WorldWideScience

Sample records for security act va

  1. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  2. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ..., VA 20598-6036 or [email protected] . For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0013] Privacy Act of..., Transportation Security Enforcement Record System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice...

  3. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  4. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0090] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  5. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0016] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  6. VA INFORMATION SYSTEMS: Computer Security Weaknesses Persist at the Veterans Health Administration

    National Research Council Canada - National Science Library

    2000-01-01

    .... To determine the status of computer security within VHA, we (1) evaluated information system general controls at the VA Maryland Health Cafe System, the New Mexico VA Health Care System, and the VA North Texas Health Care System and (2...

  7. The VA mission act: Funding to fail?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2018-06-01

    Full Text Available No abstract available. Article truncated after 150 words. Yesterday on D-Day, the 74th anniversary of the invasion of Normandy, President Trump signed the VA Mission Act. The law directs the VA to combine a number of existing private-care programs, including the so-called Choice program, which was created in 2014 after veterans died waiting for appointments at the Phoenix VA (1. During the signing Trump touted the new law saying “there has never been anything like this in the history of the VA” and saying that veterans “can go right outside [the VA] to a private doctor”-but can they? Although the bill authorizes private care, it appropriates no money to pay for it. Although a bipartisan plan to fund the expansion is proposed in the House, the White House has been lobbying Republicans to vote the plan down (2. Instead Trump has been asking Congress to pay for veteran’s programs by cutting spending elsewhere (2. We in Arizona are …

  8. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Security Administration, 601 South 12th Street, Arlington, VA 20598-6036. For privacy issues please contact... Secretary 6 CFR Part 5 [Docket No. DHS-2009-0137] Privacy Act of 1974: Implementation of Exemptions... Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  9. The impact of the Department of Veterans Affairs Health Care Personnel Enhancement Act of 2004 on VA physicians' salaries and retention.

    Science.gov (United States)

    Weeks, William B; Wallace, Tanner A; Wallace, Amy E

    2009-01-01

    To determine whether the Department of Veterans Affairs Health Care Personnel Enhancement Act (the Act), which was designed to achieve VA physician salary parity with American Academy of Medical Colleges (AAMC) Associate Professors and enacted in 2006, had achieved its goal. Using VA human resources datasets and data from the AAMC, we calculated mean VA physician salaries, with 95 percent confidence intervals, for 15 different medical specialties. For each specialty, we compared VA salaries to the median, 25th, and 75th percentile of AAMC Associate Professors' incomes. The Act's passage resulted in a $20,000 annual increase in VA physicians' salaries. VA primary care physicians, medical subspecialists, and psychiatrists had salaries that were comparable to their AAMC counterparts prior to and after enactment of the Act. However, VA surgical specialists', anesthesiologists', and radiologists' salaries lagged their AAMC counterparts both before and after the Act's enactment. Income increases were negatively correlated with full-time workforce changes. VA does not appear to provide comparable salaries for physicians necessary for surgical care. In certain cases, VA should consider outsourcing surgical services.

  10. 17 CFR 229.801 - Securities Act industry guides.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Securities Act industry guides... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry... claims and claim adjustment expenses of property-casualty insurance underwriters. (g) Guide 7...

  11. Air traffic security act unconstitutional

    International Nuclear Information System (INIS)

    Heller, W.

    2006-01-01

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1 st Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  12. Legislating for Terrorism: The Philippines’ Human Security Act 2007

    Directory of Open Access Journals (Sweden)

    Pauline E. Eadie

    2011-11-01

    Full Text Available In February 2007 the Philippine Senate passed the Human Security Act (HSA otherwise known as Republic Act No. 9372: An Act to Secure the State and Protect our People From Terrorism. Philippine Senate Minority Leader Aquilino Q. Pimentel Jr. was heavily involved in the final drafting of the HSA. He gave it its final name shortly before the Senate Chamber passed it into law. Previously the Act had been known by various titles including ‘An Act to Deter and Punish Acts of Terrorism and for Other Purposes’ (Senate Bill No. 2137 and ‘An Act to Define and Punish the Crime of Terrorism, the Crime of Conspiracy to Commit Terrorism, and the Crime of Proposal to Commit Terrorism, and for Other Purposes (Senate Bill No. 2187. Thus the Human Security Act exists as an instrument of counter terrorism as opposed to human security policy.

  13. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  14. 38 CFR 74.27 - How will VA store information?

    Science.gov (United States)

    2010-07-01

    ... (CONTINUED) VETERANS SMALL BUSINESS REGULATIONS Records Management § 74.27 How will VA store information? VA... examination visits will be scanned onto portable media and fully secured in the Center for Veterans Enterprise...

  15. Air traffic security act unconstitutional; Luftsicherheitsgesetz verfassungswidrig

    Energy Technology Data Exchange (ETDEWEB)

    Heller, W.

    2006-05-15

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1{sup st} Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  16. 17 CFR 239.18 - Form S-11, for registration under the Securities Act of 1933 of securities of certain real estate...

    Science.gov (United States)

    2010-04-01

    ... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...

  17. 75 FR 7648 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Veterans Affairs...

    Science.gov (United States)

    2010-02-22

    ... Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503), amended the Privacy... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0006] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Veterans Affairs/Veterans Benefits Administration (VA/ VBA...

  18. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    Science.gov (United States)

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  19. 78 FR 56271 - FY 2014-2020 Draft VA Strategic Plan

    Science.gov (United States)

    2013-09-12

    ... DEPARTMENT OF VETERANS AFFAIRS FY 2014-2020 Draft VA Strategic Plan AGENCY: Department of Veterans... Affairs (VA) is announcing the availability of the FY 2014-2020 Draft VA Strategic Plan (Strategic Plan... Act of 2010 (GPRAMA) (Pub. L. 111-352). The Strategic Plan provides the Department's long-term...

  20. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  1. What does Shulkin's firing mean for the VA?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2018-03-01

    Full Text Available No abstract available. Article truncated at 150 words. David Shulkin MD, Secretary for Veterans Affairs (VA was finally fired by President Donald Trump ending long speculation (1. Trump nominated his personal physician, Ronny Jackson MD, to fill Shulkin’s post. The day after his firing, Shulkin criticized his firing in a NY Times op-ed claiming pro-privatization factions within the Trump administration led to his ouster (2. “They saw me as an obstacle to privatization who had to be removed,” Dr. Shulkin wrote. “That is because I am convinced that privatization is a political issue aimed at rewarding select people and companies with profits, even if it undermines care for veterans.” Former Secretary Shulkin’s tenure at the VA has had several controversies. First, as undersecretary of Veterans Healthcare and later as secretary money appropriated to the VA to obtain private care under the Veterans Access, Choice, and Accountability Acts of 2014 and the VA Choice and Quality Employment Act of …

  2. Dutch National Security Reform Under Review : Sufficient Checks and Balances in the Intelligence and Security Services Act 2017?

    NARCIS (Netherlands)

    Quirine Eijkman; Nico van Eijk; Robert van Schaik

    2018-01-01

    In May 2018, the new Dutch Intelligence and Security Services Act 2017 (Wet op de Inlichtingen- en veiligheidsdiensten, Wiv) will enter into force. It replaces the previous 2002 Act and incorporates many reforms to the information gathering powers of the two intelligence and security services as

  3. 75 FR 6231 - Securities Act of 1933; Securities Exchange Act of 1934; Order Regarding Review of FASB...

    Science.gov (United States)

    2010-02-08

    ...; Securities Exchange Act of 1934; Order Regarding Review of FASB Accounting Support Fee for 2010 Under Section...'s accounting support fee for calendar year 2010. In connection with its review, the Commission also... contributions from the accounting profession. After its review, the Commission determined that the 2010 annual...

  4. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  5. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  6. DATA Act File C Award Financial - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File C. File C includes the agency award information from the financial accounting system at...

  7. 46 CFR 7.55 - Cape Henry, VA to Cape Fear, NC.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Cape Henry, VA to Cape Fear, NC. 7.55 Section 7.55 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.55 Cape Henry, VA to Cape Fear, NC. (a) A line drawn from Rudee Inlet Jetty Light “2” to...

  8. Whistle-blower accuses VA inspector general of a "whitewash"

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2014-09-01

    Full Text Available No abstract available. Article truncated after 150 words. Yesterday, Dr. Sam Foote, the initial whistle-blower at the Phoenix VA, criticized the Department of Veterans Affairs inspector general's (VAOIG report on delays in healthcare at the Phoenix VA at a hearing before the House Committee of Veterans Affairs (1,2. Foote accused the VAOIG of minimizing bad patient outcomes and deliberately confusing readers, downplaying the impact of delayed health care at Phoenix VA facilities. "At its best, this report is a whitewash. At its worst, it is a feeble attempt at a cover-up," said Foote. Foote earlier this year revealed that as many as 40 Phoenix patients died while awaiting care and that the Phoenix VA maintained secret waiting lists while under-reporting patient wait times for appointments. His disclosures triggered the national VA scandal. Richard Griffin, the acting VAOIG, said that nearly 300 patients died while on backlogged wait lists in the Phoenix VA Health Care System, a much higher ...

  9. Helman defends decision to pull VA sponsorship of Veterans day parade

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-04-01

    Full Text Available No abstract available. Article truncated after 150 words. Sharon Helman, Phoenix VA Director, defended her decision to cancel VA sponsorship of the annual Phoenix Veterans Day Parade in a 4/10/13 email to VA employees. Helman said that VA sponsorship was cancelled because of “…priorities in the organization (specifically access, and heightened awareness over liability concerns which VA Legal Counsel brought forward”. She concluded her letter by warning “… that all media inquiries should be forwarded to Paul Coupaud, Acting Public Affairs Officer”. VA officials initially said fear of litigation prompted the review of VA support. Last year, a float carrying wounded Veterans in a Midland, Texas, parade collided with a freight train, killing four and injuring 17. Crash victims and their families filed lawsuits in Texas against Union Pacific Railroad and the float owner. The VA was not a defendant, and the VA has not issued any national directives on liability as a result of the tragedy.In…

  10. 78 FR 10169 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Science.gov (United States)

    2013-02-13

    ... Location Accuracy, Network Security Best Practices, DNSSEC Implementation Practices for ISPs, Secure BGP... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security... persons that the Federal Communications Commission's (FCC) Communications Security, Reliability, and...

  11. Comparison of historically simulated VaR: Evidence from oil prices

    International Nuclear Information System (INIS)

    Costello, Alexandra; Asem, Ebenezer; Gardner, Eldon

    2008-01-01

    Cabedo and Moya [Cabedo, J.D., Moya, I., 2003. Estimating oil price 'Value at Risk' using the historical simulation approach. Energy Economics 25, 239-253] find that ARMA with historical simulation delivers VaR forecasts that are superior to those from GARCH. We compare the ARMA with historical simulation to the semi-parametric GARCH model proposed by Barone-Adesi et al. [Barone-Adesi, G., Giannopoulos, K., Vosper, L., 1999. VaR without correlations for portfolios of derivative securities. Journal of Futures Markets 19 (5), 583-602]. The results suggest that the semi-parametric GARCH model generates VaR forecasts that are superior to the VaR forecasts from the ARMA with historical simulation. This is due to the fact that GARCH captures volatility clustering. Our findings suggest that Cabedo and Moya's conclusion is mainly driven by the normal distributional assumption imposed on the future risk structure in the GARCH model. (author)

  12. 17 CFR 239.40 - Form F-10, for registration under the Securities Act of 1933 of securities of certain Canadian...

    Science.gov (United States)

    2010-04-01

    ...) This Form may not be used for registration of derivative securities except: (1) Warrants, options and... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-10, for registration under the Securities Act of 1933 of securities of certain Canadian issuers. 239.40 Section 239.40...

  13. ESTIMATING RISK ON THE CAPITAL MARKET WITH VaR METHOD

    Directory of Open Access Journals (Sweden)

    Sinisa Bogdan

    2015-06-01

    Full Text Available The two basic questions that every investor tries to answer before investment are questions about predicting return and risk. Risk and return are generally considered two positively correlated sizes, during the growth of risk it is expected increase of return to compensate the higher risk. The quantification of risk in the capital market represents the current topic since occurrence of securities. Together with estimated future returns it represents starting point of any investment. In this study it is described the history of the emergence of VaR methods, usefulness in assessing the risks of financial assets. Three main Value at Risk (VaR methodologies are decribed and explained in detail: historical method, parametric method and Monte Carlo method. After the theoretical review of VaR methods it is estimated risk of liquid stocks and portfolio from the Croatian capital market with historical and parametric VaR method, after which the results were compared and explained.

  14. Comparison of historically simulated VaR: Evidence from oil prices

    Energy Technology Data Exchange (ETDEWEB)

    Costello, Alexandra [Seminole Canada Energy, Calgary, AB (Canada); Asem, Ebenezer; Gardner, Eldon [Faculty of Management, University of Lethbridge, Lethbridge, AB (Canada)

    2008-09-15

    Cabedo and Moya [Cabedo, J.D., Moya, I., 2003. Estimating oil price 'Value at Risk' using the historical simulation approach. Energy Economics 25, 239-253] find that ARMA with historical simulation delivers VaR forecasts that are superior to those from GARCH. We compare the ARMA with historical simulation to the semi-parametric GARCH model proposed by Barone-Adesi et al. [Barone-Adesi, G., Giannopoulos, K., Vosper, L., 1999. VaR without correlations for portfolios of derivative securities. Journal of Futures Markets 19 (5), 583-602]. The results suggest that the semi-parametric GARCH model generates VaR forecasts that are superior to the VaR forecasts from the ARMA with historical simulation. This is due to the fact that GARCH captures volatility clustering. Our findings suggest that Cabedo and Moya's conclusion is mainly driven by the normal distributional assumption imposed on the future risk structure in the GARCH model. (author)

  15. 76 FR 72922 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Science.gov (United States)

    2011-11-28

    ... alerting systems, 9-1-1 location accuracy, and network security. The FCC will attempt to accommodate as... FEDERAL COMMUNICATIONS COMMISSION Federal Advisory Committee Act; Communications Security... persons that the Federal Communications Commission's (FCC) third Communications Security, Reliability, and...

  16. Act of 4 August 1955 concerning State Security in the Nuclear Field

    International Nuclear Information System (INIS)

    1955-01-01

    This Act governing State security in the nuclear field lays down that the King may determine the security measures to be complied with concerning nuclear research, materials, methods of production used by establishments and legal or physical persons having in their possession information, documents or material obtained either directly from the Government or with its consent. The Act was supplemented by Royal Order of 14 March 1956 which amplified its provisions by laying down specific requirements regarding the classification of information and material, the security measures to be applied thereto, and to establishments involved in related research work. It also provides for the security clearance to be applied to persons who shall be authorised to obtain such information and classified material. A Royal Order of 18 October 1974 amends this Order in respect of the authorities responsible for its implementation. (NEA) [fr

  17. 76 FR 10362 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-02-24

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Cybersecurity and Communications Reliability Public Safety and Homeland Security Bureau, Federal Communications...

  18. 77 FR 12054 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal..., Associate Bureau Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445...

  19. 75 FR 74050 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-11-30

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its fourth meeting on...

  20. 76 FR 54234 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2011-08-31

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal.... Postal Service Mail to Jeffery Goldthorp, Associate Bureau Chief, Public Safety and Homeland Security...

  1. 75 FR 56533 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-09-16

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal...) Communications Security, Reliability, and Interoperability Council (CSRIC) will hold its third meeting on October...

  2. 77 FR 70777 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2012-11-27

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council AGENCY: Federal... Security, Reliability, and Interoperability Council (CSRIC III) scheduled for December 5, 2012, at Federal...

  3. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 Public Law (Pub. L.) 100-503...

  4. 75 FR 9899 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications...

    Science.gov (United States)

    2010-03-04

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council; Notice of Public Meeting... Analysis Division, Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th...

  5. Building capacity in VA to provide emergency gynecology services for women.

    Science.gov (United States)

    Cordasco, Kristina M; Huynh, Alexis K; Zephyrin, Laurie; Hamilton, Alison B; Lau-Herzberg, Amy E; Kessler, Chad S; Yano, Elizabeth M

    2015-04-01

    Visits to Veterans Administration (VA) emergency departments (EDs) are increasingly being made by women. A 2011 national inventory of VA emergency services for women revealed that many EDs have gaps in their resources and processes for gynecologic emergency care. To guide VA in addressing these gaps, we sought to understand factors acting as facilitators and/or barriers to improving VA ED capacity for, and quality of, emergency gynecology care. Semistructured interviews with VA emergency and women's health key informants. ED directors/providers (n=14), ED nurse managers (n=13), and Women Veteran Program Managers (n=13) in 13 VA facilities. Leadership, staff, space, demand, funding, policies, and community were noted as important factors influencing VA EDs building capacity and improving emergency gynecologic care for women Veterans. These factors are intertwined and cross multiple organizational levels so that each ED's capacity is a reflection not only of its own factors, but also those of its local medical center and non-VA community context as well as VA regional and national trends and policies. Policies and quality improvement initiatives aimed at building VA's emergency gynecologic services for women need to be multifactorial and aimed at multiple organizational levels. Policies need to be flexible to account for wide variations across EDs and their medical center and community contexts. Approaches that build and encourage local leadership engagement, such as evidence-based quality improvement methodology, are likely to be most effective.

  6. 75 FR 44720 - Safety Zone; Live-Fire Gun Exercise, M/V Del Monte, James River, VA

    Science.gov (United States)

    2010-07-29

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0585] RIN 1625-AA00 Safety Zone; Live-Fire Gun Exercise, M/V Del Monte, James River, VA AGENCY: Coast Guard, DHS... follows: Sec. 165.T05-0585 Safety Zone; Live-Fire Gun Exercise, M/V Del Monte, James River, VA (a...

  7. Comparison of outcomes for veterans receiving dialysis care from VA and non-VA providers.

    Science.gov (United States)

    Wang, Virginia; Maciejewski, Matthew L; Patel, Uptal D; Stechuchak, Karen M; Hynes, Denise M; Weinberger, Morris

    2013-01-18

    Demand for dialysis treatment exceeds its supply within the Veterans Health Administration (VA), requiring VA to outsource dialysis care by purchasing private sector dialysis for veterans on a fee-for-service basis. It is unclear whether outcomes are similar for veterans receiving dialysis from VA versus non-VA providers. We assessed the extent of chronic dialysis treatment utilization and differences in all-cause hospitalizations and mortality between veterans receiving dialysis from VA versus VA-outsourced providers. We constructed a retrospective cohort of veterans in 2 VA regions who received chronic dialysis treatment financed by VA between January 2007 and December 2008. From VA administrative data, we identified veterans who received outpatient dialysis in (1) VA, (2) VA-outsourced settings, or (3) both ("dual") settings. In adjusted analyses, we used two-part and logistic regression to examine associations between dialysis setting and all-cause hospitalization and mortality one-year from veterans' baseline dialysis date. Of 1,388 veterans, 27% received dialysis exclusively in VA, 47% in VA-outsourced settings, and 25% in dual settings. Overall, half (48%) were hospitalized and 12% died. In adjusted analysis, veterans in VA-outsourced settings incurred fewer hospitalizations and shorter hospital stays than users of VA due to favorable selection. Dual-system dialysis patients had lower one-year mortality than veterans receiving VA dialysis. VA expenditures for "buying" outsourced dialysis are high and increasing relative to "making" dialysis treatment within its own system. Outcomes comparisons inform future make-or-buy decisions and suggest the need for VA to consider veterans' access to care, long-term VA savings, and optimal patient outcomes in its placement decisions for dialysis services.

  8. P.L. 110-140, "Energy Independence and Security Act of 2007", 2007

    Energy Technology Data Exchange (ETDEWEB)

    None

    2007-12-19

    The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.

  9. Report: Fiscal Year 2010 Federal Information Security Management Act Report

    Science.gov (United States)

    Report #11-P-0017, November 16, 2010. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2010 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  10. Comparison of outcomes for veterans receiving dialysis care from VA and non-VA providers

    Directory of Open Access Journals (Sweden)

    Wang Virginia

    2013-01-01

    Full Text Available Abstract Background Demand for dialysis treatment exceeds its supply within the Veterans Health Administration (VA, requiring VA to outsource dialysis care by purchasing private sector dialysis for veterans on a fee-for-service basis. It is unclear whether outcomes are similar for veterans receiving dialysis from VA versus non-VA providers. We assessed the extent of chronic dialysis treatment utilization and differences in all-cause hospitalizations and mortality between veterans receiving dialysis from VA versus VA-outsourced providers. Methods We constructed a retrospective cohort of veterans in 2 VA regions who received chronic dialysis treatment financed by VA between January 2007 and December 2008. From VA administrative data, we identified veterans who received outpatient dialysis in (1 VA, (2 VA-outsourced settings, or (3 both (“dual” settings. In adjusted analyses, we used two-part and logistic regression to examine associations between dialysis setting and all-cause hospitalization and mortality one-year from veterans’ baseline dialysis date. Results Of 1,388 veterans, 27% received dialysis exclusively in VA, 47% in VA-outsourced settings, and 25% in dual settings. Overall, half (48% were hospitalized and 12% died. In adjusted analysis, veterans in VA-outsourced settings incurred fewer hospitalizations and shorter hospital stays than users of VA due to favorable selection. Dual-system dialysis patients had lower one-year mortality than veterans receiving VA dialysis. Conclusions VA expenditures for “buying” outsourced dialysis are high and increasing relative to “making” dialysis treatment within its own system. Outcomes comparisons inform future make-or-buy decisions and suggest the need for VA to consider veterans’ access to care, long-term VA savings, and optimal patient outcomes in its placement decisions for dialysis services.

  11. DATA Act File B Object Class and Program Activity - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File B. File B includes the agency object class and program activity detail obligation and...

  12. 77 FR 43100 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-009...

    Science.gov (United States)

    2012-07-23

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Mary Ellen Callahan (703) 235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0097] Privacy Act of... Assistance Grant Programs System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system...

  13. KENO-VA-PVM KENO-VA-SM, KENO5A for Parallel Processors

    International Nuclear Information System (INIS)

    Ramon, Javier; Pena, Jorge

    2002-01-01

    1 - Description of program or function: This package contains versions KENO-Va-SM (Shared Memory version) and KENO-Va-PVM (Parallel Virtual Machine version) based on SCALE-4.1. KENO-Va three-dimensional Boltzmann transport equation for neutron multiplying systems. The primary purpose of KENO-Va is to determine k-effective. Other calculated quantities include lifetime and generation time, energy-dependent leakages, energy- and region-dependent absorptions, fissions, fluxes, and fission densities. 2 - Method of solution: KENO-Va employs the Monte Carlo technique

  14. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Karen L. Neuman, (202) 343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [DHS-2013-0073] Privacy Act of 1974... Defense Executive Reserve System of Records AGENCY: Department of Homeland Security, Privacy Office...

  15. 75 FR 4626 - Order Granting a Temporary Exemption From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2010-01-28

    ... DEPARTMENT OF THE TREASURY Order Granting a Temporary Exemption From Certain Government Securities... Department of the Treasury (Treasury) is issuing a temporary exemption from certain Government Securities Act... accommodate customer clearing of credit default swaps that reference government securities. Treasury is also...

  16. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  17. Cyber/Physical Security Vulnerability Assessment Integration

    International Nuclear Information System (INIS)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-01-01

    This internally funded Laboratory-Directed R and D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  18. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Science.gov (United States)

    2010-10-01

    ...: Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997) The... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997). 1552.235-78 Section 1552.235-78 Federal...

  19. 76 FR 21768 - Privacy Act of 1974; Department of Homeland Security/Office of Health Affairs-001 Contractor...

    Science.gov (United States)

    2011-04-18

    ... Homeland Security, Washington, DC 20520. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0013] Privacy Act of... Immunization Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  20. 76 FR 70345 - Drawbridge Operation Regulations; Elizabeth River, Eastern Branch, Norfolk, VA

    Science.gov (United States)

    2011-11-14

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2011-1022] Drawbridge Operation Regulations; Elizabeth River, Eastern Branch, Norfolk, VA AGENCY: Coast Guard, DHS. ACTION: Notice... periodic maintenance. The Norfolk Southern 5 Bridge, at mile 1.1, across the Elizabeth River (Eastern...

  1. 76 FR 43376 - Order Granting Temporary Exemptions From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2011-07-20

    .../gsareg.htm . As noted in its request, on July 16, 2011, ICE Trust reorganized its corporate structure... DEPARTMENT OF THE TREASURY Order Granting Temporary Exemptions From Certain Government Securities... temporary exemptions from certain Government Securities Act of 1986 provisions and regulations regarding...

  2. 75 FR 11627 - Order Granting Temporary Exemptions From Certain Government Securities Act Provisions and...

    Science.gov (United States)

    2010-03-11

    ... DEPARTMENT OF THE TREASURY Order Granting Temporary Exemptions From Certain Government Securities... Department of the Treasury (Treasury) is granting temporary exemptions from certain Government Securities Act...).pdf. \\8\\ 75 FR 4626, January 28, 2010 Order Granting a Temporary Exemption from Certain Government...

  3. 17 CFR 240.15b5-1 - Extension of registration for purposes of the Securities Investor Protection Act of 1970 after...

    Science.gov (United States)

    2010-04-01

    ... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. 240.15b5-1... purposes of the Securities Investor Protection Act of 1970 after cancellation or revocation. Commission... member within the meaning of Section 3(a)(2) of the Securities Investor Protection Act of 1970 for...

  4. 76 FR 67755 - Privacy Act of 1974; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP...

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0102] Privacy Act of... Data System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to...

  5. A legislative history of the Social Security Protection Act of 2004.

    Science.gov (United States)

    Hansen, Erik

    2008-01-01

    Passage of the original Social Security Act in 1935, Public Law (P.L.) 74-271, represented one of the watershed achievements of social welfare reform in American history. For the first time, workers were guaranteed a basic floor of protection against the hardships of poverty. In the ensuing decades, more than 100 million beneficiaries have realized the value of this protection through the receipt of monthly Social Security payments. As this guarantee has endured and progressed, the policies and administration of such a vast and complex program have required ongoing modifications-more than 150 such revisions over the past 73 years. To some extent, these amendments can be seen as an ongoing refinement process, with the Social Security Protection Act of 2004 (SSPA) being another incremental step in the development of a social insurance program that best meets the evolving needs of American society. This article discusses the legislative history of the SSPA in detail. It includes summaries of the provisions and a chronology of the modification of these proposals as they passed through the House and Senate, and ultimately to the president's desk.

  6. 76 FR 23810 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-04-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response Interoperability Center Public Safety Advisory Committee Meeting AGENCY... Fullano, Associate Chief, Public Safety and Homeland Security Bureau, Federal Communications Commission...

  7. 78 FR 43890 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency-006...

    Science.gov (United States)

    2013-07-22

    ... titled, ``Department of Homeland Security/Federal Emergency Management Agency--006 Citizen Corps Database... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0049] Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency--006 Citizen Corps Program...

  8. 17 CFR 239.24 - Form N-5, form for registration of small business investment company under the Securities Act of...

    Science.gov (United States)

    2010-04-01

    ... registration of small business investment company under the Securities Act of 1933 and the Investment Company... N-5, form for registration of small business investment company under the Securities Act of 1933 and... of 1933 of securities issued by any small business investment company which is registered under the...

  9. OneVA Pharmacy

    Data.gov (United States)

    Department of Veterans Affairs — The OneVA Pharmacy application design consists of 3 main components: VistA Medication Profile screen, Health Data Record Clinical Data Service (HDR/CDS), and OneVA...

  10. Comparisons and Characterizations of the Mean-Variance, Mean-VaR, Mean-CVaR Models for Portfolio Selection With Background Risk

    OpenAIRE

    Xu, Guo; Wing-Keung, Wong; Lixing, Zhu

    2013-01-01

    This paper investigates the impact of background risk on an investor’s portfolio choice in a mean-VaR, mean-CVaR and mean-variance framework, and analyzes the characterizations of the mean-variance boundary and mean-VaR efficient frontier in the presence of background risk. We also consider the case with a risk-free security.

  11. Comparing Catheter-associated Urinary Tract Infection Prevention Programs Between VA and Non-VA Nursing Homes

    Science.gov (United States)

    Mody, Lona; Greene, M. Todd; Saint, Sanjay; Meddings, Jennifer; Trautner, Barbara W.; Wald, Heidi L.; Crnich, Christopher; Banaszak-Holl, Jane; McNamara, Sara E.; King, Beth J.; Hogikyan, Robert; Edson, Barbara; Krein, Sarah L.

    2018-01-01

    OBJECTIVE The impact of healthcare system integration on infection prevention programs is unknown. Using catheter-associated urinary tract infection (CAUTI) prevention as an example, we hypothesize that U.S. Department of Veterans Affairs (VA) nursing homes have a more robust infection prevention infrastructure due to integration and centralization compared with non-VA nursing homes. SETTING VA and non-VA nursing homes participating in the “AHRQ Safety Program for Long-term Care” collaborative. METHODS Nursing homes provided baseline information about their infection prevention programs to assess strengths and gaps related to CAUTI prevention. RESULTS A total of 353 (71%; 47 VA, 306 non-VA) of 494 nursing homes from 41 states responded. VA nursing homes reported more hours/week devoted to infection prevention-related activities (31 vs. 12 hours, P<.001), and were more likely to have committees that reviewed healthcare-associated infections. Compared with non-VA facilities, a higher percentage of VA nursing homes reported tracking CAUTI rates (94% vs. 66%, P<.001), sharing CAUTI data with leadership (94% vs. 70%, P=.014) and nursing personnel (85% vs. 56%, P=.003). However, fewer VA nursing homes reported having policies for appropriate catheter use (64% vs. 81%, P=.004) and catheter insertion (83% vs. 94%, P=.004). CONCLUSIONS Among nursing homes participating in an AHRQ-funded collaborative, VA and non-VA nursing homes differed in their approach to CAUTI prevention. Best practices from both settings should be applied universally to create an optimal infection prevention program within emerging integrated healthcare systems. PMID:27917728

  12. Energy Independence and Security Act of 2007: A Summary of Major Provisions

    National Research Council Canada - National Science Library

    Sissine, Fred

    2007-01-01

    The Energy Independence and Security Act (P.L. 110-140, H.R. 6) is an omnibus energy policy law that consists mainly of provisions designed to increase energy efficiency and the availability of renewable energy...

  13. 17 CFR 259.206 - Form U-6B-2, for notification of security issues exempt under section 6(b) of the Act.

