 U... and support for the planning, development and implementation of the Tribal Maternal, Infant and Early... early childhood systems in the American Indian and Alaska Natives (AIAN) communities and that support...

  4. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Science.gov (United States)

    2010-01-01

    ... CURRENCY, DEPARTMENT OF THE TREASURY INVESTMENT SECURITIES Interpretations § 1.130 Type II securities... financing the construction or improvement of facilities at or used by a university or a degree-granting... construction or improvement of facilities used by a hospital may be eligible as a Type II security, if the...

  5. INIS: Authority list for journal titles

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-03-01

    This is the twenty-ninth revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). It lists the titles of 12 990 journals which have contained articles within the scope of INIS. The purpose of this report is to provide descriptive cataloguers with a standard entry for the full title of a journal. In addition to the full journal title, the ISSN (International Standard Serial Number), administered by the ISSN International Centre, Paris, France, and/or CODEN, assigned by Chemical Abstracts Service, USA, are given in this manual. In order to help the reader to find titles easily, the list is divided into two parts. In Part I, the full journal titles are grouped by country or international organization responsible for coverage and ordered alphabetically. In Part II, the full journal titles of all countries or international organizations are arranged alphabetically. The country name or the international organization name responsible for coverage of the journal title to INIS is entered in parentheses. Journal titles marked with an asterisk are regularly scanned by INIS. Titles that have been identified by INIS Centres as 'Key Journals' are marked with the hash sign.

  6. INIS: Authority list for journal titles

    International Nuclear Information System (INIS)

    2003-01-01

    This is the twenty-ninth revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). It lists the titles of 12 990 journals which have contained articles within the scope of INIS. The purpose of this report is to provide descriptive cataloguers with a standard entry for the full title of a journal. In addition to the full journal title, the ISSN (International Standard Serial Number), administered by the ISSN International Centre, Paris, France, and/or CODEN, assigned by Chemical Abstracts Service, USA, are given in this manual. In order to help the reader to find titles easily, the list is divided into two parts. In Part I, the full journal titles are grouped by country or international organization responsible for coverage and ordered alphabetically. In Part II, the full journal titles of all countries or international organizations are arranged alphabetically. The country name or the international organization name responsible for coverage of the journal title to INIS is entered in parentheses. Journal titles marked with an asterisk are regularly scanned by INIS. Titles that have been identified by INIS Centres as 'Key Journals' are marked with the hash sign

  7. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  8. U.S. Military Technology Dependence: The Hidden Vulnerability to National Security

    Science.gov (United States)

    2016-06-10

    Wiebe Eco . Vulnerability in Technological Cultures. Maastricht University, 2009. Caforio, Giuseppe. Handbook of the Sociology of the Military...10-06-2016 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER U.S. MILITARY TECHNOLOGY DEPENDENCE: THE HIDDEN Sb. GRANT NUMBER VULNERABILITY TO NATIONAL...14. ABSTRACT Because the U.S. has a technological culture, the U.S. military has become technology dependent. This dependence has made the military

  9. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 488 ... African Journal of Paediatric Surgery. ... Ileocecal valve atresia: Introduction of a new surgical approach ... Vol 4, No 1 (2007), Isolated Bilateral Macrostomia: Case Series and ... Vol 9, No 2 (2012), Laparoscopic inguinal hernia repair in ... List All Titles · Free To Read Titles This Journal is Open Access.

  10. APPROACHES TO THE SECURITY SYSTEM AT THE MS SHAREPOINT

    Directory of Open Access Journals (Sweden)

    Iryna V. Zolotarenko

    2010-10-01

    Full Text Available Relevance of the material contained in the article is conditioned by pressing needs of society in creating secure information systems, facilitating the introduction of advanced information technologies in the education department. Security is important for the reliability and efficiency of such systems. One way of solving the security problem is the distribution of categories of users and granting their rights at different levels. The paper analyzes general approaches to organize groups and permission levels of users in information systems developed based on MS SharePoint. The main design decisions on security in information system planning research at the National Academy of Pedagogical Sciences of Ukraine based on the Internet use the conceptual results of this article.

  11. Free emission quotas in the climate policy - consequences of different ways of granting quotas

    International Nuclear Information System (INIS)

    Hagem, Cathrine

    2001-01-01

    The article discusses how different types of conditions and rules of granting quotas over time affects the companies' decision about production and implementation of measures to reduce emission. The first section analyses a quota system in which the granting of free emission quotas are based on the firm's emission history. The effects of tradable free quotas are compared to the effects of non-tradable free quotas. The second part analyses a quota system based on the firms' needs for a free system in order to secure continued production

  12. Symmetric Link Key Management for Secure Neighbor Discovery in a Decentralized Wireless Sensor Network

    Science.gov (United States)

    2017-09-01

    KEY MANAGEMENT FOR SECURE NEIGHBOR DISCOVERY IN A DECENTRALIZED WIRELESS SENSOR NETWORK by Kelvin T. Chew September 2017 Thesis Advisor...and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT...DATE September 2017 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE SYMMETRIC LINK KEY MANAGEMENT FOR SECURE NEIGHBOR

  13. 75 FR 62839 - Award of a Single-Source Expansion Supplement to the Tribal Law and Policy Institute

    Science.gov (United States)

    2010-10-13

    ...)(2)(iii) to allow Indian Tribes to receive one-time development grants to be used to offset the cost..., HHS. ACTION: Notice. CFDA Number: 93.658. Legislative Authority: Section 476(c)(2)(iii) of the Social... programs under title IV-E of the Social Security Act. Under the agreement, Tribal Law and Policy Institute...

  14. 78 FR 63216 - Announcing the Award of Four Single-Source Expansion Supplement Grants Under the Tribal Maternal...

    Science.gov (United States)

    2013-10-23

    ...,000 Indians. The program expansion supplement awards will support expanded services to identify and... plans to improve outcomes, continue the implementation of and expand the development of concrete...)(2)(A) of Title V of the Social Security Act, as added by Section 2951 of the Patient Protection and...

  15. 78 FR 35945 - Request for Comments on Security Training Programs for Surface Mode Employees

    Science.gov (United States)

    2013-06-14

    ... million for training projects. Similarly, under the Intercity Bus Security Grant Program (IBSGP), which... related to the security elements in Table 1, per employee? (Please indicate whether this includes travel... on the size and scope of the exercise, including the phases of an exercise, travel expenses for...

  16. Grants Solutions -

    Data.gov (United States)

    Department of Transportation — The Grants Center of Excellence The Grants Center of Excellence (COE) delivers end-to-end grants management products and support to over 17 Federal partner agencies....

  17. Work security in a global economy.

    Science.gov (United States)

    Rosskam, Ellen

    2003-01-01

    Work security is a fundamental right of all working people. After World War II, the welfare state became an intrinsic part of the "Golden Age" of capitalism, in which universal prosperity seemed attainable. Workers' organizations frequently played a crucial role in policy decisions that promoted full employment, income stability, and equitable treatment of workers. Today's world order is quite different. Globalization in its present form is a major obstacle to work security. Globalization is not simply a market-driven phenomenon. It is a political and ideological movement that grants authority to capital over governments and labor. This transfer of authority hinders national efforts to promote work security and may impact the well-being of communities worldwide. In the absence of domestic autonomy, international labor standards are needed to protect social welfare. They should be geared toward curbing unemployment, poverty, and social exclusion in the global economy. The article looks at three initiatives to promote global work security.

  18. Legislating for Terrorism: The Philippines’ Human Security Act 2007

    Directory of Open Access Journals (Sweden)

    Pauline E. Eadie

    2011-11-01

    Full Text Available In February 2007 the Philippine Senate passed the Human Security Act (HSA otherwise known as Republic Act No. 9372: An Act to Secure the State and Protect our People From Terrorism. Philippine Senate Minority Leader Aquilino Q. Pimentel Jr. was heavily involved in the final drafting of the HSA. He gave it its final name shortly before the Senate Chamber passed it into law. Previously the Act had been known by various titles including ‘An Act to Deter and Punish Acts of Terrorism and for Other Purposes’ (Senate Bill No. 2137 and ‘An Act to Define and Punish the Crime of Terrorism, the Crime of Conspiracy to Commit Terrorism, and the Crime of Proposal to Commit Terrorism, and for Other Purposes (Senate Bill No. 2187. Thus the Human Security Act exists as an instrument of counter terrorism as opposed to human security policy.

  19. The ARV roll out and the disability grant: a South African dilemma?

    Science.gov (United States)

    de Paoli, Marina Manuela; Mills, Elizabeth Anne; Grønningsaeter, Arne Backer

    2012-02-16

    Prior to the antiretroviral (ARV) drug roll out in 2004, people living with HIV (PLHIV) in South Africa received disability grants when they were defined as "AIDS-sick". In the absence of available and effective medication, a diagnosis of AIDS portended disability. The disability grant is a critical component of South Africa's social security system, and plays an important role in addressing poverty among PLHIV. Given the prevalence of unemployment and poverty, disability grants ensure access to essential resources, like food, for PLHIV. Following the ARV roll out in South Africa, PLHIV experienced improved health that, in turn, affected their grant eligibility. Our aim is to explore whether PLHIV reduced or stopped treatment to remain eligible for the disability grant from the perspectives of both PLHIV and their doctors. A mixed-methods design with concurrent triangulation was applied. We conducted: (1) in-depth semi-structured interviews with 29 PLHIV; (2) in-depth semi-structured interviews with eight medical doctors working in the public sector throughout the Cape Peninsula; (3) three focus group discussions with programme managers, stakeholders and community workers; and (4) a panel survey of 216 PLHIV receiving ARVs. Unemployment and poverty were the primary concerns for PLHIV and the disability grant was viewed as a temporary way out of this vicious cycle. Although loss of the disability grant significantly affected the well-being of PLHIV, they did not discontinue ARVs. However, in a number of subtle ways, PLHIV "tipped the scales" to lower the CD4 count without stopping ARVs completely. Grant criteria were deemed ad hoc, and doctors struggled to balance economic and physical welfare when assessing eligibility. It is crucial to provide sustainable economic support in conjunction with ARVs in order to make "positive living" a reality for PLHIV. A chronic illness grant, a basic income grant or an unemployment grant could provide viable alternatives when the

  20. 32 CFR 644.62 - Title evidence.

    Science.gov (United States)

    2010-07-01

    ... HANDBOOK Acquisition Procurement of Title Evidence, Title Clearance, and Closings § 644.62 Title evidence... and their charter to issue the same. They must also be financially sound and be willing and able to...

  1. Title to mining properties

    International Nuclear Information System (INIS)

    Crouch, K.M.

    1976-01-01

    The requirements of the law which must be met in order to create title to an unpatented mining claim and the procedures which should be followed when an attempt is made to determine the title to the claim is acceptable are reviewed

  2. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    communication theory. Author, Timothy Coombs , in Ongoing Crisis Communication , discusses the need for a crisis management 10 plan to prepare for potential... COMMUNICATION : A NEW CRISIS COMMUNICATION STRATEGY FOR HOMELAND SECURITY by Sharon L. Watson March 2012 Thesis Advisor: Christopher Bellavita...REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Resilient Communication : A New Crisis Communication

  3. 77 FR 4605 - Self-Regulatory Organizations; EDGA Exchange, Inc.; Order Granting Approval of Proposed Rule...

    Science.gov (United States)

    2012-01-30

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66231; File No. SR-EDGA-2011-40] Self-Regulatory Organizations; EDGA Exchange, Inc.; Order Granting Approval of Proposed Rule Change Amending EDGA Rule 11.9 January 24, 2012. On December 2, 2011, EDGA Exchange, Inc. (``Exchange'' or ``EDGA'') filed...

  4. Nuclear regulation. NRC's security clearance program can be strengthened

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Kruslicky, Mary Ann; Bagnulo, John E.

    1988-12-01

    Because of the national security implications of its programs, the Nuclear Regulatory Commission (NRC) investigates the background of its employees and consultants as well as others to ensure that they are reliable and trustworthy. If the investigation indicates that an employee will not endanger national security, NRC grants a security clearance that allows access to classified information, material, and facilities. NRC also requires periodic checks for some clearance holders to ensure their continued clearance eligibility. The Chairman, Subcommittee on Environment, Energy, and Natural Resources, House Committee on Government Operations, asked GAO to review NRC's personnel security clearance program and assess the procedures that NRC uses to ensure that those who operate nuclear power plants do not pose a threat to the public. The Atomic Energy Act of 1954 requires NRC to conduct background investigations of its employees and consultants as well as others who have access to classified information, material, or facilities. To do this, NRC established a personnel security clearance program. Under NRC policies, a security clearance is granted after the Office of Personnel Management (OPM) or the Federal Bureau of Investigation checks the background of those applying for an NRC clearance. NRC also periodically reassesses the integrity of those holding the highest level clearance. NRC employees, consultants, contractors, and licensees as well as other federal employees hold approximately 10,600 NRC clearances. NRC does not grant clearances to commercial nuclear utility employees unless they require access to classified information or special nuclear material. However, the utilities have voluntarily established screening programs to ensure that their employees do not pose a threat to nuclear plants. NRC faces a dilemma when it hires new employees. Although its policy calls for new hires to be cleared before they start work, the security clearance process takes so long

  5. 2013 Annual Site Inspection and Monitoring Report for Uranium Mill Tailings Radiation Control Act Title II Disposal Sites

    International Nuclear Information System (INIS)

    2013-01-01

    This report, in fulfillment of a license requirement, presents the results of long-term surveillance and maintenance activities conducted by the U.S. Department of Energy (DOE) Office of Legacy Management in 2013 at six uranium mill tailings disposal sites reclaimed under Title II of the Uranium Mill Tailings Radiation Control Act (UMTRCA) of 1978. These activities verified that the UMTRCA Title II disposal sites remain in compliance with license requirements. DOE manages six UMTRCA Title II disposal sites under a general license granted by the U.S. Nuclear Regulatory Commission (NRC) established at Title 10 Code of Federal Regulations Part 40.28. Reclamation and site transition activities continue at other sites, and DOE ultimately expects to manage approximately 27 Title II disposal sites. Long-term surveillance and maintenance activities and services for these disposal sites include inspecting and maintaining the sites; monitoring environmental media and institutional controls; conducting any necessary corrective action; and performing administrative, records, stakeholder services, and other regulatory functions. Annual site inspections and monitoring are conducted in accordance with site-specific long-term surveillance plans (LTSPs) and procedures established by DOE to comply with license requirements. Each site inspection is performed to verify the integrity of visible features at the site; to identify changes or new conditions that may affect the long-term performance of the site; and to determine the need, if any, for maintenance, follow-up inspections, or corrective action. LTSPs and site compliance reports are available online at http://www.lm.doe.gov

  6. 2013 Annual Site Inspection and Monitoring Report for Uranium Mill Tailings Radiation Control Act Title II Disposal Sites

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-11-01

    This report, in fulfillment of a license requirement, presents the results of long-term surveillance and maintenance activities conducted by the U.S. Department of Energy (DOE) Office of Legacy Management in 2013 at six uranium mill tailings disposal sites reclaimed under Title II of the Uranium Mill Tailings Radiation Control Act (UMTRCA) of 1978. These activities verified that the UMTRCA Title II disposal sites remain in compliance with license requirements. DOE manages six UMTRCA Title II disposal sites under a general license granted by the U.S. Nuclear Regulatory Commission (NRC) established at Title 10 Code of Federal Regulations Part 40.28. Reclamation and site transition activities continue at other sites, and DOE ultimately expects to manage approximately 27 Title II disposal sites. Long-term surveillance and maintenance activities and services for these disposal sites include inspecting and maintaining the sites; monitoring environmental media and institutional controls; conducting any necessary corrective action; and performing administrative, records, stakeholder services, and other regulatory functions. Annual site inspections and monitoring are conducted in accordance with site-specific long-term surveillance plans (LTSPs) and procedures established by DOE to comply with license requirements. Each site inspection is performed to verify the integrity of visible features at the site; to identify changes or new conditions that may affect the long-term performance of the site; and to determine the need, if any, for maintenance, follow-up inspections, or corrective action. LTSPs and site compliance reports are available online at http://www.lm.doe.gov

  7. International codes concerning the security of radioisotopes

    International Nuclear Information System (INIS)