    Science.gov (United States)

    2010-04-01

    ... of security issues exempt under section 6(b) of the Act. 259.206 Section 259.206 Commodity and... security issues exempt under section 6(b) of the Act. This form shall be filed pursuant to section 6(b) of the Act as the certificate of notification of the issue, sale, renewal, or guaranty of securities...

  14. 75 FR 50846 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-001...

    Science.gov (United States)

    2010-08-18

    ... INFORMATION CONTACT: For general questions and privacy issues please contact: Mary Ellen Callahan (703-235...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--001 Freedom of Information Act and Privacy Act Records System of Records AGENCY: Privacy Office, DHS. ACTION: Final rule...

  15. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  16. 75 FR 78806 - Agency Information Collection (Create Payment Request for the VA Funding Fee Payment System (VA...

    Science.gov (United States)

    2010-12-16

    ... Payment Request for the VA Funding Fee Payment System (VA FFPS); a Computer Generated Funding Fee Receipt.... 2900-0474.'' SUPPLEMENTARY INFORMATION: Title: Create Payment Request for the VA Funding Fee Payment System (VA FFPS); a Computer Generated Funding Fee Receipt, VA Form 26-8986. OMB Control Number: 2900...

  17. 17 CFR 239.500 - Form D, notice of sales of securities under Regulation D and section 4(6) of the Securities Act...

    Science.gov (United States)

    2010-04-01

    ... amount since the previously filed notice of sales on Form D, does not result in an increase of more than... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form D, notice of sales of... ACT OF 1933 Forms Pertaining to Exemptions § 239.500 Form D, notice of sales of securities under...

  18. 75 FR 8092 - Privacy Act of 1974; Department of Homeland Security/ALL-027 The History of the Department of...

    Science.gov (United States)

    2010-02-23

    ... Policy, U.S. Department of Homeland Security, Washington, DC 20528. For privacy issues please contact... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0040] Privacy Act of... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY...

  19. 78 FR 76897 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-12-19

    ... established as the Income Verification Match Center, has authority under section 8051 to verify Veterans' self...) is amending the system of records currently titled ``Income Verification Records--VA'' (89VA16) as... Reconciliation Act of 1990, provides VA the authority to verify Veterans' self-reported income to determine...

  20. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... Security, Washington, DC 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- [[Page...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of Operations... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  1. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Science.gov (United States)

    2010-03-10

    ... 20472. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management Agency System of Records AGENCY: Privacy Office...

  2. Review of Drug Quality and Security Act of 2013: The Drug Supply Chain Security Act (DSCSA

    Directory of Open Access Journals (Sweden)

    Elona Gjini

    2016-10-01

    Full Text Available The Drug Supply Chain Security Act (DSCSA signed into law in November 27, 2013 by president Obama creates a uniform national standard for tracing drug products through the supply chain. The goal of DQSA is to enhance FDA’s ability to help protect consumers by detecting and removing potential dangerous products from the pharmaceutics distribution supply chain. A new electronic, interoperable system will identify and trace only prescription drugs in the finished form for human use while distributed in the United States. The purpose of this review was to shed light on a complex and complicated process that it will require cooperation between FDA and drug manufactures, wholesale drug distributors, repackagers and dispensers. The implementation of the DSCSA is based on several law requirements and FDA has developed a schedule with time frames for each of them to be executed over a 10-year period. From this review, FDA recommendations are provided through the FDA Guidance on Identifying Suspect Product document to help trading partners and provide information about the risk of suspect drugs entering the supply chain. Moreover, FDA organized on April 5-6, 2016 in Silver Spring, MD a public workshop to gather valuable feedback from stakeholders who shared their input about the implementation of the new electronic system and its requirements. By the end of 2023, a unified system will provide easier data exchange and less errors, and will increase the safety and security of the pharmaceutical distribution supply chain.   Type: Student Project

  3. The Geometric-VaR Backtesting Method

    DEFF Research Database (Denmark)

    Wei, Wei; Pelletier, Denis

    2014-01-01

    This paper develops a new test to evaluate Value af Risk (VaR) forecasts. VaR is a standard risk measure widely utilized by financial institutions and regulators, yet estimating VaR is a challenging problem, and popular VaR forecast relies on unrealistic assumptions. Hence, assessing...

  4. 12 CFR 250.408 - Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Short-term negotiable notes of banks not securities under section 32, Banking Act of 1933. 250.408 Section 250.408 Banks and Banking FEDERAL RESERVE... securities under section 32, Banking Act of 1933. (a) The Board of Governors has been asked whether short...

  5. 78 FR 59771 - Proposed Information Collection (Create Payment Request for the VA Funding Fee Payment System (VA...

    Science.gov (United States)

    2013-09-27

    ... Payment Request for the VA Funding Fee Payment System (VA FFPS); a Computer Generated Funding Fee Receipt.... Title: Create Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated... through the Federal Docket Management System (FDMS) at www.Regulations.gov or to Nancy J. Kessinger...

  6. 48 CFR 1552.235-77 - Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business...

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Federal Insecticide, Fungicide and Rodenticide Act Confidential Business Information (DEC 1997). 1552.235-77 Section... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-77 Data Security for...

  7. VA Vascular Injury Study (VAVIS): VA-DoD extremity injury outcomes collaboration.

    Science.gov (United States)

    Shireman, Paula K; Rasmussen, Todd E; Jaramillo, Carlos A; Pugh, Mary Jo

    2015-02-03

    Limb injuries comprise 50-60% of U.S. Service member's casualties of wars in Afghanistan and Iraq. Combat-related vascular injuries are present in 12% of this cohort, a rate 5 times higher than in prior wars. Improvements in medical and surgical trauma care, including initial in-theatre limb salvage approaches (IILS) have resulted in improved survival and fewer amputations, however, the long-term outcomes such as morbidity, functional decline, and risk for late amputation of salvaged limbs using current process of care have not been studied. The long-term care of these injured warfighters poses a significant challenge to the Department of Defense (DoD) and Department of Veterans Affairs (VA). The VA Vascular Injury Study (VAVIS): VA-DoD Extremity Injury Outcomes Collaborative, funded by the VA, Health Services Research and Development Service, is a longitudinal cohort study of Veterans with vascular extremity injuries. Enrollment will begin April, 2015 and continue for 3 years. Individuals with a validated extremity vascular injury in the Department of Defense Trauma Registry will be contacted and will complete a set of validated demographic, social, behavioral, and functional status measures during interview and online/ mailed survey. Primary outcome measures will: 1) Compare injury, demographic and geospatial characteristics of patients with IILS and identify late vascular surgery related limb complications and health care utilization in Veterans receiving VA vs. non-VA care, 2) Characterize the preventive services received by individuals with vascular repair and related outcomes, and 3) Describe patient-reported functional outcomes in Veterans with traumatic vascular limb injuries. This study will provide key information about the current process of care for Active Duty Service members and Veterans with polytrauma/vascular injuries at risk for persistent morbidity and late amputation. The results of this study will be the first step for clinicians in VA and

  8. 75 FR 61252 - Proposed Information Collection (Create Payment Request for the VA Funding Fee Payment System (VA...

    Science.gov (United States)

    2010-10-04

    ... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... information through the Federal Docket Management System (FDMS) at http://www.Regulations.gov or to Nancy J...

  9. 75 FR 61859 - Proposed Information Collection (Create Payment Request for the VA Funding Fee Payment System (VA...

    Science.gov (United States)

    2010-10-06

    ... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... information through the Federal Docket Management System (FDMS) at http://www.Regulations.gov or to Nancy J...

  10. VA announces aggressive new approach to produce rapid improvements in VA medical centers

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2018-02-01

    Full Text Available No abstract available. Article truncated at 150 words. The U.S. Department of Veterans Affairs (VA announced steps that it is taking as part of an aggressive new approach to produce rapid improvements at VA’s low-performing medical facilities nationwide (1. VA defines its low-performing facilities as those medical centers that receive the lowest score in its Strategic Analytics for Improvement and Learning (SAIL star rating system, or a one-star rating out of five. The SAIL star rating was initiated in 2016 and uses a variety of measures including mortality, length of hospital stay, readmission rates, hospital complications, physician productivity and efficiency. A complete listing of the VA facilities, their star ratings and the metrics used to determine the ratings is available through the end of fiscal year 2017 (2. Based on the latest ratings, the VA currently has 15 one-star facilities including Denver, Loma Linda, and Phoenix in the Southwest (Table 1. Table 1. VA facilities with one-star ratings …

  11. 15 CFR 744.11 - License requirements that apply to entities acting contrary to the national security or foreign...

    Science.gov (United States)

    2010-01-01

    ... entities acting contrary to the national security or foreign policy interests of the United States. 744.11... national security or foreign policy interests of the United States. BIS may impose foreign policy export... of being or becoming involved in activities that are contrary to the national security or foreign...

  12. 76 FR 39315 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of...

    Science.gov (United States)

    2011-07-06

    ... the Terrorist Screening Database System of Records relates to official DHS national security and law... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 5 [Docket No. DHS-2011-0060] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--030 Use of the...

  13. 77 FR 21755 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-04-11

    ... individual's full name, Social Security Number (SSN), their company's name, sales number, and Bidder..., Fort Belvoir, VA 22060-6221. Inquiry should contain the subject individual's full name, Social Security Number (SSN), their company's name, [[Page 21756

  14. 48 CFR 853.215-70 - VA Form 10-1170, Application for Furnishing Nursing Home Care to Beneficiaries of VA.

    Science.gov (United States)

    2010-10-01

    ..., Application for Furnishing Nursing Home Care to Beneficiaries of VA. 853.215-70 Section 853.215-70 Federal... 853.215-70 VA Form 10-1170, Application for Furnishing Nursing Home Care to Beneficiaries of VA. VA Form 10-1170, Application for Furnishing Nursing Home Care to Beneficiaries of VA, will be used for...

  15. 78 FR 69858 - Privacy Act of 1974; Department of Homeland Security/Federal Emergency Management Agency-001...

    Science.gov (United States)

    2013-11-21

    ... Emergency Management Agency, 500 C Street SW., Washington, DC 20475. For privacy issues please contact... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0077] Privacy Act of..., Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy...

  16. Homeland security and public health: role of the Department of Veterans Affairs, the US Department of Homeland Security, and implications for the public health community.

    Science.gov (United States)

    Koenig, Kristi L

    2003-01-01

    The terrorist attacks of 11 September 2001 led to the largest US Government transformation since the formation of the Department of Defense following World War II. More than 22 different agencies, in whole or in part, and >170,000 employees were reorganized to form a new Cabinet-level Department of Homeland Security (DHS), with the primary mission to protect the American homeland. Legislation enacted in November 2002 transferred the entire Federal Emergency Management Agency and several Department of Health and Human Services (HHS) assets to DHS, including the Office of Emergency Response, and oversight for the National Disaster Medical System, Strategic National Stockpile, and Metropolitan Medical Response System. This created a potential separation of "health" and "medical" assets between the DHS and HHS. A subsequent presidential directive mandated the development of a National Incident Management System and an all-hazard National Response Plan. While no Department of Veterans Affairs (VA) assets were targeted for transfer, the VA remains the largest integrated healthcare system in the nation with important support roles in homeland security that complement its primary mission to provide care to veterans. The Emergency Management Strategic Healthcare Group (EMSHG) within the VA's medical component, the Veteran Health Administration (VHA), is the executive agent for the VA's Fourth Mission, emergency management. In addition to providing comprehensive emergency management services to the VA, the EMSHG coordinates medical back-up to the Department of Defense, and assists the public via the National Disaster Medical System and the National Response Plan. This article describes the VA's role in homeland security and disasters, and provides an overview of the ongoing organizational and operational changes introduced by the formation of the new DHS. Challenges and opportunities for public health are highlighted.

  17. 75 FR 5491 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... addressing privacy concerns. The fifteen- year retention period will allow CBP to access the data when needed... security, law enforcement and counterterrorism missions, while addressing privacy concerns. Legal or...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs and Border...

  18. Biosynthesis of actinorhodin and related antibiotics: discovery of alternative routes for quinone formation encoded in the act gene cluster.

    Science.gov (United States)

    Okamoto, Susumu; Taguchi, Takaaki; Ochi, Kozo; Ichinose, Koji

    2009-02-27

    All known benzoisochromanequinone (BIQ) biosynthetic gene clusters carry a set of genes encoding a two-component monooxygenase homologous to the ActVA-ORF5/ActVB system for actinorhodin biosynthesis in Streptomyces coelicolor A3(2). Here, we conducted molecular genetic and biochemical studies of this enzyme system. Inactivation of actVA-ORF5 yielded a shunt product, actinoperylone (ACPL), apparently derived from 6-deoxy-dihydrokalafungin. Similarly, deletion of actVB resulted in accumulation of ACPL, indicating a critical role for the monooxygenase system in C-6 oxygenation, a biosynthetic step common to all BIQ biosyntheses. Furthermore, in vitro, we showed a quinone-forming activity of the ActVA-ORF5/ActVB system in addition to that of a known C-6 monooxygenase, ActVA-ORF6, by using emodinanthrone as a model substrate. Our results demonstrate that the act gene cluster encodes two alternative routes for quinone formation by C-6 oxygenation in BIQ biosynthesis.

  19. 75 FR 60171 - Proposed Information Collection (Credit Underwriting Standards and Procedures for Processing VA...

    Science.gov (United States)

    2010-09-29

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0521] Proposed Information Collection (Credit Underwriting Standards and Procedures for Processing VA Guaranteed Loans) Activity: Comment Request AGENCY... comment on the proposed collection of certain information by the agency. Under the Paperwork Reduction Act...

  20. 78 FR 60379 - Proposed Information Collection (Credit Underwriting Standards and Procedures for Processing VA...

    Science.gov (United States)

    2013-10-01

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0521] Proposed Information Collection (Credit Underwriting Standards and Procedures for Processing VA Guaranteed Loans) Activity: Comment Request AGENCY... comment on the proposed collection of certain information by the agency. Under the Paperwork Reduction Act...

  1. Do Older Rural and Urban Veterans Experience Different Rates of Unplanned Readmission to VA and Non-VA Hospitals?

    Science.gov (United States)

    Weeks, William B.; Lee, Richard E.; Wallace, Amy E.; West, Alan N.; Bagian, James P.

    2009-01-01

    Context: Unplanned readmission within 30 days of discharge is an indicator of hospital quality. Purpose: We wanted to determine whether older rural veterans who were enrolled in the VA had different rates of unplanned readmission to VA or non-VA hospitals than their urban counterparts. Methods: We used the combined VA/Medicare dataset to examine…

  2. P.L. 110-140, "Energy Independence and Security Act of 2007" (2007)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2007-12-13

    An act to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.

  3. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Science.gov (United States)

    2010-02-23

    ... privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

  4. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ...; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  5. 38 CFR 1.575 - Social security numbers in veterans' benefits matters.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Social security numbers... Affairs Records § 1.575 Social security numbers in veterans' benefits matters. (a) Except as provided in... because of refusal to disclose to the Department of Veterans Affairs a social security number. (b) VA...

  6. Non-VA Hospital System (NVH)

    Data.gov (United States)

    Department of Veterans Affairs — The Veterans Health Administration (VHA) pays for care provided to VA beneficiaries in non-VA hospitals through its contract hospitalization program as mandated by...

  7. Accessing VA Healthcare During Large-Scale Natural Disasters.

    Science.gov (United States)

    Der-Martirosian, Claudia; Pinnock, Laura; Dobalian, Aram

    2017-01-01

    Natural disasters can lead to the closure of medical facilities including the Veterans Affairs (VA), thus impacting access to healthcare for U.S. military veteran VA users. We examined the characteristics of VA patients who reported having difficulty accessing care if their usual source of VA care was closed because of natural disasters. A total of 2,264 veteran VA users living in the U.S. northeast region participated in a 2015 cross-sectional representative survey. The study used VA administrative data in a complex stratified survey design with a multimode approach. A total of 36% of veteran VA users reported having difficulty accessing care elsewhere, negatively impacting the functionally impaired and lower income VA patients.

  8. 75 FR 30782 - Reorganization/Expansion of Foreign-Trade Zone 20; Hampton Roads, VA, Area

    Science.gov (United States)

    2010-06-02

    ... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [Order No. 1683] Reorganization/Expansion of Foreign-Trade Zone 20; Hampton Roads, VA, Area Pursuant to its authority under the Foreign-Trade Zones Act...) in the Hampton Roads, Virginia, area within the Norfolk Customs and Border Protection port of entry...

  9. 78 FR 63311 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-10-23

    ... or fraud, or harm to the security, confidentiality, or integrity of this system or other systems or...). In addition, during the comment period, comments may be viewed online through the Federal Docket... the media on request.] Additional information includes Social Security Number, VA Employee...

  10. 75 FR 26847 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-05-12

    ... disclosed to Federal, State, or local professional, regulatory, or disciplinary organizations or associations, including but not limited to bar associations, State licensing boards, and similar professional... maintained in secure files within the OMI and indexed on a secure document management server within the VA...

  11. Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification rules under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; other modifications to the HIPAA rules.

    Science.gov (United States)

    2013-01-25

    The Department of Health and Human Services (HHS or ``the Department'') is issuing this final rule to: Modify the Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security, and Enforcement Rules to implement statutory amendments under the Health Information Technology for Economic and Clinical Health Act (``the HITECH Act'' or ``the Act'') to strengthen the privacy and security protection for individuals' health information; modify the rule for Breach Notification for Unsecured Protected Health Information (Breach Notification Rule) under the HITECH Act to address public comment received on the interim final rule; modify the HIPAA Privacy Rule to strengthen the privacy protections for genetic information by implementing section 105 of Title I of the Genetic Information Nondiscrimination Act of 2008 (GINA); and make certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on the regulated entities.

  12. 76 FR 79218 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-Robotics...

    Science.gov (United States)

    2011-12-21

    ... Production Act of 1993--Robotics Technology Consortium, Inc. Notice is hereby given that, on November 22....C. 4301 et seq. (``the Act''), Robotics Technology Consortium, Inc. (``RTC'') has filed written...., Arlington, VA; Jaybridge Robotics, Cambridge, MA; Klett Consulting Group, Inc., Virginia Beach, VA; and Next...

  13. 76 FR 49500 - Privacy Act of 1974; Department of Homeland Security United States Coast Guard-020 Substance...

    Science.gov (United States)

    2011-08-10

    ... 7101 Washington, DC 20593. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0053] Privacy Act of... Treatment Program System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  14. A study on the barriers of the implementation of social security act in ...

    African Journals Online (AJOL)

    In this study, an analytical review was done on the historical process and contexts of welfare system and social security in order to analyze and evaluate the main features of this act especially in the area of medical services. It was also attempted to study the executive barriers of the appropriate implementation of social ...

  15. VA office of inspector general releases scathing report of Phoenix VA

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2014-08-01

    Full Text Available No abstract available. Article truncated at 150 words. The long-awaited Office of Inspector General’s (OIG report on the Phoenix VA Health Care System (PVAHCS was released on August 27, 2014 (1. The report was scathing in its evaluation of VA practices and leadership. Five questions were investigated: 1.Were there clinically significant delays in care? 2. Did PVAHCS omit the names of veterans waiting for care from its Electronic Wait List (EWL? 3. Were PVAHCS personnel not following established scheduling procedures? 4. Did the PVAHCS culture emphasize goals at the expense of patient care? 5. Are scheduling deficiencies systemic throughout the VA? In each case, the OIG found that the allegations were true. Despite initial denials, the OIG report showed that former PVAHCS director Sharon Helman, associate director Lance Robinson, hospital administration director Brad Curry, chief of staff Darren Deering and other senior executives were aware of delays in care and unofficial wait lists. Perhaps most disturbing is ...

  16. VA and DOD Health Care: First Federal Health Care Center Established, but Implementation Concerns Need to Be Addressed

    Science.gov (United States)

    2011-07-01

    procedures for the reporting of information security incidents. However, VA and DOD did not meet designated deadlines for the three capabilities that were...addition to the contact named above, Marcia A. Mann, Assistant Director; Jill K. Center; Kaycee M. Glavich; E. Jane Whipple ; and Malissa G. Winograd

  17. Assessing the quality of VA Human Research Protection Programs: VA vs. affiliated University Institutional Review Board.

    Science.gov (United States)

    Tsan, Min-Fu; Nguyen, Yen; Brooks, Robert

    2013-04-01

    We compared the Human Research Protection Program (HRPP) quality indicator data of the Department of Veterans Affairs (VA) facilities using their own VA institutional review boards (IRBs) with those using affiliated university IRBs. From a total of 25 performance metrics, 13 did not demonstrate statistically significant differences, while 12 reached statistically significance differences. Among the 12 with statistically significant differences, facilities using their own VA IRBs performed better on four of the metrics, while facilities using affiliate IRBs performed better on eight. However, the absolute difference was small (0.2-2.7%) in all instances, suggesting that they were of no practical significance. We conclude that it is acceptable for facilities to use their own VA IRBs or affiliated university IRBs as their IRBs of record.

  18. Understanding Title V of the Social Security Act: A Guide to the Provisions of the Federal Maternal and Child Health Block Grant.

    Science.gov (United States)

    Health Resources and Services Administration (DHHS/PHS), Washington, DC. Maternal and Child Health Bureau.

    The Maternal and Child Health (MCH) Services Block Grant (Title V of the Social Security Act) has operated as a federal-state partnership since the Social Security Act was passed in 1935. Through Title V, the federal government pledged its support of state efforts to extend health and welfare services for mothers and children. Title V has been…

  19. 78 FR 30319 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Security...

    Science.gov (United States)

    2013-05-22

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2002-11602] Intent to Request Renewal From OMB of One Current Public Collection of Information: Security Programs for..., Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6011. FOR FURTHER INFORMATION...

  20. Characteristics Associated With Utilization of VA and Non-VA Care Among Iraq and Afghanistan Veterans With Post-Traumatic Stress Disorder.

    Science.gov (United States)

    Finley, Erin P; Mader, Michael; Bollinger, Mary J; Haro, Elizabeth K; Garcia, Hector A; Huynh, Alexis K; Pugh, Jacqueline A; Pugh, Mary Jo

    2017-11-01

    Post-traumatic stress disorder (PTSD) affects nearly one-fifth of Iraq and Afghanistan Veterans (IAV). The Department of Veterans Affairs (VA) has invested in making evidence-based psychotherapies for PTSD available at every VA facility nationwide; however, an unknown number of veterans opt to receive care in the community rather than with VA. We compared PTSD care utilization patterns among Texas IAV with PTSD, an ethnically, geographically, and economically diverse group. To identify IAV in Texas with service-connected disability for PTSD, we used a crosswalk of VA administrative data from the Operation Enduring Freedom/Operation Iraqi Freedom Roster and service-connected disability data from the Veterans Benefits Administration. We then surveyed a random sample of 1,128 veterans from the cohort, stratified by sex, rurality, and past use/nonuse of any VA care. Respondents were classified into current utilization groups (VA only, non-VA only, dual care, and no professional PTSD treatment) on the basis of reported PTSD care in the prior 12 months. Responses were weighted to account for sample stratification and for response rate within each strata. Utilization group characteristics were compared to the population mean using the one sample Z-test for proportions, or the t-test for means. A multinomial logistic regression model was used to identify survey variables significantly associated with current utilization group. 249 IAV completed the survey (28.4% response rate). Respondents reported receiving PTSD care: in the VA only (58.3%); in military or community-based settings (including private practitioners) (non-VA only, 8.7%); and in both VA and non-VA settings (dual care, 14.5%). The remainder (18.5%) reported no professional PTSD care in the prior year. Veterans ineligible for Department of Defense care, uncomfortable talking about their problems, and opposed to medication were more likely to receive non-VA care only, whereas those with lower household income

  1. 76 FR 72428 - Privacy Act of 1974; Department of Homeland Security/ALL-017 General Legal Records System of Records

    Science.gov (United States)

    2011-11-23

    ... http://www.regulations.gov . FOR FURTHER INFORMATION CONTACT: For general questions and privacy issues... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0094] Privacy Act of 1974; Department of Homeland Security/ALL--017 General Legal Records System of Records AGENCY: Privacy...

  2. KENO V.a Primer: A Primer for Criticality Calculations with SCALE/KENO V.a Using CSPAN for Input

    International Nuclear Information System (INIS)

    Busch, R.D.

    2003-01-01

    The SCALE (Standardized Computer Analyses for Licensing Evaluation) computer software system developed at Oak Ridge National Laboratory (ORNL) is widely used and accepted around the world for criticality safety analyses. The well-known KENO V.a three-dimensional Monte Carlo criticality computer code is the primary criticality safety analysis tool in SCALE. The KENO V.a primer is designed to help a new user understand and use the SCALE/KENO V.a Monte Carlo code for nuclear criticality safety analyses. It assumes that the user has a college education in a technical field. There is no assumption of familiarity with Monte Carlo codes in general or with SCALE/KENO V.a in particular. The primer is designed to teach by example, with each example illustrating two or three features of SCALE/KENO V.a that are useful in criticality analyses. The primer is based on SCALE 4.4a, which includes the Criticality Safety Processor for Analysis (CSPAN) input processor for Windows personal computers (PCs). A second edition of the primer, which uses the new KENO Visual Editor, is currently under development at ORNL and is planned for publication in late 2003. Each example in this first edition of the primer uses CSPAN to provide the framework for data input. Starting with a Quickstart section, the primer gives an overview of the basic requirements for SCALE/KENO V.a input and allows the user to quickly run a simple criticality problem with SCALE/KENO V.a. The sections that follow Quickstart include a list of basic objectives at the beginning that identifies the goal of the section and the individual SCALE/KENO V.a features which are covered in detail in the example problems in that section. Upon completion of the primer, a new user should be comfortable using CSPAN to set up criticality problems in SCALE/KENO V.a

  3. 76 FR 18954 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal...

    Science.gov (United States)

    2011-04-06

    ... issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Federal Emergency Management Agency DHS/FEMA-011 Training and Exercise Program Records System of Records AGENCY: Privacy Office...

  4. Report of VA Medical Training Programs

    Data.gov (United States)

    Department of Veterans Affairs — The Report of VA Medical Training Programs Database is used to track medical center health services trainees and VA physicians serving as faculty. The database also...

  5. Notification: Audit of the U.S. EPA's Compliance with the Federal Information Security Management Act (FISMA)

    Science.gov (United States)

    Project #OA-FY13-0280, May 9, 2013. The Office of Inspector General plans to begin fieldwork for an audit of the U.S. Environmental Protection Agency’s compliance with the Federal Information Security Management Act.

  6. 76 FR 39963 - Order Pursuant to Section 36 of the Securities Exchange Act of 1934 Granting Temporary Exemptions...

    Science.gov (United States)

    2011-07-07

    ... Exchange Act Release No. 64017, supra note 9. \\16\\ The Commission stresses that the functions highlighted... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64796; File No. S7-28-11] Order Pursuant to...- counter (``OTC'') market are centrally cleared.\\4\\ One of the key ways in which the Dodd-Frank Act seeks...

  7. Notification: FY2017 Audit of the CSB's compliance with the Federal Information Security Management Act (FISMA)

    Science.gov (United States)

    Project #, May 23, 2017. The EPA OIG plans to begin fieldwork for an audit of the U.S. Chemical Safety and Hazard Investigation Board’s (CSB’s) compliance with the Federal Information Security Modernization Act of 2014 (FISMA).

  8. 76 FR 30598 - Payment or Reimbursement for Emergency Services for Nonservice-Connected Conditions in Non-VA...

    Science.gov (United States)

    2011-05-26

    ... DEPARTMENT OF VETERANS AFFAIRS 38 CFR Part 17 RIN 2900-AN86 Payment or Reimbursement for Emergency...) ``Payment or Reimbursement for Emergency Services for Nonservice-Connected Conditions in Non-VA Facilities... Reimbursement Act. Some of the revisions in this proposed rule are purely technical, matching the language of...

  9. VaR Methodology Application for Banking Currency Portfolios

    Directory of Open Access Journals (Sweden)

    Daniel Armeanu

    2007-02-01

    Full Text Available VaR has become the standard measure that financial analysts use to quantify market risk. VaR measures can have many applications, such as in risk management, to evaluate the performance of risk takers and for regulatory requirements, and hence it is very important to develop methodologies that provide accurate estimates. In particular, the Basel Committee on Banking Supervision at the Bank for International Settlements imposes to financial institutions such as banks and investment firms to meet capital requirements based on VaR estimates. In this paper we determine VaR for a banking currency portfolio and respect rules of National Bank of Romania regarding VaR report.

  10. The WHO 2016 verbal autopsy instrument: An international standard suitable for automated analysis by InterVA, InSilicoVA, and Tariff 2.0.

    Directory of Open Access Journals (Sweden)

    Erin K Nichols

    2018-01-01

    Full Text Available Verbal autopsy (VA is a practical method for determining probable causes of death at the population level in places where systems for medical certification of cause of death are weak. VA methods suitable for use in routine settings, such as civil registration and vital statistics (CRVS systems, have developed rapidly in the last decade. These developments have been part of a growing global momentum to strengthen CRVS systems in low-income countries. With this momentum have come pressure for continued research and development of VA methods and the need for a single standard VA instrument on which multiple automated diagnostic methods can be developed.In 2016, partners harmonized a WHO VA standard instrument that fully incorporates the indicators necessary to run currently available automated diagnostic algorithms. The WHO 2016 VA instrument, together with validated approaches to analyzing VA data, offers countries solutions to improving information about patterns of cause-specific mortality. This VA instrument offers the opportunity to harmonize the automated diagnostic algorithms in the future.Despite all improvements in design and technology, VA is only recommended where medical certification of cause of death is not possible. The method can nevertheless provide sufficient information to guide public health priorities in communities in which physician certification of deaths is largely unavailable. The WHO 2016 VA instrument, together with validated approaches to analyzing VA data, offers countries solutions to improving information about patterns of cause-specific mortality.

  11. Education Issues Raised by S.744: The Border Security, Economic Opportunity, and Immigration Modernization Act

    Science.gov (United States)

    Murphy, Garrett

    2014-01-01

    This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…

  12. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  13. Has the VA Become a White Elephant?

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2016-11-01

    Full Text Available No abstract available. Article truncated at 150 words. As I write this Dennis Wagner is publishing a series of articles in the Arizona Republic describing his quest to find out if care at VA hospitals have improved over the last 2 years (1. To begin the article Wagner describes the fable of the King of Siam who presented albino pachyderms to his enemies knowing they would be bankrupted because the cost of food and care outweighed all usefulness. A modern expression derives from this parable: the white elephant. The Department of Veterans Affairs (VA has prided itself on being a leader in healthcare. It is the largest healthcare system in the US, implemented the first electronic medical record, and more than 70 percent of all US doctors have received training in the VA healthcare system (2. This year the VA is celebrating the 70th anniversary of its partnership with US medical schools. Beginning in 1946, the VA partnered ...