    Kusama, Keiji

    2013-01-01

    Explained is the title subject with international and Japanese official argument or publications and actions, where the security is defined as protection of sealed and unsealed radioisotopes (RI) from malicious acts. IAEA worked out the Code of Conduct on the Safety and Security of Radioactive Sources in 2004 based on its preceding argument and with the turning point of the terrorism 3.11 (2001), and Nuclear Security Recommendations on radioactive material and associated facilities (2011), for whose prerequisite, Security of radioactive sources: implementing guide (2009) and Security in the transport of radioactive material (2008) had been drawn up. The Code of Conduct indicates the security system to regulate the sealed sources that each nation has to build up through legislation, setup of regulatory agency, registration of the sources, provision of concerned facilities with radiation protection, etc. For attaining this purpose, IAEA defined Guidance on the Import and Export of Radioactive Sources (2005, 2012), Categorization of radioactive sources (2005) and Dangerous quantities of radioactive material (D-VALUES) (2006). For updating the related matters, IAEA holds international conferences somewhere in the world every year. The Nuclear Security Recommendations indicate the nation's responsibility of building up and maintaining the security system above with well-balanced measures between the safe and secure use of RI without the invalid inhibition of their usage. Japan government worked out the concept essential for ensuring the nuclear security in Sep. 2011, in which for RI, defined were the risk and benefit in use and security, and securing role of the present legal systems concerning the safety handling and objective RI involved in their registration system. Securing measures of RI in such usage as medical and industrial aids must be of advanced usefulness and safety in harmony with activities of other countries. (T.T)

  8. Aspects of No Endorsement of Annulment Provided Without Granting the Union Stable

    Directory of Open Access Journals (Sweden)

    Juliana Franco Fulgencio Fonseca

    2015-12-01

    Full Text Available Given the importance of the endorsement in corporate economic activities, the study has the scope to analysis of change brought about by the Civil Code of 2002, which caused expressed spousal authorization requirement to validate guarantee provided by the other, except for cases of separation regime total assets. Innovation led an intense doctrinal discussion, given that the norm has brought significant changes to the guarantor and institute such a levy was not provided for in the Civil Code of 1916. It is a critical analysis of art. 1647, III of the Civil Code on the context of the general theory of debt securities and its principles, calling for the dynamism and simplicity of credit flowing. Clarify to the approval of the consequences provided without granting the marriage scope and stable, as well as the applicability or inapplicability of such a charge against the securities. The study underpins that, besides being unnecessary to grant the guarantee provided by the cohabitant in a stable relationship, even if it were necessary, would not occur invalidity of endorsement (as stipulated by the Civil Code of 2002, but the ineffectiveness have no effect before one who did not attend the act.

  9. Valuation of Residential Premises for the Purposes of Securing the Receivables of the Creditor in Poland

    Science.gov (United States)

    Hełdak, Maria; Stacherzak, Agnieszka

    2017-10-01

    The study presents an analysis of the theoretical and practical issues connected with securing the receivables of creditors, in particular the principles connected with the appraisal of real property value used for the purposes of granting loans in Poland. The scope of research included the basic elements of the functioning and organisation of the Polish banking system, legal forms of securing debt receivables and the principles of real property valuation for universal and mortgage banks. Additionally, the authors have conducted an analysis of the number and amount of loans granted in Poland in the years 2009 - 2016

  10. UN Security Council decision-making: testing the bribery hypothesis

    Directory of Open Access Journals (Sweden)

    Eugenio Pacelli Lazzarotti Diniz Costa

    2014-12-01

    Full Text Available Liberal-Institutionalism and Structural Realism expectations about international organizations are confronted by looking at if and how US-controlled international aid is granted, and particularly if it is related or not to political affinity and to United Nations Security Council (UNSC non-permanent membership. A preliminary assessment suggests that these relations only hold for the period of the Cold War, and, even then, only when UNSC non-permanent membership is in years in which the Security Council was deemed very important.

  11. 17 CFR 240.6h-1 - Settlement and regulatory halt requirements for security futures products.

    Science.gov (United States)

    2010-04-01

    ... investors and the public interest, taking into account such factors as fairness to buyers and sellers of the affected security futures product, the maintenance of a fair and orderly market in such security futures... with the protection of investors. An exemption granted pursuant to this paragraph shall not operate as...

  12. 77 FR 43100 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-009...

    Science.gov (United States)

    2012-07-23

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Mary Ellen Callahan (703) 235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0097] Privacy Act of... Assistance Grant Programs System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system...

  13. INIS: Authority list for journal titles

    International Nuclear Information System (INIS)

    2005-01-01

    This is the 31st revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). This list is published annually and includes the titles of all journals which have contained articles submitted to INIS at the time of publication. The current list contains 13,104 journal titles, 2,078 regularly scanned journals and 561 key journals. It was last updated in February 2005. The purpose of this report is to provide descriptive cataloguers with a standard entry for the full title of a journal. In addition to the full journal title, the ISSN (International Standard Serial Number), administered by the ISSN International Centre, Paris, France, and/or CODEN, assigned by Chemical Abstracts Service, USA, are given in this manual. In order to help the user find titles easily, the list is arranged in six parts, followed by summary statistics: In Part I, all key journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part II, all key journals are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. In Part III, all journals that are regularly scanned by INIS Centers are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part IV, all journals that are regularly scanned by INIS Centers are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. In Part V, all journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part VI, all journals are sorted alphabetically under their title. The name of the

  14. INIS: Authority list for journal titles

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-03-01

    This is the 31st revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). This list is published annually and includes the titles of all journals which have contained articles submitted to INIS at the time of publication. The current list contains 13,104 journal titles, 2,078 regularly scanned journals and 561 key journals. It was last updated in February 2005. The purpose of this report is to provide descriptive cataloguers with a standard entry for the full title of a journal. In addition to the full journal title, the ISSN (International Standard Serial Number), administered by the ISSN International Centre, Paris, France, and/or CODEN, assigned by Chemical Abstracts Service, USA, are given in this manual. In order to help the user find titles easily, the list is arranged in six parts, followed by summary statistics: In Part I, all key journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part II, all key journals are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. In Part III, all journals that are regularly scanned by INIS Centers are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part IV, all journals that are regularly scanned by INIS Centers are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. In Part V, all journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part VI, all journals are sorted alphabetically under their title. The name of the

  15. INIS: Authority list for journal titles

    International Nuclear Information System (INIS)

    2006-01-01

    This is the 32nd revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). This list is published annually and includes the titles of all journals which have contained articles submitted to INIS at the time of publication. The current list contains 13,231 journal titles, 2,125 regularly scanned journals and 555 key journals. It was last updated in February 2006. The purpose of this report is to provide descriptive cataloguers with a standard entry for the full title of a journal. In addition to the full journal title, the ISSN (International Standard Serial Number), administered by the ISSN International Centre, Paris, France, and/or CODEN, assigned by Chemical Abstracts Service, USA, are given in this manual. In order to help the user find titles easily, the list is arranged in six parts, followed by summary statistics: In Part I, all key journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part II, all key journals are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. In Part III, all journals that are regularly scanned by INIS Centres are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part IV, all journals that are regularly scanned by INIS Centres are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. In Part V, all journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part VI, all journals are sorted alphabetically under their title. The name of the

  16. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  17. The International Atomic Energy Agency Nuclear Security Education Strategies

    International Nuclear Information System (INIS)

    BRAUNEGGER-GUELICH, A.; RUKHLO, V.; GREGORIC, M.; COLGAN, P.

    2011-01-01

    The threat of nuclear terrorism has not diminished. In response to the concerns of States, an international nuclear security framework has emerged through the establishment of a number of legally binding and non-binding international instruments which obligates or commits States to carry out a number of actions to protect against nuclear terrorism. In this context, the need for human resource development programmes in nuclear security was underscored at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors' Meetings. In the pursuit of this need, the IAEA provides a comprehensive nuclear security training programme to States on a regular basis, and has developed a concept that seeks to effectively pass ownership of nuclear security knowledge and skills to States through the establishment of a Nuclear Security Support Centre. In addition, the IAEA has developed a technical guidance titled IAEA Nuclear Security Series No. 12 - Educational Programme in Nuclear Security that consists of a model of a Master of Science (M.Sc.) and assists educational institutions to provide nuclear security education. The article sets out IAEA efforts in the area of nuclear security training and education, including the assistance to States for establishing a Nuclear Security Support Centre. It underlines the objective and content of the IAEA Nuclear Security Series No. 12, discusses different concepts on how to establish nuclear security at universities and, emphasizes on the IAEA efforts to assist educational and research institutions, and other stake holders to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. (author)

  18. Nonlinear Elasticity of Doped Semiconductors

    Science.gov (United States)

    2017-02-01

    AFRL-RY-WP-TR-2016-0206 NONLINEAR ELASTICITY OF DOPED SEMICONDUCTORS Mark Dykman and Kirill Moskovtsev Michigan State University...2016 4. TITLE AND SUBTITLE NONLINEAR ELASTICITY OF DOPED SEMICONDUCTORS 5a. CONTRACT NUMBER FA8650-16-1-7600 5b. GRANT NUMBER 5c. PROGRAM...vibration amplitude. 15. SUBJECT TERMS semiconductors , microresonators, microelectromechanical 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  19. You Can Get Grants!

    Science.gov (United States)

    Novelli, Joan

    1994-01-01

    Presents strategies to help elementary teachers win grants for the classroom. The article includes information on grant sources, where to find out more about grants, and how to write winning grants. Examples of successful grant projects are provided, and announcement of a $500 Instructor grant competition is included. (SM)

  20. Household Food Security and Fruit and Vegetable Intake among Low-Income Fourth-Graders

    Science.gov (United States)

    Grutzmacher, Stephanie; Gross, Susan

    2011-01-01

    Objective: To examine the relationship between household food security and children's and parents' fruit, vegetable, and breakfast consumption and fruit and vegetable availability. Design: Cross-sectional study using matched parent-child surveys. Setting: Title I elementary schools in Maryland. Participants: Ninety-two low-income parent-child…

  1. 7 CFR 1927.55 - Title clearance services.

    Science.gov (United States)

    2010-01-01

    ... REGULATIONS TITLE CLEARANCE AND LOAN CLOSING Real Estate Title Clearance and Loan Closing § 1927.55 Title clearance services. (a) Responsibilities of closing agents. Services to be provided to the agency and the borrower by a closing agent in connection with the transaction vary depending on whether a title insurance...

  2. Legal significance of the private security sector in Kosovo

    Directory of Open Access Journals (Sweden)

    Fidair Berisha

    2015-11-01

    Full Text Available Privatization of the security sector is considered a new phenomenon in the post communist society. The security system has been under a total monopol of the state institutions. Therefore, even the legal adjustment of this system is considered that only state institutions are entitled for provision of the security services, by excluding participation of civic organizations from this activity. Beside this, state enterprises have been obliged to establish its safet structures for property protection and involved employers in enterprises. Immediately after the conflictual period the privatization of the security sector was rapidly increased, including various parts of society. In Kosovo immediately after the conflictual period there was legal gaps, which means that the private security sector has not been adjusted and as a result of this has been uncontrolled and without supervision. Therefore in 2000 the UNMIK administration has undertaken measures and has carried out the first act which has regulated this sector in Kosova. The draft law has undergone significant changes starting from the title. Saying in more common manner, “Draft law for private security” is amended in the LAW no. 04/L-004.2001 for private security services, and this amendment of the private security sector is based in the above mentioned law.

  3. 77 FR 40928 - Self-Regulatory Organizations; C2 Options Exchange, Incorporated; Order Granting Approval of...

    Science.gov (United States)

    2012-07-11

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67357; File No. SR-C2-2012-011] Self-Regulatory Organizations; C2 Options Exchange, Incorporated; Order Granting Approval of Proposed Rule Change To Implement a... and subsequently migrates to the DRF, the regulatory data for the portion of the day that the main...

  4. 76 FR 4968 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Science.gov (United States)

    2011-01-27

    ...-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change Relating to Listing and Trading Shares of the AdvisorShares Active Bear ETF January 19, 2011. I. Introduction On... of the security or investment in the portfolio. \\14\\ Under accounting procedures followed by the Fund...

  5. 78 FR 75437 - Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Order Granting Approval of Proposed Rule...

    Science.gov (United States)

    2013-12-11

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71004; File No. SR-Phlx-2013-101] Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Order Granting Approval of Proposed Rule Change Regarding the Short Term Options Program December 6, 2013. I. Introduction On October 3, 2013, NASDAQ OMX PHLX LLC...

  6. 76 FR 8793 - Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Order Granting Approval of Proposed Rule...

    Science.gov (United States)

    2011-02-15

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63875; File No. SR-Phlx-2010-183] Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Order Granting Approval of Proposed Rule Change Expanding Its Short Term Option Program February 9, 2011. I. Introduction On December 15, 2010, NASDAQ OMX PHLX LLC...

  7. 75 FR 9988 - Self-Regulatory Organizations; NASDAQ OMX PHLX, Inc.; Order Granting Approval of Proposed Rule...

    Science.gov (United States)

    2010-03-04

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61590; File No. SR-Phlx-2009-113] Self-Regulatory Organizations; NASDAQ OMX PHLX, Inc.; Order Granting Approval of Proposed Rule Change Relating to Index Option Position Limits February 25, 2010. On December 29, 2009, NASDAQ OMX PHLX, Inc. (``Phlx'' or...

  8. 76 FR 2182 - Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Order Granting Approval of Proposed Rule...

    Science.gov (United States)

    2011-01-12

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63654; File No. SR-Phlx-2010-158] Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Order Granting Approval of Proposed Rule Change Establishing a $5 Strike Price Program January 6, 2011. I. Introduction On November 12, 2010, NASDAQ OMX PHLX LLC...

  9. National Ignition Facility Title II Design Plan

    International Nuclear Information System (INIS)

    Kumpan, S

    1997-01-01

    This National Ignition Facility (NIF) Title II Design Plan defines the work to be performed by the NIF Project Team between November 1996, when the U.S. Department of Energy (DOE) reviewed Title I design and authorized the initiation of Title H design and specific long-lead procurements, and September 1998, when Title 11 design will be completed

  10. 24 CFR 202.12 - Title II.

    Science.gov (United States)

    2010-04-01

    ... INSTITUTIONS AND MORTGAGEES Title I and Title II Specific Requirements § 202.12 Title II. (a) Tiered pricing—(1... rate up to two percentage points under the mortgagee's customary lending practices must be based on... after accounting for the value of servicing rights generated by making the loan and other income to the...

  11. INIS: Authority list for journal titles

    International Nuclear Information System (INIS)

    2007-01-01

    This is the 33rd revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). This list is published annually and includes the titles of all journals which have contained articles submitted to INIS at the time of publication. The current list contains 13 396 journal titles, 2 170 regularly scanned journals and 578 key journals. It was last updated in February 2007. A journal - or periodical - is a continuing publication issued in a succession of discrete parts, usually bearing numbering and/or chronological designations and intended to be continued indefinitely. It is generally published within a defined, fixed interval between issues and normally appears more than once per year. It includes a mixture of articles, letters, summaries, etc. Within this definition, annuals such as the Annual Review of Nuclear Science are included, but series titles such as the McGraw-Hill Series in Nuclear Engineering are not. The purpose of this document is to provide descriptive cataloguers with standard elements to include in bibliographic level 'S' of the INIS record. These elements include field (tag) 229 (Full Journal Title), 320 (ISSN) and 321 (CODEN). The full journal title is mandatory, and either the ISSN or the CODEN must be included (both may appear). Instructions on how to use this and other elements of the INIS record format are found in INIS: Guide to Bibliographic Description (IAEA-INIS-1). In order to help the user find titles easily, the list is arranged in six parts, followed by summary statistics: - In Part I, all key journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. - In Part II, all key journals are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. - In Part III, all journals that are regularly scanned by

  12. Securing the Borders: Creation of the Border Patrol Auxiliary

    Science.gov (United States)

    2007-05-05

    DATES COVERED 00-00-2007 to 00-00-2007 4. TITLE AND SUBTITLE Securing the Borders: Creation of the Border Patrol Auxillary 5a. CONTRACT NUMBER...Substantial work experience which demonstrates an ability to (1) take charge, make sound decisions , and maintain composure in stressful situations; (2...applicable laws, court decisions , and law enforcement procedures; and 4. Develop and maintain contact with the network of informants. ¾ To qualify at

  13. 20 CFR 416.573 - How much will we withhold from your title II and title VIII benefits to recover a title XVI...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How much will we withhold from your title II... Payment of Benefits, Overpayments, and Underpayments § 416.573 How much will we withhold from your title...-due benefits. (b)(1) We will collect the overpayment from current monthly benefits due in a month by...

  14. Granular Security in a Graph Database

    Science.gov (United States)

    2016-03-01

    database likely already has some sort of data security model in place. In a corporate context, these parti- tions may exist to keep sales, marketing , and...instance, accounting and marketing departments operate independently, and access to one area does not, by default, grant access to another because the...either an outbound relationship, as illustrated in Figure 4.5(a), or an inbound relationship, as illustrated in Figure 4.5(b). These two cases

  15. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  16. Information Security for Compliance with Select Agent Regulations

    Science.gov (United States)

    Lewis, Nick; Campbell, Mark J.

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as “select agents.” While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts—still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment. PMID:26042864

  17. Information security for compliance with select agent regulations.

    Science.gov (United States)

    Lewis, Nick; Campbell, Mark J; Baskin, Carole R

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as "select agents." While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts--still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment.

  18. 17 CFR 402.2 - Capital requirements for registered government securities brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ...)(B) of this title; (7) Loans to commercial banks for one business day of immediately available funds...; (3) Demand deposits in the case where the counterparty is a commercial bank; (4) Loans for one... made in the case where the counterparty is a commercial bank; (5) Custodial holdings of securities in...

  19. INIS: Authority list for journal titles

    International Nuclear Information System (INIS)

    2008-01-01

    This is the 34th revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). This list is published annually and includes the titles of all journals which have contained articles submitted to INIS at the time of publication. The current list contains 13 538 journal titles, 2 106 regularly scanned journals and 613 key journals. It was last updated in February 2008. A journal - or periodical - is a continuing publication issued in a succession of discrete parts, usually bearing numbering and/or chronological designations and intended to be continued indefinitely. It is generally published within a defined, fixed interval between issues and normally appears more than once per year. It includes a mixture of articles, letters, summaries, etc. Within this definition, annuals such as the Annual Review of Nuclear Science are included, but series titles such as the McGraw-Hill Series in Nuclear Engineering are not. The purpose of this document is to provide descriptive cataloguers with standard elements to include in bibliographic level 'S' of the INIS record. These elements include field (tag) 229 (Full Journal Title), 320 (ISSN) and 321 (CODEN). The full journal title is mandatory, and either the ISSN or the CODEN must be included (both may appear). Instructions on how to use this and other elements of the INIS record format are found in INIS: Guide to Bibliographic Description (IAEA-INIS-1). In order to help the user find titles easily, the list is arranged in six parts, followed by summary statistics: - In Part I, all key journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. - In Part II, all key journals are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. - In Part III, all journals that are regularly scanned by

  20. THE NATIONAL SECURITY - MEDIA POWER LINKAGE. A THEORETICAL FRAMEWORK

    Directory of Open Access Journals (Sweden)

    KARIN MEGHEŞAN

    2013-05-01

    Full Text Available The mechanism of national security policy is an issue of increasing interests in post cold war era. But what is the impact of the media upon national security policy decision making? New world wide events show us that more than ever national policy is often at the mercy of the media. The Wiki leaks, the Murdoch inquiry, the impact of new social media on Arab democratic movements are just some examples regarding the effect of nearly simultaneous presentation of information around the world. The world is changing, and the processes by which national policy is developed may also be changing especially in the security domain. The essence of this study, as the title suggests is the idea of a „dual use” media in the national security issues. This study employs a relatively narrow definition of national security issues as only those which are concerned with national survival and preservation of our society. The media affects us as individuals and as a collective body so we will like to focus on a realistic understanding of the media-secrecy-security linkage, noting that we will do nothing else but advance and underline the main points of view from the public and scientific discourse.

  1. NSSEFF Designing New Higher Temperature Superconductors

    Science.gov (United States)

    2017-04-13

    AFRL-AFOSR-VA-TR-2017-0083 NSSEFF - DESIGINING NEW HIGHER TEMPERATURE SUPERCONDUCTORS Meigan Aronson THE RESEARCH FOUNDATION OF STATE UNIVERSITY OF...2015 4. TITLE AND SUBTITLE NSSEFF - DESIGINING NEW HIGHER TEMPERATURE SUPERCONDUCTORS 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER FA9550-10-1-0191 5c...materials, identifying the most promising candidates. 15. SUBJECT TERMS TEMPERATURE, SUPERCONDUCTOR 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  2. Distinguishing Between Private Law and Social-Security Law in ...

    African Journals Online (AJOL)

    This article attempts to highlight the potential danger in applying private-law principles to social-security law in deciding whether or not social grants should be deducted from awards for damages. Typically, this issue comes to the fore where a damage-causing event, such as death, sets into motion a system that provides for ...

  3. Land Titles and Rice Production in Vietnam

    DEFF Research Database (Denmark)

    Van Den Broeck, Katleen; Newman, Carol; Tarp, Finn

    In most of the empirical literature on land titling, the household is regarded as unitary, and land rights are found to have ambiguous effects on land allocation, investment and productivity. Using data from 12 provinces in Vietnam, we diversify land titles, and show in a household fixed effects...... analysis of plot level rice yields that land titles are indeed important. Only exclusively held titles have the expected positive effects, and the positive effect on yields is found in male headed households. Furthermore, a household level rice yield function reveals that exclusive user rights...... are inefficiency decreasing, while jointly held user rights have no efficiency effects. Finally, once the gender of the head of household is controlled for, exclusively held female titles have a greater positive effect on the efficiency of the household than that of male held titles...

  4. Order Granting the Petition to Object to Williams Four Corners, LLC - Sims Mesa Central Delivery Point natural gas processing plant and compressor station, Rio Arriba County, New Mexico, Title V Operating Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  5. Protecting Commercial Space Systems: A Critical National Security Issue

    Science.gov (United States)

    1999-04-01

    systems. Part two will describe, at the operational level , this author’s theory for space protection and recommend a course of action to work...minimal loss of life. These factors force us to conclude this is a critical national security issue just as many in high- level government positions...Command and Staff College Operational Forces Coursebook (Academic Year 1999), 35. 3 The USCG is not a Title 10 Service, thus Posse Comitatus is not a

  6. 77 FR 38879 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Science.gov (United States)

    2012-06-29

    ... marketable non-displayed interest, the Market Maker would be required to re-enter a quotation for purposes of...-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change Adding New... Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to add new...

  7. Quarterly title list for the period ending June 1980

    International Nuclear Information System (INIS)

    1980-01-01

    The title list contains: a) 17 titles and abstracts of laboratory reports, b) 36 titles of publications (32 with abstracts), c) 13 titles of articles submitted for publication (12 with abstracts), and d) 72 titles of lectures (52 with abstracts.) (GG) [de

  8. Security needs you

    CERN Multimedia

    2010-01-01

    Academic freedom is a valuable thing, but like any kind of freedom, it comes with responsibility. Here at CERN, and in the global particle physics community as a whole, we enjoy an open academic environment, which gives us freedom of choice and freedom of expression. It is a strong tradition at CERN, but it’s not something we can ever take for granted. This is particularly true in the area of IT, where our openness and our global visibility make us an attractive target. Attacks on our IT infrastructure in the past have had a negative impact on our reputation, and have even led to changes in the way we operate computing services. It is the responsibility of all of us, not just the experts in the IT Department, to protect our IT infrastructure while striking the right balance between security, academic freedom and the unfettered operation of our facilities. Everyone using CERN’s IT infrastructure is responsible for the security and protection of the computers they use, the operating...

  9. Title of the paper goes here second line

    Indian Academy of Sciences (India)

    %%Please download if these packages are not included %%in your local TeX distribution %%txfonts,balance,textcase,float %% \\begin{document} %%paper title %%For line breaks, \\\\ can be used within title \\title{Title of the paper goes here\\\\ second line} %%author names are separated by comma (,) %%use \\and before ...

  10. The external dimensions of the EU area of freedom, security and justice : a constitutional perspective

    NARCIS (Netherlands)

    Matera, Claudio

    2016-01-01

    During the past decade in particular the external relations of the EU have not just concerned the classic areas of international cooperation (‘external action’) of the EU such as trade (Article 205 TFEU), development cooperation (Article 208 TFEU) and foreign security and defence policy (Title V

  11. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    Science.gov (United States)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  12. INIS: Authority list for journal titles

    International Nuclear Information System (INIS)

    2009-01-01

    This is the 35th revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). This list is published annually and includes the titles of all journals which have contained articles submitted to INIS at the time of publication. The current list contains 13 750 journal titles, 1 965 regularly scanned journals and 593 key journals. It was last updated in March 2009. A journal - or periodical - is a continuing publication issued in a succession of discrete parts, usually bearing numbering and/or chronological designations and intended to be continued indefinitely. It is generally published within a defined, fixed interval between issues and normally appears more than once per year. It includes a mixture of articles, letters, summaries, etc. Within this definition, annuals such as the Annual Review of Nuclear Science are included, but series titles such as the McGraw-Hill Series in Nuclear Engineering are not. The purpose of this document is to provide descriptive cataloguers with standard elements to include in bibliographic level 'S' of the INIS record. These elements include field (tag) 229 (Full Journal Title), 320 (ISSN) and 321 (CODEN). The full journal title is mandatory, and either the ISSN or the CODEN must be included (both may appear). Instructions on how to use this and other elements of the INIS record format are found in INIS: Guide to Bibliographic Description (IAEA-INIS-1). In order to help the user find titles easily, the list is arranged in six parts, followed by summary statistics: - In Part I, all key journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. - In Part II, all key journals are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. - In Part III, all journals that are regularly scanned by the

  13. 24 CFR 203.385 - Types of satisfactory title evidence.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Types of satisfactory title... Title Waivers § 203.385 Types of satisfactory title evidence. The following types of title evidence shall be satisfactory to the Commissioner: (a) Fee or owner's title policy. A fee or owner's policy of...

  14. Advanced Sensors for Safety and Security

    CERN Document Server

    Khudaverdyan, Surik

    2013-01-01

    This book results from a NATO Advanced Research Workshop titled “Technological Innovations in CBRNE Sensing and Detection for Safety, Security, and Sustainability” held in Yerevan, Armenia in 2012. The objective was to discuss and exchange views as to how fusion of advanced technologies can lead to improved sensors/detectors in support of defense, security, and situational awareness. The chapters range from policy and implementation, advanced sensor platforms using stand-off (THz and optical) and point-contact methods for detection of chemical, nuclear, biological, nuclear and explosive agents and contaminants in water, to synthesis methods for several materials used for sensors.  In view of asymmetric, kinetic, and distributed nature of threat vectors, an emphasis is placed to examine new generation of sensors/detectors that utilize an ecosystems of innovation and advanced sciences convergence in support of effective counter-measures against  CBRNE threats. The book will be of considerable interest and...

  15. 76 FR 42003 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2011-07-18

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... preamble, DHS amends Chapter I of Title 6, Code of Federal Regulations, as follows: PART 5--DISCLOSURE OF...

  16. Formulating the Right Title for a Research Article.

    Science.gov (United States)

    Bavdekar, Sandeep B

    2016-02-01

    Title is an important part of the article. It condenses article content in a few words and captures readers' attention. A good title for a research article is the one which, on its own, is able to introduce the research work to the fullest extent, but in a concise manner. Writing scientific titles that are informative and attractive is a challenging task. This communication describes the importance of titles and the methods of creating appropriate titles for research papers. © Journal of the Association of Physicians of India 2011.

  17. Energy Security Requires Diversity: An Argument for The Defense Production Act Title III Biofuel Initiative

    Science.gov (United States)

    2013-06-19

    Media, Integrated Marketing Communications at Northwestern University, http://oilchangeproject.nationalsecurityzone.org/choke-points/chokepoints-map-2...23 Source: The National Security Reporting Project, Medill School of Journalism, Media, Integrated Marketing Communications at Northwestern

  18. 7 CFR 1951.226 - Sale or exchange of security property.

    Science.gov (United States)

    2010-01-01

    ... Community and Direct Business Programs Loans and Grants § 1951.226 Sale or exchange of security property. A... reasonable and necessary selling expenses are used for one or more of the following purposes: (i) To pay on... successor agency under Public Law 103-354's advantage. (ii) To purchase or acquire through exchange property...

  19. Development of a Prognostic Marker for Lung Cancer Using Analysis of Tumor Evolution

    Science.gov (United States)

    2017-08-01

    AWARD NUMBER: W81XWH-15-1-0243 TITLE: Development of a Prognostic Marker for Lung Cancer Using Analysis of Tumor Evolution PRINCIPAL...SUBTITLE 5a. CONTRACT NUMBER Development of a Prognostic Marker for Lung Cancer Using Analysis of Tumor Evolution 5b. GRANT NUMBER 5c. PROGRAM...derive a prognostic classifier. 15. SUBJECT TERMS NSCLC; tumor evolution ; whole exome sequencing 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  20. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.; Espinoza, J.; Murphy, M.D.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSI addressed some of these issues to create a more manageable public key infrastructure.

  1. Quarterly title list for the period ending September 1976

    International Nuclear Information System (INIS)

    1976-01-01

    The title list of the Max-Planck-Institut fuer Plasmaphysik and the Projektgruppe fuer Laserforschung of the MPG is concerned with the period from July until September 1976, and it contains: a) 12 titles and abstracts of laboratory reports, b) 37 titles of publications (30 abstracts), c) 20 titles of articles submitted for publication (16 abstracts), and d) 25 titles of lectures (12 abstracts). (GG) [de

  2. Separating Sisters From Brothers: Ethnic Relations and Identity Politics in the Context of Indigenous Land Titling in Indonesia

    Directory of Open Access Journals (Sweden)

    Stefanie Steinebach

    2017-06-01

    Full Text Available Environmental and social transformations in Jambi province, Indonesia, are inextricably interlinked. Large-scale agro-industrial development and nature conservation policies equally alienate local communities from their agricultural lands and turn land into a scarce resource. Consequently, access to agricultural land becomes increasingly contested, not only between communities and state institutions or companies but also among communities themselves. To secure or restore local ‘indigenous’ land rights against land grabbing and green grabbing by states and companies, indigenous land titling has become a powerful tool all over the world. Ongoing activities of indigenous land titling in Indonesia have been largely perceived as an act of justice by indigenous and land rights activists and affected communities. Yet, a challenging step towards titling is the identification of who is and who is not ‘indigenous’. This highly political process creates ethnicity-based identities tied to rights and possibilities around land as a contested resource. Based on a case study of a national park in central Jambi, this paper shows that what is perceived as an act of justice against the state can also produce injustice among local communities by heavily impacting and transforming local social structures and relations.

  3. A 25-year analysis of the American College of Gastroenterology research grant program: factors associated with publication and advancement in academics.

    Science.gov (United States)

    Crockett, Seth D; Dellon, Evan S; Bright, Stephanie D; Shaheen, Nicholas J

    2009-05-01

    The American College of Gastroenterology (ACG) has awarded research grants for 25 years. We assessed the characteristics of grant recipients, their current academic status, and the likelihood of publication resulting from the grant. Demographic data, the year and amount of award, title of project, and recipient's institution were extracted from ACG databases. Using ACG reports and medical literature search engines, we assessed publication based on grant-funded research, as well as career publication record. We also determined the current position of awardees. A similar analysis was performed for recipients of junior investigator awards. A total of 396 clinical research awards totaling $5,374,497 ($6,867,937 in 2008 dollars) were awarded to 341 recipients in the 25 years between 1983 and 2008. The most commonly funded areas of research were endoscopy (22% of awards) and motility/functional disorders (21%). At least one peer-reviewed publication based on grant-funded research occurred with 255 of the 368 awards (69%) for 1983-2006 [corrected]. Higher award value was associated with subsequent publication. Of the 313 awardees over the same period, 195 (62%) are currently in academic positions [corrected]. Factors associated with staying in academics included higher award value (P academics. Overall, the mean cost in grant dollars per published paper based on the research was $14,875. The majority of ACG grant recipients published the results of their research and remained in academics. Higher amount of award, holding an advanced degree, and publication were associated with careers in academics. The ACG research grant award program is an important engine of investigation, publication, and academic career development in the field of gastroenterology.