  14. Brand-Name Prescription Drug Use Among Diabetes Patients in the VA and Medicare Part D: A National Comparison

    Science.gov (United States)

    Gellad, Walid F.; Donohue, Julie M.; Zhao, Xinhua; Mor, Maria K.; Thorpe, Carolyn T.; Smith, Jeremy; Good, Chester B.; Fine, Michael J.; Morden, Nancy E.

    2013-01-01

    Background Medicare Part D and the Department of Veterans Affairs (VA) use different approaches to manage prescription drug benefits, with implications for spending. Medicare relies on private plans with distinct formularies, whereas VA administers its own benefit using a national formulary. Objective To compare overall and regional rates of brand-name drug use among older adults with diabetes in Medicare and VA. Design Retrospective cohort Setting Medicare and VA Patients National sample in 2008 of 1,061,095 Part D beneficiaries and 510,485 Veterans age 65+ with diabetes. Measurements Percent of patients on oral hypoglycemics, statins, and angiotensin-converting-enzyme inhibitors/angiotensin-receptor-blockers who filled brand-name drugs and percent of patients on long-acting insulin who filled analogues. We compared sociodemographic and health-status adjusted hospital referral region (HRR) brand-name use to examine local practice patterns, and calculated changes in spending if each system’s brand-name use mirrored the other. Results Brand-name use in Medicare was 2–3 times that of VA: 35.3% vs. 12.7% for oral hypoglycemics, 50.7% vs. 18.2% for statins, 42.5% vs. 20.8% for angiotensin-converting-enzyme inhibitors/angiotensin-receptor-blockers, and 75.1% vs. 27.0% for insulin analogues. Adjusted HRR brand-name statin use ranged (5th to 95th percentile) from 41.0%–58.3% in Medicare and 6.2%–38.2% in VA. For each drug group, the HRR at the 95th percentile in VA had lower brand-name use than the 5th percentile HRR in Medicare. Medicare spending in this population would have been $1.4 billion less if brand-name use matched the VA for these medications. Limitation This analysis cannot fully describe the factors underlying differences in brand-name use. Conclusions Medicare beneficiaries with diabetes use 2–3 times more brand-name drugs than a comparable group within VA, at substantial excess cost. Primary Funding Sources VA; NIH; RWJF PMID:23752663

  15. Balancing Demand and Supply for Veterans' Health Care: A Summary of Three RAND Assessments Conducted Under the Veterans Choice Act.

    Science.gov (United States)

    Farmer, Carrie M; Hosek, Susan D; Adamson, David M

    2016-06-20

    In response to concerns that the Department of Veterans Affairs (VA) has faced about veterans' access to care and the quality of care delivered, Congress enacted the Veterans Access, Choice, and Accountability Act of 2014 ("Veterans Choice Act") in August 2014. The law was passed to help address access issues by expanding the criteria through which veterans can seek care from civilian providers. In addition, the law called for a series of independent assessments of the VA health care system across a broad array of topics related to the delivery of health care services to veterans in VA-owned and -operated facilities, as well as those under contract to VA. RAND conducted three of these assessments: Veteran demographics and health care needs (A), VA health care capabilities (B), and VA authorities and mechanisms for purchasing care (C). This article summarizes the findings of our assessments and includes recommendations from the reports for improving the match between veterans' needs and VA's capabilities, including VA's ability to purchase necessary care from the private sector.

  16. 75 FR 44803 - Privacy Act of 1974; Notice of a New Privacy Act System of Records (SORN), Ginnie Mae Master...

    Science.gov (United States)

    2010-07-29

    ...(s), social security number, date of birth, property address, telephone number, email address, and... Affairs (VA), Department of Agriculture Rural Housing Service (RHS), or HUD Office of Public and Indian... Agriculture RHS, and PIH Master Subservicer's loan numbers. Safeguards: Electronic records are maintained in a...

  17. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Science.gov (United States)

    2010-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is not...

  18. VaST: A variability search toolkit

    Science.gov (United States)

    Sokolovsky, K. V.; Lebedev, A. A.

    2018-01-01

    Variability Search Toolkit (VaST) is a software package designed to find variable objects in a series of sky images. It can be run from a script or interactively using its graphical interface. VaST relies on source list matching as opposed to image subtraction. SExtractor is used to generate source lists and perform aperture or PSF-fitting photometry (with PSFEx). Variability indices that characterize scatter and smoothness of a lightcurve are computed for all objects. Candidate variables are identified as objects having high variability index values compared to other objects of similar brightness. The two distinguishing features of VaST are its ability to perform accurate aperture photometry of images obtained with non-linear detectors and handle complex image distortions. The software has been successfully applied to images obtained with telescopes ranging from 0.08 to 2.5 m in diameter equipped with a variety of detectors including CCD, CMOS, MIC and photographic plates. About 1800 variable stars have been discovered with VaST. It is used as a transient detection engine in the New Milky Way (NMW) nova patrol. The code is written in C and can be easily compiled on the majority of UNIX-like systems. VaST is free software available at http://scan.sai.msu.ru/vast/.

  19. Technology Reference Model (TRM) Reports: VA Category Mapping Report

    Data.gov (United States)

    Department of Veterans Affairs — The One VA Enterprise Architecture (OneVA EA) is a comprehensive picture of the Department of Veterans Affairs' (VA) operations, capabilities and services and the...

  20. Visionary leadership and the future of VA health system.

    Science.gov (United States)

    Bezold, C; Mayer, E; Dighe, A

    1997-01-01

    As the U.S. Department of Veterans Affairs (VA) makes the change over to Veterans Integrated Service Network (VISNs) the need for new and better leadership is warranted if VA wants to not only survive, but thrive in the emerging twenty-first century healthcare system. VA can prepare for the future and meet the challenges facing them by adopting a system of visionary leadership. The use of scenarios and vision techniques are explained as they relate to VA's efforts to move toward their new system of VISNs. The four scenarios provide snapshots of possible futures for the U.S. healthcare system as well as the possible future role and mission of VA--from VA disappearing to its becoming a premier virtual organization.

  1. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0055] Privacy Act of... Operations Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  2. ESTIMASI NILAI VaR PORTOFOLIO MENGGUNAKAN FUNGSI ARCHIMEDEAN COPULA

    Directory of Open Access Journals (Sweden)

    AULIA ATIKA PRAWIBTA SUHARTO

    2017-01-01

    Full Text Available Value at Risk explains the magnitude of the worst losses occurred in financial products investments with a certain level of confidence and time interval. The purpose of this study is to estimate the VaR of portfolio using Archimedean Copula family. The methods for calculating the VaR are as follows: (1 calculating the stock return; (2 calculating descriptive statistics of return; (3 checking for the nature of autocorrelation and heteroscedasticity effects on stock return data; (4 checking for the presence of extreme value by using Pareto tail; (5 estimating the parameters of Achimedean Copula family; (6 conducting simulations of Archimedean Copula; (7 estimating the value of the stock portfolio VaR. This study uses the closing price of TLKM and GGRM. At 90% the VaR obtained using Clayton, Gumbel, Frank copulas are 0.9562%, 1.0189%, 0.9827% respectively. At 95% the VaR obtained using Clayton, Gumbel, Frank copulas are 1.2930%, 1.2522%, 1.3152% respectively. At 99% the VaR obtained using Clayton, Gumbel, Frank copulas are 2.0327%, 1.9164%, is 1.8678% respectively. In conclusion estimation of VaR using Clayton copula yields the highest VaR.

  3. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  4. 75 FR 79947 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-031...

    Science.gov (United States)

    2010-12-21

    ... contains regulatory documents #0;having general applicability and legal effect, most of which are keyed #0... particularly to any potential plans to collect cybersecurity information from private entities regarding cyber... security threats and would not include the Bank Secrecy Act (BSA) related SARs filed with FinCEN. The ISE...

  5. 38 CFR 1.203 - Information to be reported to VA Police.

    Science.gov (United States)

    2010-07-01

    ... reported to VA Police. 1.203 Section 1.203 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS... be reported to VA Police. Information about actual or possible violations of criminal laws related to... occurs on VA premises, will be reported by VA management officials to the VA police component with...

  6. 20 CFR 638.528 - Social Security.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...

  7. Notification: Audit of the U.S. Environmental Protection Agency’s Compliance with the Federal Information Security Management Act

    Science.gov (United States)

    Project #OA-FY14-0135, February 10, 2014. The Office of Inspector General plans to begin fieldwork for an audit of the U.S. Environmental Protection Agency's compliance with the Federal Information Security Management Act (FISMA).

  8. SlaVaComp: Konvertierungstool (= SlaVaComp Fonts Converter

    Directory of Open Access Journals (Sweden)

    Simon Skilevic

    2013-12-01

    Full Text Available Der vorliegende Beitrag informiert über ein Tool, das im Rahmen eines Freiburger Projekts zur historischen Korpuslinguistik entwickelt wurde und dazu dient, kirchenslavische Texte, die ohne Einsatz von Unicode digitalisiert wurden, ohne Verlust von Information bzw. Formatierung ins Unicode-Format zu überführen. Das Tool heißt SlaVaComp-Konvertierer. Es eignet sich für die Konvertierung aller idiosynkratischen Fonts und kann somit nicht nur in der Paläoslavistik, sondern in allen historisch arbeitenden Philologien eingesetzt werden. ____________________ This paper presents a fonts converter that was developed as a part of the Freiburg project on historical corpus linguistics. The tool named SlaVaComp-Konvertierer converts Church Slavonic texts digitized with non-Unicode fonts into the Unicode format without any loss of information contained in the original file and without damage to the original formatting. It is suitable for the conversion of all idiosyncratic fonts—not only Church Slavonic—and therefore can be used not only in Palaeoslavistic, but also in all historical and philological studies.

  9. Poststroke Rehabilitation and Restorative Care Utilization: A Comparison Between VA Community Living Centers and VA-contracted Community Nursing Homes.

    Science.gov (United States)

    Jia, Huanguang; Pei, Qinglin; Sullivan, Charles T; Cowper Ripley, Diane C; Wu, Samuel S; Bates, Barbara E; Vogel, W Bruce; Bidelspach, Douglas E; Wang, Xinping; Hoffman, Nannette

    2016-03-01

    Effective poststroke rehabilitation care can speed patient recovery and minimize patient functional disabilities. Veterans affairs (VA) community living centers (CLCs) and VA-contracted community nursing homes (CNHs) are the 2 major sources of institutional long-term care for Veterans with stroke receiving care under VA auspices. This study compares rehabilitation therapy and restorative nursing care among Veterans residing in VA CLCs versus those Veterans in VA-contracted CNHs. Retrospective observational. All Veterans diagnosed with stroke, newly admitted to the CLCs or CNHs during the study period who completed at least 2 Minimum Data Set assessments postadmission. The outcomes were numbers of days for rehabilitation therapy and restorative nursing care received by the Veterans during their stays in CLCs or CNHs as documented in the Minimum Data Set databases. For rehabilitation therapy, the CLC Veterans had lower user rates (75.2% vs. 76.4%, P=0.078) and fewer observed therapy days (4.9 vs. 6.4, Pcare, CLC Veterans had higher user rates (33.5% vs. 30.6%, Pcare days (9.4 vs. 5.9, Pcare (coefficient=5.48±0.37, Pcare both before and after risk adjustment.

  10. Theater Security Cooperation Planning with Article 98: How the 2002 Servicemembers' Protection Act Fosters China's Quest for Global Influence

    National Research Council Canada - National Science Library

    Hernandez, Jaime A

    2005-01-01

    The Combatant Commander is hindered in constructing Theater Security Cooperation plans due to the restrictions placed upon foreign military aid dispersal as a result of the 2002 American Servicemembers' Protection Act...

  11. 78 FR 44100 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-23

    ..., Learning Management System (LMS). System location: Verizon Business--IAD6, 21830 UUNET Way, Ashburn, VA... Management Center; Defense Technology Security Administration; Intelligence Oversight; Joint Chiefs of Staff...; OSD Operation Test & Evaluation; Office of the Under Secretary of Defense (OUSD) Intelligence; Cost...

  12. 75 FR 39184 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-029 Civil...

    Science.gov (United States)

    2010-07-08

    ... questions and privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0034] Privacy Act of 1974: Implementation of Exemptions...: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The Department of Homeland Security...

  13. Technology Reference Model (TRM) Reports: VA Category Framework Count Report

    Data.gov (United States)

    Department of Veterans Affairs — The One VA Enterprise Architecture (OneVA EA) is a comprehensive picture of the Department of Veterans Affairs' (VA) operations, capabilities and services and the...

  14. Development of a continuous energy version of KENO V.a

    International Nuclear Information System (INIS)

    Dunn, M.E.; Bentley, C.L.; Goluoglu, S.; Paschal, L.S.; Dodds, H.L.

    1997-01-01

    KENO V.a is a multigroup Monte Carlo code that solves the Boltzmann transport equation and is used extensively in the nuclear criticality safety community to calculate the effective multiplication factor k eff of systems containing fissile material. Because of the smaller amount of disk storage and CPU time required in calculations, multigroup approaches have been preferred over continuous energy (point) approaches in the past to solve the transport equation. With the advent of high-performance computers, storage and CPU limitations are less restrictive, thereby making continuous energy methods viable for transport calculations. Moreover, continuous energy methods avoid many of the assumptions and approximations inherent in multigroup methods. Because a continuous energy version of KENO V.a does not exist, the objective of the work is to develop a new version of KENO V.a that utilizes continuous energy cross sections. Currently, a point cross-section library, which is based on a raw continuous energy cross-section library such as ENDF/B-V is not available for implementation in KENO V.a; however, point cross-section libraries are available for MCNP, another widely used Monte Carlo transport code. Since MCNP cross sections are based on ENDF data and are readily available, a new version of KENO V.a named PKENO V.a has been developed that performs the random walk using MCNP cross sections. To utilize point cross sections, extensive modifications have been made to KENO V.a. At this point in the research, testing of the code is underway. In particular, PKENO V.a, KENO V.a, and MCNP have been used to model nine critical experiments and one subcritical problem. The results obtained with PKENO V.a are in excellent agreement with MCNP, KENO V.a, and experiments

  15. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Science.gov (United States)

    2011-08-30

    ... AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of records. SUMMARY: In accordance with... Security Office of Health Affairs to collect and maintain records on individuals who receive emergency care... consistent, quality medical care. To support MQM, OHA operates the electronic Patient Care Record (ePCR), an...

  16. Development of a parallelization method for KENO V.a

    International Nuclear Information System (INIS)

    Basoglu, B.; Bentley, C.; Dunn, M.

    1995-01-01

    The KENO V.a codes is a widely used Monte carlo codes that is part of the SCALE modular codes system for performing standardized computer analysis of nuclear systems for licensing evaluation. In the past few years, attempts have been made to speed up KENO V.a using new generation computers. In this paper we report on the initial development of a parallel version of KENO V.a for the Kendall Square Research supercomputer (KSRI) at ORNL. Investigations thus far have shown that the parallel code provides accurate results with significantly reduced computation times relative to the conventional KENO V.a code

  17. 77 FR 69807 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-11-21

    ... Social Security or tax identification number of providers or potential providers of care; citizenship..., education level; VA disability payment records; digital signatures where appropriate to assert validity of... personnel. 16. To Federal and State agencies to validate demographic data (e.g., SSN, citizenship status...

  18. Analysis of VaR on Stock Investing%股票投资的风险价值VaR分析

    Institute of Scientific and Technical Information of China (English)

    张江红; 唐泉

    2011-01-01

    VaR is a tool to measure financial risk,which is supported and recognized by the international financial community in recent years.For equity portfolios consisting of different market factors or different financial instruments,VaR can reliably evaluate the market risks.In the paper the basic principle and calculation of VaR is introduced,the company stock value at risk has been analyzed using normal method,which company has issued convertible bond and stock.Meanwhile the affect that the issuance of convertible bond to the underlying stock fluctuation has been taken into account in order to provide reference for the different types of investors.%VaR是近年来受到国际金融界广泛支持和认可的一种度量金融风险的工具.对于不同市场因子和不同金融工具的投资组合,VaR可以相对可靠地衡量其市场风险.本文介绍了VaR的基本原理和计算方法,并用正态分布对发行有可转债的上市公司股票的风险价值进行分析,考虑了可转债的发行对标的股票波动的影响,以期为资本市场不同类型的投资者在进行资本投资前估计风险提供参考.

  19. 76 FR 22939 - Sunshine Act Meeting

    Science.gov (United States)

    2011-04-25

    ... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... Swap,'' ``Security-Based Swap Agreement,'' the regulation of mixed swaps, and books and records...

  20. Expression of Vitis amurensis VaERF20 in Arabidopsis thaliana Improves Resistance to Botrytis cinerea and Pseudomonas syringae pv. Tomato DC3000

    Directory of Open Access Journals (Sweden)

    Mengnan Wang

    2018-03-01

    Full Text Available Ethylene response factor (ERF transcription factors play important roles in regulating immune responses in plants. In our study, we characterized a member of the ERF transcription factor family, VaERF20, from the Chinese wild Vitis genotype, V. amurensis Rupr “Shuangyou”. Phylogenetic analysis indicated that VaERF20 belongs to group IXc of the ERF family, in which many members are known to contribute to fighting pathogen infection. Consistent with this, expression of VaERF20 was induced by treatment with the necrotrophic fungal pathogen Botrytis cinerea (B. cinerea in “Shuangyou” and V. vinifera “Red Globe”. Arabidopsis thaliana plants over-expressing VaERF20 displayed enhanced resistance to B. cinerea and the bacterium Pseudomonas syringae pv. tomato (Pst DC3000. Patterns of pathogen-induced reactive oxygen species (ROS accumulation were entirely distinct in B. cinerea and PstDC3000 inoculated plants. Examples of both salicylic acid (SA and jasmonic acid/ethylene (JA/ET responsive defense genes were up-regulated after B. cinerea and PstDC3000 inoculation of the VaERF20-overexpressing transgenic A. thaliana plants. Evidence of pattern-triggered immunity (PTI, callose accumulation and stomatal defense, together with increased expression of PTI genes, was also greater in the transgenic lines. These data indicate that VaERF20 participates in various signal transduction pathways and acts as an inducer of immune responses.

  1. Obsessive-Compulsive Homeland Security: Insights from the Neurobiological Security Motivation System

    Science.gov (United States)

    2018-03-01

    HOMELAND SECURITY: INSIGHTS FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM by Marissa D. Madrigal March 2018 Thesis Advisor...FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM 5. FUNDING NUMBERS 6. AUTHOR(S) Marissa D. Madrigal 7. PERFORMING ORGANIZATION NAME(S) AND...how activation of the neurobiological security- motivation system can lead to securitization in response to a security speech act. It explores the model

  2. 75 FR 66811 - Sunshine Act Meeting

    Science.gov (United States)

    2010-10-29

    ... Law 111-203, to prohibit fraud, manipulation, and deception in connection with security-based swaps. 3... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange...

  3. 75 FR 64748 - Sunshine Act Meeting

    Science.gov (United States)

    2010-10-20

    ... NATIONAL CREDIT UNION ADMINISTRATION Sunshine Act Meeting Notice of a Matter To Be Added to the Agenda for Consideration at an Agency Meeting TIME AND DATE: 10 a.m., Thursday, October 21, 2010. PLACE: Board Room, 7th Floor, Room 7047, 1775 Duke Street, Alexandria, VA 22314-3428. STATUS: Open. Matters To...

  4. 75 FR 38824 - Privacy Act of 1974; Department of Homeland Security/ALL-029 Civil Rights and Civil Liberties...

    Science.gov (United States)

    2010-07-06

    ... civil rights, civil liberties, such as profiling on the basis of race, ethnicity, or religion, by.../ religion (CRCL does not solicit this information, it is tracked if individuals provide it); Allegation... Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245 Murray Drive...

  5. Security Safeguards on E-Payment Systems in Malaysia: Analysis on the Payment Systems Act 2003

    OpenAIRE

    Zulhuda, Sonny; Azmi, Ida Madieha bt. Abdul Ghani

    2011-01-01

    Central to the infrastructure of electronic commerce activities is the electronic payment system. This encompasses not only the issues of technical sophistication but also legal readiness. In the context of electronic commerce environment in Malaysia, this paper seeks to highlight and examine the Malaysian legal readiness in the aspect of electronic payment system, focusing on its Payment Systems Act 2003. The discussion is limited to the issue of electronic security measures embodied in the ...

  6. 77 FR 39749 - Sunshine Act Meeting

    Science.gov (United States)

    2012-07-05

    ... advertising in securities offerings conducted pursuant to Rule 506 of Regulation D under the Securities Act... Startups Act. At times, changes in Commission priorities require alterations in the scheduling of meeting...

  7. Troubles continue for the Phoenix VA

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2014-10-01

    Full Text Available No abstract available. Article truncated after 150 words. According to the Joint Commission on the Accreditation of Healthcare Organizations (Joint Commission, JCAHO, an independent organization that reviews hospitals, the Phoenix VA does not comply with U.S. standards for safety, patient care and management (1. The hospital was at the epicenter of the national scandal over the quality of care being afforded to the nation's veterans where the now notorious practice of double-booking patient appointments was first exposed. The hospital's indifferent management provoked congressional investigations that uncovered still more system-wide abuses leading to the removal of the hospital director and the resignation of then VA secretary, Eric Shinseki. The hospital maintains its accreditation but with a follow-up survey in 1-6 months where it must show that it has successfully addressed the 13 identified problems (1. Inspectors who conducted the review in July found that VA employees were unable to report concerns "without retaliatory action from the hospital." Other alarming ...

  8. 38 CFR 26.7 - VA environmental decision making and documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false VA environmental decision making and documents. 26.7 Section 26.7 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS (CONTINUED) ENVIRONMENTAL EFFECTS OF THE DEPARTMENT OF VETERANS AFFAIRS (VA) ACTIONS § 26.7 VA environmental decision making and document...

  9. Intervention pursuant to article 4(h) of the Constitutive Act of the African Union without United Nations Security Council authorisation

    OpenAIRE

    Amvane, Gabriel

    2015-01-01

    Article 4(h) of the Constitutive Act of the African Union (AU) establishes the right of the Union to intervene in a member state to prevent grave violations of human rights. It does not state whether the AU should request prior authorisation from the United Nations (UN) Security Council, leading to many interpretations. Many articles were written on this issue at a time when the AU and the Security Council were not in confrontation. However, the situation has changed since the controversy ove...

  10. Integrating Security in Real-Time Embedded Systems

    Science.gov (United States)

    2017-04-26

    Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arl ington, VA 22202-4302. Respondents should be aware that... operate without impacting the tinting and safety constraints of the control logic. Besides, the embedded nature of these systems limits the...only during slack times when no other real-time tasks are rwming. We propose to measure the security of the system by means of the achievable periodic

  11. Medical Student Psychiatry Examination Performance at VA and Non-VA Clerkship Sites

    Science.gov (United States)

    Tucker, Phebe; von Schlageter, Margo Shultes; Park, EunMi; Rosenberg, Emily; Benjamin, Ashley B.; Nawar, Ola

    2009-01-01

    Objective: The authors examined the effects of medical student assignment to U.S. Department of Veterans Affairs (VA) Medical Center inpatient and outpatient psychiatry clerkship sites versus other university and community sites on the performance outcome measure of National Board of Medical Examiners (NBME) subject examination scores. Methods:…

  12. 78 FR 14293 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Management System Office, 4800 Mark Center Drive East Tower, 2nd Floor, Suite 02G09, Alexandria, VA 22350... Security and Governmental Affairs, and the Office of Management and Budget (OMB) pursuant to paragraph 4c... Name: Deliberate and Crisis Action Planning and Execution Segment (DCAPES) Records (July 2, 2009, 74 FR...

  13. 78 FR 48609 - Safety Zone; James River; Newport News, VA

    Science.gov (United States)

    2013-08-09

    ... Act (APA) (5 U.S.C. 553(b)). This provision authorizes an agency to issue a rule without prior notice... Homeland Security Management Directive 023-01 and Commandant Instruction M16475.lD, which guide the Coast...

  14. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    Science.gov (United States)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  15. 48 CFR 852.219-71 - VA mentor-protégé program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false VA mentor-protégÃ....219-71 VA mentor-protégé program. As prescribed in 819.7115(a), insert the following clause: VA Mentor-Protégé Program (DEC 2009) (a) Large businesses are encouraged to participate in the VA Mentor-Protégé...

  16. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  17. Empirical analysis on future-cash arbitrage risk with portfolio VaR

    Science.gov (United States)

    Chen, Rongda; Li, Cong; Wang, Weijin; Wang, Ze

    2014-03-01

    This paper constructs the positive arbitrage position by alternating the spot index with Chinese Exchange Traded Fund (ETF) portfolio and estimating the arbitrage-free interval of futures with the latest trade data. Then, an improved Delta-normal method was used, which replaces the simple linear correlation coefficient with tail dependence correlation coefficient, to measure VaR (Value-at-risk) of the arbitrage position. Analysis of VaR implies that the risk of future-cash arbitrage is less than that of investing completely in either futures or spot market. Then according to the compositional VaR and the marginal VaR, we should increase the futures position and decrease the spot position appropriately to minimize the VaR, which can minimize risk subject to certain revenues.

  18. Patient deaths blamed on long waits at the Phoenix VA

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2014-04-01

    Full Text Available No abstract available. Article truncated at 150 words. This morning the lead article in the Arizona Republic was a report blaming as many as 40 deaths at the Phoenix VA on long waits (1. Yesterday, Rep. Jeff Miller, the chairman of the House Committee on Veterans Affairs, held a hearing titled “A Continued Assessment of Delays in VA Medical Care and Preventable Veteran Deaths.” “It appears as though there could be as many as 40 veterans whose deaths could be related to delays in care,” Miller announced to a stunned audience. The committee has spent months investigating patient-care scandals and allegations at VA facilities in Pittsburgh, Atlanta, Miami and other cities. said that dozens of VA hospital patients in Phoenix may have died while awaiting medical care. He went on to say that staff investigators have evidence that the Phoenix VA Health Care System keeps two sets of records to conceal prolonged waits that patients must endure for ...

  19. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... transportation operators, flight students, and others, where appropriate, for services related to security threat.... Enforce safety- and security-related regulations and requirements; 3. Assess and distribute intelligence...

  20. 75 FR 73095 - Privacy Act of 1974; Report of New System of Records

    Science.gov (United States)

    2010-11-29

    ... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the E-Government Act of... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the E-Government Act of... Social Security Act (the Act) by establishing incentive payments to eligible professionals (EPs...

  1. 77 FR 67063 - VA Directive 0005 on Scientific Integrity

    Science.gov (United States)

    2012-11-08

    ... in multiple areas, including data integrity, ethics, privacy, and human research protections, as well... replace the Association for the Accreditation of Human Research Protection Programs (AAHRPP) with Alion... human research protection programs. VA Response: VA is currently reviewing its accreditation...

  2. 77 FR 65939 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-31

    ...) is amending the system of records currently entitled ``Veterans Health Information Systems and... Health Information Systems and Technology Architecture (VistA) Records-VA ROUTINE USES OF RECORDS... DEPARTMENT OF VETERANS AFFAIRS Privacy Act of 1974; System of Records AGENCY: Department of...

  3. 75 FR 9277 - Proposed Information Collection (VA National Rehabilitation Special Events, Event Registration...

    Science.gov (United States)

    2010-03-01

    ... Sports Clinic Application, VA Form 0924--233 hours. b. National Veterans Wheelchair Games Application, VA.... National Veterans TEE Tournament Application, VA Form 0927--133 hours. e. National Veterans Summer Sports... Form 0929--67 hours. OMB Control Number: 2900-New (VA Form 0924). Type of Review: Existing collection...

  4. VA National Bed Control System

    Data.gov (United States)

    Department of Veterans Affairs — The VA National Bed Control System records the levels of operating, unavailable and authorized beds at each VAMC, and it tracks requests for changes in these levels....

  5. The Registration of Special Notarial Bonds under the Security by Means of Movable Property Act and the Publicity Principle: Lessons from Developments in Belgium

    Directory of Open Access Journals (Sweden)

    Lefa

    2018-01-01

    Full Text Available Many people do not own immovable property to offer as security but do have movable property which can be offered as security for the repayment of a debt. In today's world, where the costs of a motor car can exceed that of a house, the increasing value of movable things makes them popular and appropriate security objects. Under the common law pledge, delivery of the movable property from the pledgor (the debtor to the pledgee (the creditor has to take place in order for the pledgee to acquire a real security right in the property. Delivery of the property is aimed at ensuring compliance with the publicity principle. The principle of publicity entails that the existence of a real security must be known to the public. With the aim of promoting commerce, certain countries have taken the initiative in reforming their laws on pledge to allow the debtor to retain possession of the movable property that serves as security. Furthermore, technology has advanced to a level where national registration systems which can be accessed easily and at minimal cost can be established. The South African legislature enacted the Security by Means of Movable Property Act 57 of 1993 which makes provision for a pledge without possession. This Act deemed a duly registered notarial bond over specified movable property to have been delivered as if delivery had in fact taken place, thereby substituting the common law delivery requirement with registration in the Deeds Office. On 30 May 2013 the Belgian House of Representatives adopted a Belgian Pledge Act which allows for a non-possessory pledge on movable property subject to registration in a newly created public register called the Electronic Pledge Register. This article therefore examines the efficacy of the registration system of special notarial bonds in South African law and whether this form of registration complies with the publicity principle looking at the developments of a computerised registration system taking

  6. VA Telemedicine: An Analysis of Cost and Time Savings.

    Science.gov (United States)

    Russo, Jack E; McCool, Ryan R; Davies, Louise

    2016-03-01

    The Veterans Affairs (VA) healthcare system provides beneficiary travel reimbursement ("travel pay") to qualifying patients for traveling to appointments. Travel pay is a large expense for the VA and hence the U.S. Government, projected to cost nearly $1 billion in 2015. Telemedicine in the VA system has the potential to save money by reducing patient travel and thus the amount of travel pay disbursed. In this study, we quantify this savings and also report trends in VA telemedicine volumes over time. All telemedicine visits based at the VA Hospital in White River Junction, VT between 2005 and 2013 were reviewed (5,695 visits). Travel distance and time saved as a result of telemedicine were calculated. Clinical volume in the mental health department, which has had the longest participation in telemedicine, was analyzed. Telemedicine resulted in an average travel savings of 145 miles and 142 min per visit. This led to an average travel payment savings of $18,555 per year. Telemedicine volume grew significantly over the study period such that by the final year the travel pay savings had increased to $63,804, or about 3.5% of the total travel pay disbursement for that year. The number of mental health telemedicine visits rose over the study period but remained small relative to the number of face-to-face visits. A higher proportion of telemedicine visits involved new patients. Telemedicine at the VA saves travel distance and time, although the reduction in travel payments remains modest at current telemedicine volumes.

  7. VA Dental Insurance Program--federalism. Direct final rule.

    Science.gov (United States)

    2013-10-22

    The Department of Veterans Affairs (VA) is taking direct final action to amend its regulations related to the VA Dental Insurance Program (VADIP), a pilot program to offer premium-based dental insurance to enrolled veterans and certain survivors and dependents of veterans. Specifically, this rule will add language to clarify the limited preemptive effect of certain criteria in the VADIP regulations.

  8. Comparing VA and private sector healthcare costs for end-stage renal disease.

    Science.gov (United States)

    Hynes, Denise M; Stroupe, Kevin T; Fischer, Michael J; Reda, Domenic J; Manning, Willard; Browning, Margaret M; Huo, Zhiping; Saban, Karen; Kaufman, James S

    2012-02-01

    Healthcare for end-stage renal disease (ESRD) is intensive, expensive, and provided in both the public and private sector. Using a societal perspective, we examined healthcare costs and health outcomes for Department of Veterans Affairs (VA) ESRD patients comparing those who received hemodialysis care at VA versus private sector facilities. Dialysis patients were recruited from 8 VA medical centers from 2001 through 2003 and followed for 12 months in a prospective cohort study. Patient demographics, clinical characteristics, quality of life, healthcare use, and cost data were collected. Healthcare data included utilization (VA), claims (Medicare), and patient self-report. Costs included VA calculated costs, Medicare dialysis facility reports and reimbursement rates, and patient self-report. Multivariable regression was used to compare costs between patients receiving dialysis at VA versus private sector facilities. The cohort comprised 334 patients: 170 patients in the VA dialysis group and 164 patients in the private sector group. The VA dialysis group had more comorbidities at baseline, outpatient and emergency visits, prescriptions, and longer hospital stays; they also had more conservative anemia management and lower baseline urea reduction ratio (67% vs. 72%; Pprivate sector dialysis group (Pprivate sector settings is critical in informing health policy options for patients with complex chronic illnesses such as ESRD.

  9. 77 FR 34067 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-Robotics...

    Science.gov (United States)

    2012-06-08

    ... Production Act of 1993--Robotics Technology Consortium, Inc. Notice is hereby given that, on April 30, 2012... seq. (``the Act''), Robotics Technology Consortium, Inc. (``RTC'') has filed written notifications... Inc., Huntsville, AL; John H. Northrop & Associates, Inc., Burke, VA; Lithos Robotics Corporation...

  10. 75 FR 3948 - Sunshine Act Meeting

    Science.gov (United States)

    2010-01-25

    ... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... matters relating to climate change. At times, changes in Commission priorities require alterations in the...

  11. 78 FR 26667 - Sunshine Act Meeting

    Science.gov (United States)

    2013-05-07

    ... first panel will examine issues in connection with the possibility of developing a credit rating... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange...

  12. 78 FR 20705 - Securities Act of 1933; Securities Exchange Act of 1934; Order Regarding Review of FASB...

    Science.gov (United States)

    2013-04-05

    ... accepted for purposes of the securities laws, any accounting principles established by a standard setting... Financial Accounting Standards Board (``FASB'') and its parent organization, the Financial Accounting... recognizing the FASB's financial accounting and reporting standards as ``generally accepted'' under Section...

  13. 76 FR 47190 - Privacy Act of 1974; Report of Modified or Altered System

    Science.gov (United States)

    2011-08-04

    ... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance... 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986...). MMA amended the Social Security Act (the Act) by adding the Medicare Part D Program under Title XVIII...

  14. 17 CFR 210.12-12A - Investments-securities sold short.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Investments-securities sold... EXCHANGE ACT OF 1934, PUBLIC UTILITY HOLDING COMPANY ACT OF 1935, INVESTMENT COMPANY ACT OF 1940, INVESTMENT ADVISERS ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Form and Content of Schedules...

  15. PTSD: National Center for PTSD

    Medline Plus

    Full Text Available ... About the Website Site Map Content Inventory Accessibility Privacy and Security Updating of Web Site Web Site ... Button to subscribe to email VA HOME Notices Privacy FOIA Regulations Web Policies No FEAR Act Whistleblower ...

  16. 75 FR 75187 - Sunshine Act Meeting

    Science.gov (United States)

    2010-12-02

    ... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting Notice is hereby given, pursuant to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange.... Elizabeth M. Murphy, Secretary. [FR Doc. 2010-30407 Filed 11-30-10; 4:15 pm] BILLING CODE 8011-01-P ...

  17. Job satisfaction and burnout among VA and community mental health workers.

    Science.gov (United States)

    Salyers, Michelle P; Rollins, Angela L; Kelly, Yu-Fan; Lysaker, Paul H; Williams, Jane R

    2013-03-01

    Building on two independent studies, we compared burnout and job satisfaction of 66 VA staff and 86 community mental health center staff in the same city. VA staff reported significantly greater job satisfaction and accomplishment, less emotional exhaustion and lower likelihood of leaving their job. Sources of work satisfaction were similar (primarily working with clients, helping/witnessing change). VA staff reported fewer challenges with job-related aspects (e.g. flexibility, pay) but more challenges with administration. Community mental health administrators and policymakers may need to address job-related concerns (e.g. pay) whereas VA administrators may focus on reducing, and helping workers navigate, administrative policies.

  18. 48 CFR 852.219-9 - VA Small business subcontracting plan minimum requirements.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false VA Small business... Provisions and Clauses 852.219-9 VA Small business subcontracting plan minimum requirements. As prescribed in subpart 819.709, insert the following clause: VA Small Business Subcontracting Plan Minimum Requirements...

  19. 2006 Homeland Security Symposium and Exposition. Held in Arlington, VA on 29-31 March 2006

    Science.gov (United States)

    2006-03-31

    Consequences , Vulnerabilities, and Threats) Prioritize Implement Protective Programs Measure Effectiveness 9March 2006 Major NIPP Theme: Sector Partnership... effect of exposure • Full understanding of the levels of exposure that mark the onset of miosis • Refined human operational exposure standard for GB...Untitled Document 2006 Homeland Security Symposium and Exposition.html[7/7/2016 11:38:26 AM] 2006 Homeland Security Symposium and Exposition

  20. Identifying Homelessness among Veterans Using VA Administrative Data: Opportunities to Expand Detection Criteria.

    Directory of Open Access Journals (Sweden)

    Rachel Peterson

    Full Text Available Researchers at the U.S. Department of Veterans Affairs (VA have used administrative criteria to identify homelessness among U.S. Veterans. Our objective was to explore the use of these codes in VA health care facilities. We examined VA health records (2002-2012 of Veterans recently separated from the military and identified as homeless using VA conventional identification criteria (ICD-9-CM code V60.0, VA specific codes for homeless services, plus closely allied V60 codes indicating housing instability. Logistic regression analyses examined differences between Veterans who received these codes. Health care services and co-morbidities were analyzed in the 90 days post-identification of homelessness. VA conventional criteria identified 21,021 homeless Veterans from Operations Enduring Freedom, Iraqi Freedom, and New Dawn (rate 2.5%. Adding allied V60 codes increased that to 31,260 (rate 3.3%. While certain demographic differences were noted, Veterans identified as homeless using conventional or allied codes were similar with regards to utilization of homeless, mental health, and substance abuse services, as well as co-morbidities. Differences were noted in the pattern of usage of homelessness-related diagnostic codes in VA facilities nation-wide. Creating an official VA case definition for homelessness, which would include additional ICD-9-CM and other administrative codes for VA homeless services, would likely allow improved identification of homeless and at-risk Veterans. This also presents an opportunity for encouraging uniformity in applying these codes in VA facilities nationwide as well as in other large health care organizations.

  1. Identifying Homelessness among Veterans Using VA Administrative Data: Opportunities to Expand Detection Criteria

    Science.gov (United States)

    Peterson, Rachel; Gundlapalli, Adi V.; Metraux, Stephen; Carter, Marjorie E.; Palmer, Miland; Redd, Andrew; Samore, Matthew H.; Fargo, Jamison D.

    2015-01-01

    Researchers at the U.S. Department of Veterans Affairs (VA) have used administrative criteria to identify homelessness among U.S. Veterans. Our objective was to explore the use of these codes in VA health care facilities. We examined VA health records (2002-2012) of Veterans recently separated from the military and identified as homeless using VA conventional identification criteria (ICD-9-CM code V60.0, VA specific codes for homeless services), plus closely allied V60 codes indicating housing instability. Logistic regression analyses examined differences between Veterans who received these codes. Health care services and co-morbidities were analyzed in the 90 days post-identification of homelessness. VA conventional criteria identified 21,021 homeless Veterans from Operations Enduring Freedom, Iraqi Freedom, and New Dawn (rate 2.5%). Adding allied V60 codes increased that to 31,260 (rate 3.3%). While certain demographic differences were noted, Veterans identified as homeless using conventional or allied codes were similar with regards to utilization of homeless, mental health, and substance abuse services, as well as co-morbidities. Differences were noted in the pattern of usage of homelessness-related diagnostic codes in VA facilities nation-wide. Creating an official VA case definition for homelessness, which would include additional ICD-9-CM and other administrative codes for VA homeless services, would likely allow improved identification of homeless and at-risk Veterans. This also presents an opportunity for encouraging uniformity in applying these codes in VA facilities nationwide as well as in other large health care organizations. PMID:26172386

  2. A Role for Myosin Va in Human Cytomegalovirus Nuclear Egress.

    Science.gov (United States)

    Wilkie, Adrian R; Sharma, Mayuri; Pesola, Jean M; Ericsson, Maria; Fernandez, Rosio; Coen, Donald M

    2018-03-15

    Herpesviruses replicate and package their genomes into capsids in replication compartments within the nuclear interior. Capsids then move to the inner nuclear membrane for envelopment and release into the cytoplasm in a process called nuclear egress. We previously found that nuclear F-actin is induced upon infection with the betaherpesvirus human cytomegalovirus (HCMV) and is important for nuclear egress and capsid localization away from replication compartment-like inclusions toward the nuclear rim. Despite these and related findings, it has not been shown that any specific motor protein is involved in herpesvirus nuclear egress. In this study, we have investigated whether the host motor protein, myosin Va, could be fulfilling this role. Using immunofluorescence microscopy and coimmunoprecipitation, we observed associations between a nuclear population of myosin Va and the viral major capsid protein, with both concentrating at the periphery of replication compartments. Immunoelectron microscopy showed that nearly 40% of assembled nuclear capsids associate with myosin Va. We also found that myosin Va and major capsid protein colocalize with nuclear F-actin. Importantly, antagonism of myosin Va with RNA interference or a dominant negative mutant revealed that myosin Va is important for the efficient production of infectious virus, capsid accumulation in the cytoplasm, and capsid localization away from replication compartment-like inclusions toward the nuclear rim. Our results lead us to suggest a working model whereby human cytomegalovirus capsids associate with myosin Va for movement from replication compartments to the nuclear periphery during nuclear egress. IMPORTANCE Little is known regarding how newly assembled and packaged herpesvirus capsids move from the nuclear interior to the periphery during nuclear egress. While it has been proposed that an actomyosin-based mechanism facilitates intranuclear movement of alphaherpesvirus capsids, a functional role for

  3. 77 FR 72368 - Privacy Act of 1974; Notice of a New System of Records, Enterprise Wide Operations Data Store

    Science.gov (United States)

    2012-12-05

    ... servicing data: Borrower/co-borrower name, Social Security Number, gender, date of birth, and income and...), U.S. Department of Veterans Affairs (VA), U.S. Department of Agriculture Rural Development (RD...

  4. An academic-VA partnership: Student interprofessional teams integrated with VA PACT teams.

    Science.gov (United States)

    Swenty, Constance L; Schaar, Gina L; Butler, Ryan M

    2016-12-01

    Veterans are challenged with multiple unique healthcare issues related to their military service environment. Likewise, health care providers must understand the special concerns associated with military conflict and recognize how the veteran's care can be optimized by interprofessional care delivery. Little is taught didactically or clinically that supports nursing students in addressing the unique issues of the veteran or the student's need to work collaboratively with allied health team members to enhance the veteran's care. Because of limited exposure to the veteran's special conditions, nursing students who may seek a career with the veteran population often face challenges in rendering appropriate care. The VA offers an invaluable opportunity for health profession students to collaborate with VA interprofessional Patient Aligned Care Teams (PACT) ultimately optimizing veteran health outcomes. This academic partnership, that implements an interprofessional model, will prepare students to better embrace the veteran population. This article describes the immersion of health profession students in interprofessional collaborative practice (IPCP) using PACT team principles which ultimately promotes the students' ability to link theory content to patient care delivery. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. OneVA EA Vision and Strategy

    Data.gov (United States)

    Department of Veterans Affairs — The outcomes/goals supported by effective use of an EA are: Improved Service Delivery, Functional Integration, Resource Optimization and Authoritative Reference. VA...

  6. Flexural Stiffness of Myosin Va Subdomains as Measured from Tethered Particle Motion

    Science.gov (United States)

    Michalek, Arthur J.; Kennedy, Guy G.; Warshaw, David M.; Ali, M. Yusuf

    2015-01-01

    Myosin Va (MyoVa) is a processive molecular motor involved in intracellular cargo transport on the actin cytoskeleton. The motor's processivity and ability to navigate actin intersections are believed to be governed by the stiffness of various parts of the motor's structure. Specifically, changes in calcium may regulate motor processivity by altering the motor's lever arm stiffness and thus its interhead communication. In order to measure the flexural stiffness of MyoVa subdomains, we use tethered particle microscopy, which relates the Brownian motion of fluorescent quantum dots, which are attached to various single- and double-headed MyoVa constructs bound to actin in rigor, to the motor's flexural stiffness. Based on these measurements, the MyoVa lever arm and coiled-coil rod domain have comparable flexural stiffness (0.034 pN/nm). Upon addition of calcium, the lever arm stiffness is reduced 40% as a result of calmodulins potentially dissociating from the lever arm. In addition, the flexural stiffness of the full-length MyoVa construct is an order of magnitude less stiff than both a single lever arm and the coiled-coil rod. This suggests that the MyoVa lever arm-rod junction provides a flexible hinge that would allow the motor to maneuver cargo through the complex intracellular actin network. PMID:26770194

  7. VaRank: a simple and powerful tool for ranking genetic variants

    Directory of Open Access Journals (Sweden)

    Véronique Geoffroy

    2015-03-01

    Full Text Available Background. Most genetic disorders are caused by single nucleotide variations (SNVs or small insertion/deletions (indels. High throughput sequencing has broadened the catalogue of human variation, including common polymorphisms, rare variations or disease causing mutations. However, identifying one variation among hundreds or thousands of others is still a complex task for biologists, geneticists and clinicians.Results. We have developed VaRank, a command-line tool for the ranking of genetic variants detected by high-throughput sequencing. VaRank scores and prioritizes variants annotated either by Alamut Batch or SnpEff. A barcode allows users to quickly view the presence/absence of variants (with homozygote/heterozygote status in analyzed samples. VaRank supports the commonly used VCF input format for variants analysis thus allowing it to be easily integrated into NGS bioinformatics analysis pipelines. VaRank has been successfully applied to disease-gene identification as well as to molecular diagnostics setup for several hundred patients.Conclusions. VaRank is implemented in Tcl/Tk, a scripting language which is platform-independent but has been tested only on Unix environment. The source code is available under the GNU GPL, and together with sample data and detailed documentation can be downloaded from http://www.lbgi.fr/VaRank/.

  8. Home Health Care and Patterns of Subsequent VA and Medicare Health Care Utilization for Veterans

    Science.gov (United States)

    Van Houtven, Courtney Harold; Jeffreys, Amy S.; Coffman, Cynthia J.

    2008-01-01

    Purpose: The Veterans Affairs or VA health care system is in the process of significantly expanding home health care (HOC) nationwide. We describe VA HHC use in 2003 for all VA HHC users from 2002; we examine whether VA utilization across a broad spectrum of services differed for a sample of VA HHC users and their propensity-score-matched…

  9. 7 CFR 1260.128 - Act.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Act. 1260.128 Section 1260.128 Agriculture... Promotion and Research Order Definitions § 1260.128 Act. Act means the Beef Promotion and Research Act of 1985, Title XVI, Subtitle A of the Food Security Act of 1985, Pub. L. 99-198 and any amendments thereto. ...

  10. Draft Federal Act of the Russian Federation 'The Civil Liability for Nuclear Damage and its Financial Security'

    International Nuclear Information System (INIS)

    Lebedeva, Yulia

    2014-01-01

    The use of nuclear power by states in the modern world requires supplements to international law through the development of national legislation on civil liability for nuclear damage and compensation. The situation in the Russian Federation is no exception. Russian law on civil liability for nuclear damage has not fully evolved, and currently, there is no specific law covering liability for nuclear damage, nor is there a law regarding the financial and insurance mechanisms for compensation. Instead, the current laws establish a state system of benefits and compensation for damage to health and property of citizens. Since 1996, Russia has been actively working to develop a draft federal act to cover liability for nuclear damage. A bill was first introduced in the State Duma of the Federal Assembly of the Russian Federation on 16 July 1996, and was originally called 'The Compensation for Nuclear Damage and Nuclear Insurance'. In 1997, the official representative of the Government of the Russian Federation, Head of Russian Federal Inspectorate for Nuclear and Radiation Safety, Yuri Vishnevsky, was appointed to present this bill for discussion in the chambers of the Federal Assembly of the Russian Federation. In September 1998, the State Duma rejected the draft federal act and instead adopted in the first reading a different draft federal act: No. 96700118-2, 'The Civil Liability for Nuclear Damage and its Financial Security' ('the bill'). In this case, the State Duma Committee on Ecology was charged with incorporating the incoming amendments into a final bill and submitting it to the State Duma for a second reading. In 2005, Russia ratified the Vienna Convention on Civil Liability for Nuclear Damage. This ratification required significant amendments to 'The Civil Liability for Nuclear Damage and its Financial Security' bill. But, even though the Russian Federation had not yet ratified the Vienna Convention, the drafters were still careful to take into account the

  11. 10 CFR 780.8 - Security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...

  12. An Analysis of Security Incidents on the Internet 1989-1995

    Science.gov (United States)

    1997-04-07

    intervene. 14.4.2. Government Information Policies and the Computer Security Market - During the history of the Internet , the government has maintained a...the government is already taking to improve the operation of the Internet market by supplying information . The following analysis determined whether the... Information Assurance Technology Analysis Center (IATAC) 3190 Fairview Park Drive Falls Church VA 22042 Performing Organization Number(s) Sponsoring

  13. 48 CFR 803.7000 - Display of the VA Hotline poster.

    Science.gov (United States)

    2010-10-01

    ... poster. 803.7000 Section 803.7000 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS... Improper Business Practices 803.7000 Display of the VA Hotline poster. (a) Under the circumstances described in paragraph (b) of this section, a contractor must display prominently a VA Hotline poster...

  14. 78 FR 66318 - Securities Investor Protection Corporation

    Science.gov (United States)

    2013-11-05

    ...] Securities Investor Protection Corporation AGENCY: Securities and Exchange Commission. ACTION: Proposed rule. SUMMARY: The Securities Investor Protection Corporation (``SIPC'') filed a proposed rule change with the... satisfaction of customer claims for standardized options under the Securities Investor Protection Act of 1970...

  15. 31 CFR 500.325 - National securities exchange.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 500.325... Definitions § 500.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act of...

  16. 31 CFR 515.325 - National securities exchange.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act of...

  17. Local television news coverage of President Clinton's introduction of the Health Security Act.

    Science.gov (United States)

    Dorfman, L; Schauffler, H H; Wilkerson, J; Feinson, J

    1996-04-17

    To investigate how local television news reported on health system reform during the week President Clinton presented his health system reform bill. Retrospective content analysis of the 1342-page Health Security Act of 1993, the printed text of President Clinton's speech before Congress on September 22, 1993, and a sample of local television news stories on health system reform broadcast during the week of September 19 through 25, 1993. The state of California. During the week, 316 television news stories on health system reform were aired during the 166 local news broadcasts sampled. Health system reform was the second most frequently reported topic, second to stories on violent crime. News stories on health system reform averaged 1 minute 38 seconds in length, compared with 57 seconds for violent crime. Fifty-seven percent of the local news stories focused on interest group politics. Compared with the content of the Health Security Act, local news broadcasts devoted a significantly greater portion of their stories to financing, eligibility, and preventive services. Local news stories gave significantly less attention to cost-saving mechanisms, long-term care benefits, and changes in Medicare and Medicaid, and less than 2% of stories mentioned quality assurance mechanisms, malpractice reform, or new public health initiatives. Of the 316 televised news stories, 53 reported on the president's speech, covering many of the same topics emphasized in the speech (financing, organization and administration, and eligibility) and de-emphasizing many of the same topics (Medicare and Medicaid, quality assurance, and malpractice reform). Two percent of the president's speech covered partisan politics; 45% of the local news stories on the speech featured challenges from partisan politicians. Although health system reform was the focus of a large number of local television news stories during the week, in-depth explanation was scarce. In general, the news stories provided

  18. 12 CFR 792.67 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Security of systems of records. 792.67 Section... AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION The Privacy Act § 792.67 Security of systems of records. (a) Each system manager, with the approval of the head of that...

  19. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... security screening and identity verification of individuals, including identification media and identifying... undergoing screening of their person (including identity verification) or property; individuals against whom... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  20. VA Veterans Health Administration Access Data

    Data.gov (United States)

    Department of Veterans Affairs — At the Department of Veterans Affairs (VA), our most important mission is to provide the high quality health care and benefits Veterans have earned and deserve —...

  1. Semi-nonparametric VaR forecasts for hedge funds during the recent crisis

    Science.gov (United States)

    Del Brio, Esther B.; Mora-Valencia, Andrés; Perote, Javier

    2014-05-01

    The need to provide accurate value-at-risk (VaR) forecasting measures has triggered an important literature in econophysics. Although these accurate VaR models and methodologies are particularly demanded for hedge fund managers, there exist few articles specifically devoted to implement new techniques in hedge fund returns VaR forecasting. This article advances in these issues by comparing the performance of risk measures based on parametric distributions (the normal, Student’s t and skewed-t), semi-nonparametric (SNP) methodologies based on Gram-Charlier (GC) series and the extreme value theory (EVT) approach. Our results show that normal-, Student’s t- and Skewed t- based methodologies fail to forecast hedge fund VaR, whilst SNP and EVT approaches accurately success on it. We extend these results to the multivariate framework by providing an explicit formula for the GC copula and its density that encompasses the Gaussian copula and accounts for non-linear dependences. We show that the VaR obtained by the meta GC accurately captures portfolio risk and outperforms regulatory VaR estimates obtained through the meta Gaussian and Student’s t distributions.

  2. Research on Interval Forecast For Metal Futures Market′s VaR Based on Bootstrap%基于Bootstrap的金属期货市场风险VaR区间预测

    Institute of Scientific and Technical Information of China (English)

    沈盟; 王璐

    2016-01-01

    金属期货市场风险VaR的准确测度对防范期货交易风险及保持市场健康平稳运行有重要作用.传统的VaR测度方法主要以点预测为主,无法反映预测近似值的精确程度及范围. 因此,提出了一种基于Bootstrap的金属期货市场风险VaR区间预测方法,同时引入LR检验区间预测的有效性,最后利用我国铜和铝期货市场数据进行了VaR风险的区间预测. 结果表明,新的VaR区间预测方法能克服点预测的不足,准确有效地描述VaR的估计风险,同时置信区间上下限可用于风险的预警及控制.%The accurate measurement on metal futures market′s VaR is important to prevent the futures′transaction risk and maintain the market healthy and stable operation.The traditional methods measuring VaR focus on point forecast which can't re-flect the accuracy of the predictive value.A new method to measure the interval forecast for metal futures market's VaR based on bootstrap is put forward.LR test is used to test the effectiveness of interval forecast.Finally,we empirical study the interval fore-cast of copper and aluminum futures market's VaR in China.The results show that the new method can overcome the lack of point forecast,while the upper and lower confidence interval can be used for early warning and control financial risks.

  3. 76 FR 52230 - Establishment of Class E Airspace; Forest, VA

    Science.gov (United States)

    2011-08-22

    ...-0378; Airspace Docket No. 11-AEA-11] Establishment of Class E Airspace; Forest, VA AGENCY: Federal... at Forest, VA, to accommodate the new Area Navigation (RNAV) Global Positioning System (GPS) Standard... published in the Federal Register a notice of proposed rulemaking to establish Class E airspace at Forest...

  4. VA Personal Health Record Sample Data

    Data.gov (United States)

    Department of Veterans Affairs — My HealtheVet (www.myhealth.va.gov) is a Personal Health Record portal designed to improve the delivery of health care services to Veterans, to promote health and...

  5. Computing Conditional VaR using Time-varying CopulasComputing Conditional VaR using Time-varying Copulas

    Directory of Open Access Journals (Sweden)

    Beatriz Vaz de Melo Mendes

    2005-12-01

    Full Text Available It is now widespread the use of Value-at-Risk (VaR as a canonical measure at risk. Most accurate VaR measures make use of some volatility model such as GARCH-type models. However, the pattern of volatility dynamic of a portfolio follows from the (univariate behavior of the risk assets, as well as from the type and strength of the associations among them. Moreover, the dependence structure among the components may change conditionally t past observations. Some papers have attempted to model this characteristic by assuming a multivariate GARCH model, or by considering the conditional correlation coefficient, or by incorporating some possibility for switches in regimes. In this paper we address this problem using time-varying copulas. Our modeling strategy allows for the margins to follow some FIGARCH type model while the copula dependence structure changes over time.

  6. 22 CFR 1101.5 - Security, confidentiality and protection of records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Security, confidentiality and protection of... Bureau of Standard's booklet “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May... STATES AND MEXICO, UNITED STATES SECTION PRIVACY ACT OF 1974 § 1101.5 Security, confidentiality and...

  7. Chemical Facility Security: Regulation and Issues for Congress

    National Research Council Canada - National Science Library

    Shea, Dana A; Tatelman, Todd B

    2007-01-01

    The Department of Homeland Security (DHS) has proposed security regulations for chemical facilities, implementing the statutory authority granted in the Homeland Security Appropriations Act, 2007 (P.L...

  8. In aftermath of financial investigation Phoenix VA employee demoted after her testimony

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-03-01

    Full Text Available No abstract available. Article truncated after 150 words. A previous Southwest Journal of Pulmonary and Critical Care Journal editorial commented on fiscal mismanagement at the Department of Veterans Affairs (VA Medical Center in Phoenix (1. Now Paula Pedene, the former Phoenix VA public affairs officer, claims she was demoted for testimony she gave to the VA Inspector General’s Office (OIG regarding that investigation (2. In 2011, the OIG investigated the Phoenix VA for excess spending on private care of patients (3. The report blamed systemic failures for controls so weak that $56 million in medical fees were paid during 2010 without adequate review. The report particularly focused on one clinician assigned by the Chief of Staff to review hundreds of requests per week and the intensive care unit physicians for transferring patients to chronic ventilator units (1,3. After the investigation, the director and one of the associate directors left the VA and the chief of staff was promoted …

  9. 17 CFR 229.1008 - (Item 1008) Interest in securities of the subject company.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1008) Interest in securities of the subject company. 229.1008 Section 229.1008 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  10. Isolation and characterization of specific bacteriophage Va1 to Vibrio alginolyticus

    Directory of Open Access Journals (Sweden)

    Carla Fernández Espinel

    2017-04-01

    Full Text Available Vibrio alginolyticus is associated with diseases in aquaculture. The misuse of antibiotics has led to the search for alternatives in the treatment of bacterial diseases, among them the application of bacteriophages that infect and destroy bacteria selectively. In this way, a highly lytic V. alginolyticus bacteriophage, termed Va1, was isolated, with the aim to evaluate its physical chemical parameters. For this purpose, different temperature, pH, chloroform exposure and host range conditions were evaluated. The temperature stability of phage Va1 showed higher titers at 20 and 30 °C decreasing from 40 °C. With respect to pH, the highest titers for the bacteriophage were between 5 and 8, and chloroform exposure reduced viability of the Va1 phage by 25%. The one-step curve determined that the latency period and the burst size were 20 minutes and 192 PFU / infective center respectively. Under the transmission electron microscope, the Va1 phage showed an icosahedral head and a non-contractile tail, belonging to the Podoviridae family. In conclusion, Va1 phage presents potential characteristics for use in phage therapy.

  11. 17 CFR 240.16a-4 - Derivative securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Derivative securities. 240.16a....16a-4 Derivative securities. (a) For purposes of section 16 of the Act, both derivative securities and... securities, except that the acquisition or disposition of any derivative security shall be separately...

  12. The Application of VaR Method to Risk Evaluation of Bank Loans%VaR方法在银行贷款风险评估中的应用

    Institute of Scientific and Technical Information of China (English)

    邹新月

    2005-01-01

    Value-at-Risk model developed recently is a mathemetical medol to measure and monitor market risk. The article focuses on discussing calculate procedure and calculate method about applying VaR means for the bank loan risk in evaluation, we make clear differentiate both the Bank for International Settlements draw credit risk reserve and VaR means calculate bank loan risk value, find VaR means in application practicality value and extensity perspective in our bank loan risk for evaluation

  13. Measuring Stability and Security in Iraq: Report to Congress in Accordance with the Department of Defense Appropriations Act 2007 (Section 9010, Public Law 109-289)

    National Research Council Canada - National Science Library

    2006-01-01

    This report to Congress includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in Section 9010, DoD Defense Appropriations Act 2007...

  14. 78 FR 76412 - Agency Information Collection (VA National Rehabilitation Special Events, Event Registration...

    Science.gov (United States)

    2013-12-17

    ... INFORMATION: Titles: a. National Disabled Veterans Winter Sports Clinic Application, VA Form 0924a, c, d and..., c, e. j. Voluntary Service Application, VA Form 0927f. k. National Veterans Summer sports Clinic... Festival Event Application, VA0929a, b, c, d, e, f, g, h. Type of Review: Revision of an already approved...