  4. 78 FR 12130 - Social Security Ruling, SSR 13-3p; Appeal of an Initial Medical Disability Cessation...

    Science.gov (United States)

    2013-02-21

    ... determination. This Ruling also clarifies how this policy applies at the Appeals Council (AC) level when the AC.... Policy Interpretation Ruling Title II: Appeal of an Initial Medical Disability Cessation Determination or...; Appeal of an Initial Medical Disability Cessation Determination or Decision AGENCY: Social Security...

  5. 76 FR 42005 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-07-18

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... Title 6, Code of Federal Regulations, as follows: PART 5--DISCLOSURE OF RECORDS AND INFORMATION 0 1. The...

  6. 24 CFR 202.11 - Title I.

    Science.gov (United States)

    2010-04-01

    ... in 24 CFR 25.5. Civil money penalties may be imposed against Title I lenders and mortgagees pursuant... unacceptable risk to the Department; or (iv) Transfer of a Title I loan to a party that does not have a valid...

  7. Effective Electronic Security: Process for the Development and Validation from Requirements to Testing

    Science.gov (United States)

    2013-06-01

    ABBREVIATIONS ANSI American National Standards Institute ASIS American Society of Industrial Security CCTV Closed Circuit Television CONOPS...is globally recognized for the development and maintenance of standards. ASTM defines a specification as an explicit set of requirements...www.rkb.us/saver/. One of the SAVER reports titled CCTV Technology Handbook has a chapter on system design. The report uses terms like functional

  8. Global Security, Religion and Education Development: A Crisis for the Field of Comparative Education?

    Science.gov (United States)

    Sayed, Yusuf; Davies, Lynn; Hardy, Mike; Arani, Abbas Madandar; Kakia, Lida; Bano, Masooda

    2011-01-01

    The above title was suggested by the editors of this journal as being an interesting topic for a forum. It is indeed a valuable one to explore, in that while there has been extensive writing on various connections between security, religion and education (e.g. Apple 2004; Griffin 2006; Merry 2007; Davies 2008), situating this within comparative…

  9. Strategies to Prevent or Reduce Gender Bias in Peer Review of Research Grants: A Rapid Scoping Review.

    Directory of Open Access Journals (Sweden)

    Andrea C Tricco

    Full Text Available To review the literature on strategies implemented or identified to prevent or reduce gender bias in peer review of research grants.Studies of any type of qualitative or quantitative design examining interventions to reduce or prevent gender bias during the peer review of health-related research grants were included. Electronic databases including MEDLINE, EMBASE, Education Resources Information Center (ERIC, PsycINFO, Joanna Briggs, the Cochrane Library, Evidence Based Medicine (EBM Reviews, and the Campbell Library were searched from 2005 to April 2016. A search for grey (i.e., difficult to locate or unpublished literature was conducted and experts in the field were consulted to identify additional potentially relevant articles. Two individuals screened titles and abstracts, full-text articles, and abstracted data with discrepancies resolved by a third person consistently.After screening 5524 citations and 170 full-text articles, one article evaluating gender-blinding of grant applications using an uncontrolled before-after study design was included. In this study, 891 applications for long-term fellowships in 2006 were included and 47% of the applicants were women. These were scored by 13 peer reviewers (38% were women. The intervention included eliminating references to gender from the applications, letters of recommendations, and interview reports that were sent to the committee members for evaluation. The proportion of successful applications led by women did not change with gender-blinding, although the number of successful applications that were led by men increased slightly.There is limited research on interventions to mitigate gender bias in the peer review of grants. Only one study was identified and no difference in the proportion of women who were successful in receiving grant funding was observed. Our results suggest that interventions to prevent gender bias should be adapted and tested in the context of grant peer review to

  10. Offshore oil and gas and coastal British Columbia : Aboriginal rights, title and interests

    Energy Technology Data Exchange (ETDEWEB)

    Porter, D. [First Nations Summit, West Vancouver, BC (Canada)

    2006-07-01

    This presentation discussed the legal duty of offshore proponents in the oil and gas industry to consult with Aboriginal nations. The Crown court's support for Aboriginal title to ocean areas within proposed offshore regions was also discussed, and Aboriginal rights to manage ocean resources were outlined. Haida and Taku River Tlingit legal decisions have confirmed both a constitutional and fiduciary duty for the Crown to consult with Aboriginal nations who assert their rights or title to lands subject to development. Resource rights granted without meaningful consultation with Aboriginal nations can be challenged, which may result in legal and financial liability for resource companies. A consultative process that addresses ownership, capacity and benefit sharing must be developed so that Aboriginal governments can participate in the design and development of appropriate fiscal and regulatory regimes. The developed regime must consider benefit and revenue sharing, as well as the integration of traditional knowledge within western science for the lifetime of any project. All decision-making bodies must include participation from Aboriginal groups. Mechanisms must also be developed to mitigate the environmental and socio-economic consequences of resource development. Impact and benefit agreements must be negotiated with coastal nations. Dissatisfaction with the concept of consultation processes has led first nations to reconsider the role that they must play in ensuring that oil and gas developments in the coastal regions of British Columbia do not negatively impact on their communities. It was noted that Inuit land claims reserve special rights for the Inuit over 18,800 miles of tidal waters. Earlier attempts by Aboriginal societies to assert their right to control their own ocean resources free from governmental interference were also discussed. It was concluded that litigation of Aboriginal rights and title poses serious challenges to offshore oil and gas

  11. How property title impacts urban consolidation

    DEFF Research Database (Denmark)

    Easthope, Hazel; Warnken, Jan; Sherry, Cathy

    2014-01-01

    Continuing urbanisation is triggering an increase in multi-titled housing internationally. This trend has given rise to a substantial research interest in the social consequences of higher density living. Little enquiry, however, has been directed to examining how property title subdivisions gene...

  12. The ties that bind: what's in a title?

    Science.gov (United States)

    Neuhaus, Susan J

    2018-03-01

    Many Australian and New Zealand surgeons use the title 'Mister' rather than 'Doctor', a practice dating back to traditions established over 600 years ago. The Royal Australasian College of Surgeons is currently undergoing a period of critical self-reflection, embodied by its 'Respect' campaign. Active measures to embrace diversity and encourage women into surgery are underway. This paper reviews the historical basis to the use of gendered titles and their current use amongst fellows. De-identified demographic data from the college register of active fellows was searched by self-identified title, country or state, and gender. Data were further reviewed by surgical sub-specialty and year of fellowship. The college dataset suggests that there is significant variance in the preference for gendered titles, determined predominantly by geography rather than specialty. The highest use of gendered titles (by male and female surgeons) was in Victoria/Tasmania (58% male, 22% female) and New Zealand (81% male, 17% female). By contrast, only 2% of female surgeons in other states elected a gendered title (Miss/Mrs/Ms). Surgery is the only profession that continues to use gendered titles. As the College of Surgeons moves towards greater equity and diversity, consideration should be given to phasing out the use of gendered titles, which serve to divide rather than unite our profession. © 2017 Royal Australasian College of Surgeons.

  13. 76 FR 70207 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Science.gov (United States)

    2011-11-10

    ... Change Regarding Professional Qualifications and Information Concerning Associated Persons November 3... proposed rule change consisting of amendments to Rule G-3, on professional qualifications, and Rule G-7, on.... Underwriting, trading or sales of municipal securities; 2. Financial advisory or consultant services for...

  14. 40 CFR 300.220 - Related Title III issues.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Related Title III issues. 300.220 Section 300.220 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND, EMERGENCY... PLAN Planning and Preparedness § 300.220 Related Title III issues. Other related Title III requirements...

  15. IT Security Support for the Spaceport Command Control System Development

    Science.gov (United States)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 437 ... Journal Home > Advanced Search > Browse Title Index ... prospects and realistic strategies to its implementation in Nigeria\\'s Institute of ... and Communication Technology (ICT) in information dissemination, Abstract.

  17. Browse Title Index

    African Journals Online (AJOL)

    1986), University Engineering Education and Training in Nigeria: Development, ... Vol 29, No 1 (2010), Use of Energy Method to Simulate the ... of Optimal Rational Composition of Titles Producible from Nigerian Clays ...

  18. Sinkhole Avoidance Routing in Wireless Sensor Networks

    Science.gov (United States)

    2011-05-09

    COVERED (From- To) 09-05-2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Sinkhole Avoidance Routing in Wireless Sensor Networks 5b . GRANT NUMBER . 5c...reliability of wireless sensor networks. 15. SUBJECT TERMS wireless sensor networks, sinkhole attack, routing protocol 16. SECURITY CLASSIFICATION...Include area code) Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std . Z39.18 1 Sinkhole Avoidance Routing in Wireless Sensor Networks MIDN 1/C

  19. Novel Therapeutic Target for the Treatment of Lupus

    Science.gov (United States)

    2014-09-01

    AWARD NUMBER: W81XWH-12-1-0205 TITLE: Novel Therapeutic Target for the Treatment of Lupus PRINCIPAL INVESTIGATOR: Lisa Laury-Kleintop...SUBTITLE 5a. CONTRACT NUMBER Novel Therapeutic Target for the Treatment of Lupus 5b. GRANT NUMBER W81XWH-12-1-0205 5c. PROGRAM ELEMENT NUMBER 6...Systemic lupus erythematosus, autoantibodies. 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 7 19a. NAME OF

  20. Roadmap Through Title XX. Financing Services for Children Through Title XX and Other Programs: Manual 5.

    Science.gov (United States)

    Copeland, William C.; Iversen, Iver A.

    This manual, part of a Hecht Institute four-manual series entitled Financing Children's Services Through Title XX and Related Programs, teaches what Title XX regulations are, what they mean, and what actions and procedures are commanded by them. The first section covers the necessity of rule systems, the characteristics of a good rule system and…

  1. Climate Change Impact on the Southeastern Europe Security Environment and the Increasing Role of the Bulgarian Army as the World Warms

    Science.gov (United States)

    2016-06-10

    CLIMATE CHANGE IMPACT ON THE SOUTHEASTERN EUROPE SECURITY ENVIRONMENT AND THE INCREASING ROLE OF THE BULGARIAN ARMY AS THE WORLD WARMS...DD-MM-YYYY) 10-06-2016 2. REPORT TYPE Master’s Thesis 3. DATES COVERED (From - To) AUG 2015 – JUN 2016 4. TITLE AND SUBTITLE Climate Change ...14. ABSTRACT Climate change impacts on the security environment are real and have the potential to create unprecedented levels of risk through

  2. Research Market Gap in Law Enforcement Technology: Lessons from Czech Security Research Funding Programmes

    Directory of Open Access Journals (Sweden)

    Luděk Moravec

    2014-12-01

    Full Text Available While security research funding schemes are nothing new to the EU (Horizon 2020 and FP7, or to several Member States, their priorities and procedures are usually decided administratively or shaped by advisory groups of varying membership. Only recently did the EU shift its focus to the role of end users in security research programmes, seeking their input in order to maximise the utility of funded solutions. Such a hint to limited usefulness of some industrial solutions is not exactly inconspicuous. This paper discusses the gap between the stated needs of law enforcement agencies in terms of R&D funding and the grant project applications in the area of law enforcement. It aims to define and describe the gap, and consequently the market opportunities, between the supply and demand sides represented by industry-driven grant project applications and end-user-formulated calls. The study is based on empirical data from two Czech security research funding programmes that have been running since 2010 and should deliver their results by 2015. It seeks to contribute some preliminary observations about the structure of both end user needs and industry capabilities in such a particular area as law enforcement technology.

  3. 77 FR 26063 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Science.gov (United States)

    2012-05-02

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66866; File No. SR-MSRB-2012-02] Self... 2009, the MSRB implemented an electronic system for free public access to primary market disclosure... Disclosure Service'').\\4\\ In July 2009, the MSRB implemented a permanent continuing disclosure service to...

  4. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 346 ... Journal Home > Advanced Search > Browse Title Index ... and hygiene promotion services in Rungwe district, Tanzania, Abstract .... as seen in NIgerian teaching hospital: pattern and a simple classification, Abstract.

  5. 33 CFR 401.1 - Short title.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Short title. 401.1 Section 401.1 Navigation and Navigable Waters SAINT LAWRENCE SEAWAY DEVELOPMENT CORPORATION, DEPARTMENT OF TRANSPORTATION SEAWAY REGULATIONS AND RULES Regulations § 401.1 Short title. These regulations may be cited as the...

  6. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 153 ... Issue, Title. Vol 9, No 2 (2006):, Effects of efficient water utilisation on water resources development in Swaziland under climate change, Abstract .... Ethical, Indigenous and Socio-Economic Perspectives, Abstract.

  7. Inscribing Authority: Female Title Bearers in Jewish Inscriptions

    Directory of Open Access Journals (Sweden)

    Carrie Duncan

    2012-02-01

    Full Text Available This paper investigates representations of gender in the material culture of the ancient synagogue. The pertinent data are numerous dedicatory and funerary inscriptions linking individual Jews, men and women, with titles seemingly associated with leadership in Late Antique synagogues (ca. 200–600 CE. Bernadette Brooten’s influential 1982 monograph argued against the prevailing tendency to characterize these titles as indications of power, authority, and responsibility when associated with men but as meaningless flattery when applied to women. She suggests that synagogue titles denote power, authority and responsibility on all title bearers equally, both men and women. I question the continued utility of proffering female title-holders as enumerable examples of powerful women rescued from their forgotten place in history. Using theoretical insights developed by historians Elizabeth Clark and Gabrielle Spiegel, this paper will engage a comparative analysis with the work of Riet van Bremen and Saba Mahmood to develop new methods of conceptualizing women’s authority in early Jewish communities. I propose that viewing women’s synagogue titles as culturally constructed representations allows for a fruitful inquiry into how women’s titles were used by male-dominated synagogue communities in their self-articulation and public presentation of Judaism.

  8. 31 CFR 505.01 - Short title.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Short title. 505.01 Section 505.01 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN... CERTAIN MERCHANDISE BETWEEN FOREIGN COUNTRIES § 505.01 Short title. The regulations in this part may be...

  9. 18 CFR 415.1 - Short title.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Short title. 415.1 Section 415.1 Conservation of Power and Water Resources DELAWARE RIVER BASIN COMMISSION ADMINISTRATIVE MANUAL BASIN REGULATIONS-FLOOD PLAIN REGULATIONS Generally § 415.1 Short title. This part shall be known...

  10. Student Achievement in Title I Schools

    Science.gov (United States)

    Diaz, Abby T.

    2017-01-01

    This researcher seeks to answer the following question: How did two elementary Title I schools, identified as "high performing" on the first Smarter Balanced assessment, address elements of Maslow's hierarchy of needs when developing school-wide initiatives to enhance student achievement? Many students in Title I schools face barriers to…

  11. SOR/83-77, Physical Security Regulations

    International Nuclear Information System (INIS)

    1983-01-01

    These Regulations establish and require the maintenance of security systems, equipment and procedures to implement Canada's international obligations regarding security at those nuclear facilities. The Regulations, which determine the different areas in a nuclear facility, provide for the establishment of security barriers around the ''protected areas'' occupied by facilities and prescribe that the licensees (operators) are required to keep the facilities for which they hold a licence under constant surveillance. They must also make arrangements for a response force - a local, provincial or federal police force detachment or similar force - to provide assistance where necessary. No person may enter a protected area without written authorization from the licensee concerned. Inspectors appointed under the Atomic Energy Control Regulations or designated under an agreement between Canada and the IAEA may be granted an authorization to enter such areas to discharge their duties. The Regulations have been amended by SOR/84-81 of 12 January 1988 to add certain requirements concerning documentary evidence and the duties of the board; by SOR/85-1016 of 25 October 1985 to revise the definition of response force and provide other clarifications; by SOR/91-585 of 10 October 1991 to clarify wording in French. (NEA)

  12. 2013 Annual Site Inspection and Monitoring Report for Uranium Mill Tailings Radiation Control Act Title I Disposal Sites

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2014-03-01

    This report, in fulfillment of a license requirement, presents the results of long-term surveillance and maintenance activities conducted by the U.S. Department of Energy (DOE) Office of Legacy Management (LM) in 2013 at 19 uranium mill tailings disposal sites established under Title I of the Uranium Mill Tailings Radiation Control Act (UMTRCA) of 1978.1 These activities verified that the UMTRCA Title I disposal sites remain in compliance with license requirements. DOE operates 18 UMTRCA Title I sites under a general license granted by the U.S. Nuclear Regulatory Commission (NRC) in accordance with Title 10 Code of Federal Regulations Part 40.27 (10 CFR 40.27). As required under the general license, a long-term surveillance plan (LTSP) for each site was prepared by DOE and accepted by NRC. The Grand Junction, Colorado, Disposal Site, one of the 19 Title I sites, will not be included under the general license until the open, operating portion of the cell is closed. The open portion will be closed either when it is filled or in 2023. This site is inspected in accordance with an interim LTSP. Long-term surveillance and maintenance services for these disposal sites include inspecting and maintaining the sites; monitoring environmental media and institutional controls; conducting any necessary corrective actions; and performing administrative, records, stakeholder relations, and other regulatory stewardship functions. Annual site inspections and monitoring are conducted in accordance with site-specific LTSPs and procedures established by DOE to comply with license requirements. Each site inspection is performed to verify the integrity of visible features at the site; to identify changes or new conditions that may affect the long-term performance of the site; and to determine the need, if any, for maintenance, follow-up or contingency inspections, or corrective action in accordance with the LTSP. LTSPs and site compliance reports are available on the Internet at http://www.lm.doe.gov/.