  15. PERHITUNGAN VaR PORTOFOLIO SAHAM MENGGUNAKAN DATA HISTORIS DAN DATA SIMULASI MONTE CARLO

    Directory of Open Access Journals (Sweden)

    WAYAN ARTHINI

    2012-09-01

    Full Text Available Value at Risk (VaR is the maximum potential loss on a portfolio based on the probability at a certain time.  In this research, portfolio VaR values calculated from historical data and Monte Carlo simulation data. Historical data is processed so as to obtain stock returns, variance, correlation coefficient, and variance-covariance matrix, then the method of Markowitz sought proportion of each stock fund, and portfolio risk and return portfolio. The data was then simulated by Monte Carlo simulation, Exact Monte Carlo Simulation and Expected Monte Carlo Simulation. Exact Monte Carlo simulation have same returns and standard deviation  with historical data, while the Expected Monte Carlo Simulation satistic calculation similar to historical data. The results of this research is the portfolio VaR  with time horizon T=1, T=10, T=22 and the confidence level of 95 %, values obtained VaR between historical data and Monte Carlo simulation data with the method exact and expected. Value of VaR from both Monte Carlo simulation is greater than VaR historical data.

  16. 17 CFR 403.2 - Hypothecation of customer securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Hypothecation of customer... UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER SECURITIES AND BALANCES § 403.2 Hypothecation of customer securities. Every registered government securities broker or dealer...

  17. 76 FR 51255 - Security Zone; Potomac River, Georgetown Channel, Washington, DC

    Science.gov (United States)

    2011-08-18

    ... officials, mitigate potential terrorist acts, and enhance public and maritime safety and security. The Coast... officials, mitigating potential terrorist acts and enhancing public and maritime safety security. Under 5 U... and enhancing public and maritime safety and security. Background and Purpose The President of the...

  18. Equal Access to Justice Act Payments

    Data.gov (United States)

    Social Security Administration — A dataset containing payment amounts made by the Social Security Administration for court-approved Equal Access to Justice Act (EAJA) payments for fiscal year 2010...

  19. Mental Health Disorders, Suicide Risk, and Treatment seeking among Formerly Deployed National Guardand Reserve Service Member seen in Non VA Facilities

    Science.gov (United States)

    2016-10-01

    through the Affordable Healthcare Act ( ACA ) and other sources. Most veterans are not seen in VA facilities. The Geisinger Clinic, the community partner...group practice, ten hospital campuses, a 467,000-member health plan, and is one of the largest employers in the state. The knowledge gained from...Complete Analyses for Study Aim 3 ( Effectiveness ) and for Aim 4 (Genetics), Prepare Final Manuscripts for Review and Submission, Convene Final Conferences

  20. Poincare group, SU(3) and V-A in leptonic decay

    International Nuclear Information System (INIS)

    Boehm, A.

    1975-07-01

    From as few assumptions as possible about the relations between the Poincare group, the particle classifying SU(3) and V-A we derive properties of the K/sub l 3 / and K/sub L 2 / decays. From the assumed relation between SU(3) and the Poincare group and the first class condition it follows that the formfactor ratio Xi of K/sub l 3 / decay is Xi = --0.57, and that a value of Xi = 0 is in disagreement with very general and well accepted theoretical assumptions. Assuming universality of V-A, the Cabibbo suppression is derived from the relations between SU(3) and V-A as a consequence of the brokenness of SU(3). (U.S.)

  1. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... their official duties. The computer system also maintains a real-time audit of individuals who access... Secure Flight Program regulations \\4\\ for the purpose of enhancing the security of air travel in the... detection of individuals on federal government watch lists who seek to travel by air, and to facilitate the...

  2. VA Health Care: VA Spends Millions on Post-Traumatic Stress Disorder Research and Incorporates Research Outcomes into Guidelines and Policy for Post-Traumatic Stress Disorder Services

    Science.gov (United States)

    2011-01-01

    post - traumatic stress disorder ( PTSD ) and...Veterans Affairs (VA) Intramural Post - Traumatic Stress Disorder ( PTSD ) Research Funding and VA’s Medical and Prosthetic Research Appropriation...Table 6: Department of Veterans Affairs (VA) Research Centers and Programs That Conduct or Support Post - Traumatic Stress Disorder ( PTSD ) Research

  3. 685. Order amending the Order concerning the definition of goods whose export requires a permit in accordance with the Security Control Act

    International Nuclear Information System (INIS)

    1990-01-01

    The list of goods which may not be exported without a permit, in accordance with the Act of 1972 on security control, was amended by this Order. The amendment includes numerous items or equipment involving radiation or radioactive materials. It came into effect on 1 December 1990. (NEA)

  4. Employment status, employment functioning, and barriers to employment among VA primary care patients.

    Science.gov (United States)

    Zivin, Kara; Yosef, Matheos; Levine, Debra S; Abraham, Kristen M; Miller, Erin M; Henry, Jennifer; Nelson, C Beau; Pfeiffer, Paul N; Sripada, Rebecca K; Harrod, Molly; Valenstein, Marcia

    2016-03-15

    Prior research found lower employment rates among working-aged patients who use the VA than among non-Veterans or Veterans who do not use the VA, with the lowest reported employment rates among VA patients with mental disorders. This study assessed employment status, employment functioning, and barriers to employment among VA patients treated in primary care settings, and examined how depression and anxiety were associated with these outcomes. The sample included 287 VA patients treated in primary care in a large Midwestern VA Medical Center. Bivariate and multivariable analyses were conducted examining associations between socio-demographic and clinical predictors of six employment domains, including: employment status, job search self-efficacy, work performance, concerns about job loss among employed Veterans, and employment barriers and likelihood of job seeking among not employed Veterans. 54% of respondents were employed, 36% were not employed, and 10% were economically inactive. In adjusted analyses, participants with depression or anxiety (43%) were less likely to be employed, had lower job search self-efficacy, had lower levels of work performance, and reported more employment barriers. Depression and anxiety were not associated with perceived likelihood of job loss among employed or likelihood of job seeking among not employed. Single VA primary care clinic; cross-sectional study. Employment rates are low among working-aged VA primary care patients, particularly those with mental health conditions. Offering primary care interventions to patients that address mental health issues, job search self-efficacy, and work performance may be important in improving health, work, and economic outcomes. Published by Elsevier B.V.

  5. 78 FR 18425 - Proposed Information Collection VA Police Officer Pre-Employment Screening Checklist); Comment...

    Science.gov (United States)

    2013-03-26

    ... techniques or the use of other forms of information technology. Title: VA Police Officer Pre-Employment... Police Officer Pre-Employment Screening Checklist); Comment Request AGENCY: Office of Operations... approved collection. Abstract: VA personnel complete VA Form 0120 to document pre- employment history and...

  6. 76 FR 24570 - Proposed Information Collection (Application for VA Education Benefits) Activity; Comment Request

    Science.gov (United States)

    2011-05-02

    ... (Application for VA Education Benefits) Activity; Comment Request AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Veterans Benefits Administration (VBA... Under the Montgomery GI Bill, VA Form 22-1990E. c. Application for VA Education Benefits Under the...

  7. Validation of KENO V.a for the Portsmouth Gaseous Diffusion Plant

    International Nuclear Information System (INIS)

    Felsher, H.D.; Fentiman, A.W.; Tayloe, R.W.; D'Aquila, D.

    1992-01-01

    At the Portsmouth Gaseous Diffusion Plant, KENO V.a is used to make criticality calculations for complex configurations and a wide range of 235 U enrichments. It is essential that the calculated critical conditions either accurately reflect the true critical state or that the bias from the true critical conditions are well known. Accordingly, a study has been initiated to validate KENO V.a over the ranges of parameters expected to be used when modeling equipment and processes at Portsmouth. Preliminary results of that study are reported in this paper. The ultimate goal of this study is to identify a set of data from existing critical experiments that will exercise all KENO V.a parameters commonly used by Portsmouth's criticality safety personnel. A second goal is to identify a relatively small subset of those experiments that may be run frequently to ensure that KENO V.a provides consistent results

  8. Geographic Distribution of VA Expenditures FY 2016

    Data.gov (United States)

    Department of Veterans Affairs — This report details VA expenditures at the state, county, and Congressional District level. It includes categories such as Compensation and Pension, Construction,...

  9. Geographic Distribution of VA Expenditures FY2010

    Data.gov (United States)

    Department of Veterans Affairs — This report details VA expenditures at the state, county, and Congressional District level. It includes categories such as Compensation and Pension, Construction,...

  10. Geographic Distribution of VA Expenditures FY2012

    Data.gov (United States)

    Department of Veterans Affairs — This report details VA expenditures at the state, county, and Congressional District level. It includes categories such as Compensation and Pension, Construction,...

  11. Geographic Distribution of VA Expenditures FY2004

    Data.gov (United States)

    Department of Veterans Affairs — This report details VA expenditures at the state, county, and Congressional District level. It includes categories such as Compensation and Pension, Construction,...

  12. Geographic Distribution of VA Expenditures FY1998

    Data.gov (United States)

    Department of Veterans Affairs — This report details VA expenditures at the state, county, and Congressional District level. It includes categories such as Compensation and Pension, Construction,...

  13. Geographic Distribution of VA Expenditures FY2009

    Data.gov (United States)

    Department of Veterans Affairs — This report details VA expenditures at the state, county, and Congressional District level. It includes categories such as Compensation and Pension, Construction,...

  14. Geographic Distribution of VA Expenditures FY2013

    Data.gov (United States)

    Department of Veterans Affairs — This report details VA expenditures at the state, county, and Congressional District level. It includes categories such as Compensation and Pension, Construction,...

  15. Geographic Distribution of VA Expenditures FY2002

    Data.gov (United States)

    Department of Veterans Affairs — This report details VA expenditures at the state, county, and Congressional District level. It includes categories such as Compensation and Pension, Construction,...

  16. 77 FR 14843 - [Securities Act of 1933; Release No. 9300/March 7, 2012; Securities Exchange Act of 1934; Release...

    Science.gov (United States)

    2012-03-13

    ..., as generally accepted for purposes of the securities laws, any accounting principles established by a... concluding that the Financial Accounting Standards Board (``FASB'') and its parent organization, the Financial Accounting Foundation (``FAF''), satisfied the criteria for an accounting standard-setting body...

  17. 77 FR 20536 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies

    Science.gov (United States)

    2012-04-05

    ... provisions of the Securities Act, other than the Section 17(a) anti-fraud provisions, as well as exempt these... swaps from all provisions of the Securities Act, other than the Section 17(a) anti-fraud provisions, as... the Securities Act, except the anti-fraud provisions of Section 17(a), subject to certain conditions...

  18. The results of studies on clinical dosemeters type VA-J-18. Pt.1

    International Nuclear Information System (INIS)

    Penchev, V.; Buchakliev, Z.; Popits, R.; Konstantinov, B.

    1982-01-01

    A description is submitted of standard instruments used to detect and measure exposure to low and medium energy X-ray and gamma rays ( 137 Cs and 60 Co), designed for the control and calibration of dosimeters. The studies performed on clinical dosimeters, type VA-J-18, are reported. To secure exact exposure measurement, correction coefficients for non-linearity of the readings and for inaccuracy of the range factors are introduced. Non-linearity does not exceed 5 per cent of the begining of the scale, and in the range 30 to 100 scale divisions, it is within the +- 1 per cent limits. Usually, the inaccuracy of the range factors amounts to +- 3 per cent, but in isolated cases it may reach up to 10 per cent, and for that reason the second correction coefficient should be introduced as a routine in all measurements. (author)

  19. Continuous-energy version of KENO V.a for criticality safety applications

    International Nuclear Information System (INIS)

    Dunn, Michael E.; Greene, N. Maurice; Petrie, Lester M.

    2003-01-01

    KENO V.a is a multigroup Monte Carlo code that solves the Boltzmann transport equation and is used extensively in the criticality safety community to calculate the effective multiplication factor of systems with fissionable material. In this work, a continuous-energy or pointwise version of KENO V.a has been developed by first designing a new continuous-energy cross-section format and then by developing the appropriate Monte Carlo transport procedures to sample the new cross-section format. In order to generate pointwise cross sections for a test library, a series of cross-section processing modules were developed and used to process 50 ENDF/B-6 Release 7 nuclides for the test library. Once the cross-section processing procedures were in place, a continuous-energy version of KENO V.a was developed and tested by calculating 21 critical benchmark experiments. The point KENO-calculated results for the 21 benchmarks are in agreement with calculated results obtained with the multigroup version of KENO V.a using the 238-group ENDF/B-5 and 199-group ENDF/B-6 Release 3 libraries. Based on the calculated results with the prototypic cross-section library, a continuous-energy version of the KENO V.a code has been successfully developed and demonstrated for modeling systems with fissionable material. (author)

  20. 17 CFR 41.15 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Science.gov (United States)

    2010-04-01

    ..., that is a note, bond, debenture, or evidence of indebtedness; (ii) None of the securities of an issuer included in the index is an equity security, as defined in section 3(a)(11) of the Securities Exchange Act... of 1934; (B) The issuer of the security has a worldwide market value of its outstanding common equity...

  1. Information Security: Comments on the Proposed Federal Information Security Management Act of 2002

    National Research Council Canada - National Science Library

    Dacey, Robert

    2002-01-01

    ... 2001.1 Concerned with reports that continuing, pervasive information security weaknesses place federal operations at significant risk of disruption, tampering, fraud, and inappropriate disclosures...

  2. CoVaCS: a consensus variant calling system.

    Science.gov (United States)

    Chiara, Matteo; Gioiosa, Silvia; Chillemi, Giovanni; D'Antonio, Mattia; Flati, Tiziano; Picardi, Ernesto; Zambelli, Federico; Horner, David Stephen; Pesole, Graziano; Castrignanò, Tiziana

    2018-02-05

    The advent and ongoing development of next generation sequencing technologies (NGS) has led to a rapid increase in the rate of human genome re-sequencing data, paving the way for personalized genomics and precision medicine. The body of genome resequencing data is progressively increasing underlining the need for accurate and time-effective bioinformatics systems for genotyping - a crucial prerequisite for identification of candidate causal mutations in diagnostic screens. Here we present CoVaCS, a fully automated, highly accurate system with a web based graphical interface for genotyping and variant annotation. Extensive tests on a gold standard benchmark data-set -the NA12878 Illumina platinum genome- confirm that call-sets based on our consensus strategy are completely in line with those attained by similar command line based approaches, and far more accurate than call-sets from any individual tool. Importantly our system exhibits better sensitivity and higher specificity than equivalent commercial software. CoVaCS offers optimized pipelines integrating state of the art tools for variant calling and annotation for whole genome sequencing (WGS), whole-exome sequencing (WES) and target-gene sequencing (TGS) data. The system is currently hosted at Cineca, and offers the speed of a HPC computing facility, a crucial consideration when large numbers of samples must be analysed. Importantly, all the analyses are performed automatically allowing high reproducibility of the results. As such, we believe that CoVaCS can be a valuable tool for the analysis of human genome resequencing studies. CoVaCS is available at: https://bioinformatics.cineca.it/covacs .

  3. 75 FR 28757 - Security Zone; Potomac River, Washington Channel, Washington, DC

    Science.gov (United States)

    2010-05-24

    ... potential terrorist acts, and enhance public and maritime safety and security. The Coast Guard was unable to...-ranking government officials, mitigating potential terrorist acts and enhancing public and maritime safety... terrorist acts and enhancing public and maritime safety and security. Basis and Purpose The Coast Guard will...

  4. 76 FR 44288 - Establishment of Class E Airspace; New Market, VA

    Science.gov (United States)

    2011-07-25

    ...-380; Airspace Docket No. 11-AEA-12] Establishment of Class E Airspace; New Market, VA AGENCY: Federal... proposes to establish Class E Airspace at New Market, VA, to accommodate the additional airspace needed for the Standard Instrument Approach Procedures developed for New Market Airport. This action would...

  5. 3 CFR 101.4 - National Security Council.

    Science.gov (United States)

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI. ...

  6. P.L. 96-294, "Energy Security Act" (1980)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2011-12-13

    Declares it to be the purpose of this title to reduce dependence on foreign energy resources by producing synthetic fuel. Part A: Development of Synthetic Fuel Under the Defense Production Act of 1950 - Defense Production Act Amendments of 1980 - Amends the Defense Production Act of 1950 to include within the policy objectives of such Act Government preparedness to contend with foreign actions which could reduce or terminate the availability of material, including energy, which is crucial to national defense. States that greater independence in domestic energy supplies is necessary to national defense preparedness. Designates "energy" as a "strategic and critical material." States that such designation shall not give the President any authority: (1) for the mandatory allocation or pricing of any fuel or feedstock; or (2) to engage in the production of energy in any manner whatsoever, except for synthetic fuel production.

  7. 28 CFR Appendix C to Part 79 - Radiation Exposure Compensation Act Offset Worksheet-On Site Participants

    Science.gov (United States)

    2010-07-01

    ..., Column 4 “Actuarial Present Value”of past payments = $0.00 NET AMOUNT OWED CLAIMANT ($75,000 less APV... Compensation Act Offset Worksheet—On Site Participants [Present CPI = 185.20] VA paymentsyear Payment Indicated...

  8. 17 CFR 240.16c-4 - Derivative securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Derivative securities. 240.16c-4 Section 240.16c-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED... Exchange Act of 1934 Exemption of Certain Transactions from Section 16(c) § 240.16c-4 Derivative securities...

  9. 75 FR 30411 - Privacy Act of 1974; Report of a Modified or Altered System of Records

    Science.gov (United States)

    2010-06-01

    ... Privacy Act of 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse... Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance Portability... systems and data files necessary for compliance with Title XI, Part C of the Social Security Act because...

  10. 76 FR 40453 - Agency Information Collection (Application for VA Education Benefits) Activity Under OMB Review

    Science.gov (United States)

    2011-07-08

    ... (Application for VA Education Benefits) Activity Under OMB Review AGENCY: Veterans Benefits Administration... Education Benefits, VA Form 22-1990. b. Application for Family Member to Use Transferred Benefits, VA Form 22-1990E. [[Page 40454

  11. Security of Radioactive Waste

    International Nuclear Information System (INIS)

    Goldammer, W.

    2003-01-01

    Measures to achieve radioactive waste security are discussed. Categorization of waste in order to implement adequate and consistent security measures based on potential consequences is made. The measures include appropriate treatment/storage/disposal of waste to minimize the potential and consequences of malicious acts; management of waste only within an authorised, regulated, legal framework; management of the security of personnel and information; measures to minimize the acquisition of radioactive waste by those with malicious intent. The specific measures are: deter unauthorized access to the waste; detect any such attempt or any loss or theft of waste; delay unauthorized access; provide timely response to counter any attempt to gain unauthorised access; measures to minimize acts of sabotage; efforts to recover any lost or stolen waste; mitigation and emergency plans in case of release of radioactivity. An approach to develop guidance, starting with the categorisation of sources and identification of dangerous sources, is presented. Dosimetric criteria for internal and external irradiation are set. Different exposure scenarios are considered. Waste categories and security categories based on the IAEA INFCIRC/225/Rev.4 are presented

  12. 17 CFR 270.12d3-1 - Exemption of acquisitions of securities issued by persons engaged in securities related businesses.

    Science.gov (United States)

    2010-04-01

    ... securities issued by persons engaged in securities related businesses. 270.12d3-1 Section 270.12d3-1... in securities related businesses. (a) Notwithstanding section 12(d)(3) of the Act, a registered... securities related business, the determination required by paragraph (b) of this section shall be made as...

  13. VA/Q distribution during heavy exercise and recovery in humans: implications for pulmonary edema

    Science.gov (United States)

    Schaffartzik, W.; Poole, D. C.; Derion, T.; Tsukimoto, K.; Hogan, M. C.; Arcos, J. P.; Bebout, D. E.; Wagner, P. D.

    1992-01-01

    Ventilation-perfusion (VA/Q) inequality has been shown to increase with exercise. Potential mechanisms for this increase include nonuniform pulmonary vasoconstriction, ventilatory time constant inequality, reduced large airway gas mixing, and development of interstitial pulmonary edema. We hypothesized that persistence of VA/Q mismatch after ventilation and cardiac output subside during recovery would be consistent with edema; however, rapid resolution would suggest mechanisms related to changes in ventilation and blood flow per se. Thirteen healthy males performed near-maximal cycle ergometry at an inspiratory PO2 of 91 Torr (because hypoxia accentuates VA/Q mismatch on exercise). Cardiorespiratory variables and inert gas elimination patterns were measured at rest, during exercise, and between 2 and 30 min of recovery. Two profiles of VA/Q distribution behavior emerged during heavy exercise: in group 1 an increase in VA/Q mismatch (log SDQ of 0.35 +/- 0.02 at rest and 0.44 +/- 0.02 at exercise; P less than 0.05, n = 7) and in group 2 no change in VA/Q mismatch (n = 6). There were no differences in anthropometric data, work rate, O2 uptake, or ventilation during heavy exercise between groups. Group 1 demonstrated significantly greater VA/Q inequality, lower vital capacity, and higher forced expiratory flow at 25-75% of forced vital capacity for the first 20 min during recovery than group 2. Cardiac index was higher in group 1 both during heavy exercise and 4 and 6 min postexercise. However, both ventilation and cardiac output returned toward baseline values more rapidly than did VA/Q relationships. Arterial pH was lower in group 1 during exercise and recovery. We conclude that greater VA/Q inequality in group 1 and its persistence during recovery are consistent with the hypothesis that edema occurs and contributes to the increase in VA/Q inequality during exercise. This is supported by observation of greater blood flows and acidosis and, presumably therefore

  14. 77 FR 2450 - Security Zone; Potomac and Anacostia Rivers, Washington, DC

    Science.gov (United States)

    2012-01-18

    ... terrorist acts, and enhance public and maritime safety and security. The Coast Guard was unable to publish a... terrorist acts and enhancing public and maritime safety security. Under 5 U.S.C. 553(d)(3), the Coast Guard...-ranking government officials, mitigating potential terrorist acts and enhancing public and maritime safety...

  15. 17 CFR 14.4 - Violation of Commodity Exchange Act.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Violation of Commodity Exchange Act. 14.4 Section 14.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... Exchange Act. The Commission may deny, temporarily or permanently, the privilege of appearing or practicing...

  16. MODEL NON LINIER GARCH (NGARCH UNTUK MENGESTIMASI NILAI VALUE at RISK (VaR PADA IHSG

    Directory of Open Access Journals (Sweden)

    I KOMANG TRY BAYU MAHENDRA

    2015-06-01

    Full Text Available In investment, risk measurement is important. One of risk measure is Value at Risk (VaR. There are many methods that can be used to estimate risk based on VaR framework. One of them Non Linier GARCH (NGARCH model. In this research, determination of VaR used NGARCH model. NGARCH model allowed for asymetric behaviour in the volatility such that “good news” or positive return and “bad news” or negative return. Based on calculations of VaR, the higher of the confidence level and the longer the investment period, the risk was greater. Determination of VaR using NGARCH model was less than GARCH model.

  17. Vectorization of the KENO V.a criticality safety code

    International Nuclear Information System (INIS)

    Hollenbach, D.F.; Dodds, H.L.; Petrie, L.M.

    1991-01-01

    The development of the vector processor, which is used in the current generation of supercomputers and is beginning to be used in workstations, provides the potential for dramatic speed-up for codes that are able to process data as vectors. Unfortunately, the stochastic nature of Monte Carlo codes prevents the old scalar version of these codes from taking advantage of the vector processors. New Monte Carlo algorithms that process all the histories undergoing the same event as a batch are required. Recently, new vectorized Monte Carlo codes have been developed that show significant speed-ups when compared to the scalar version of themselves or equivalent codes. This paper discusses the vectorization of an already existing and widely used criticality safety code, KENO V.a All the changes made to KENO V.a are transparent to the user making it possible to upgrade from the standard scalar version of KENO V.a to the vectorized version without learning a new code

  18. 'Acting like chameleons’: on the McDonaldization of private security

    NARCIS (Netherlands)

    van Steden, R.; de Waard, J.

    2013-01-01

    Private security is a fragmented industry with tens of thousands of small- and medium-sized suppliers worldwide. However, with the arrival in the market of multinational brands such as Group 4 Securicor and Securitas, we are witnessing a McDonaldization of security commodities. This development

  19. 76 FR 79067 - Payment or Reimbursement for Emergency Treatment Furnished by Non-VA Providers in Non-VA...

    Science.gov (United States)

    2011-12-21

    ... DEPARTMENT OF VETERANS AFFAIRS 38 CFR Part 17 RIN 2900-AN49 Payment or Reimbursement for Emergency..., authorize the Secretary of Veterans Affairs to reimburse eligible veterans for costs related to non-VA.... Specifically, section 1725 authorizes reimbursement for emergency treatment for eligible veterans with...

  20. Methods for estimating and comparing VA outpatient drug benefits with the private sector.

    Science.gov (United States)

    Render, Marta L; Nowak, John; Hammond, Emmett K; Roselle, Gary

    2003-06-01

    To estimate and compare Veterans Health Administration (VA) expenditures for outpatient pharmaceuticals for veterans at six VA facilities with hypothetical private sector costs. Using the VA Pharmacy Benefits Management Strategic Health Care Group (PBM) database, we extracted data for all dispensed outpatient prescriptions from the six study sites over federal fiscal year 1999. After extensive data validation, we converted prescriptions to the same units and merged relevant VA pricing information by National Drug Code to Redbook listed average wholesale price and the Medicaid maximal allowable charge, where available. We added total VA drug expenditures to personnel cost from the pharmacy portion of that medical center's cost distribution report. Hypothetical private sector payments were $200.8 million compared with an aggregate VA budget of $118.8 million. Using National Drug Code numbers, 97% of all items dispensed from the six facilities were matched to private sector price data. Nonmatched pharmaceuticals were largely generic over-the-counter pain relievers and commodities like alcohol swabs. The most commonly prescribed medications reflect the diseases and complaints of an older male population: pain, cardiovascular problems, diabetes, and depression or other psychiatric disorders. Use of the VA PBM database permits researchers to merge expenditure and prescription data to patient diagnoses and sentinel events. A critical element in its use is creating similar units among the systems. Such data sets permit a deeper view of the variability in drug expenditures, an important sector of health care whose inflation has been disproportionate to that of the economy and even health care.

  1. Malaria epidemiology in the Pakaanóva (Wari') Indians, Brazilian Amazon.

    Science.gov (United States)

    Sá, D Ribeiro; Souza-Santos, R; Escobar, A L; Coimbra, C E A

    2005-04-01

    This paper reports the results of a longitudinal study of malaria incidence (1998-2002) among the Pakaanóva (Wari') Indians, Brazilian southwest Amazon region, based on data routinely gathered by Brazilian National Health Foundation outposts network in conjunction with the Indian health service. Malaria is present yearlong in the Pakaanóva. Statistically significant differences between seasons or months were not noticed. A total of 1933 cases of malaria were diagnosed in the Pakaanóva during this period. The P. vivax / P. falciparum ratio was 3.4. P. vivax accounted for 76.5% of the cases. Infections with P. malariae were not recorded. Incidence rates did not differ by sex. Most malaria cases were reported in children < 10 years old (45%). About one fourth of all cases were diagnosed on women 10-40 years old. An entomological survey carried out at two Pakaanóva villages yielded a total of 3.232 specimens of anophelines. Anopheles darlingi predominated (94.4%). Most specimens were captured outdoors and peak activity hours were noted at early evening and just before sunrise. It was observed that Pakaanóva cultural practices may facilitate outdoor exposure of individuals of both sexes and all age groups during peak hours of mosquito activities (e.g., coming to the river early in the morning for bathing or to draw water, fishing, engaging in hunting camps, etc). In a context in which anophelines are ubiquitous and predominantly exophilic, and humans of both sexes and all ages are prone to outdoor activities during peak mosquito activity hours, malaria is likely to remain endemic in the Pakaanóva, thus requiring the development of alternative control strategies that are culturally and ecologically sensitive.

  2. 75 FR 31440 - Privacy Act of 1974; Report of a New System of Records

    Science.gov (United States)

    2010-06-03

    ... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the E-Government Act of... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the E-Government Act of... by State law, or its fiscal agent; (3) support litigation involving the Department; (4) combat fraud...

  3. The Burr X Pareto Distribution: Properties, Applications and VaR Estimation

    Directory of Open Access Journals (Sweden)

    Mustafa Ç. Korkmaz

    2017-12-01

    Full Text Available In this paper, a new three-parameter Pareto distribution is introduced and studied. We discuss various mathematical and statistical properties of the new model. Some estimation methods of the model parameters are performed. Moreover, the peaks-over-threshold method is used to estimate Value-at-Risk (VaR by means of the proposed distribution. We compare the distribution with a few other models to show its versatility in modelling data with heavy tails. VaR estimation with the Burr X Pareto distribution is presented using time series data, and the new model could be considered as an alternative VaR model against the generalized Pareto model for financial institutions.

  4. 75 FR 33216 - Payment or Reimbursement for Emergency Treatment Furnished by Non-VA Providers in Non-VA...

    Science.gov (United States)

    2010-06-11

    ... health care services for veterans).'' Proposed Sec. 17.121(a) would establish the clinical decision maker... practice to utilize the services of health care professionals, such as nurses, for purposes of clinical review. For this reason, establishing the clinical decision maker as a ``designated VA clinician'' would...

  5. 6 CFR 5.31 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security of systems of records. 5.31 Section 5.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.31 Security of systems of records. (a) In general. Each component...

  6. No nuclear safety without security

    International Nuclear Information System (INIS)

    Anon.

    2016-01-01

    ead of Health and Safety - Nuclear Safety and Corporate Security at ENGIE Benelux, Pierre Doumont has the delicate job of defining and implementing measures, including cybersecurity, to prevent the risk of malevolent acts against tangible and intangible assets. He gives some hints on the contribution of nuclear security to safety.

  7. Testing popular VaR models in EU new member and candidate states

    Directory of Open Access Journals (Sweden)

    Saša Žiković

    2007-12-01

    Full Text Available The impact of allowing banks to calculate their capital requirement based on their internal VaR models, and the impact of regulation changes on banks in transitional countries has not been well studied. This paper examines whether VaR models that are created and suited for developed markets apply to the volatile stock markets of EU new member and candidate states (Bulgaria, Romania, Croatia and Turkey. Nine popular VaR models are tested on five stock indexes from EU new member and candidate states. Backtesting results show that VaR models commonly used in developed stock markets are not well suited for measuring market risk in these markets. Presented findings bear very important implications that have to be addressed by regulators and risk practitioners operating in EU new member andcandidate states. Risk managers have to start thinking outside the frames set by their parent companies or else investors present in these markets may find themselves in serious trouble, dealing with losses that they have not been expecting. National regulators have to take into consideration that simplistic VaR models that are widely used in some developed countries are not well suited for these illiquid and developing stock markets.