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 183 ... Journal Home > Advanced Search > Browse Title Index ... Vol 61 (2017), New interventions and sustainable solutions: .... Vol 35 (2011), Resurgence of tribal levies: Double taxation for the rural poor, Abstract PDF.

  14. Browse Title Index

    African Journals Online (AJOL)

    Items 901 - 950 of 1355 ... Journal of Applied Sciences and Environmental Management. ... Journal Home > Advanced Search > Browse Title Index .... Vol 22, No 2 (2018), Performance evaluation of a locally fabricated sawdust fired oven for ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 465 ... Journal Home > Advanced Search > Browse Title Index ... and twinning data of an igbo kindred during the Nigerian Civil War, Abstract ... on laboratory estimations with special reference to clinical chemistry, Abstract.

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 533 ... Southern African Linguistics and Applied Language Studies. ... Issue, Title ... Vol 34, No 1 (2016), Book Review: Qualitative-Quantitative Analyses of .... The complex consonants of simple CV-syllables in Zezuru, Abstract.

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 644 ... Journal Home > Advanced Search > Browse Title Index. Log in or ... Ethics review n international health research: quality assurance or bureaucratic nightmare? Details ... Audit of Management of Open Fractures, Details PDF.

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 165 ... Journal Home > Advanced Search > Browse Title Index ... Vol 43 (2011), Assessment of the Learning Commons takeoff at the University of ... the archive of South Africa's Truth and Reconciliation Commission, Abstract.

  19. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  20. 19 CFR 351.504 - Grants.

    Science.gov (United States)

    2010-04-01

    ... INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE ANTIDUMPING AND COUNTERVAILING DUTIES Identification and Measurement of Countervailable Subsidies § 351.504 Grants. (a) Benefit. In the case of a grant, a benefit exists in the amount of the grant. (b) Time of receipt of benefit. In the case of a grant, the...

  1. 76 FR 604 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Science.gov (United States)

    2011-01-05

    ... November 9, 2010 (``BDA Letter I''); letter from Hartfield Titus & Donnelly, LLC, dated November 9, 2010..., 2010 (``SIFMA Letter II''), letter from Bond Dealers of America, dated December 14, 2010 (``BDA Letter...\\ See BDA Letter I, Coastal Securities Letter, GFOA Letter, HTD Letter, Morgan Stanley Letter, RW Smith...

  2. 78 FR 18410 - Order Granting a Limited Exemption From Rule 102 of Regulation M Concerning the NASDAQ Stock...

    Science.gov (United States)

    2013-03-26

    ... expected to keep the price of the ETF shares tracking the net asset value of the ETF shares, which should make the shares less susceptible to price manipulation. \\42\\ Rule 102(e) allows the Commission to grant... requirement that the MQP Security is an ETF and the secondary market price for shares of the ETF must not vary...

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 414 ... Journal Home > Advanced Search > Browse Title Index. Log in or ... of an algebraic function for the permutation of truth table columns, Abstract ... appraisal and productivity levels in selected Nigerian universities, Abstract.

  4. 25 CFR 151.13 - Title examination.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Title examination. 151.13 Section 151.13 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAND AND WATER LAND ACQUISITIONS § 151.13 Title examination. If the Secretary determines that he will approve a request for the acquisition of land from...

  5. Can the use of the Leggett-Garg inequality enhance security of the BB84 protocol?

    Science.gov (United States)

    Shenoy H., Akshata; Aravinda, S.; Srikanth, R.; Home, Dipankar

    2017-08-01

    Prima facie, there are good reasons to answer in the negative the question posed in the title: the Bennett-Brassard 1984 (BB84) protocol is provably secure subject to the assumption of trusted devices, while the Leggett-Garg-type inequality (LGI) does not seem to be readily adaptable to the device independent (DI) or semi-DI scenario. Nevertheless, interestingly, here we identify a specific device attack, which has been shown to render the standard BB84 protocol completely insecure, but against which our formulated LGI-assisted BB84 protocol (based on an appropriate form of LGI) is secure.

  6. Title IX: With New Opportunities, Girls' Interest Rises

    Science.gov (United States)

    Toporek, Bryan

    2012-01-01

    On June 23, 1972, President Richard M. Nixon signed into law Title IX of the Education Amendments of 1972, which prohibits gender discrimination in any federally financed education program or activity. Title IX is far-reaching, but the law is most often associated with school and college athletics. Title IX allows schools to prove their athletic…

  7. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 879 ... South African Journal of Higher Education. ... Browse Title Index ... in a USA school setting: Merging transition theory with a narrative approach, Abstract ... Citation analysis of theses and dissertations submitted at the ...

  8. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 130 ... Journal Home > Advanced Search > Browse Title Index. Log in or ... using the technological pedagogical content knowledge(TPACK) framework, Abstract PDF ... Tamara N. Hrin, Dušica D. Milenković, Mirjana D. Segedinac.

  9. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 278 ... Journal Home > Advanced Search > Browse Title Index ... drie paradigmas beskou: 'n eenheid, of 'n veelheid van perspektiewe? ... Vol 45, No 1 (2011), Genre pedagogy in the mediation of socially-situated literacies ...

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 251 - 300 of 1260 ... Journal Home > Advanced Search > Browse Title Index ... Consumption of ammonia-nitrogen by aob in immobilized batch culture, Abstract PDF .... Vol 9, No 3S (2017): Special Issue, Design an automatic temperature ...

  11. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 147 ... Journal Home > Advanced Search > Browse Title Index .... Library (TEEAL) Database among faculty members in Federal University, ... Vol 5, No 2 (2014), Effects of corporate culture on the implementation of automation in ...

  12. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 531 ... Journal Home > Advanced Search > Browse Title Index ... thermal conductivity and viscosity in a flat plate solar collector, Abstract PDF .... similarity method in unsteady two-dimensional MHD boundary layer on the body ...

  13. U.S. Security Cooperation with India and Pakistan: A Comparative Study

    Science.gov (United States)

    2013-06-01

    news_and_features/. /07indicipline_force.htm. 284 Richard Van Atta et al ., “Export Controls and the U.S. Defense Industrial Base,” Institute for Defense...Kargil War,” Indian Defense and Strategic Analysis, November 17, 2012. Available at defenceforumindia.com › Opinion › History. Atta, Richard Van et al ...This document was downloaded on August 22, 2013 at 10:36:47 Author(s) Bajwa, Shahid Latif Title U.S. security cooperation with India and Pakistan

  14. Browse Title Index

    African Journals Online (AJOL)

    Items 601 - 650 of 879 ... South African Journal of Higher Education. ... Browse Title Index .... The challenge of thesis supervision in an art university, Abstract ... No 2 (2004), Robert Sternberg's mental self-government theory and its contribution to ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 736 ... Journal Home > Advanced Search > Browse Title Index ... Vol 5 (2008), A Contagious Malady: The Human Quest for Truth through Religion, Abstract ... A Study of Politeness Strategies Used by the National University of ...

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 879 ... Journal Home > Advanced Search > Browse Title Index ... Vol 20, No 4 (2006), Assessing academic potential for university admission: ... Vol 16, No 2 (2002), Book Review: Rethinking truth by Higgs, P & Smith, J, Details.

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 651 - 700 of 1199 ... Issue, Title ... Vol 5, No 1 (2011), Motivation, an Essential Ingredient for Optimal Performance in Emerging Markets, Abstract PDF ... Vol 3, No 5 (2009), Multinational transfer pricing and international taxation: what, why, ...

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 451 - 500 of 533 ... Journal Home > Advanced Search > Browse Title Index .... for past tense forms in Northern Sotho: verb stems with final 'm' and 'n', Abstract ... in an academic writing class: Implications for a dialogic pedagogy, Abstract.

  19. Browse Title Index

    African Journals Online (AJOL)

    Items 701 - 750 of 808 ... Issue, Title ... Vol 58, No 2 (2010), Short Communicaton: The socio-economic impact of helminth infections and the ... Vol 62 (2014): Special Edition, Special edition summarizing the scientific discourse which took place ...

  20. 77 FR 17557 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Science.gov (United States)

    2012-03-26

    ... based on a transaction in a security for which each bond costs less than $1,000.\\9\\ \\9\\ For example, if... the Real-Time Transaction Reporting System March 20, 2012. I. Introduction On January 20, 2012, the... Transaction Reporting System. The proposed rule change was published for comment in the Federal Register on...

  1. 75 FR 23314 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Granting Approval of...

    Science.gov (United States)

    2010-05-03

    ... Rule 502(h), only Exchange-Traded Fund Shares, or ETFs, that are traded on a national securities... that holds a specified non-U.S. currency or currencies deposited with the trust when aggregated in some... non-U.S. currency or currencies and pays the beneficial owner interest and other distributions on the...

  2. Browse Title Index

    African Journals Online (AJOL)

    Items 301 - 350 of 788 ... Journal Home > Advanced Search > Browse Title Index ... Vol 26, No 1 (2018), Gender differentials in the perception of .... Vol 25, No 1 (2017), Impact of total quality management on students' academic performance in ...

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 194 ... Journal Home > Advanced Search > Browse Title Index ... Vol 14, No 1 (2000), A functional categoriality of adjectives in ... Vol 1, No 1 (1987), Alienation and affirmation: The humanistic vision of Bessie Head, Abstract PDF.

  4. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 1117 ... Journal Home > Advanced Search > Browse Title Index ... Vol 13, No 3 (2007):, an edu-ethical perspecitve on the nature of truth: case studies in elite ... 2009: September: Supplement, An empirical study of university ...

  5. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 294 ... Journal Home > Advanced Search > Browse Title Index. Log in or .... S Edwards, M Hlongwane, J Thwala, N Robinson ... Vol 16, No 1 (2017), Infancy of internet cafe: The substitute of ubuntu-padare pedagogy, Abstract.

  6. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 98 ... Journal Home > Advanced Search > Browse Title Index ... model for the continued professionalisation of student affairs in Africa, Abstract PDF ... Vol 2, No 2 (2014), Book Review: How College Affects Students, A Third decade ...

  7. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 76 ... Journal Home > Advanced Search > Browse Title Index ... Vol 4, No 1 (2011), Automation of AutoCAD for Detailing of Reinforced .... Vol 10, No 1 (2017), Housing data base for sustainable housing provision, Abstract PDF.

  8. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 103 ... Issue, Title ... SE Edusah, E Osei-Tutu ... Vol 6, No 2 (2016), Interrelationships among unemployment, inflation and economic growth in Nigeria, Abstract .... Vol 4, No 3 (2014): Special Edition, Socio-cultural Issues for ...

  9. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 41 of 41 ... Issue, Title ... Vol 1, No 3 (2004): Special Edition, Assessment of the quality and reserves of Bat ... Vol 1, No 1 (1997), Bovine dermatophilosis in Zambia: epidemiology, socio-economic impacts and future perspectives, Abstract.

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 351 - 391 of 391 ... Issue, Title ... Vol 2, No 3 (1999): Special Edition, The efficacy of low volume application of roundup ... Vol 1, No 1 (1998), The relationships among National Socio-Economic Indicators and Child Health Statistics, Abstract.

  11. China’s Expanding African Relations: Implications for U.S National Security

    Science.gov (United States)

    2015-01-01

    30 Derived from IMF , undated: South Africa, 20.6 percent; Nigeria , 12.5 percent; Egypt, 11 percent; Algeria, 7.4 percent; Ghana, 6.4 percent; and...oil sectors . Sino-African Capital Flows China has become a major source of financial capital for African econ- omies. Estimates of the volume of these...resulted in this report, as well as a companion report by Stephen Watts titled Identifying and Mitigating Risks in Security Sector Assistance for

  12. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    Science.gov (United States)

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 167 of 167 ... Issue, Title ... Vol 2, No 2 (2013), Women and the Leadership Paradigm: Bridging the Workplace Gender-Gap in Nigeria, Abstract PDF ... Vol 5, No 2 (2016), Women's participation and gender issues in local governance ...

  14. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 73 of 73 ... Journal Home > Advanced Search > Browse Title Index ... Vol 13 (2006), The ageing eye” functional changes from cradle to gray: A ... Vol 12 (2005), The evaluation of vision in children using monocular vision acuity and ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 391 ... Journal Home > Advanced Search > Browse Title Index ... Efficacy of four Rodenticides on the Ghanaian Market, Abstract ... Vol 2, No 1 (2000):, Determination of some wear elements in used car engine oil and oil filter ...

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 251 - 300 of 652 ... Journal Home > Advanced Search > Browse Title Index ... Vol 18, No 7 (2015), Introduction to virtual property: Lex virtualis ipsa ... Vol 17, No 1 (2014), Legal challenges relating to the commercial use of outer space, with ...

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 551 - 600 of 879 ... Journal Home > Advanced Search > Browse Title Index ... A James, E Ralfe, L van Laren, N Ngcobo ... 1 (2011), Recognition of prior learning in promoting lifelong learning: A pedagogy of hope or a shattering of dreams?

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 97 of 97 ... Journal Home > Advanced Search > Browse Title Index ... Vol 20, No 2 (2008), Research Note: Anthropometric data of the foot of ... Vol 26, No 1 (2014), Validation of the Automation Attitude Questionnaire for Airline Pilots ...

  19. Titles of Midas

    Directory of Open Access Journals (Sweden)

    G. L. Huxley

    2001-09-01

    Full Text Available The Phrygian inscription on the tomb at Yazılıkaya (8th century gives Midas the titles wanax and lawagtas, paralled in Mycenaean, and there were strong connections between his dynasty and Greek Aeolis.

  20. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 412 ... Issue, Title. Vol 30, No 3 (2011) ... Transferring the principle of double effect from war to business, Abstract. G. J. Rossouw ... Vol 22, No 2 (2003), Can more business ethics teaching halt corruption in companies? Abstract.

  1. 42 CFR 51b.605 - How will grant applications be evaluated and the grants awarded?

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES GRANTS PROJECT GRANTS FOR PREVENTIVE HEALTH SERVICES Grants for Research, Demonstrations... has potential to directly benefit the national venereal disease control effort? (2) Are the project...

  2. ACM CCS 2013-2015 Student Travel Support

    Science.gov (United States)

    2016-10-29

    ACM CCS 2013-2015 Student Travel Support Under the ARO funded effort titled “ACM CCS 2013-2015 Student Travel Support,” from 2013 to 2015, George...Computer and Communications Security (ACM CCS ). The views, opinions and/or findings contained in this report are those of the author(s) and should not...AGENCY NAME(S) AND ADDRESS (ES) U.S. Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-2211 travel grant, acm ccs REPORT

  3. Wetland Program Development Grants (WPDGs)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Wetland Grant Database (WGD) houses grant data for Wetland Program Development Grants (created by EPA in 1990 under the Clean Water Act Section 104(b)(3)...

  4. Social Media - DoD’s Greatest Information Sharing Tool or Weakest Security Link?

    Science.gov (United States)

    2010-04-15

    or position of the Department of the Army, Department of Defense, or the U.S. Government. SOCIAL MEDIA – DOD’S GREATEST INFORMATION SHARING TOOL...appropriateness and effectiveness of these policies in securing the information network. 15. SUBJECT TERMS Social media , information...TYPE Civilian Research Paper 3. DATES COVERED (From - To) August 2009-April 2010 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Social Media

  5. Relationships between nutrition-related knowledge, self-efficacy, and behavior for fifth grade students attending Title I and non-Title I schools.