  8. 76 FR 71920 - Payment for Home Health Services and Hospice Care by Non-VA Providers

    Science.gov (United States)

    2011-11-21

    ... concerning the billing methodology for non-VA providers of home health services and hospice care. The proposed rulemaking would include home health services and hospice care under the VA regulation governing... to ``RIN 2900-AN98--Payment for home health and services and hospice care by non-VA providers...

  9. Effects of inspired CO2, hyperventilation, and time on VA/Q inequality in the dog

    Science.gov (United States)

    Tsukimoto, K.; Arcos, J. P.; Schaffartzik, W.; Wagner, P. D.; West, J. B.

    1992-01-01

    In a recent study by Tsukimoto et al. (J. Appl. Physiol. 68: 2488-2493, 1990), CO2 inhalation appeared to reduce the size of the high ventilation-perfusion ratio (VA/Q) mode commonly observed in anesthetized mechanically air-ventilated dogs. In that study, large tidal volumes (VT) were used during CO2 inhalation to preserve normocapnia. To separate the influences of CO2 and high VT on the VA/Q distribution in the present study, we examined the effect of inspired CO2 on the high VA/Q mode using eight mechanically ventilated dogs (4 given CO2, 4 controls). The VA/Q distribution was measured first with normal VT and then with increased VT. In the CO2 group at high VT, data were collected before, during, and after CO2 inhalation. With normal VT, there was no difference in the size of the high VA/Q mode between groups [10.5 +/- 3.5% (SE) of ventilation in the CO2 group, 11.8 +/- 5.2% in the control group]. Unexpectedly, the size of the high VA/Q mode decreased similarly in both groups over time, independently of the inspired PCO2, at a rate similar to the fall in cardiac output over time. The reduction in the high VA/Q mode together with a simultaneous increase in alveolar dead space (estimated by the difference between inert gas dead space and Fowler dead space) suggests that poorly perfused high VA/Q areas became unperfused over time. A possible mechanism is that elevated alveolar pressure and decreased cardiac output eliminate blood flow from corner vessels in nondependent high VA/Q regions.

  10. 17 CFR 240.16b-6 - Derivative securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Derivative securities. 240.16b... Exchange Act of 1934 Exemption of Certain Transactions from Section 16(b) § 240.16b-6 Derivative securities...). Note to paragraph (b): The exercise or conversion of a derivative security that does not satisfy the...

  11. Homeland Security: Scope of the Secretary's Reorganization Authority

    National Research Council Canada - National Science Library

    Vina, Stephen R

    2005-01-01

    ...). Section 872 of the Homeland Security Act gives the Secretary of Homeland Security the authority to reorganize "functions" and "organizational units" within the Department either independently, 60...

  12. 78 FR 66265 - Drawbridge Operation Regulation; Elizabeth River, Eastern Branch, Norfolk, VA

    Science.gov (United States)

    2013-11-05

    ... Operation Regulation; Elizabeth River, Eastern Branch, Norfolk, VA AGENCY: Coast Guard, DHS. ACTION: Notice... Elizabeth River Eastern Branch, mile 1.1, at Norfolk, VA. This deviation is necessary to facilitate... maintenance. The Norfolk Southern 5 railroad Bridge, at mile 1.1, across the Elizabeth River (Eastern Branch...

  13. Can reported VaR be used as an indicator of the volatility of share prices? Evidence from UK banks.

    OpenAIRE

    Ou, Shian Kao

    2006-01-01

    Value at Risk (VaR) is used as an indicator to measure the risks contained in a firm. With the uprising development of VaR theory and computational techniques, the VaR is nowadays adopted by banks and reported in annual reports. Since the method to calculate VaR is questioned, and the reported VaR can not be thoroughly audited, this paper attempts to find the relationship between the reported VaR and the volatility of share price for UK listed banks. This paper reviews literature about VaR an...

  14. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  15. 78 FR 15731 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0011] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503) and the Computer...

  16. VA's National PTSD Brain Bank: a National Resource for Research.

    Science.gov (United States)

    Friedman, Matthew J; Huber, Bertrand R; Brady, Christopher B; Ursano, Robert J; Benedek, David M; Kowall, Neil W; McKee, Ann C

    2017-08-25

    The National PTSD Brain Bank (NPBB) is a brain tissue biorepository established to support research on the causes, progression, and treatment of PTSD. It is a six-part consortium led by VA's National Center for PTSD with participating sites at VA medical centers in Boston, MA; Durham, NC; Miami, FL; West Haven, CT; and White River Junction, VT along with the Uniformed Services University of Health Sciences. It is also well integrated with VA's Boston-based brain banks that focus on Alzheimer's disease, ALS, chronic traumatic encephalopathy, and other neurological disorders. This article describes the organization and operations of NPBB with specific attention to: tissue acquisition, tissue processing, diagnostic assessment, maintenance of a confidential data biorepository, adherence to ethical standards, governance, accomplishments to date, and future challenges. Established in 2014, NPBB has already acquired and distributed brain tissue to support research on how PTSD affects brain structure and function.

  17. Feasibility and acceptability of interventions to delay gun access in VA mental health settings.

    Science.gov (United States)

    Walters, Heather; Kulkarni, Madhur; Forman, Jane; Roeder, Kathryn; Travis, Jamie; Valenstein, Marcia

    2012-01-01

    The majority of VA patient suicides are completed with firearms. Interventions that delay patients' gun access during high-risk periods may reduce suicide, but may not be acceptable to VA stakeholders or may be challenging to implement. Using qualitative methods, stakeholders' perceptions about gun safety and interventions to delay gun access during high-risk periods were explored. Ten focus groups and four individual interviews were conducted with key stakeholders, including VA mental health patients, mental health clinicians, family members and VA facility leaders (N=60). Transcripts were consensus-coded by two independent coders, and structured summaries were developed and reviewed using a consensus process. All stakeholder groups indicated that VA health system providers had a role in increasing patient safety and emphasized the need for providers to address gun access with their at-risk patients. However, VA mental health patients and clinicians reported limited discussion regarding gun access in VA mental health settings during routine care. Most, although not all, patients and clinicians indicated that routine screening for gun access was acceptable, with several noting that it was more acceptable for mental health patients. Most participants suggested that family and friends be involved in reducing gun access, but expressed concerns about potential family member safety. Participants generally found distribution of trigger locks acceptable, but were skeptical about its effectiveness. Involving Veteran Service Organizations or other individuals in temporarily holding guns during high-risk periods was acceptable to many participants but only with numerous caveats. Patients, clinicians and family members consider the VA health system to have a legitimate role in addressing gun safety. Several measures to delay gun access during high-risk periods for suicide were seen as acceptable and feasible if implemented thoughtfully. Published by Elsevier Inc.

  18. 78 FR 1275 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-01-08

    ... Social Security Administration (Computer Matching Agreement 1071). SUMMARY: In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as amended by the Computer Matching and Privacy Protection Act of... of its new computer matching program with the Social Security Administration (SSA). DATES: OPM will...

  19. 46 CFR 7.45 - Cape Henlopen, DE to Cape Charles, VA.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Cape Henlopen, DE to Cape Charles, VA. 7.45 Section 7.45... Atlantic Coast § 7.45 Cape Henlopen, DE to Cape Charles, VA. (a) A line drawn from the easternmost extremity of Indian River Inlet North Jetty to latitude 38°36.5′ N. longitude 75°02.8′ W. (Indian River...

  20. VA Enterprise Design Patterns - 5.1 (Mobility) Mobile

    Data.gov (United States)

    Department of Veterans Affairs — First of a set of guidance documents that establish the architectural foundation for mobile computing in the VA. This document outlines the enterprise capabilities...

  1. VA Enterprise Design Patters - 2.5 (Enterprise Architecture)

    Data.gov (United States)

    Department of Veterans Affairs — Enterprise architectural guidelines and constraints that provide references to the use of enterprise capabilities that will enable the VA to access and exchange data...

  2. Usable Security and E-Banking: ease of use vis-a-vis security

    Directory of Open Access Journals (Sweden)

    Morten Hertzum

    2004-05-01

    Full Text Available Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes and that the weaknesses may in turn cause decreased security. We view the conflict between ease of use and security in the context of usable security, a concept that is intended to match security principles and demands against user knowledge and motivation. Automation, instruction, and understanding can be identified as different approaches to usable security. Instruction is the main approach of the systems evaluated; automation relieves the user from involvement in security, as far as possible; and understanding goes beyond step-by-step instructions, to enable users to act competently and safely in situations that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems.

  3. Islamic movement and human rights: Pertubuhan Jamaah Islah Malaysia’s involvement in the “Abolish Internal Security Act Movement,” 2000-2012

    Directory of Open Access Journals (Sweden)

    Maszlee Malik

    2014-12-01

    Full Text Available Human rights has been acknowledged as one of the essential characteristics of good governance. Abuse of human rights is strongly associated with bad governance, which is believed by many to be a serious impediment to development and sustainable growth. Despite the active participations of Islamic movements in many parts of the political world, very little is known of their involvement in advocating human rights issues as part of their struggle for power. Nevertheless, as an Islamic movement and an Islamic revivalism actor in Malaysia, Pertubuhan Jamaah Islah Malaysia (JIM has shown otherwise. JIM has resembled a different attitude towards the issue of human rights that they believe as an integrated and pertinent composition of good governance. By scrutinising their political activities and discourse since 2000, it becomes clear that JIM has been actively engaged in good governance and human rights issues, especially those that relate to the political rights of citizens through its involvement in the Abolish Internal Security Act (ISA Movement (Gerakan Mansuhkan ISA. This paper examines JIM’s involvement in human rights issues with a special focus on its active and leading role in calling for the abolishment of the Internal Security Act (ISA.

  4. 76 FR 21373 - Privacy Act of 1974; Report of a New System of Records

    Science.gov (United States)

    2011-04-15

    ... Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986; the Health Insurance... 1974; the Federal Information Security Management Act of 2002; the Computer Fraud and Abuse Act of 1986... established by State law; (3) support litigation involving the Agency; (4) combat fraud, waste, and abuse in...

  5. 28 CFR 700.24 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...

  6. 78 FR 66806 - Privacy Act of 1974

    Science.gov (United States)

    2013-11-06

    ... new system of records titled ``VA Mobile Application Environment (MAE)-VA'' (173VA005OP2). DATES... utilizing services available in VA's MAE middle tier service layer (the VA Health Adapter). These records... including, but not limited to, Veterans Health Information Systems and Technology Architecture (VistA)-VA...

  7. 38 CFR 74.26 - What types of business information will VA collect?

    Science.gov (United States)

    2010-07-01

    ... VETERANS AFFAIRS (CONTINUED) VETERANS SMALL BUSINESS REGULATIONS Records Management § 74.26 What types of business information will VA collect? VA will examine a variety of business records. See § 74.12, “What is... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false What types of business...

  8. 76 FR 3098 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-01-19

    ... requests and/or records have been referred to the National Security Agency/Central Security Service (NSA..., Department of Defense Privacy Program; NSA/CSS Policy 1-5; NSA/CSS Freedom of Information Act Program; NSA/CSS Policy 1-34; Implementation of the Privacy Act of 1974; NSA/CSS Policy 1-15, Mandatory...

  9. Agents Based e-Commerce and Securing Exchanged Information

    Science.gov (United States)

    Al-Jaljouli, Raja; Abawajy, Jemal

    Mobile agents have been implemented in e-Commerce to search and filter information of interest from electronic markets. When the information is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described, which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol usingSymbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data-authenticity, origin confidentiality and data non-repudiability.

  10. 40 CFR 205.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2... PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security... a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  11. Security Price Informativeness with Delegated Traders

    OpenAIRE

    Gary Gorton; Ping He; Lixin Huang

    2010-01-01

    Trade in securities markets is conducted by agents acting for principals, using "mark-to-market" contracts whereby performance is assessed using security market prices. We endogenize contract choices, information production, informed trading, and security price informativeness. But there is a contract externality. Prices are informative only because other principals induce their agents to trade based on privately produced information. The agent-traders then have an incentive to coordinate and...

  12. 76 FR 34920 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies

    Science.gov (United States)

    2011-06-15

    ... from all provisions of the Securities Act, other than the Section 17(a) anti-fraud provisions, as well... provisions of the Securities Act, except the anti- fraud provisions of Section 17(a), subject to certain... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230, 240 and 260 [Release Nos. 33-9222; 34-64639...

  13. 77 FR 10807 - Designation of One Entity Pursuant to Executive Order 13553

    Science.gov (United States)

    2012-02-23

    ... International Emergency Economic Powers Act (50 U.S.C. 1701-06) (``IEEPA'') and the Comprehensive Iran Sanctions... INTELLIGENCE AND SECURITY (a.k.a. VEZARAT-E ETTELA'AT VA AMNIAT-E KESHVAR; a.k.a. ``MOIS''; a.k.a. ``VEVAK..., Tehran, Iran; Ministry of Intelligence, Second Negarestan Street, Pasdaran Avenue, Tehran, Iran [SDGT...

  14. 17 CFR 210.3-16 - Financial statements of affiliates whose securities collateralize an issue registered or being...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Financial statements of... FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934, PUBLIC UTILITY... POLICY AND CONSERVATION ACT OF 1975 General Instructions As to Financial Statements § 210.3-16 Financial...

  15. 78 FR 8536 - Privacy Act of 1974; Report of New System of Records

    Science.gov (United States)

    2013-02-06

    ... to Section 3004 of the Patient Protection and Affordable Care Act of 2010 (ACA) (Pub. L. 111-148), amending the Social Security Act (the Act) (42 U.S.C. 1886(m)). DATES: Effective Dates: Effective 30 days..., Office of Enterprise Management, Centers for Medicare & Medicaid Services, 7500 Security Boulevard...

  16. Security Problems in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Rola Motawie

    2016-12-01

    Full Text Available Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work, we provide a comparable study of cloud computing privacy and security concerns. We identify and classify known security threats, cloud vulnerabilities, and attacks.

  17. Synthesis of securement device options and strategies

    Science.gov (United States)

    2002-03-01

    The Americans with Disabilities Act of 1990 (ADA) requires that public transit vehicles be equipped with securement location(s) and device(s) that are able to secure common wheelchairs," as defined in the ADA regulations. The definition and size spec...

  18. 40 CFR 204.5-2 - National security exemptions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act, any...

  19. 17 CFR 41.21 - Requirements for underlying securities.

    Science.gov (United States)

    2010-04-01

    ... underlying security is: (i) Common stock, (ii) Such other equity security as the Commission and the SEC jointly deem appropriate, or (iii) A note, bond, debenture, or evidence of indebtedness; and (3) The... Exchange Act of 1934; (3) The securities in the index are: (i) Common stock, (ii) Such other equity...

  20. 17 CFR 210.12-13 - Investments other than securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Investments other than... EXCHANGE ACT OF 1934, PUBLIC UTILITY HOLDING COMPANY ACT OF 1935, INVESTMENT COMPANY ACT OF 1940, INVESTMENT ADVISERS ACT OF 1940, AND ENERGY POLICY AND CONSERVATION ACT OF 1975 Form and Content of Schedules...

  1. 78 FR 21981 - Sunshine Act Meeting

    Science.gov (United States)

    2013-04-12

    ... transparency, liquidity, efficiency, or other aspects of the structure of the corporate bond and asset-backed... provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... focus on the characteristics of the corporate bond and asset-backed securities markets today, how those...

  2. Affordable Care Act (ACA)

    Data.gov (United States)

    Social Security Administration — The Affordable Care Act (ACA) is a federal statute enacted with a goal of increasing the quality and affordability of health insurance. Through a web service, CMS...

  3. 77 FR 48207 - Further Definition of “Swap,” “Security-Based Swap,” and “Security-Based Swap Agreement”; Mixed...

    Science.gov (United States)

    2012-08-13

    ... Swaps and Cross-Currency Swaps (c) Interpretation Regarding Foreign Exchange Spot Transactions (d... Exchange Act, 15 U.S.C. 78c(a)(68). This new security-based swap definition also is cross-referenced in new... Securities and Exchange Commission 17 CFR Parts 230, 240 and 241 Further Definition of ``Swap,'' ``Security...

  4. 75 FR 10554 - Privacy Act of 1974; System of Records Notice

    Science.gov (United States)

    2010-03-08

    ..., privacy and security objectives: Provide driver-related MCMIS crash and inspection data electronically... to submit a Freedom of Information Act (FOIA) request or Privacy Act request to FMCSA for the data..., privacy and security objectives are being met. The PSP system will only allow operator-applicants to...

  5. Interaction of blood coagulation factor Va with phospholipid vesicles examined by using lipophilic photoreagents

    International Nuclear Information System (INIS)

    Krieg, U.C.; Isaacs, B.S.; Yemul, S.S.; Esmon, C.T.; Bayley, H.; Johnson, A.E.

    1987-01-01

    Two different lipophilic photoreagents, [ 3 H]adamantane diazirine and 3-(trifluoromethyl)-3-(m-[ 125 I]iodophenyl)diazirine (TID), have been utilized to examine the interactions of blood coagulation factor Va with calcium, prothrombin, factor Xa, and, in particular, phospholipid vesicles. With each of these structurally dissimilar reagents, the extent of photolabeling of factor Va was greater when the protein was bound to a membrane surface than when it was free in solution. Specifically, the covalent photoreaction with Vl, the smaller subunit of factor Va, was 2-fold higher in the presence of phosphatidylcholine/phosphatidylserine (PC/PS, 3:1) vesicles, to which factor Va binds, than in the presence of 100% PC vesicles, to which the protein does not bind. However, the magnitude of the PC/PS-dependent photolabeling was much less than has been observed previously with integral membrane proteins. It therefore appears that the binding of factor Va to the membrane surface exposes Vl to the lipid core of the bilayer, but that only a small portion of the Vl polypeptide is exposed to, or embedded in, the bilayer core. Addition of either prothrombin or active-site-blocked factor Xa to PC/PS-bound factor Va had little effect on the photolabeling of Vl with TID, but reduced substantially the covalent labeling of Vh, the larger subunit of factor Va. This indicates that prothrombin and factor Xa each cover nonpolar surfaces on Vh when the macromolecules associate on the PC/PS surface. It therefore seems likely that the formation of the prothrombinase complex involves a direct interaction between Vh and factor Xa and between Vh and prothrombin.(ABSTRACT TRUNCATED AT 250 WORDS)

  6. Electroencephalogram (EEG spectral features discriminate between Alzheimer’s (AD and Vascular dementia (VaD

    Directory of Open Access Journals (Sweden)

    Emanuel eNeto

    2015-02-01

    Full Text Available Alzheimer’s disease (AD and vascular dementia (VaD present with similar clinical symptoms of cognitive decline, but the underlying pathophysiological mechanisms differ. To determine whether clinical electroencephalography (EEG can provide information relevant to discriminate between these diagnoses, we used quantitative EEG analysis to compare the spectra between non-medicated patients with AD (n=77 and VaD (n=77 and healthy elderly normal controls (NC (n=77. We use curve-fitting with a combination of a power loss and Gaussian function to model the averaged resting-state spectra of each EEG channel extracting six parameters. We assessed the performance of our model and tested the extracted parameters for group differentiation. We performed regression analysis in a MANCOVA with group, age, gender, and number of epochs as predictors and further explored the topographical group differences with pair-wise contrasts. Significant topographical differences between the groups were found in several of the extracted features. Both AD and VaD groups showed increased delta power when compared to NC, whereas the AD patients showed a decrease in alpha power for occipital and temporal regions when compared with NC. The VaD patients had higher alpha power than NC and AD. The AD and VaD groups showed slowing of the alpha rhythm. Variability of the alpha frequency was wider for both AD and VaD groups. There was a general decrease in beta power for both AD and VaD. The proposed model is a useful to parameterize spectra which allowed extracting relevant clinical EEG key features that move towards simple and interpretable diagnostic criteria.

  7. LIFE JOURNEY: MEDICAL AND SCIENTIFIC WORK OF PROFESSOR V.A. SOKOLOV

    Directory of Open Access Journals (Sweden)

    P. A. Ivanov

    2017-01-01

    Full Text Available The article is dedicated to doctor of medicine, professor V.A. Sokolov. In 2017 he celebrates his eightieth birthday. Professor V.A. .Sokolov is one of the founders of polytrauma treatment in USSR and Russia. For a long time he had been heading polytrauma department at the N.V. Sklifosovsky Research Institute for Emergency Medicine. Due to his work, algorithms of life sustaining and recovery of serious patients were developed. Professor V.A. Sokolov is the author of 6 monographies and about 300 periodical papers. Besides, he is the holder of 32 patents. Some of his inventions were popularized and manufactured. He had been leading active scientific work, which resulted in 6 doctoral dissertations and 15 candidate theses. The staff of N.V. Sklifosovsky Research Institute for Emergency Medicine congratulates on the anniversary.

  8. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    Science.gov (United States)

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  9. 76 FR 28960 - National Security Education Board Members Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  10. 77 FR 27739 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-05-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  11. From El Billar to Operations Fenix and Jaque: The Colombian Security Force Experience, 1998-2008

    Science.gov (United States)

    2009-12-01

    577–601. ———. Sostenibilidad De La Seguridad Democratica. Bogotá: Fundadcion Seguridad & Democracia, 23 February 2005. Rempe, Dennis M...Security Force Experience, 1998–2008 Robert D. Ramsey III Occasional Paper 34 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting ...Services, Directorate for Information Operations and Reports , 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be

  12. 75 FR 25321 - Agency Information Collection (VA National Rehabilitation Special Events, Event Registration...

    Science.gov (United States)

    2010-05-07

    ... Winter Sports Clinic Application, VA Form 0924a series. b. National Veterans Wheelchair Games Application.... National Veterans TEE Tournament Application, VA Form 0927a series. e. National Veterans Summer Sports... Form 0929a series. Type of Review: Existing collection in use without an OMB control number. Abstract...

  13. 76 FR 9054 - National Science Board; Sunshine Act Meetings; Impromptu Notice of Change (Addition of Agenda Item)

    Science.gov (United States)

    2011-02-16

    ... NATIONAL SCIENCE FOUNDATION National Science Board; Sunshine Act Meetings; Impromptu Notice of Change (Addition of Agenda Item) The National Science Board's (NSB) Audit & Oversight (A&O) Committee..., National Science Foundation, 4201 Wilson Blvd., Arlington, VA 22230. Telephone: (703) 292-7000. Daniel A...

  14. V.A. Gorodtsov and Kazan: tour 1920

    Directory of Open Access Journals (Sweden)

    Kuzminykh Sergey V.

    2014-12-01

    Full Text Available A fragment of an archival document is published, that is connected to the September 8-12, 1920, stay in Kazan of V.A. Gorodtsov, who headed the Archaeological Subdepartment with the Museum Department of the RSFSR People’s Commissariat for Education, in the framework of his inspecting tour around the towns of the Volga and Urals region. The document is a diary, and its entries reflect information about the tour and its results that had not been exhaustively reflected in official documentation. It narrates about meetings, polemic exchanges, Gorodtsov’s addresses to scientists and the public, his impressions of the archaeological investigations in the regions, and the state of the museums and collections. V.A. Gorodtsov’s encounters and personal contacts with B.F. Adler, N.F. Katanov, M.G. Hudyakov and other researchers had played a positive role in archaeology development in the Volga-Kama region during the hardest times after the revolution.

  15. 17 CFR 240.8c-1 - Hypothecation of customers' securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Hypothecation of customers... Securities Exchange Act of 1934 Hypothecation of Customers' Securities § 240.8c-1 Hypothecation of customers... any customer under circumstances: (1) That will permit the commingling of securities carried for the...

  16. 33 CFR 1.05-5 - Marine Safety and Security Council.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine Safety and Security Council, composed of senior Coast Guard officials, acts as policy advisor to the...

  17. 17 CFR 240.17a-5 - Reports to be made by certain brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and... market risk; (B) A graph reflecting, for each business line, the daily intra-month VaR; (C) The aggregate... Relating to the Possession or Control Requirements Under § 240.15c3-3 and shall be filed with said report...

  18. Nuclear and radiological Security: Introduction.

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-02-24

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  19. Nuclear and radiological Security: Introduction

    International Nuclear Information System (INIS)

    Miller, James Christopher

    2016-01-01

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  20. Vađenje podrtina i potonulih stvari u svjetlu novele Pomorskog zakonika iz 2013. godine

    Directory of Open Access Journals (Sweden)

    Vesna Skorupan Wolff

    2017-11-01

    Full Text Available Materiju vađenja podrtina i potonulih stvari uređuju odredbe upravnopravne prirode koje reguliraju odnose između vlasnika podrtine ili potonule stvari, odnosno ovlaštene osobe i upravnih tijela, a kojima se uređuju razni pravni aspekti postupka vađenja. Pravo vaditi podrtinu ili potonulu stvar primarno ima njezin vlasnik odnosno ovlaštena osoba. Zakon vlasnicima podrtina i potonulih stvari, odnosno ovlaštenim osobama, ostavlja primjeren rok u kojem mogu pokrenuti upravni postupak za dobivanje dozvole za vađenje podrtine ili potonule stvari. Na taj način jamči se nepovredivost vlasništva i utvrđuje načelo prema kojem činjenica da je stvar potonula ili se nasukala ne utječe izravno na vlasnička prava njezina dotadašnjeg vlasnika. Međutim, ako vlasnik, odnosno ovlaštena osoba ne zatraži odobrenje za vađenje podrtine ili potonule stvari, ili kad bez opravdanog razloga prekine ili napusti započeto vađenje kao i u slučaju ako je ovlaštena osoba nepoznata, PZ nudi pravni okvir i omogućuje da vađenje podrtine ili potonule stvari poduzme pošteni nalaznik ili lučka kapetanija. U okviru instituta vađenja podrtina i potonulih stvari uvodi se posebno pravno uređenje za nalaz stvari u moru te se precizno normiraju svi segmenti postupka vađenja kada ga poduzima pošteni nalaznik ili lučka kapetanija. Uređuju se i sva relevantna pitanja u svezi postupanja s izvađenim stvarima kao što su njihovo čuvanje te u propisanim slučajevima mogućnost prodaje na javnoj dražbi. PZ-om se precizno uređuju obvezni odnosi koji nastaju između vlasnika, odnosno ovlaštene osobe i poštenog nalaznika te vlasnika, odnosno ovlaštene osobe i lučke kapetanije, ovisno o tome tko je poduzeo vađenje, a koji se odnose na plaćanje naknade za vađenje, čuvanje, nalazninu i druge tražbine koje zakon priznaje poštenim nalaznicima i lučkim kapetanijama. U okviru toga, uređuje se i posebno stvarnopravno uređenje za stjecanje prava vlasni

  1. VA Dental Insurance Program--federalism. Direct final rule; confirmation of effective date.

    Science.gov (United States)

    2014-03-20

    The Department of Veterans Affairs (VA) published a direct final rule in the Federal Register on October 22, 2013, amending its regulations related to the VA Dental Insurance Program (VADIP), a pilot program to offer premium-based dental insurance to enrolled veterans and certain survivors and dependents of veterans. Specifically, this rule adds language to clarify the limited preemptive effect of certain criteria in the VADIP regulations. VA received no comments concerning this rule or its companion substantially identical proposed rule published in the Federal Register on October 23, 2013. This document confirms that the direct final rule became effective on December 23, 2013. In a companion document in this issue of the Federal Register, we are withdrawing as unnecessary the proposed rule.

  2. 77 FR 30595 - Further Definition of “Swap Dealer,” “Security-Based Swap Dealer,” “Major Swap Participant...

    Science.gov (United States)

    2012-05-23

    ... associated with owning certain types of securities or to gain economic exposure akin to ownership of certain... would insert a loophole into the definition.\\56\\ Some commenters expressed the view that mere active... volume, revenues and profits of such activities, the person's value at risk (VaR) and exposure from such...

  3. Indirect Relations Between Transgressive Acts and General Combat Exposure and Moral Injury.

    Science.gov (United States)

    Frankfurt, Sheila B; Frazier, Patricia; Engdahl, Brian

    2017-11-01

    Moral injury describes the deleterious effects of acts of commission (e.g., killing noncombatants), omission (e.g., failing to prevent a massacre), or betrayal (i.e., by a trusted authority figure) during military service that transgress accepted behavioral boundaries and norms. Transgressive acts are proposed to lead to a guilt- and shame-based syndrome consisting of post-traumatic stress disorder (PTSD) symptoms, demoralization, self-handicapping, and self-injury. In this study, we tested a frequently cited model of moral injury and assessed the associations between potentially transgressive acts, moral injury outcomes, and guilt and fear. Additionally, we sought to clarify the relative contribution of transgressive and nontransgressive/general combat exposure to moral injury. On the basis of previous research and theory, we anticipated that the transgressive acts would be related to outcomes through guilt and that nontransgressive combat exposure would be related to outcomes through fear. Secondary analysis was conducted on data from a sample of combat-exposed male veterans at a Midwestern Veterans Affairs (VA) medical center (N = 190) who participated in a larger parent study on postdeployment readjustment. Structural equation modeling was used to test the pathways from transgressive and nontransgressive combat exposure to PTSD symptoms and suicidality through combat-related guilt and combat-related fear. The institutional review boards of the Midwestern VA medical center and the university of the affiliated researchers approved the study. In total, 38% (n = 72) of the sample reported a potentially transgressive act as one of their three worst traumatic events. The most common potentially transgressive act was killing an enemy combatant (17%; n = 32). In structural equation modeling analyses. potentially transgressive acts were indirectly related to both suicidality (β = 0.09, p < 0.01) and PTSD symptoms (β = 0.06, p < 0.05) through guilt. General combat

  4. 38 CFR 1.9 - Description, use, and display of VA seal and flag.

    Science.gov (United States)

    2010-07-01

    ... stars represent the five branches of military service. The crossed flags represent our nation's history... employees. (D) Official VA signs. (E) Official publications or graphics issued by and attributed to VA, or...) Souvenir or novelty items. (iii) Toys or commercial gifts or premiums. (iv) Letterhead design, except on...

  5. 32 CFR 806b.12 - Requesting the Social Security Number.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Requesting the Social Security Number. 806b.12... Number. When asking an individual for his or her Social Security Number, always give a Privacy Act... Social Security Number; and whether providing the Social Security Number is voluntary or mandatory. Do...

  6. 78 FR 14847 - Topaz Exchange, LLC; Notice of Filing of Application for Registration as a National Securities...