    Science.gov (United States)

    Hall, Elisha; Chai, Weiwen; Albrecht, Julie A

    2016-01-01

    The Social Cognitive Theory (SCT) is a widely used theory for nutrition education programming. Better understanding the relationships between knowledge, self-efficacy, and behavior among children of various income levels can help to form and improve nutrition programs, particularly for socioeconomically disadvantaged youth. The purpose of this study was to determine the relationships between knowledge, self-efficacy, and behavior among fifth grade students attending Title I (≥40% of students receiving free or reduced school meals) and non-Title I schools (students receiving free or reduced school meals). A validated survey was completed by 55 fifth grade students from Title I and 122 from non-Title I schools. Differences in knowledge, self-efficacy, and behavior scores between groups were assessed using t test and adjusted for variations between participating schools. Regression analysis was used to determine the relationships between knowledge, self-efficacy, and behavior. In adjusted models, the Title I group had significantly lower scores on several knowledge items and summary knowledge (P = 0.04). The Title I group had significantly lower scores on several behavior variables including intakes of fruits (P = 0.02), vegetables (P = 0.0005), whole grains (P = 0.0003), and lean protein (P = 0.047), physical activity (P = 0.002) and summary behavior (P = 0.001). However the Title I group scored higher on self-efficacy for meal planning (P = 0.04) and choosing healthy snacks (P = 0.036). Both self-efficacy (β = 0.70, P knowledge (β = 0.35, P = 0.002) strongly predicted behavior; however, only self-efficacy remained significant in the Title I group (self-efficacy, β = 0.82, P = 0.0003; knowledge, β = 0.11, P = 0.59). Results demonstrate disparities in nutrition knowledge and behavior outcomes between students surveyed from Title I and non-Title I schools, suggesting more resources may be necessary for lower income populations

  6. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 1732 ... Journal Home > Advanced Search > Browse Title Index ... Vol 10, No 3 (2007), An Audit Of Perioperative Cardiac Arrest At ... Vol 11, No 4 (2008), An Audit Of Rejected Repeated X-ray Films As A Quality Assurance ...

  7. Land Titles and Rice Production in Vietnam

    DEFF Research Database (Denmark)

    Van Den Broeck, Katleen; Newman, Carol; Tarp, Finn

    analysis of plot level rice yields that land titles are indeed important. Only exclusively held titles have the expected positive effects, and the positive effect on yields is found in male headed households. Furthermore, a household level rice yield function reveals that exclusive user rights...

  8. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 221 ... Issue, Title ... Vol 38 (2010), Soft drink consumption of Grade 4 and Grade 7 learners in the Wynberg area, City of Cape Town, South .... Vol 42 (2014), The meaning of food for obese men: a qualitative study, Abstract PDF.

  9. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 1020 ... Issue, Title ... Vol 48, No 2 (2006), Barriers to HIV Care and Treatment by Doctors: A review of the literature. ... Vol 48, No 5 (2006), Breast cancer – early detection and screening in South African women from the ...

  10. Best Practices for the Security of Radioactive Materials

    Energy Technology Data Exchange (ETDEWEB)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices

  11. Best Practices for the Security of Radioactive Materials

    International Nuclear Information System (INIS)

    Coulter, D.T.; Musolino, S.

    2009-01-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass

  12. Superfund Technical Assistance Grants

    Data.gov (United States)

    U.S. Environmental Protection Agency — This asset includes data related to the Superfund Technical Assistance Grant program, including grant number, award amounts, award dates, period of performance,...

  13. Report: EPA Should Improve Management Practices and Security Controls for Its Network Directory Service System and Related Servers

    Science.gov (United States)

    Report #12-P-0836, September 20, 2012. EPA's OEI is not managing key system management documentation, system administration functions, the granting and monitoring of privileged accounts, and the application of security controls associated with its DSS.

  14. Exploring New Directions: Title I in the Year 2000.

    Science.gov (United States)

    Puma, Michael J.; Drury, Darrel W.

    This report takes stock of the present Title I program, identifies the most promising approaches to educating the nation's disadvantaged children, and offers guidance to policymakers seeking to improve Title I's effectiveness. The report draws upon hundreds of studies, evaluations, and other documents, and details the evolution of the Title I…

  15. 24 CFR 232.595 - Eligibility of title.

    Science.gov (United States)

    2010-04-01

    ... URBAN DEVELOPMENT MORTGAGE AND LOAN INSURANCE PROGRAMS UNDER NATIONAL HOUSING ACT AND OTHER AUTHORITIES MORTGAGE INSURANCE FOR NURSING HOMES, INTERMEDIATE CARE FACILITIES, BOARD AND CARE HOMES, AND ASSISTED... Fire Safety Equipment Title § 232.595 Eligibility of title. In order for the property which is to be...

  16. Citation Oil and Gas Corporation... Title V Applicability Determination

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Policy and Guidance Database available at www2.epa.gov/title-v-operating-permits/title-v-operating-permit-policy-and-guidance-document-index. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 577 ... Issue, Title. Vol 20, No 2 (2003), Emergency Contraception: A Global Overview of Knowledge, Attitudes and Practices Among Providers, Abstract PDF. Deborah Haggai. Vol 23 (2006):, Emergency laparotomy for peripartum haemorrhage in Bida North Central Nigeria, Abstract PDF. Sunny Abiodun O ...

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 155 ... Issue, Title. Vol 12 (2012), Political Dissent and Autonomy in Wum Local Government, Southern (West) Cameroons, 1957 – 1968, Abstract. TP Mbeum. Vol 9 (2009), Post-Emancipation Slave Commerce: Increasing Child Slave Trafficking and Women's Agency in Late Nineteenth-century Ghana ...

  19. 24 CFR 203.386 - Coverage of title evidence.

    Science.gov (United States)

    2010-04-01

    ... SINGLE FAMILY MORTGAGE INSURANCE Contract Rights and Obligations Property Title Transfers and Title... the public records, there are not, at such date, any outstanding prior liens, including any past-due...

  20. 24 CFR 234.65 - Nature of title.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Nature of title. 234.65 Section 234.65 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... OWNERSHIP MORTGAGE INSURANCE Eligibility Requirements-Individually Owned Units § 234.65 Nature of title. A...

  1. Valuation of Urban Commercial Properties in Nigeria for Secured Lending: Issues and Developments

    Directory of Open Access Journals (Sweden)

    Namnso Bassey Udoekanem

    2018-01-01

    Full Text Available Valuation for secured lending is required when an interest in real property is used as security for a loan. The outcome of such valuation will help the lending institution to achieve commercial prudence in lending as well as avoid taking undue risk. This paper examines the issues and developments in the valuation of urban commercial properties in Nigeria for secured lending purposes. It argues that due to the volatile nature of the Nigerian economy, coupled with the linkage between the economy and commercial property markets, the maximum amount of loan to be granted by lenders in the country using interest in commercial property as collateral should be based on the Mortgage Lending Value (MLV and not the Market Value (MV of the property, although the market value should also be reported in the valuation. A case study is used to demonstrate the valuation. It further contends that since the inputs for determining the MLV of a commercial property must be derived from long-term trends in the property and financial markets, it is more stable than MV when used to determine the maximum amount of mortgage loan to be granted by a lender. It concludes that the stability of the MLV makes it more reliable than the MV in achieving commercial prudence in mortgage lending as it fits into the long-term nature of mortgage loan repayment.

  2. Surveys of current status in biomedical science grant review: funding organisations' and grant reviewers' perspectives

    DEFF Research Database (Denmark)

    Schroter, Sara; Groves, Trish; Højgaard, Liselotte

    2010-01-01

    The objectives of this research were (a) to describe the current status of grant review for biomedical projects and programmes from the perspectives of international funding organisations and grant reviewers, and (b) to explore funders' interest in developing uniform requirements for grant review...

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 98 of 98 ... Issue, Title. Vol 4, No 1 (2016), First-year seminar intervention: Enhancing firstyear mathematics performance at the University of Johannesburg, Abstract PDF. Melanie Jacobs, Estherna Pretorius. Vol 5, No 2 (2017), From Inky Pinky Ponky to Improving Student Understanding in Assessment: Exploring the ...

  4. Browse Title Index

    African Journals Online (AJOL)

    Items 551 - 600 of 1463 ... Issue, Title. Vol 15, No 2 (2015), Evaluation of the diagnostic performance and operational characteristics of four rapid immunochromatographic syphilis tests in Burkina Faso, Abstract PDF. FY Bocoum, H Ouedraogo, G Tarnagda, A Kiba, S Tiendrebeogo, F Bationo, B Liestman, S Diagbouga, ...

  5. Browse Title Index

    African Journals Online (AJOL)

    Items 9951 - 10000 of 11090 ... Issue, Title. Vol 10, No 36 (2011), Study of heavy metals bioaccumulation in the process of vermicomposting, Abstract PDF. MM Aleagha, G Ebadi. Vol 10, No 45 (2011), Study of malondialdehyde (MDA) content, superoxide dismutase (SOD) and glutathione peroxidase (GSH-Px) activities in ...

  6. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 985 ... Journal Home > Advanced Search > Browse Title Index ... Vol 17 (2010), Alternating Direction Implicit Finite Difference Time Domain Acoustic Wave Algorithm, Abstract. E Ikata .... Vol 17 (2010), Analytic derivation of the wave profile and phase speed of sixth order Stokes waves in deep water, Abstract.

  7. Browse Title Index

    African Journals Online (AJOL)

    Items 451 - 500 of 581 ... Issue, Title. Vol 30, No 1 (2016), Risky sexual behaviour and associated factors among students of Debre Tabor University, Northwest Ethiopia: a cross-sectional study, Abstract PDF. Awoke Derbie, Mekonnen Assefa, Daniel Mekonnen, Fantahun Biadglegne. Vol 28, No 1 (2014), Road traffic accident: ...

  8. 14 CFR 1245.109 - Assignment of title to NASA.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Assignment of title to NASA. 1245.109... INTELLECTUAL PROPERTY RIGHTS Patent Waiver Regulations § 1245.109 Assignment of title to NASA. (a) The instrument of waiver set forth in § 1245.115(c) shall be voided by NASA with respect to the domestic title to...

  9. EphB1 as a Novel Drug Target to Combat Pain and Addiction

    Science.gov (United States)

    2016-09-01

    Award Number: W81XWH-14-1-0220 Project Title: EphB1 as a Novel Drug Target to Combat Pain and Addiction Principal Investigator Name: Mark...Pain and Addiction 5a. CONTRACT NUMBER EphB1 as a Novel Drug Target to Combat Pain and Addiction 5b. GRANT NUMBER W81XWH-14-1-0220 5c. PROGRAM...SUBJECT TERMS Chronic neuropathic pain, opioid addiction , synaptic plasticity, EphB1 receptor, ephrin-B2, NMDA receptor, drug discovery 16. SECURITY

  10. Grants: View from the Campus.

    Science.gov (United States)

    Mohrman, Kathryn, Ed.

    Each of 13 authors, all experienced in obtaining grants, examines a separate element of the grantsgetting process. The essays include: The Characteristics of an Effective Grants Officer (Julia B. Leverenz); The Grants Office (Morton Cooper); Working with the Academic Dean (Robert C. Nordvall); Working with the Development Office (Barbara A.…

  11. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 108 of 108 ... Issue, Title. Vol 8, No 2 (2016), The status and challenges of clinical informatics development in South Africa, Abstract PDF. Abayomi Kehinde Owolabi, Thokozani Patrick Mhlongo, Neil Evans. Vol 4, No 1 (2012), The stuttering implementation of language policies in the South African education system ...

  12. Browse Title Index

    African Journals Online (AJOL)

    Items 751 - 800 of 846 ... Journal Home > Advanced Search > Browse Title Index ... Vol 9, No 3S (2017): Special Issue, The effect of torrefaction on oil palm ... core competency skills of IRBM tax auditors towards their performance, Abstract PDF ... of exchange rates behavior in Malaysia by using NATREX model, Abstract PDF.

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 76 of 76 ... Issue, Title. Vol 6, No 1 (2013), Integrating Sustainability into the Real Estate Valuation Process: A Nigerian Perspective, Abstract PDF. G K Babawale, B A Oyalowo. Vol 5, No 1 (2012), Internalising internationa valuation standards: Relevance and applicability issues in the Nigerian context, Abstract PDF.

  14. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 201 ... Issue, Title. Vol 12, No 1 (2006), Conservative management of cervical ectopic pregnancy: case report, Abstract PDF. TD Naidoo, MR Ramogale, J Moodley. Vol 18, No 2 (2012), Contraceptive use and associated factors among South African youth (18 - 24 years): A population-based survey, Abstract ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 76 ... Issue, Title. Vol 16, No 2 (2006), A profile of the theatre procedures in paediatrict ophthalmic practice, Abstract. E O Onwasigwe. Vol 15, No 2 (2005), Abdominal cocoon, Abstract. Abdulrasheed K Adesunkanmi, Tajudeen A Badmus, Olukayode Ogundoyin, Akinwumi B Ogunrombi. Vol 18, No 1 (2008) ...

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 93 ... Issue, Title. Vol 5 (2013), A cost-effective Geographic Information Systems for Transportation (GIS-T) application for traffic congestion analyses in the Developing World, Abstract PDF. E Agyemang. Vol 3 (2011), A Historical and Gendered Perspective on HIV / AIDS in Botswana, Abstract PDF. J Hesselberg ...

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 301 - 350 of 577 ... Issue, Title. Vol 32, No 2 (2015), Late arrival in hospital during labour: any correlation with materno-foetal outcome? The state specialist hospital, Asubiaro, Osogbo Experience. Abstract PDF. OO Awolola. Vol 30, No 2 (2013), Late Reproductive Effects of Cancer Treatment in Young People, Abstract ...

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 251 ... Issue, Title. Vol 55 (2014), 20 Years of democracy: Transforming the public service, Abstract. A Ruiters. Vol 63 (2016), Zemk' iinkomo magwala ndini! Wake up! The cows are being stolen! Abstract. Sipho Pityana. Vol 56 (2014), A layperson's guide to Nene's budget statement, Abstract. B Turok.

  19. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 1007 ... Issue, Title. Vol 11, No 1 (1997), (+)-Floribundone 3 from the pods of Senna septemtrionalis, Details PDF. Gizachew Alemayehu, Bekuretsion Woldeyesus, Berhanu M Abegaz. Vol 14, No 1 (2000), 11α-Hydroxy muzigadiolide, a novel drimane sesquiterpene from the stem bark of warburgia ugandensis ...

  20. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 170 of 170 ... Issue, Title. Vol 20, No 2 (2004), The Impact of Mine Closures on Rural Population Dynamics: The Case of Zhombe in Kwekwe District, Midlands Province, Zimbabwe, Abstract. Crescentia Madebwe. Vol 29, No 1 (2013), The Influence of Organisational Culture and Job Satisfaction on Intentions to ...

  1. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 633 ... Issue, Title. Vol 19, No 1 (2009), Delays in Tuberculosis Treatment and Associated Factors in Jimma Zone, Southwest Ethiopia, Abstract PDF. Ayalew Tegegn, Meseret Yazachew. Vol 26, No 1 (2016), Delivery Site Preferences and Associated Factors among Married Women of Child Bearing Age in ...

  2. Browse Title Index

    African Journals Online (AJOL)

    Items 251 - 300 of 367 ... Issue, Title. Vol 43 (2014), Some interlingual communicative challenges for foreign African interpreters in South African courtrooms, Abstract PDF. SE Usadolo, E Kotze. Vol 29 (1996), South Africa's new language policy in the context of the organisation for African unity's language plan of action for ...

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 110 ... Issue, Title. Vol 10, No 1 (2003), Incidence and Determinants of Child Labour in Nigeria: Implications for Poverty Alleviation, Abstract. Benjamin Chiedozie Okpukpara, Ngozi Odurukwu. Vol 20, No 1 (2013), Inflation and capacity utilisation in Nigeria's manufacturing sector, Abstract. OA Ishola. Vol 19, No ...