    Science.gov (United States)

    2013-03-07

    ...; Notice of Filing of Application for Registration as a National Securities Exchange Under Section 6 of the... the Securities Exchange Act of 1934 (``Exchange Act''), seeking registration as a national securities... Topaz Exchange's request to be registered as a national securities exchange. The Commission will grant...

  7. On Setting Day-Ahead Equity Trading Risk Limits: VaR Prediction at Market Close or Open?

    Directory of Open Access Journals (Sweden)

    Ana-Maria Fuertes

    2016-09-01

    Full Text Available This paper investigates the information content of the ex post overnight return for one-day-ahead equity Value-at-Risk (VaR forecasting. To do so, we deploy a univariate VaR modeling approach that constructs the forecast at market open and, accordingly, exploits the available overnight close-to-open price variation. The benchmark is the bivariate VaR modeling approach proposed by Ahoniemi et al. that constructs the forecast at the market close instead and, accordingly, it models separately the daytime and overnight return processes and their covariance. For a small cap portfolio, the bivariate VaR approach affords superior predictive ability than the ex post overnight VaR approach whereas for a large cap portfolio the results are reversed. The contrast indicates that price discovery at the market open is less efficient for small capitalization, thinly traded stocks.

  8. Topiramate Protects Pericytes from Glucotoxicity: Role for Mitochondrial CA VA in Cerebromicrovascular Disease in Diabetes.

    Science.gov (United States)

    Patrick, Ping; Price, Tulin O; Diogo, Ana L; Sheibani, Nader; Banks, William A; Shah, Gul N

    Hyperglycemia in diabetes mellitus causes oxidative stress and pericyte depletion from the microvasculature of the brain thus leading to the Blood-Brain Barrier (BBB) disruption. The compromised BBB exposes the brain to circulating substances, resulting in neurotoxicity and neuronal cell death. The decline in pericyte numbers in diabetic mouse brain and pericyte apoptosis in high glucose cultures are caused by excess superoxide produced during enhanced respiration (mitochondrial oxidative metabolism of glucose). Superoxide is precursor to all Reactive Oxygen Species (ROS) which, in turn, cause oxidative stress. The rate of respiration and thus the ROS production is regulated by mitochondrial carbonic anhydrases (mCA) VA and VB, the two isoforms expressed in the mitochondria. Inhibition of both mCA: decreases the oxidative stress and restores the pericyte numbers in diabetic brain; and reduces high glucose-induced respiration, ROS, oxidative stress, and apoptosis in cultured brain pericytes. However, the individual role of the two isoforms has not been established. To investigate the contribution of mCA VA in ROS production and apoptosis, a mCA VA overexpressing brain pericyte cell line was engineered. These cells were exposed to high glucose and analyzed for the changes in ROS and apoptosis. Overexpression of mCA VA significantly increased pericyte ROS and apoptosis. Inhibition of mCA VA with topiramate prevented increases both in glucose-induced ROS and pericyte death. These results demonstrate, for the first time, that mCA VA regulates the rate of pericyte respiration. These findings identify mCA VA as a novel and specific therapeutic target to protect the cerebromicrovascular bed in diabetes.

  9. 77 FR 1095 - Sunshine Act Meeting

    Science.gov (United States)

    2012-01-09

    ... provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and Exchange... 2012 budget of the Public Company Accounting Oversight Board and will consider the related annual accounting support fee for the Board under Section 109 of the Sarbanes-Oxley Act of 2002. Commissioner...

  10. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  11. 77 FR 21158 - VA Directive 0005 on Scientific Integrity: Availability for Review and Comment

    Science.gov (United States)

    2012-04-09

    ... Draft VA Directive 0005 on Scientific Integrity: [square] Fosters a culture of transparency, integrity, and ethical behavior in the development and application of scientific and technological findings in VA... information from inappropriate political or commercial influence; [square] Ensures that selection and...

  12. 48 CFR 853.236-70 - VA Form 10-6298, Architect-Engineer Fee Proposal.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false VA Form 10-6298, Architect-Engineer Fee Proposal. 853.236-70 Section 853.236-70 Federal Acquisition Regulations System DEPARTMENT OF...-Engineer Fee Proposal. VA Form 10-6298, Architect-Engineer Fee Proposal, shall be used as prescribed in 836...

  13. Continuation of Iranshahri Thoughts in Kalileh va Demne

    Directory of Open Access Journals (Sweden)

    Bijan Zahirinav

    2010-10-01

    Full Text Available In this essay, Iranshahri’s thoughts such as ideal king, divine charisma, togetherness of religion and kingdom, justice, truth etc in kalileh va Demneh are investigated. In Kalileh and Demneh, kingdom is a divine gift and the king is at the center of the state affairs. Therefore, affection and kindness must be imprinted on his forehead, otherwise he would be a devilish creature who disturbs governing orders of the universe. He must metaphysically be supported in the circus of governmental affairs, and this is possible only by divine charisma. Such a king must be decorated with justice ornament, so that every body does his best in his own special class and approaches the salvation of soul. The king must also be decorated with accomplishments such as battle assistance and with virtues such as religion assistance. He must strengthen the social connection by “truth”. Basically, without truth life has no harmony because falsehood diverts life form its regular direction. But finally, with the dominance of divine forces over devilish ones, utopia, which is a secure place for releasing from disorder and injustice is proven to be true. Therefore, we conclude that Kalileh and Demneh has a contribution to the continuation of Iranshahri’s thoughts and also to the historical and cultural continuation of Iran in transition to the Islamic period.

  14. Information Security Behavioral Model: Towards Employees' Knowledge and Attitude

    OpenAIRE

    Mishra, Saurabh; Snehlata, Snehlata; Srivastava, Anjali

    2014-01-01

    Information Security has become a significant concern for today's organizations. The internal security threats acts as the most curtail type of security threat within an organization. These internal security threats are a result of poor conduct of security behavior by the employees within an organization. If not deal properly, it may hamper the auditing of organization. Auditing plays an important role in the business environment. Before conducting auditing it is essential to examine the beha...

  15. A PC [personal computer]-based version of KENO V.a

    International Nuclear Information System (INIS)

    Nigg, D.A.; Atkinson, C.A.; Briggs, J.B.; Taylor, J.T.

    1990-01-01

    The use of personal computers (PCs) and engineering workstations for complex scientific computations has expanded rapidly in the last few years. This trend is expected to continue in the future with the introduction of increasingly sophisticated microprocessors and microcomputer systems. For a number of reasons, including security, economy, user convenience, and productivity, an integrated system of neutronics and radiation transport software suitable for operation in an IBM PC-class environment has been under development at the Idaho National Engineering Laboratory (INEL) for the past 3 yr. Nuclear cross-section data and resonance parameters are preprocessed from the Evaluated Nuclear Data Files Version 5 (ENDF/B-V) and supplied in a form suitable for use in a PC-based spectrum calculation and multigroup cross-section generation module. This module produces application-specific data libraries that can then be used in various neutron transport and diffusion theory code modules. This paper discusses several details of the Monte Carlo criticality module, which is based on the well-known highly-sophisticated KENO V.a package developed at Oak Ridge National Laboratory and previously released in mainframe form by the Radiation Shielding Information Center (RSIC). The conversion process and a variety of benchmarking results are described

  16. African Journal of Food and Nutritional Security

    African Journals Online (AJOL)

    The African Journal of Food and Nutritional Security, as an international journal, is intended to act as a forum for researchers working on food and nutritional security issues in Africa and the Third World in their widest range and perspectives. We believe this journal to have ceased publishing ...

  17. 17 CFR 403.4 - Customer protection-reserves and custody of securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Customer protection-reserves... TREASURY REGULATIONS UNDER SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER SECURITIES AND BALANCES § 403.4 Customer protection—reserves and custody of securities. Every registered...

  18. Kritika važećeg i prijedlog novog pravnog uređenja vađenja i uklanjanja podrtina i potonulih stvari

    Directory of Open Access Journals (Sweden)

    Vesna Skorupan Wolff

    2012-12-01

    Full Text Available Glavni cilj rada je ponuditi i prikazati rješenja koja predstavljaju prijedlog novog pravnog uređenja instituta vađenja i uklanjanja podrtina i potonulih stvari. Prije toga, autorice u radu prikazuju genezu pravnih izvora u povijesti i ranijem domaćem zakonodavstvu te proučavaju sva relevantna pitanja i sve odredbe važećeg Pomorskog zakonika (u nastavku PZ o ovoj materiji. Analizira se značenje i uporaba pojedinih izraza, sistematizacija zakonske građe unutar strukture zakona te sadržaj i domašaj pojedinih odredbi. Autorice preispituju razinu usklađenosti pozitivnog PZ-a sa suvremenom međunarodnom regulativom u ovom području. Ukazuje se na važne probleme koji mogu nastati zbog manjkavosti odredbi pozitivnog PZ-a i nepostojanja sustavne regulacije svih relevantnih pitanja koja se mogu pojaviti u praksi. U okviru istraživanja provodi se i poredbena analiza ovih instituta u drugim nacionalnim zakonodavstvima. Predložena zakonska rješenja odlikuju se cjelovitošću i sustavnošću u normiranju svih relevantnih pitanja. Uređivanje ovih instituta specijalnim odredbama pružit će viši stupanj pravne sigurnosti te viši stupanj sigurnosti plovidbe Jadranom, zaštite okoliša, njegovih prirodnih bogatstava i drugih povezanih interesa.

  19. Networks and network analysis for defence and security

    CERN Document Server

    Masys, Anthony J

    2014-01-01

    Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic

  20. Forecasting VaR and ES of stock index portfolio: A Vine copula method

    Science.gov (United States)

    Zhang, Bangzheng; Wei, Yu; Yu, Jiang; Lai, Xiaodong; Peng, Zhenfeng

    2014-12-01

    Risk measurement has both theoretical and practical significance in risk management. Using daily sample of 10 international stock indices, firstly this paper models the internal structures among different stock markets with C-Vine, D-Vine and R-Vine copula models. Secondly, the Value-at-Risk (VaR) and Expected Shortfall (ES) of the international stock markets portfolio are forecasted using Monte Carlo method based on the estimated dependence of different Vine copulas. Finally, the accuracy of VaR and ES measurements obtained from different statistical models are evaluated by UC, IND, CC and Posterior analysis. The empirical results show that the VaR forecasts at the quantile levels of 0.9, 0.95, 0.975 and 0.99 with three kinds of Vine copula models are sufficiently accurate. Several traditional methods, such as historical simulation, mean-variance and DCC-GARCH models, fail to pass the CC backtesting. The Vine copula methods can accurately forecast the ES of the portfolio on the base of VaR measurement, and D-Vine copula model is superior to other Vine copulas.

  1. Slovak Republic Act of 11 February 1998 on the energetics and on alterations to Act No. 455/1991 Collection of Acts of CSFR on small business (trade Act) in version of posterior regulations

    International Nuclear Information System (INIS)

    1998-01-01

    This act constitute: (a) conditions of undertaking in electro-energetic, gas industry, and heat supply (in next only 'energetic' branches) ; (b) rights and responsibility of physical and act person undertaking in energetic branches; (c) rights and responsibility of customers of electricity, gas, and heat; counteract measures in the need situations, (d) and at prevention before need situations in energetic branches; (e) state regulation in energetic; (f) authority on keep of this act. The act is divided into for parts: (1) General constitutions, (2) Energetic branches; (3) The state authority; (4) Common, transient and invalidation constitutions.This act deals with the specific conditions for undertaking in nuclear power plants, too (licensing, security). This act shall into effect on 1 July 1998

  2. Experiencing Security in Interaction Design

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne

    2011-01-01

    Security is experienced differently in different contexts. This paper argues that in everyday situations, users base their security decisions on a mix of prior experiences. When approaching security and interaction design from an experience approach, tools that help bring out such relevant...... experiences for design are needed. This paper reports on how Prompted exploration workshops and Acting out security were developed to target such experiences when iteratively designing a mobile digital signature solution in a participatory design process. We discuss how these tools helped the design process...... and illustrate how the tangibility of such tools matters. We further demonstrate how the approach grants access to non-trivial insights into people's security experience. We point out how the specific context is essential for exploring the space between experience and expectations, and we illustrate how people...

  3. 75 FR 4595 - BATS Y-Exchange, Inc.; Notice of Filing of Application for Registration as a National Securities...

    Science.gov (United States)

    2010-01-28

    ....; Notice of Filing of Application for Registration as a National Securities Exchange Under Section 6 of the... the Securities Exchange Act of 1934 (``Exchange Act''), seeking registration as a national securities... determination about whether to grant BATS Y Exchange's request to be registered as a national securities...

  4. 38 CFR 3.2130 - Will VA accept a signature by mark or thumbprint?

    Science.gov (United States)

    2010-07-01

    ... signature by mark or thumbprint? 3.2130 Section 3.2130 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... of This Title General § 3.2130 Will VA accept a signature by mark or thumbprint? VA will accept signatures by mark or thumbprint if: (a) They are witnessed by two people who sign their names and give their...

  5. 77 FR 11195 - Announcement of Competition Under the America COMPETES Reauthorization Act of 2011: Badges for...

    Science.gov (United States)

    2012-02-24

    ... start their own business demonstrate their qualifications to their customers. 2. Amount of the prize. VA... counterparts and in obtaining civilian credit for military training. The easier task is drawing direct linkages... primary place of business in the United States. c. May not be a Federal entity or Federal employee acting...

  6. 78 FR 62441 - VA Dental Insurance Program-Federalism

    Science.gov (United States)

    2013-10-22

    ...--Federalism AGENCY: Department of Veterans Affairs. ACTION: Direct final rule. SUMMARY: The Department of... that they are submitted in response to ``RIN 2900-AO85-VA Dental Insurance Program-- Federalism... add preemption language in accordance with the discussion above. Executive Order 13132, Federalism...

  7. A Stochastic Dominance Approach to the Basel III Dilemma: Expected Shortfall or VaR?

    NARCIS (Netherlands)

    C-L. Chang (Chia-Lin); J.A. Jiménez-Martín (Juan-Ángel); E. Maasoumi (Esfandiar); M.J. McAleer (Michael); T. Pérez-Amaral (Teodosio)

    2015-01-01

    markdownabstract__Abstract__ The Basel Committee on Banking Supervision (BCBS) (2013) recently proposed shifting the quantitative risk metrics system from Value-at-Risk (VaR) to Expected Shortfall (ES). The BCBS (2013) noted that “a number of weaknesses have been identified with using VaR for

  8. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  9. VaR: Exchange Rate Risk and Jump Risk

    Directory of Open Access Journals (Sweden)

    Fen-Ying Chen

    2010-01-01

    Full Text Available Incorporating the Poisson jumps and exchange rate risk, this paper provides an analytical VaR to manage market risk of international portfolios over the subprime mortgage crisis. There are some properties in the model. First, different from past studies in portfolios valued only in one currency, this model considers portfolios not only with jumps but also with exchange rate risk, that is vital for investors in highly integrated global financial markets. Second, in general, the analytical VaR solution is more accurate than historical simulations in terms of backtesting and Christoffersen's independence test (1998 for small portfolios and large portfolios. In other words, the proposed model is reliable not only for a portfolio on specific stocks but also for a large portfolio. Third, the model can be regarded as the extension of that of Kupiec (1999 and Chen and Liao (2009.

  10. SlaVaComp Fonts Converter

    Directory of Open Access Journals (Sweden)

    Simon Skilevic

    2013-12-01

    Full Text Available This paper presents a fonts converter that was developed as a part of the Freiburg project on historical corpus linguistics. The tool named SlaVaComp-Konvertierer converts Church Slavonic texts digitized with non-Unicode fonts into the Unicode format without any loss of information contained in the original file and without damage to the original formatting. It is suitable for the conversion of all idiosyncratic fonts—not only Church Slavonic—and therefore can be used not only in Palaeoslavistic, but also in all historical and philological studies.

  11. 10 years beyond the Health Security Act failure: subsequent developments and persistent problems.

    Science.gov (United States)

    Budetti, Peter P

    2004-10-27

    Ten years after the failure of President Clinton's Health Security Act (HSA), the United States continues to face multiple stresses in health care, including large numbers of uninsured individuals, increasing costs, questions about quality, and dissatisfaction with managed care. Using the framework of the HSA-particularly universal coverage, spending and managed competition, insurance for low-income persons, and patients' rights-the post-HSA evolution and current status of the US health care system is traced and lessons to guide future actions are outlined. Neither incremental legislation nor private sector changes in health care organization and financing during the past decade have ameliorated the problems addressed by the HSA, and new troubles have emerged. These problems affect every group in the country and continue to deteriorate health care, yet there has been no political support for large-scale reform. The core components of a vision for future action-universal coverage, quality improvement, cost containment, and subsidies for the economically vulnerable-are essential. There is a pressing need to construct a clear vision that would tie together incremental steps into a rational approach to comprehensive reform and to actually move toward the realization of that vision.

  12. Security System Software

    Science.gov (United States)

    1993-01-01

    C Language Integration Production System (CLIPS), a NASA-developed expert systems program, has enabled a security systems manufacturer to design a new generation of hardware. C.CURESystem 1 Plus, manufactured by Software House, is a software based system that is used with a variety of access control hardware at installations around the world. Users can manage large amounts of information, solve unique security problems and control entry and time scheduling. CLIPS acts as an information management tool when accessed by C.CURESystem 1 Plus. It asks questions about the hardware and when given the answer, recommends possible quick solutions by non-expert persons.

  13. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  14. 77 FR 11618 - Solutions Capital I, L.P.; Notice Seeking Exemption Under the Small Business Investment Act...

    Science.gov (United States)

    2012-02-27

    ... SMALL BUSINESS ADMINISTRATION [License No. 03/03-0247] Solutions Capital I, L.P.; Notice Seeking Exemption Under the Small Business Investment Act, Conflicts of Interest Notice is hereby given that Solutions Capital I, L.P., 1100 Wilson Blvd., Suite 3000, Arlington, VA 22209, a Federal Licensee under the...

  15. 24 CFR 232.525 - Note and security form.

    Science.gov (United States)

    2010-04-01

    ... URBAN DEVELOPMENT MORTGAGE AND LOAN INSURANCE PROGRAMS UNDER NATIONAL HOUSING ACT AND OTHER AUTHORITIES MORTGAGE INSURANCE FOR NURSING HOMES, INTERMEDIATE CARE FACILITIES, BOARD AND CARE HOMES, AND ASSISTED... Fire Safety Equipment Eligible Security Instruments § 232.525 Note and security form. The lender shall...

  16. 78 FR 22580 - Millington Securities, Inc. and Millington Exchange Traded MAVINS Fund, LLC; Notice of Application

    Science.gov (United States)

    2013-04-16

    ... security for inclusion in the Fund's portfolio to have aggregate investment characteristics, fundamental... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30459; File No. 812-13887... an order under section 6(c) of the Investment Company Act of 1940 (the ``Act'') for an exemption from...

  17. Validation of KENO V.a: Comparison with critical experiments

    International Nuclear Information System (INIS)

    Jordan, W.C.; Landers, N.F.; Petrie, L.M.

    1986-12-01

    Section 1 of this report documents the validation of KENO V.a against 258 critical experiments. Experiments considered were primarily high or low enriched uranium systems. The results indicate that the KENO V.a Monte Carlo Criticality Program accurately calculates a broad range of critical experiments. A substantial number of the calculations showed a positive or negative bias in excess of 1 1/2% in k-effective (k/sub eff/). Classes of criticals which show a bias include 3% enriched green blocks, highly enriched uranyl fluoride slab arrays, and highly enriched uranyl nitrate arrays. If these biases are properly taken into account, the KENO V.a code can be used with confidence for the design and criticality safety analysis of uranium-containing systems. Sections 2 of this report documents the results of investigation into the cause of the bias observed in Sect. 1. The results of this study indicate that the bias seen in Sect. 1 is caused by code bias, cross-section bias, reporting bias, and modeling bias. There is evidence that many of the experiments used in this validation and in previous validations are not adequately documented. The uncertainty in the experimental parameters overshadows bias caused by the code and cross sections and prohibits code validation to better than about 1% in k/sub eff/. 48 refs., 19 figs., 19 tabs

  18. 78 FR 63143 - VA Dental Insurance Program-Federalism

    Science.gov (United States)

    2013-10-23

    ...--Federalism AGENCY: Department of Veterans Affairs. ACTION: Proposed rule. SUMMARY: The Department of Veterans... that they are submitted in response to ``RIN 2900-AO86-VA Dental Insurance Program-- Federalism... Order 13132, Federalism Section 6(c) of Executive Order 13132 (entitled ``Federalism'') requires an...

  19. VA Library Service--Today's look at Tomorrow's Library.

    Science.gov (United States)

    Veterans Administration, Washington, DC.

    The Conference Poceedings are divided into three broad topics: systems planning, audiovisuals in biomedical communication, and automation and networking. Speakers from within the Veterans Administration (VA), from the National Medical Audiovisual Center, and the Lister Hill National Center for Biomedical Communications, National Library of…

  20. A Legal Reasoning Component of a Network Security Command and Control System

    Science.gov (United States)

    2010-03-01

    United States Code VA Vulnerability Assessment VLC Virtual Legal Cell xv ACKNOWLEDGMENTS The authors would like to humbly thank Professor Bret...cyberspace environment. In this thesis, the authors address the information warrior’s challenge of obtaining just-in-time legal advice. They...PROPOSED VIRTUAL DYNAMIC LEGAL CELL One of the challenges in cyberspace is to define and detect a hostile act or the use of force. Another major

  1. Maximum power per VA control of vector controlled interior ...

    Indian Academy of Sciences (India)

    Thakur Sumeet Singh

    2018-04-11

    Apr 11, 2018 ... Department of Electrical Engineering, Indian Institute of Technology Delhi, New ... The MPVA operation allows maximum-utilization of the drive-system. ... Permanent magnet motor; unity power factor; maximum VA utilization; ...

  2. Protective force legal issues: the security perspective

    International Nuclear Information System (INIS)

    Rich, B.L.

    1984-01-01

    There has been much discussion and some controversy on the legal issues faced by the Department of Energy's (DOE) protective forces in the performance of their security duties. These include the observance of legal proprieties in the arrest of non-violent demonstrators, the use of lethal weapons, and the extent of protective forces' authority to carry weapons and protect DOE's security interests offsite. In brief, the need to protect DOE's security interests may be in nominal conflict with other requirements. When faced with a potential conflict in requirements, we in the DOE security community must place first attention to the security mission -- to deter and prevent hostile acts

  3. 12 CFR 792.68 - Use and collection of Social Security numbers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Use and collection of Social Security numbers... Act § 792.68 Use and collection of Social Security numbers. The head of each NCUA Office shall take... furnish Social Security numbers, and that individuals who are requested to provide Social Security numbers...

  4. 6 CFR 5.33 - Use and collection of social security numbers.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Use and collection of social security numbers. 5... OF RECORDS AND INFORMATION Privacy Act § 5.33 Use and collection of social security numbers. Each... to 1975; and (b) That individuals requested to provide their social security numbers must be informed...

  5. The Corporations Act 2001

    OpenAIRE

    Bostock, Tom

    2002-01-01

    The author outlines reforms made in Australia in the area of company law with an analysis of the Corporations Act 2001, which along with the Australian Securities and Investments Commission Act 2001 comprises Corporations legislation in Australia. Article by Tom Bostock (a partner in the law firm Mallesons Stephen Jaques, Melbourne, Australia). Published in Amicus Curiae - Journal of the Institute of Advanced Legal Studies and its Society for Advanced Legal Studies. The Journal is produced by...

  6. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    Directory of Open Access Journals (Sweden)

    Dan Constantin TOFAN

    2012-01-01

    Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.

  7. 76 FR 25409 - Privacy Act of 1974

    Science.gov (United States)

    2011-05-04

    ... performing this required function, VA must collect, collate and analyze full statistical data regarding... and timely assess the current health care usage by the patient population served by VA, to forecast future demand for VA medical care by individuals currently eligible for service by VA medical facilities...

  8. 77 FR 60746 - Proposed Information Collection (VA/DOD Joint Disability Evaluation Board Claim) Activity...

    Science.gov (United States)

    2012-10-04

    ... burden of the collection of information on respondents, including through the use of automated collection techniques or the use of other forms of information technology. Title: VA/DOD Joint Disability Evaluation... War on Terror Heroes, VA and the Department of Defense (DOD) have agreed to develop a joint process in...

  9. 75 FR 51867 - Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed...

    Science.gov (United States)

    2010-08-23

    ... VII (CNS Accounting Operation) NSCC will modify Procedure VII to provide for the tracking of customer.... I. Introduction On June 4, 2010, National Securities Clearing Corporation (``NSCC'') filed with the... 19(b)(1) of the Securities Exchange Act of 1934 (``Act'').\\1\\ The proposed rule change was published...

  10. 78 FR 77204 - Proposed Information Collection (VA National Veterans Sports Programs and Special Event Surveys...

    Science.gov (United States)

    2013-12-20

    ... AGENCY: Office of Public & Intergovernmental Affairs, Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Office of Public Affairs (OPA), Department of Veterans Affairs (VA), is announcing an... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-NEW] Proposed Information Collection (VA...

  11. Access to mental health care among women Veterans: is VA meeting women's needs?

    Science.gov (United States)

    Kimerling, Rachel; Pavao, Joanne; Greene, Liberty; Karpenko, Julie; Rodriguez, Allison; Saweikis, Meghan; Washington, Donna L

    2015-04-01

    Patient-centered access to mental health describes the fit between patient needs and resources of the system. To date, little data are available to guide implementation of services to women veterans, an underrepresented minority within Department of Veteran Affairs (VA) health care. The current study examines access to mental health care among women veterans, and identifies gender-related indicators of perceived access to mental health care. A population-based sample of 6287 women veterans using VA primary care services participated in a survey of past year perceived need for mental health care, mental health utilization, and gender-related mental health care experiences. Subjective rating of how well mental health care met their needs was used as an indicator of perceived access. Half of all women reported perceived mental health need; 84.3% of those women received care. Nearly all mental health users (90.9%) used VA services, although only about half (48.8%) reported that their mental health care met their needs completely or very well. Gender related experiences (availability of female providers, women-only treatment settings, women-only treatment groups, and gender-related comfort) were each associated with 2-fold increased odds of perceived access, and associations remained after adjusting for ease of getting care. Women VA users demonstrate very good objective access to mental health services. Desire for, and access to specialized mental health services for women varies across the population and are important aspects of shared decision making in referral and treatment planning for women using VA primary care.

  12. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  13. 76 FR 38302 - Safety Zone; Cape Charles Fireworks, Cape Charles Harbor, Cape Charles, VA

    Science.gov (United States)

    2011-06-30

    ... the Town of Cape Charles will sponsor a fireworks display on the shoreline of the navigable waters of...-AA00 Safety Zone; Cape Charles Fireworks, Cape Charles Harbor, Cape Charles, VA AGENCY: Coast Guard... navigable waters of Cape Charles City Harbor in Cape Charles, VA in support of the Fourth of July Fireworks...

  14. 76 FR 27970 - Safety Zone; Cape Charles Fireworks, Cape Charles Harbor, Cape Charles, VA.

    Science.gov (United States)

    2011-05-13

    ... Charles will sponsor a fireworks display on the shoreline of the navigable waters of Cape Charles City...[deg]01'30'' W (NAD 1983). This safety zone will be established in the vicinity of Cape Charles, VA...-AA00 Safety Zone; Cape Charles Fireworks, Cape Charles Harbor, Cape Charles, VA. AGENCY: Coast Guard...

  15. 78 FR 40542 - Privacy Act of 1974, As Amended: Proposed New Routine Use

    Science.gov (United States)

    2013-07-05

    ... (CSR), Medicaid, the Children's Health Insurance Program (CHIP), and the Basic Health Program (BHP). As... annual Social Security benefit information under title II of the Social Security Act (Act). Section 1411... to a Federal or State agency that administers a Federally-funded benefit other than pursuant to the...

  16. Atomic Energy Authority Act 1971

    International Nuclear Information System (INIS)

    1971-01-01

    This Act provides for the transfer of property, rights, liabilities and obligations of parts of the undertaking of the United Kingdom Atomic Energy Autority, to two new Compagnies set up for this purpose: the Bristish Nuclear Fuels Limited, and the Radiochemical Centre Limited. Patents licences and registered designs owned by the Autority at the time of the transfer are not included therein. The Act also includes amendments to the Nuclear Installations Act 1965, notably as regards permits to operate granted to a body corporate. Finally, the Schedule to this Act lays down a certain number of provisions relating to security and the preservation of secrets. (NEA) [fr

  17. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2010-05-27

    ...] President's National Security Telecommunications Advisory Committee AGENCY: National Protection and Programs... Security Telecommunications Advisory Committee (NSTAC) will be meeting by teleconference; the meeting will... telecommunications policy. Notice of this meeting is given under the Federal Advisory Committee Act (FACA), Public...

  18. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records... boarding pass printing instruction. If the passenger's identifying information matches the entry on the TSA... enforcement, immigration, intelligence, or other homeland security functions. In addition, TSA may share...

  19. Use of the Decision Support System for VA cost-effectiveness research.

    Science.gov (United States)

    Barnett, P G; Rodgers, J H

    1999-04-01

    The Department of Veterans Affairs is adopting the Decision Support System (DSS), computer software and databases which include a cost-accounting system which determines the cost of health care products and patient encounters. A system for providing cost data for cost-effectiveness analysis should be provide valid, detailed, and comprehensive data that can be aggregated. The design of DSS is described and compared with those criteria. Utilization data from DSS was compared with other VA utilization data. Aggregate DSS cost data from 35 medical centers was compared with relative resource weights developed for the Medicare program. Data on hospital stays at 3 facilities found that 3.7% of the stays in DSS were not in the VA discharge database, whereas 7.6% of the stays in the discharge data were not in DSS. DSS reported between 68.8% and 97.1% of the outpatient encounters reported by six facilities in the ambulatory care data base. Relative weights for each Diagnosis Related Group based on DSS data from 35 VA facilities correlated with Medicare weights (correlation coefficient of .853). DSS will be useful for research if certain problems are overcome. It is difficult to distinguish long-term from acute hospital care. VA does not have a complete database of all inpatient procedures, so DSS has not assigned them a specific cost. The authority to access encounter-level DSS data needs to be centralized. Researchers can provide the feedback needed to improve DSS cost estimates. A comprehensive encounter-level extract would facilitate use of DSS for research.

  20. 24 CFR 241.555 - Security instrument and lien.

    Science.gov (United States)

    2010-04-01

    ... that a default under the first mortgage is a default under the supplementary loan security instrument... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Security instrument and lien. 241... HOUSING AND URBAN DEVELOPMENT MORTGAGE AND LOAN INSURANCE PROGRAMS UNDER NATIONAL HOUSING ACT AND OTHER...