  4. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 8, No 2 (2016): Supplement, Using operative models (ICF and CBR) within an interprofessional context to address community needs, Abstract PDF. A Rhoda, F Waggie, G.C. Filies, J.M. Frantz. Vol 2, No 1 (2010), Using portfolios to assess professional competence and development in medical laboratory ...

  5. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 43, No 2 (2006), Review: "'n Wonderlike geweld. Jeugherinneringe", By Elsa Joubert (2005), Abstract PDF. Henriette Roos. Vol 53, No 1 (2016), Review: Breyten Breytenbach, A Monologue in Two Voices, Abstract PDF. Andy Carolin. Vol 53, No 1 (2016), Review: The Shadow of the Hummingbird, Abstract ...

  6. Safeguards and security research and development: Progress report, October 1994--September 1995

    Energy Technology Data Exchange (ETDEWEB)

    Rutherford, D.R.; Henriksen, P.W. [comp.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years.

  7. Safeguards and security research and development: Progress report, October 1994--September 1995

    International Nuclear Information System (INIS)

    Rutherford, D.R.; Henriksen, P.W.

    1997-03-01

    The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IV is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years

  8. SRA Grant Writing Tutorial

    Science.gov (United States)

    This tutorial will help give your organization a broad but succinct analysis of what the SRA grant program is about. This self-paced tutorial is organized under two segments: Overview of Grant Program and Program Details.

  9. What is the title of a Web page? A study of Webography practice

    Directory of Open Access Journals (Sweden)

    Timothy C. Craven

    2002-01-01

    Full Text Available Few style guides recommend a specific source for citing the title of a Web page that is not a duplicate of a printed format. Sixteen Web bibliographies were analyzed for uses of two different recommended sources: (1 the tagged title; (2 the title as it would appear to be from viewing the beginning of the page in the browser (apparent title. In all sixteen, the proportion of tagged titles was much less than that of apparent titles, and only rarely did the bibliography title match the tagged title and not the apparent title. Convenience of copying may partly explain the preference for the apparent title. Contrary to expectation, correlation between proportion of valid links in a bibliography and proportion of accurately reproduced apparent titles was slightly negative.

  10. Security encryption for video-on-radio devices

    Science.gov (United States)

    Perrone, Antonio L.; Basti, Gianfranco

    2002-03-01

    In this paper we present an encryption module included in the Subsidiary Communication Channel (SCC) System we are developing for video-on-FM radio broadcasting. This module is aimed to encrypt by symmetric key the video image archive and real-time database of the broadcaster, and by asymmetric key the video broadcasting to final users. The module includes our proprietary Techniteia Encryption Library (TEL), that is already successfully running and securing several e-commerce portals in Europe. TEL is written in C-ANSI language for its easy exportation onto all main platforms and it is optimized for real-time applications. It is based on the blowfish encryption algorithm and it is characterized by a physically separated sub-module for the automatic generation/recovering of the variable sub-keys of the blowfish algorithm. In this way, different parts of the database are encrypted by different keys, both in space and in time, for granting an optimal security.

  11. Ulysses S. Grant and Reconstruction.

    Science.gov (United States)

    Wilson, David L.

    1989-01-01

    Discusses the role played by Ulysses S. Grant during the four years of Reconstruction before he became President of the United States. Describes the dynamics of the relationship between Grant and Andrew Johnson. Points out that Grant's attitude of service to the laws created by Congress submerged his desire to create a new South. (KO)

  12. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 20 of 20 ... Issue, Title. Vol 9, No 2 (2000), Age dependent changes in the hypothalamic amino acid neurotransmitters in response to nicotine, Abstract. NM Radwan, NA Ahmed, YAM Aly. Vol 9, No 2 (2000), Autoantibodies, ocular and auditory changes in patients with vitiligo, Abstract. AE Fathia, EA Nagwa, ...

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 183 of 183 ... Issue, Title. Vol 9, No 1 (2004), Socio-economic constraints affecting youths involvement in national economic development, Abstract. Josephine U Nwagwu. Vol 12, No 2 (2007), Stabilizing Potential Of Cement-Fly Ash Mixture On Expansive Clay Soil, Abstract. OO Amu, AB Fajobi, SO Afekhuai. Vol 11 ...

  14. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 670 ... Issue, Title. Vol 9, No 2 (2012), Business Planning and the Economic Growth of Small and Medium Scale Enterprises in Nigeria, Abstract. Egbe Aneozeng A, Ejoh Ndifon Ojong, Obo Ekpenyong Bassey. Vol 11, No 2 (2014), Calabar Humaphors: An Analysis of Selected Jokes in Nigerian Stand Up ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 25, No 2 (2005), Yam-based farm practices and nematode problems in stored yams (Dioscorea spp.) in Ghana, Abstract PDF. CK Kwoseh, RA Plowright, J Bridge, R Asiedu. Vol 27, No 2 (2007), Yield, irrigation production efficiency and economic returns of broccoli under variable drip irrigation and lateral ...

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 11090 ... Issue, Title. Vol 12, No 49 (2013), In vitro regeneration of selected Kenyan papaya (Carica papaya L.) lines through shoot tip culture, Abstract PDF. Naomi Nzilani Mumo, Fredah Karambu Rimberia, George Edward Mamati, Agnes Wanjiru Kihurani. Vol 7, No 12 (2008), In vitro regeneration of Turkish ...

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 232 ... Issue, Title. Vol 5 (2003), Pre-School Education for a Democratic Society: Identifying Views of Stakeholders in Tanzania, Abstract. Willy LM Komba, Satoki T Mahenge, Gadi Koda. Vol 13, No 2 (2012), Process of Assuring Quality in Counselling at the National Open University of Nigeria: A Critique ...

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 501 - 550 of 670 ... Issue, Title. Vol 11, No 4 (2014), Strategies for Fostering Creativity Among Business Education Graduates in Nigeria, Abstract. BO Nwosu, KE Ojo. Vol 13, No 1 (2015) ... Vol 10, No 1 (2013), The Challenges Facing Accounting Education: The Nigerian Experience, Abstract. OR Okolie. Vol 5 (2008), The ...

  19. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 183 ... Issue, Title. Vol 62 (2017), #SchoolsOnFire: Criminal justice responses to protests that impede the right to basic education, Abstract PDF. Ann Skelton, Martin Nsibirwa. Vol 45 (2013), 'Pale Face'/'Pointy Face: SA Criminology in Denial, Abstract PDF. S Henkeman. Vol 59 (2017), Aluta continua: Police ...

  20. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 38, No 1 (2004), Book Review: Unexpected Voices – Theory, Practice and Identity in the Writing Classroom. Abstract. Charly Dyers. Vol 38, No 1 (2004), Book Review: Shelley Angelil-Carter: Stolen Language? Plagiarism in Writing. Abstract. Elizabeth de Kadt. Vol 37, No 1 (2003), Book Review: The Green ...

  1. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 23, No 2 (2011), Dynamique foliaire et croissance du maïs: Application du modèle «STICS» en conditions tropicales en RD-Congo, Abstract PDF. MM Lufuluabo, RV Kizungu, KK Nkongolo. Vol 18, No 1 (2006), Dynamique spatio-temporelle des populations d\\'Altises Podagrica spp. (Coleoptera ...

  2. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 661 ... Journal Home > Advanced Search > Browse Title Index. Log in or Register to get access to full text downloads. .... A El-Mahdy, B Bolduc, J Upadhyay, R Shoukr, A Khoury. Vol 19, No 1 (2013), Factors affecting lower calyceal stone clearance after Extracorporeal shock wave lithotripsy, Abstract PDF.

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 367 ... Issue, Title. Vol 42 (2013), Nursing the Cure: A Phonetic Analysis of /ʊə/ in South African English, Abstract PDF. I Bekker. Vol 1 (1980), Nuwe ontwikkelings binne chomsky se teorle van kerngrammatika, Abstract PDF. J Maartens. Vol 42 (2013), Obligatory Reflexivity in a Minimalist Grammar of ...

  4. Browse Title Index

    African Journals Online (AJOL)

    Items 651 - 700 of 1007 ... Issue, Title. Vol 4, No 1 (1990), Kinetics of oxidation of β-diimihe macrocyclic complexes and accessibility of six-coordinate copper(III) complexes generated by electrochemical oxidation of copper(II) complexes, Abstract PDF. Mohamed A. Khalifa. Vol 14, No 2 (2000), Kinetics of periodate oxidation of ...

  5. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 22, No 2 (2008), Voltammetric determination of heparin based on its interaction with malachite green, Abstract PDF. Xueliang Niu, Weili Zhang, Na Zhao, Wei Sun. Vol 22, No 2 (2008), Voltammetric determination of l-cysteic acid on a 1-[4-(ferrocenyl-ethynyl)phenyl]-1-ethanone modified carbon paste ...

  6. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 265 ... Issue, Title. Vol 35, No 2 (2008), Choice of place for childbirth: prevalence and correlates of utilization of health facilities in Chongwe district, Zambia, Abstract PDF. AN Hazemba, S Siziya. Vol 43, No 1 (2016), Clinical and Radiological Features of Multiple Myeloma Patients at the University Teaching ...

  7. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 88, No 8 (1998), New birth and death registration forms - a foundation for the future, a challenge for health workers? Abstract PDF. Debbie Bradshaw, Danuta Kielkowski, Freddy Sitas. Vol 83, No 3 (1993), New estimates of infant and child mortality for blacks in South Africa, 1968-1979, Abstract PDF.

  8. Browse Title Index

    African Journals Online (AJOL)

    Items 851 - 900 of 1006 ... Issue, Title. Vol 54, No 2 (2012), The effect of the introduction of a standard monitoring protocol on the investigations performed on the metabolic control of type 2 diabetes at Addington Hospital Medical Outpatients Department, Durban, South Africa, Abstract PDF. JM Gill, A Ross, F Pirie, ...

  9. Nuclear Power, Energy Economics and Energy Security

    International Nuclear Information System (INIS)

    2013-01-01

    Economic development requires reliable, affordable electricity that is provided in sufficient quantities to satisfy the minimum energy requirements at a local, regional or national level. As simple as this recipe for economic development appears, technological, infrastructural, financial and developmental considerations must be analysed and balanced to produce a national energy strategy. Complicating that task is the historic fact that energy at the desired price and in the desired quantities can be neither taken for granted nor guaranteed. Energy economics and energy security determine the options available to nations working to establish a sustainable energy strategy for the future.

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 249 ... Appraisal of the Addis Ababa Peace and Security Cooperation Framework and the United Nations Security Council Resolution 2098 for .... intervention: Evaluation of the African Union's right of intervention, Abstract PDF.

  11. Coordinated Collection Development via CD-ROM. A Pilot Project Granted by LSCA Title III Funds to Crosby Library, Gonzaga University. Final Narrative Report.

    Science.gov (United States)

    Peterson, Elaine; Carr, Mary M.

    Three colleges in the state of Washington--Gonzaga College (Crosby Library), Whitworth College, and Eastern Washington University--received grants from the Fred Meyer Charitable Trust and the Library Services and Construction Act to facilitate coordinated collection development in the areas of education and business/economics, so that their…

  12. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 100 ... Issue, Title. Vol 28 (2013): Special Issue, Occurrence of Cryptosporidium and Giardia in domestic animals in peri-urban communities of Kafue district, Zambia, Abstract. J Siwila, IGK Phiri, HI Enemark, M Nchito, A Olsen. Vol 26, No 1 (2009), Occurrence of foot and mouth disease serotypes in Tanzania: A ...

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 15 of 15 ... Issue, Title. Vol 1, No 1 (2008), Assessment Of Ophthalmic Patients' Satisfaction In Owo, Abstract. CO Omolase, CO Fadamiro, BO Omolase, AS Aina, EO Omolade. Vol 3, No 1 (2010), Case Report: Strongyloides stercoralis coinfection in a Nigerian with HIV. Abstract. A.A Oyekunle, R.A.A Bolarinwa, O.A ...

  14. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 15 of 15 ... Issue, Title. Vol 1, No 1 (2007), An Action Five Strategy For Bridging The Gender Gap In Academic Research Activities In African Universities. The Case of Nigeria, Abstract PDF. DN Okorie, OG Agabi, CM Uche. Vol 1, No 1 (2007), Book Review: Confronting sexual harassment in Ghanaian Universities ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 240 of 240 ... Issue, Title. Vol 8, No 4 (2005), Status equipment in primary health centres of Tafa Lga, North Central Nigeria, Abstract. MN Sambo, I Lewis, K Sabitu. Vol 10, No 1 (2007), Stroke at a tertiary medical institution in Northern Nigeria: Patients\\' profile and predictors of outcome, Abstract. KW Wahab, MU ...

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 107 of 107 ... Issue, Title. Vol 6, No 1 (2017), The Ophthalmic status manifestations of nutritional and lifestyle disorders of men in a peri urban community in Ghana, Abstract PDF. F. Vuvor, M. Steiner-Asiedu, F.K. Saalia. Vol 2, No 1 (2013), Thyroid Disorders in Accra, Ghana: A Retrospective Histopathological Study ...

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 165 ... Issue, Title. Vol 30 (2005), Digitisation projects at the University of Cape Town Libraries, Abstract. Janine Dunlop, Lesley Hart. Vol 24 (2002), DISA: an African Perspective on Digital Technology, Abstract. Michele Pickover, Dale Peters. Vol 30 (2005), Doing it right – or are we? Basic principles in the ...

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 66 ... Issue, Title. Vol 48, No 1-2 (2015), A hierarchical modeling of information seeking behavior of school teachers in rural areas of Nigeria, Abstract. Manir Abdullahi Kamba. Vol 49, No 1-2 (2016), Access to electronic information resources by students of federal college of education in south east Nigeria ...

  19. Browse Title Index

    African Journals Online (AJOL)

    Items 351 - 400 of 400 ... Issue, Title. Vol 9, No 1 (2010), Soft tissue sarcoma of the thigh: Need for angiography in the developing, Abstract PDF. IA Adigun, GA Rahman, KO Ogundipe. Vol 3, No 1 (2004), Spectrum of rheumatic heart disease in Zaria, Northern Nigeria, Abstract. SS Danbauchi, MA Alhassan, SO David, ...

  20. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 68 of 68 ... Issue, Title. Vol 12, No 1-2 (2009), Sécurité et ordre politique au Cameroun : entre dynamiques internes et connexions internationales, Abstract PDF. BEP Chantal. Vol 6, No 1-2 (2003), Self-Determination, Nationalism, Development and Pan-Africanism Stuck on the Runway: Are Intellectuals to be Blamed ...

  1. Browse Title Index

    African Journals Online (AJOL)

    Items 251 - 300 of 328 ... Issue, Title. Vol 7, No 1 (2003), Sexual Harassment in Academia in Nigeria: How Real? Details PDF. Olugbenga Jelil Ladebo. Vol 8, No 2 (2004), Shaping the internet for match-making/dating: a challenge for the contemporary Nigerian family institution, Abstract PDF. Wale Adesina. Vol 6, No 1 (2002) ...

  2. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 20, No 1 (2015), Assessment of iron status among preschool children (6 to 59 months) with and without malaria in Western Province, Kenya, Abstract. I Kisiangani, C Mbakaya, A Makokha, D Magu. Vol 20, No 1 (2015), Assessment of iron status among preschool children (6 to 59 months) with and without ...

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 217 ... Browse Title Index. Journal Home > Advanced ... Vol 13, No 1 (2016), Access to specialized surgical care, Abstract PDF. H Saidi ... Vol 9, No 2 (2012), Clinical Assessment of the Palmaris Longus – Accuracy of common tests, Abstract PDF ... Vol 11, No 2 (2014), Clinical trials in Surgery, Abstract PDF.

  4. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 1006 ... Issue, Title. Vol 49, No 8 (2007), Clinical approach to a patient with abnormal uterine bleeding, Abstract PDF. B G Lindeque. Vol 57, No 5 (2015), Clinical evidence in the management of swimmer's ear, Abstract PDF. Andre Marais. Vol 50, No 1 (2008), Clinical features of Systemic Lupus ...

  5. Browse Title Index

    African Journals Online (AJOL)

    Items 251 - 300 of 2005 ... Issue, Title. Vol 92, No 4 (2015), Blood Pressure and Obesity Index Assessment in a Typical Urban Slum in Enugu, Nigeria, Abstract. GI Ahaneku, CU Osuji, OC Oguejiofor, BC Anisiuba, VO Ikeh, JE Ahaneku. Vol 80, No 10 (2003):, Blood pressure control in a population where antihypertensives are ...

  6. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 644 ... Issue, Title. Vol 19, No 2 (2007), A qualitative study of medical student socialization in Malawi\\'s College of Medicine: Clincal crisis and beyond, Abstract PDF. C Wendland, C Bandawe. Vol 19, No 2 (2007), A qualitative study of medical student socialization in Malawi\\'s College of Medicine: Preclinical ...

  7. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 101 ... Issue, Title. Vol 3, No 4 (2014), Chlamydia trachomatis IgG antibodies seroprevalence among students in two tertiary institutions in Anambra state, Nigeria: a comparative study, Abstract PDF. CB Duru, FE Emele, ED Adinma, CO Ifeadike, KA Uwakwe, AO Oluboyo, BO Oluboyo, C Abejegah. Vol 2, No 1 ...

  8. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 1038 ... Issue, Title. Vol 31, No 2 (2009), Assessing the utility of a continuous, underway fish egg sampler (CUFES) for sampling zooplankton, Abstract. S Sono, CL Moloney, CD van der Lingen. Vol 38, No 4 (2016), Assessing trophic adaptability is critical for understanding the response of predatory fishes to ...

  9. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 17 (2005), A. C. conduction behaviour in amorphous WO3/CEO2 thin film, Abstract. B Yagoubi, C A Hogarth, A Boukorrt. Vol 16 (2003), A lossless image compression algorithm using variable block size segmentation, Abstract. Z Brahimi, K A Saadi, N Baraka. Vol 15 (2003), Analysis method of wavelet ...

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 451 - 500 of 1346 ... Issue, Title. Vol 32, No 1 (2015), Fire and the dynamics of two unpalatable grass species (Cymbopogon pospischilii and Elionurus muticus) in a semi-arid climate, Abstract. Hennie A Snyman. Vol 8, No 1 (1973), Fire as a method of controlling macchia (Fynos) vegetation on the Amathole Mountains of ...

  11. Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data

    Science.gov (United States)

    2017-03-02

    AFRL-AFOSR-UK-TR-2017-0020 Quantum-Enhanced Cyber Security: Experimental Computation on Quantum- Encrypted Data Philip Walther UNIVERSITT WIEN Final...on Quantum- Encrypted Data 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER FA9550-16-1-0004 5c.  PROGRAM ELEMENT NUMBER 61102F 6. AUTHOR(S) Philip Walther 5d...1010 AT 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) EOARD Unit 4515 APO AE 09421-4515 10

  12. Browse Title Index

    African Journals Online (AJOL)

    Items 801 - 850 of 11090 ... Issue, Title. Vol 10, No 61 (2011), Analysis of chemical constituents in medicinal plants of selected districts of Pakhtoonkhwa, Pakistan, Abstract PDF. I Hussain, R Ullah, J Khan, N Khan, M Zahoor, N Ullah, MuR Khattak, FA Khan, A Baseer, M Khurram. Vol 10, No 77 (2011), Analysis of chloroplast ...

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 387 ... Issue, Title. Vol 15, No 2 (2015), Introduction to Christian philosophy, Abstract. Charles Ogundu Nnaji. Vol 8, No 2 (2006), Is Quantum Mechanics a Complete Theory?: A Philosophical Defense of Einstein's Position, Abstract. U O Egbai. Vol 10, No 1 (2007), Jesus in Africa, Abstract. FF Edet. Vol 10, No ...

  14. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 647 ... Issue, Title. Vol 13, No 2 (2010), 'N toekomstige perspektief op grondwetlike stabiliteit, Abstract PDF. F.W de Klerk. Vol 18, No 5 (2015), Cloete murray and Another v Firstrand bank ltd t/a Wesbank [2015] ZASCA 39A, Abstract PDF. M Laubscher. Vol 15, No 5 (2012), Cave Pecuniam: Lawyers as ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 814 ... Issue, Title. Vol 21, No 2 (2016), A 10 years trend of peptic ulcer disease and other gastrointestinal disorders in northern Uganda, Abstract PDF. T.R. Okello, D.M. Ogwang, I Pecorella. Vol 21, No 2 (2016), A 2-years description of traumatic brain injury admissions in Tikur Anbessa Specialized Hospital ...

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 319 ... Issue, Title. Vol 23, No 2 (2016), Carica papaya juice enhanced in-vitro cell proliferation better than freeze-dried PBS extract using scratch assay, Abstract. A.B. Nafiu, E Abdulaziz, M.T. Rahman. Vol 23, No 2 (2016), A comparative study of the ownership and utilization of insecticide treated nets in ...

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 52 ... Issue, Title. Vol 15 (2000), Ammi analysis of maize yield trials in South-Western Nigeria, Abstract. SR Ajibade, BA Ogunbodede. Vol 20 (2006), Association of yield with some agronomic characters in potatoes in a cool mid-altitude location, Abstract. CO Amadi, EE Ene Obong. Vol 20 (2006), Casein (CSN3) ...

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 249 ... Issue, Title. Vol 10, No 1 (2010), Ye Shakoch Chilot (the court of the sheikhs): A traditional institution of conflict resolution in Oromiya zone of Amhara regional state, Ethiopia, Abstract PDF. M Zeleke. Vol 15, No 3 (2015), A comparative analysis of the Post- Arab Spring National Dialogues in Tunisia and ...

  19. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 683 ... Issue, Title. Vol 54, No 1 (2006), Bovine tuberculosis survey in urban and peri urban dairy farms in coastal humid region of Tanga, Tanzania, Abstract. ES Swai, G Shirima, S Bwanga, W Moshy. Vol 60, No 3 (2012), Browsing capacity and nutritive value of indigenous browses in a tropical Coastal ...

  20. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 1215 ... Journal Home > Advanced Search > Browse Title Index. Log in or ... Vol 12, No 1 (2018), Analysis of the effects of frequent strikes on academic performance of students in universities in Nigeria: Edo State as a focal point, Abstract PDF ... Vol 6, No 1 (2012), Appraisal as a Determinant for Adequate ...

  1. Browse Title Index

    African Journals Online (AJOL)

    Items 251 - 300 of 490 ... Issue, Title. Vol 6, No 2 (2010), Knowledge and patterns of use of highly active antiretroviral therapies in HIV management at Abuja, Nigeria, Abstract. Jill I Okpalugo, US Inyang, K Ibrahim, F Anita, Chinwe V Ukwe, NC Aguwa. Vol 5, No 4 (2009), Knowledge and utilization of the acts in two major ...

  2. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 14 of 14 ... Issue, Title. Vol 2, No 1 (2009), Auditory and Respiratory Health Disorders Among Workers in an Iron and Steel Factory, Abstract. GM Abdel – Rasoul, OAE Mahrous, ME Abou Salem, MA Al-Batanony, HK Allam. Vol 2, No 1 (2009), Effect of An Educational Program About Medical Waste Management on ...

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 263 ... Issue, Title. Vol 1, No 2 (2002), Effect of Light and Darkness on Packed Cell Volume in the Rat, Abstract. A. A. OSINUBI, F. I. DURU, C. C. NORONHA, A. O. OKANLAWON. Vol 4, No 1 (2005), Effect of Marijuana Smoking on Blood Chemistry and Serum Biogenic Amines Concentrations in Humans ...

  4. Browse Title Index

    African Journals Online (AJOL)

    Items 301 - 350 of 745 ... Issue, Title. Vol 9, No 3 (1999), Frequency And Outcome In AIDS Patients In A University Teaching Hospital – A Five Year Review, Abstract. SA Ogun, OO Adelowo, AEA ... Vol 18, No 2 (2008), Good cllinical practice in clinical drug trials - What you need to know, Abstract. K Soyebi, Y Abosede, HAB ...

  5. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 4119 ... Issue, Title. Vol 86, No 2 (1996), A re-evaluation of isotope screening for skeletal metastases in nodenegative breast cancer, Abstract PDF. C.A. Gudgeon, I.D. Werner, D.M. Dent. Vol 104, No 6 (2014), A reflection on the South African Medical Association – past, present and future, Abstract PDF.

  6. Browse Title Index

    African Journals Online (AJOL)

    Items 351 - 400 of 979 ... Issue, Title. Vol 45, No 9 (2003), Erectile dysfunction: A GP's guide to clinical assessment, Abstract PDF. PJ Harden. Vol 47, No 4 (2005), Ethical Issues in Family Practice: My Culture – Right or Wrong? Abstract PDF. GA Ogunbanjo, D Knapp van Bogaert. Vol 59, No 3 (2017), Ethical issues with ...

  7. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 333 ... Issue, Title. Vol 15, No 1 (2016), Irrigation potential of Inuakpa in Odukpani local government of Cross river using Kostiakov model, Abstract PDF. B.O. Unuigbe, K.I. Ofem, N.R.B. Antigha. Vol 2, No 2 (2003), LABOUR USE IN SMALL-SCALE YAM PRODUCTION IN QUA'AN PAN LOCAL GOVERNMENT ...

  8. Browse Title Index

    African Journals Online (AJOL)

    Items 701 - 750 of 1010 ... Issue, Title. Vol 6, No 2 (1998), Performance et stabilité de rendement des génotypes de patate douce dans divers environnements à l'est du Congo, Abstract. P Phemba, T Mutombo, N B Lutaladio, E E Carey. Vol 22 (2014): Supplement, Performance of Artemia shell-free embryos, Moina micrura and ...

  9. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 13, No 2 (2013), Using Mindfulness as a Teaching Aid for Phenomenology, Abstract PDF. IR Owen. Vol 8, No 1 (2008), Were Nietzsche's Cardinal Ideas – Delusions? Abstract PDF. Eva M Cybulska. Vol 12, No 1 (2012), What did you learn in school today? Abstract PDF. Carina Henriksson. Vol 5, No 1 (2005) ...

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 4351 - 4386 of 4386 ... Issue, Title. Vol 107, No 6 (2017), When students become patients: TB disease among medical undergraduates in Cape Town, South Africa, Abstract PDF. H van der Westhuizen, A Dramowski. Vol 106, No 4 (2016), Where do children die and what are the causes? Under-5 deaths in the Metro West ...

  11. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 10, No 2 (2014), Sorindeia warneckei Engl. (Anacardiaceae), une espèce multi-usagère de la dépression de la Lama au Togo, Abstract PDF. A Akodewou, S Akpavi, M Dourma, K Batawila, KB Amegnaglo, W Atakpama, K Akpagama. Vol 10, No 1 (2014), Sterculia setigera Del.: influence de quelques ...

  12. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 126 ... Issue, Title. Vol 8, No 2 (2016), 2010 FIFA World Cup stadium investment: Does the post-event usage justify the expenditure? Abstract PDF. Luke Humphrey, Gavin Fraser. Vol 6, No 1 (2014), 7Implication of mergers and acquisitions on stock returns before and during the 2007–2009 credit crunch: An ...

  13. Paper Title (use style: paper title)

    African Journals Online (AJOL)

    IEEE

    2018-03-22

    Mar 22, 2018 ... is used to maintain the security and reliability of the encrypted data whether these data are ... financial affairs, Automatic Teller Machine (ATM), E- commerce, Mobile network, credit card, health issues, etc. [1]. One of the most ...

  14. 48 CFR 32.503-15 - Application of Government title terms.

    Science.gov (United States)

    2010-10-01

    ... Application of Government title terms. (a) Property to which the Government obtains title by operation of the... Property; and (2) The termination clauses at 52.249, for termination inventory. (c) The contractor may sell... the scrap disposition. (d) When the title to materials or other inventories is vested in the...

  15. Contested Domains of Science and Science Learning in Contemporary Native American Communities: Three Case Studies from a National Science Foundation grant titled, "Archaeology Pathways for Native Learners"

    Science.gov (United States)

    Parent, Nancy Brossard

    This dissertation provides a critical analysis of three informal science education partnerships that resulted from a 2003-2006 National Science Foundation grant titled, "Archaeology Pathways for Native Learners" (ESI-0307858), hosted by the Mashantucket Pequot Museum and Research Center. This dissertation is designed to contribute to understandings of learning processes that occur within and at the intersection of diverse worldviews and knowledge systems, by drawing upon experiences derived from three disparate contexts: 1) The Navajo Nation Museum in Window Rock, Arizona; 2) The A:shiwi A:wan Museum and Heritage Center on the Zuni Reservation in Zuni, New Mexico; and 3) Science learning camps at the Mashantucket Pequot Museum and Research Center for Native youth of southern New England. While informal science education is increasingly moving toward decolonizing and cross-cutting institutional boundaries of learning through critical thinking and real-world applications, the construction of "science" (even within diverse contexts) continues to be framed within a homogenous, predominantly Euro-American perspective. This study analyzes the language of Western science employed in these partnerships, with particular attention to the use of Western/Native binaries that shape perceptions of Native peoples and communities, real or imagined. Connections are drawn to broader nation-state interests in education, science, and the global economy. The role of educational evaluation in these case studies is also critically analyzed, by questioning the ways in which it is constructed, conducted, and evaluated for the purposes of informing future projects and subsequent funding. This study unpacks problems of the dominant language of "expert" knowledge embedded in Western science discourse, and highlights the possibilities of indigenous knowledge systems that can inform Western science frameworks of education and evaluation. Ultimately, this study suggests that research

  16. Acknowledgements

    OpenAIRE

    2017-01-01

    This book is the product of a seminar series funded by the UK Economic and Social Research Council entitled ‘Security in Scotland, with or without constitutional change’, which ran from 2013–2015 at the University of Edinburgh (grant reference ES/L00139X/1). The Reports from this seminar series can be found on the title page on the Open Book Publishers website, http://www.openbookpublishers.com/product/524#resources The editor and principal investigator Andrew W. Neal would like to thank his ...

  17. Title XX and CETA. A Coordination Guide for Title XX Administrators.

    Science.gov (United States)

    Urban Management Consultants of San Francisco, Inc., CA.

    Written for the social service (Title XX) administrator at the State or sub-State level, this guide is intended to serve four major purposes: (1) Provide selected insights into what the Comprehensive Employment and Training Act (CETA) is and how it works; (2) point out potential areas for coordination which, from study or field experience, hold…

  18. Federal health services grants, 1985.

    Science.gov (United States)

    Zwick, D I

    1986-01-01

    Federal health services grants amounted to about $1.8 billion in fiscal year 1985. The total amount was about $100 million less, about 6 percent, than in 1980. Reductions in the health planning program accounted for most of the decline in absolute dollars. The four formula grants to State agencies amounted to about $1.0 billion in 1985, about 60 percent of the total. The largest formula grants were for maternal and child health services and for alcohol, drug abuse, and mental health services. Project grants to selected State and local agencies amounted to about $.8 billion. There was 12 such grants in 1985 (compared with 34 in 1980). The largest, for community health services, equaled almost half the total. In real, inflation-adjusted dollars, the decline in Federal funds for these programs exceeded a third during the 5-year period. The overall dollar total in real terms in 1985 approximated the 1970 level. The ratio of formula grants to project grants in 1985 was similar to that in 1965. Studies of the impact of changes in Federal grants have found that while the development of health programs has been seriously constrained in most cases, their nature has not been substantially altered. In some cases broader program approaches and allocations have been favored. Established modes of operations and administration have generally been strengthened. Some efficiencies but few savings in administration have been identified. Replacement of reduced Federal funding by the States has been modest but has increased over time, especially for direct service activities. These changes reflect the important influence of professionalism in the health fields and the varying strengths of political interest and influence among program supporters. The long-term impact on program innovation is not yet clear.

  19. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 327 ... Issue, Title. Vol 10, No 4 (2016), Omphalocoeles: A decade in review, Abstract PDF. S Singh, A Madaree. Vol 2, No 4 (2008), Ortner syndrome, Abstract PDF. E Meyer, NE Jones, LJ Zühlke. Vol 10, No 3 (2016), Outcome of children admitted to a general highcare unit in a regional hospital in the ...

  20. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 356 ... Issue, Title. Vol 27, No 3 (2014), A desire for weight loss in season increases disordered eating behaviour risk and energy deficiency in athletes, Abstract PDF. HH Wright, R Ford, CR Botha. Vol 29, No 3 (2016), A review of infant and young child feeding practice in hospital and the home in KwaZulu-Natal ...