  1. Intra-Operative Indocyanine Green-Videoangiography (ICG-VA) in ...

    African Journals Online (AJOL)

    Methods: Fifteen consecutive patients with anterior circulation aneurysms who underwent craniotomy and clipping of the aneurysms were included in this study. Intraoperative ICG-VA was performed in all cases after exposure of the aneurysm and the branches in the vicinity of the aneurysm or the parent vessel before ...

  2. Validity testing and neuropsychology practice in the VA healthcare system: results from recent practitioner survey (.).

    Science.gov (United States)

    Young, J Christopher; Roper, Brad L; Arentsen, Timothy J

    2016-05-01

    A survey of neuropsychologists in the Veterans Health Administration examined symptom/performance validity test (SPVT) practices and estimated base rates for patient response bias. Invitations were emailed to 387 psychologists employed within the Veterans Affairs (VA), identified as likely practicing neuropsychologists, resulting in 172 respondents (44.4% response rate). Practice areas varied, with 72% at least partially practicing in general neuropsychology clinics and 43% conducting VA disability exams. Mean estimated failure rates were 23.0% for clinical outpatient, 12.9% for inpatient, and 39.4% for disability exams. Failure rates were the highest for mTBI and PTSD referrals. Failure rates were positively correlated with the number of cases seen and frequency and number of SPVT use. Respondents disagreed regarding whether one (45%) or two (47%) failures are required to establish patient response bias, with those administering more measures employing the more stringent criterion. Frequency of the use of specific SPVTs is reported. Base rate estimates for SPVT failure in VA disability exams are comparable to those in other medicolegal settings. However, failure in routine clinical exams is much higher in the VA than in other settings, possibly reflecting the hybrid nature of the VA's role in both healthcare and disability determination. Generally speaking, VA neuropsychologists use SPVTs frequently and eschew pejorative terms to describe their failure. Practitioners who require only one SPVT failure to establish response bias may overclassify patients. Those who use few or no SPVTs may fail to identify response bias. Additional clinical and theoretical implications are discussed.

  3. KiVa Anti-Bullying Program in Italy: Evidence of Effectiveness in a Randomized Control Trial.

    Science.gov (United States)

    Nocentini, Annalaura; Menesini, Ersilia

    2016-11-01

    The present study aims to evaluate the effectiveness of the KiVa anti-bullying program in Italy through a randomized control trial of students in grades 4 and 6. The sample involved 2042 students (51 % female; grade 4, mean age = 8.85; ds = 0.43; grade 6, mean age = 10.93; ds = 0.50); 13 comprehensive schools were randomly assigned into intervention (KiVa) or control (usual school provision) conditions. Different outcomes (bullying, victimization, pro-bullying attitudes, pro-victim attitudes, empathy toward victims), analyses (longitudinal mixed model with multiple-item scales; longitudinal prevalence of bullies and victims using Olweus' single question), and estimates of effectiveness (Cohen's d; odds ratios) were considered in order to compare the Italian results with those from other countries. Multilevel models showed that KiVa reduced bullying and victimization and increased pro-victim attitudes and empathy toward the victim in grade 4, with effect sizes from 0.24 to 0.40. In grade 6, KiVa reduced bullying, victimization, and pro-bullying attitudes; the effects were smaller as compared to grade 4, yet significant (d ≥ 0.20). Finally, using Olweus dichotomous definition of bullies and victims, results showed that the odds of being a victim were 1.93 times higher for a control student than for a KiVa student in grade 4. Overall, the findings provide evidence of the effectiveness of the program in Italy; the discussion will focus on factors that influenced successfully the transportability of the KiVa program in Italy.

  4. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... source categories, retention and disposal, and notification procedure. The Transportation Security... recipients of information about individuals who are their employees, job applicants, or contractors, or.... For each system of records covered by this notice, the retention and disposal sections are updated to...

  5. 77 FR 74279 - Agency Information Collection (VA/DOD Joint Disability Evaluation Board Claim): Activity under...

    Science.gov (United States)

    2012-12-13

    ... Joint Disability Evaluation Board Claim): Activity under OMB Review AGENCY: Veterans Benefits... . Please refer to ``OMB Control No. 2900-0704.'' SUPPLEMENTARY INFORMATION: Title: VA/DOD Joint Disability Evaluation Board Claim, VA Form 21- 0819. OMB Control Number: 2900-0704. Type of Review: Extension of a...

  6. Analysis of Specific Features of International Standards of Personnel Security of an Enterprise

    Directory of Open Access Journals (Sweden)

    Otenko Iryna P.

    2014-03-01

    Full Text Available The article marks out components of personnel security of an enterprise, outlines processes of personnel management, which correspond with conditions of security of life and labour, competent, socially protected professional activity, availability of the acting system of motivation and stimulation, and possibilities for corporate conflicts resolution. The article presents basic standards, rules and legislative acts that regulate ensuring personnel security. It analyses specific features of application of standards with respect to: life security and labour protection culture at an enterprise, including managerial systems and practice, behaviour of personnel at working places and also intellectual component of personnel security, which envisages that personnel has knowledge and competences that assist in achievement of strategic goals of an enterprise.

  7. 75 FR 54028 - Technical Revisions To Conform With the Veterans' Mental Health Care Act of 2008 and Other Laws

    Science.gov (United States)

    2010-09-03

    ...,'' authorizing VA to exercise discretion to provide certain mental health services, counseling, and training for... Health and Medical Program of the Department of Veterans Affairs, which provides health benefits for... the Veterans' Mental Health Care Act of 2008 and Other Laws AGENCY: Department of Veterans Affairs...

  8. Privacy Act System of Records: Freedom of Information Act Request and Appeal File, EPA-9

    Science.gov (United States)

    Learn more about the Freedom of Information Act Request and Appeal File System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.

  9. Proactive approach to Corporate Security

    CSIR Research Space (South Africa)

    Grobler, MM

    2010-05-01

    Full Text Available The best Information Security infrastructure cannot guarantee that intrusions or other malicious acts will not happen. It is necessary to know the facts and prepare beforehand knowing cyber threats and trends; knowing the broadband impact...

  10. Conformational determination of [Leu]enkephalin based on theoretical and experimental VA and VCD spectral analyses

    DEFF Research Database (Denmark)

    Abdali, Salim; Jalkanen, Karl J.; Cao, X.

    2004-01-01

    Conformational determination of [Leu]enkephalin in DMSO-d6 is carried out using VA and VCD spectral analyses. Conformational energies, vibrational frequencies and VA and VCD intensities are calculated using DFT at B3LYP/6-31G* level of theory. Comparison between the measured spectra...

  11. 78 FR 55777 - Proposed Information Collection (VA, National Veterans Sports Programs and Special Events, Event...

    Science.gov (United States)

    2013-09-11

    ... techniques or the use of other forms of information technology. Titles: a. National Disabled Veterans Winter... Form 0928h. m. Surfing Personnel Application, VA Form 0928i. n. Venue Personnel Application, VA Form... Creative Arts Festival, National Veterans TEE Tournament, National Disabled Veterans Winter Sports Clinic...

  12. Effectiveness of Expanded Implementation of STAR-VA for Managing Dementia-Related Behaviors Among Veterans.

    Science.gov (United States)

    Karel, Michele J; Teri, Linda; McConnell, Eleanor; Visnic, Stephanie; Karlin, Bradley E

    2016-02-01

    Nonpharmacological, psychosocial approaches are first-line treatments for managing behavioral symptoms in dementia, but they can be challenging to implement in long-term care settings. The Veterans Health Administration implemented STAR-VA, an interdisciplinary behavioral approach for managing challenging dementia-related behaviors in its Community Living Center (CLCs, nursing home care) settings. This study describes how the program was implemented and provides an evaluation of Veteran clinical outcomes and staff feedback on the intervention. One mental health professional and registered nurse team from 17 CLCs completed STAR-VA training, which entailed an experiential workshop followed by 6 months of expert consultation as they worked with their teams to implement STAR-VA with Veterans identified to have challenging dementia-related behaviors. The frequency and severity of target behaviors and symptoms of depression, anxiety, and agitation were evaluated at baseline and at intervention completion. Staff provided feedback regarding STAR-VA feasibility and impact. Seventy-one Veterans completed the intervention. Behaviors clustered into 6 types: care refusal or resistance, agitation, aggression, vocalization, wandering, and other. Frequency and severity of target behaviors and symptoms of depression, anxiety, and agitation all significantly decreased, with overall effect sizes of 1 or greater. Staff rated both benefits for Veterans and program feasibility favorably. This evaluation supports the feasibility and effectiveness of STAR-VA, an interdisciplinary, behavioral intervention for managing challenging behaviors among residents with dementia in CLCs. Published by Oxford University Press on behalf of the Gerontological Society of America 2015.

  13. Debt security market in lithuania: changes and tendencies

    OpenAIRE

    Zumaraitė, Birutė

    2007-01-01

    Security market in economically strong countries has deep developing traditions and acts strong role in financial system. Debt securities market helps to allocate the financial recourses between separate institutions. Also the strong role in financial system plays debts securities market, especially government bonds that help to form the lending resources effectively. Interest rate of government bonds is the main point, which turns rates of lending and borrowing. The incomes, which are gained...

  14. Legal constraints imposed on security force personnel

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search

  15. Legal constraints imposed on security force personnel

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  16. S.1220: This Act may be referred to as the National Energy Security Act of 1991, introduced in the Senate of the United States, One Hundred Second Congress, First Session, June 5, 1991

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    This bill would reduce the Nation's dependence on imported oil and provide for the energy security of the US. The contents of this bill are extensive. The Titles are as follows: Findings and purposes; Definitions; Corporate average fuel economy; Fleets and alternative fuels; Renewable energy; Energy efficiency; Oil and gas leasing in the Arctic National Wildlife Refuge; Advanced nuclear reactor commercialization; Nuclear reactor licensing; Uranium; Natural gas; Outer continental shelf; Research, development, demonstration and commercialization activities; Coal, coal technology, and electricity; Public Utility Holding Company Act reform; and Strategic petroleum reserve

  17. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2007-01-01

    This report to Congress, Measuring Stability and Security in Iraq, is submitted pursuant to Section 9010 of the Department of Defense Appropriations Act 2007, Public Law 109-289 as amended by Section...

  18. 48 CFR 852.219-72 - Evaluation factor for participation in the VA mentor-protégé program.

    Science.gov (United States)

    2010-10-01

    ... participation in the VA mentor-protégé program. 852.219-72 Section 852.219-72 Federal Acquisition Regulations... Texts of Provisions and Clauses 852.219-72 Evaluation factor for participation in the VA mentor-protégé... the VA Mentor-Protégé Program (DEC2009) This solicitation contains an evaluation factor or sub-factor...

  19. 32 CFR 505.3 - Privacy Act systems of records.

    Science.gov (United States)

    2010-07-01

    ... anticipated threats or hazards to the security or integrity of data, which could result in substantial harm... 32 National Defense 3 2010-07-01 2010-07-01 true Privacy Act systems of records. 505.3 Section 505... AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.3 Privacy Act systems of records. (a) Systems of...

  20. Martin Continues His Homeland Security Profession with New UASI Position

    OpenAIRE

    Issvoran, Heather

    2014-01-01

    Bruce Martin has found a second act in homeland security. The fire services veteran and college educator is now Project Manager of the Bay Area Urban Areas Security Initiative (UASI), overseeing its Chemical, Biological, Radiological, Nuclear Explosives (CBRNE) program. Martin is a 2010 master’s degree graduate of the Naval Postgraduate School Center for Homeland Defense and Security.

  1. Correspondence of the Boston Assessment of Traumatic Brain Injury-Lifetime (BAT-L) clinical interview and the VA TBI screen.

    Science.gov (United States)

    Fortier, Catherine Brawn; Amick, Melissa M; Kenna, Alexandra; Milberg, William P; McGlinchey, Regina E

    2015-01-01

    Mild traumatic brain injury is the signature injury of Operation Enduring Freedom (OEF), Operation Iraqi Freedom (OIF), and Operation New Dawn (OND), yet its identification and diagnosis is controversial and fraught with challenges. In 2007, the Department of Veterans Affairs (VA) implemented a policy requiring traumatic brain injury (TBI) screening on all individuals returning from deployment in the OEF/OIF/OND theaters of operation that lead to the rapid and widespread use of the VA TBI screen. The Boston Assessment of TBI-Lifetime (BAT-L) is the first validated, postcombat semistructured clinical interview to characterize head injuries and diagnose TBIs throughout the life span, including prior to, during, and post-military service. Community-dwelling convenience sample of 179 OEF/OIF/OND veterans. BAT-L, VA TBI screen. Based on BAT-L diagnosis of military TBI, the VA TBI screen demonstrated similar sensitivity (0.85) and specificity (0.82) when administered by research staff. When BAT-L diagnosis was compared with historical clinician-administered VA TBI screen in a subset of participants, sensitivity was reduced. The specificity of the research-administered VA TBI screen was more than adequate. The sensitivity of the VA TBI screen, although relatively high, suggests that it does not oversample or "catch all" possible military TBIs. Traumatic brain injuries identified by the BAT-L, but not identified by the VA TBI screen, were predominantly noncombat military injuries. There is potential concern regarding the validity and reliability of the clinician administered VA TBI screen, as we found poor correspondence between it and the BAT-L, as well as low interrater reliability between the clinician-administered and research-administered screen.

  2. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Science.gov (United States)

    2011-05-12

    ... Subjects Environmental protection, Business and industry, Government property, Security measures. Dated... Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This... Cosmetic Act (FFDCA), including information that may have been claimed as Confidential Business Information...

  3. Atomic Energy Act 1953-1966

    International Nuclear Information System (INIS)

    1970-01-01

    The Atomic Energy Act 1953-1966 establishes the Australian Atomic Energy Commission and lays down its powers, duties, rules of procedure and financing. The members of the Commission are appointed by the Governor-General. It is responsible, inter alia, for all activities covering uranium research, mining and trading as well as for atomic energy development and nuclear plant construction and operation. Its duties also include training of scientific research workers and collection and dissemination of information on atomic energy. For purposes of security, the Act further-more prescribes sanctions in relation to unauthorised acquisition or communication of information on this subject. Finally, the Act repeals the Atomic Energy (Control of Materials) Act 1946 and 1952. (NEA) [fr

  4. 17 CFR 274.5 - Form N-5, for registration statement of small business investment company under the Securities...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form N-5, for registration statement of small business investment company under the Securities Act of 1933 and the Investment Company...-5, for registration statement of small business investment company under the Securities Act of 1933...

  5. 78 FR 31840 - Safety Zone; USO Patriotic Festival Air Show, Atlantic Ocean; Virginia Beach, VA

    Science.gov (United States)

    2013-05-28

    ...-AA00 Safety Zone; USO Patriotic Festival Air Show, Atlantic Ocean; Virginia Beach, VA AGENCY: Coast... provide for the safety of life on navigable waters during the USO Patriotic Festival Air Show. This action... Patriotic Festival Air Show, Atlantic Ocean; Virginia Beach, VA. (a) Regulated Area. The following area is a...

  6. 31 CFR 1.32 - Use and disclosure of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... OF RECORDS Privacy Act § 1.32 Use and disclosure of social security numbers. (a) In general. An... such individual's refusal to disclose his social security number. (b) Exceptions. The provisions of... Federal statute, or (2) The disclosure of a social security number to any Federal, State, or local agency...

  7. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  8. Cloning, Characterization, and Functional Investigation of VaHAESA from Vitis amurensis Inoculated with Plasmopara viticola

    Directory of Open Access Journals (Sweden)

    Shaoli Liu

    2018-04-01

    Full Text Available Plant pattern recognition receptors (PRRs are essential for immune responses and establishing symbiosis. Plants detect invaders via the recognition of pathogen-associated molecular patterns (PAMPs by PRRs. This phenomenon is termed PAMP-triggered immunity (PTI. We investigated disease resistance in Vitis amurensis to identify PRRs that are important for resistance against downy mildew, analyzed the PRRs that were upregulated by incompatible Plasmopara viticola infection, and cloned the full-length cDNA of the VaHAESA gene. We then analyzed the structure, subcellular localization, and relative disease resistance of VaHAESA. VaHAESA and PRR-receptor-like kinase 5 (RLK5 are highly similar, belonging to the leucine-rich repeat (LRR-RLK family and localizing to the plasma membrane. The expression of PRR genes changed after the inoculation of V. amurensis with compatible and incompatible P. viticola; during early disease development, transiently transformed V. vinifera plants expressing VaHAESA were more resistant to pathogens than those transformed with the empty vector and untransformed controls, potentially due to increased H2O2, NO, and callose levels in the transformants. Furthermore, transgenic Arabidopsis thaliana showed upregulated expression of genes related to the PTI pathway and improved disease resistance. These results show that VaHAESA is a positive regulator of resistance against downy mildew in grapevines.

  9. 76 FR 49698 - Covered Securities Pursuant to Section 18 of the Securities Act of 1933

    Science.gov (United States)

    2011-08-11

    ... listed on the Nasdaq Capital Market (``NCM'') as Covered Securities for purposes of Section 18(b) of the... posed above, commenters are welcome to offer their views on any other matter raised by the proposed..., competition and capital formation. We have considered, and discuss below, the effects of the proposed...

  10. 77 FR 61275 - Privacy Act of 1974: Implementation

    Science.gov (United States)

    2012-10-09

    ... (FBI) Privacy Act system of records titled FBI Data Warehouse System, JUSTICE/FBI- 022. This system is...)(G), (H), and (I), (5), and (8); (f); and (g) of the Privacy Act: (1) FBI Data Warehouse System... security; disclose information that would constitute an unwarranted invasion of another's personal privacy...

  11. VA Construction: Improved Processes Needed to Monitor Contract Modifications, Develop Schedules, and Estimate Costs

    Science.gov (United States)

    2017-03-01

    the Handbook.36 VA headquarters officials told us that regional CFM offices monitor change- order - processing time frames for projects in their...visited collected different types of data on change orders. Because VA lacks the data on the change order processing timeframes required by the Handbook...goals of processing change orders in a timelier manner, especially given our previous findings that change- order - processing time frames caused

  12. 76 FR 46907 - Ammonium Nitrate Security Program

    Science.gov (United States)

    2011-08-03

    ... Maritime Transportation Security Act NAICS North American Industrial Classification System NPRM Notice of.... Commenters noted, for example, that equipment used for transporting bulk ammonium nitrate, such as hoppers...

  13. A Call for National Security System Transformation

    Science.gov (United States)

    2012-06-01

    Gabriel Marcella . Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2008. Fox News Corporation. “Last American Troops Leave Iraq...by Gabriel Marcella . Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2008. Stewart, Douglas. “Constructing the Iron Cage: The...1947 National Security Act.” In Affairs of State: The Interagency and National Security. Edited by Gabriel Marcella . Carlisle, PA: Strategic

  14. 76 FR 37632 - Addition of Certain Persons on the Entity List: Addition of Persons Acting Contrary to the...

    Science.gov (United States)

    2011-06-28

    ... to the National Security or Foreign Policy Interests of the United States AGENCY: Bureau of Industry.... Government to be acting contrary to the national security or foreign policy interests of the United States... security or foreign policy interests of the United States, and those acting on behalf of such entities...

  15. 77 FR 23114 - Addition of Certain Persons on the Entity List: Addition of Persons Acting Contrary to the...

    Science.gov (United States)

    2012-04-18

    ... to the National Security or Foreign Policy Interests of the United States AGENCY: Bureau of Industry... acting contrary to the national security or foreign policy interests of the United States) of the EAR... national security or foreign policy interests of the United States and those acting on behalf of such...

  16. Small RNA sequence analysis of adenovirus VA RNA-derived miRNAs reveals an unexpected serotype-specific difference in structure and abundance.

    Directory of Open Access Journals (Sweden)

    Wael Kamel

    Full Text Available Human adenoviruses (HAds encode for one or two highly abundant virus-associated RNAs, designated VA RNAI and VA RNAII, which fold into stable hairpin structures resembling miRNA precursors. Here we show that the terminal stem of the VA RNAs originating from Ad4, Ad5, Ad11 and Ad37, all undergo Dicer dependent processing into virus-specific miRNAs (so-called mivaRNAs. We further show that the mivaRNA duplex is subjected to a highly asymmetric RISC loading with the 3'-strand from all VA RNAs being the favored strand, except for the Ad37 VA RNAII, where the 5'-mivaRNAII strand was preferentially assembled into RISC. Although the mivaRNA seed sequences are not fully conserved between the HAds a bioinformatics prediction approach suggests that a large fraction of the VA RNAII-, but not the VA RNAI-derived mivaRNAs still are able to target the same cellular genes. Using small RNA deep sequencing we demonstrate that the Dicer processing event in the terminal stem of the VA RNAs is not unique and generates 3'-mivaRNAs with a slight variation of the position of the 5' terminal nucleotide in the RISC loaded guide strand. Also, we show that all analyzed VA RNAs, except Ad37 VA RNAI and Ad5 VA RNAII, utilize an alternative upstream A start site in addition to the classical +1 G start site. Further, the 5'-mivaRNAs with an A start appears to be preferentially incorporated into RISC. Although the majority of mivaRNA research has been done using Ad5 as the model system our analysis demonstrates that the mivaRNAs expressed in Ad11- and Ad37-infected cells are the most abundant mivaRNAs associated with Ago2-containing RISC. Collectively, our results show an unexpected variability in Dicer processing of the VA RNAs and a serotype-specific loading of mivaRNAs into Ago2-based RISC.

  17. Atomic Energy Act 1989

    International Nuclear Information System (INIS)

    1989-05-01

    This Act, which entered into force on 1 september 1989, contains a series of provisions dealing with different subjects: increase of public financing for British Nuclear Fuels plc, amendment of the Nuclear Installations Act 1965 regarding the powers of the Health and Safety Executive to recover expenses directly from nuclear operators and obligation of the UKAEA to take out insurance or other financial security to cover its liability and finally, measures to enable the UK to ratify the IAEA Convention on Assistance in Case of a Nuclear Accident or Radiological Emergency [fr

  18. Introduction to Hardware Security and Trust

    CERN Document Server

    Wang, Cliff

    2012-01-01

    The emergence of a globalized, horizontal semiconductor business model raises a set of concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware-oriented security and trust issues span a broad range including threats related to the malicious insertion of Trojan circuits designed, e.g.,to act as a ‘kill switch’ to disable a chip, to integrated circuit (IC) piracy,and to attacks designed to extract encryption keys and IP from a chip. This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade.  Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.  This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of,and trust in, modern society�...

  19. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  20. BMP-2 Overexpression Augments Vascular Smooth Muscle Cell Motility by Upregulating Myosin Va via Erk Signaling

    Directory of Open Access Journals (Sweden)

    Ming Zhang

    2014-01-01

    Full Text Available Background. The disruption of physiologic vascular smooth muscle cell (VSMC migration initiates atherosclerosis development. The biochemical mechanisms leading to dysfunctional VSMC motility remain unknown. Recently, cytokine BMP-2 has been implicated in various vascular physiologic and pathologic processes. However, whether BMP-2 has any effect upon VSMC motility, or by what manner, has never been investigated. Methods. VSMCs were adenovirally transfected to genetically overexpress BMP-2. VSMC motility was detected by modified Boyden chamber assay, confocal time-lapse video assay, and a colony wounding assay. Gene chip array and RT-PCR were employed to identify genes potentially regulated by BMP-2. Western blot and real-time PCR detected the expression of myosin Va and the phosphorylation of extracellular signal-regulated kinases 1/2 (Erk1/2. Immunofluorescence analysis revealed myosin Va expression locale. Intracellular Ca2+ oscillations were recorded. Results. VSMC migration was augmented in VSMCs overexpressing BMP-2 in a dose-dependent manner. siRNA-mediated knockdown of myosin Va inhibited VSMC motility. Both myosin Va mRNA and protein expression significantly increased after BMP-2 administration and were inhibited by Erk1/2 inhibitor U0126. BMP-2 induced Ca2+ oscillations, generated largely by a “cytosolic oscillator”. Conclusion. BMP-2 significantly increased VSMCs migration and myosin Va expression, via the Erk signaling pathway and intracellular Ca2+ oscillations. We provide additional insight into the pathophysiology of atherosclerosis, and inhibition of BMP-2-induced myosin Va expression may represent a potential therapeutic strategy.

  1. Maritime supply chain security: navigating through a sea of compliance requirements

    CSIR Research Space (South Africa)

    Maspero, EL

    2008-11-01

    Full Text Available MTSA Maritime Transportation Security Act RFID Radio Frequency Identification SAFE Security and Accountability For Every port SOLAS Safety Of Life At Sea SST Smart and Secure Tradelane UNCTAD United Nations Conference on Trade and Development... for increased security within maritime shipping and so the SOLAS (the Safety of Lives at Sea) Convention Chapter 11 was amended to provide for the inclusion of the International Ships and Port Facilities Security Code (ISPS Code), which was internationally...

  2. Australian Experience in Implementing Transport Safety Regulations and Transport Security Recommendations

    International Nuclear Information System (INIS)

    Sarkar, S.

    2016-01-01

    Australian transport safety and security regulatory framework is governed by Commonwealth, State and Territory legislations. There are eleven competent authorities in Australia that includes three Commonwealth authorities, six states and two territory authorities. IAEA Regulations for Safe Transport of Radioactive Material (TS-R-1, 2005 edition) is applied through Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) Code of Practice for Transport of Radioactive Material 2008 by road, rail and waterways not covered by marine legislations. All states and territories apply this Transport Code through their regulatory system. For air transport, the Civil Aviation Act 1988 adopts the requirements of the ICAO Technical Instructions for the Safe Transport of Dangerous Goods by Air DOC 9284, which also adopts TS-R-1. The security of radioactive material in air transport is achieved via the Aviation Transport Security Act 2004. For sea transport Australian Marine Order 41 applies the requirements of IMDG (International Maritime Dangerous Goods) Code which also adopts TS-R-1. The security of radioactive material (nuclear material) is governed by two Commonwealth Agencies namely, ARPANSA and ASNO (Australian Safeguards and Non-proliferation Office) . ARPANSA regulates the security of radioactive sources through ARPANSA Code of Practice for the Security of Radioactive Sources 2007 which is based on the IAEA Draft Security Series. ASNO regulates security of nuclear material including U, Th and Pu through the Nuclear Non-Proliferation (Safeguards) Act, and the object of which is to give effect to certain obligations that Australia has as a party to the NPT, Australia’s safeguards agreement with the IAEA, and other bilateral safeguards agreements and certain obligations that Australia has as a party to the Convention for the Physical Protection of Nuclear Materials (CPPNM). This paper presents the effectiveness of regulatory approaches for safe and secure

  3. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  4. 29 CFR 71.12 - Use and collection of social security numbers.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Use and collection of social security numbers. 71.12 Section... UNDER THE PRIVACY ACT OF 1974 General § 71.12 Use and collection of social security numbers. (a) Each component unit that requests an individual to disclose his social security account number shall provide the...

  5. 17 CFR 239.41 - Form F-80, for registration under the Securities Act of 1933 of securities of certain Canadian...

    Science.gov (United States)

    2010-04-01

    ... completed fiscal years immediately prior to the business combination, when combined with the listing history... offers or a business combination. 239.41 Section 239.41 Commodity and Securities Exchanges SECURITIES AND... issuers to be issued in exchange offers or a business combination. (a) Form F-80 may be used for...

  6. 17 CFR 239.38 - Form F-8, for registration under the Securities Act of 1933 of securities of certain Canadian...

    Science.gov (United States)

    2010-04-01

    ... completed fiscal years immediately prior to the business combination, when combined with the listing history... offers or a business combination. 239.38 Section 239.38 Commodity and Securities Exchanges SECURITIES AND... issuers to be issued in exchange offers or a business combination. (a) Form F-8 may be used for...

  7. 75 FR 53262 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-31

    ... a new Privacy Act system of records, JUSTICE/FBI- 021, the Data Integration and Visualization System... provisions of the Privacy Act in order to avoid interference with the national security and criminal law...)(G), (H) and (I); (e)(5) and (8); (f) and (g) of the Privacy Act: (1) Data Integration and...

  8. 12 CFR 1204.9 - Does FHFA collect and use Social Security numbers?

    Science.gov (United States)

    2010-01-01

    ... OPERATIONS PRIVACY ACT IMPLEMENTATION § 1204.9 Does FHFA collect and use Social Security numbers? FHFA collects Social Security numbers only when it is necessary and authorized. At least annually, the Privacy... of refusing to provide their Social Security numbers, unless the collection is authorized either by a...

  9. 17 CFR 240.15a-1 - Securities activities of OTC derivatives dealers.

    Science.gov (United States)

    2010-04-01

    ... options, forwards, futures, swap agreements, or collars involving currencies, interest or other rates... derivatives dealers. 240.15a-1 Section 240.15a-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Under the Securities Exchange Act of 1934 Exemption of Certain Otc Derivatives Dealers § 240.15a-1...

  10. GeVaDSs – decision support system for novel Genetic Vaccine development process

    Directory of Open Access Journals (Sweden)

    Blazewicz Jacek

    2012-05-01

    Full Text Available Abstract Background The lack of a uniform way for qualitative and quantitative evaluation of vaccine candidates under development led us to set up a standardized scheme for vaccine efficacy and safety evaluation. We developed and implemented molecular and immunology methods, and designed support tools for immunization data storage and analyses. Such collection can create a unique opportunity for immunologists to analyse data delivered from their laboratories. Results We designed and implemented GeVaDSs (Genetic Vaccine Decision Support system an interactive system for efficient storage, integration, retrieval and representation of data. Moreover, GeVaDSs allows for relevant association and interpretation of data, and thus for knowledge-based generation of testable hypotheses of vaccine responses. Conclusions GeVaDSs has been tested by several laboratories in Europe, and proved its usefulness in vaccine analysis. Case study of its application is presented in the additional files. The system is available at: http://gevads.cs.put.poznan.pl/preview/(login: viewer, password: password.

  11. 76 FR 35050 - Privacy Act of 1974: New System of Records

    Science.gov (United States)

    2011-06-15

    .../Central-15, Health Claims Data Warehouse, to its inventory of records systems subject to the Privacy Act.... The data warehouse will be fully compliant with all applicable provisions of the Privacy Act, Health... fully compliant with all applicable provisions of the Privacy Act, Federal Information Security...

  12. Value at risk (VaR in uncertainty: Analysis with parametric method and black & scholes simulations

    Directory of Open Access Journals (Sweden)

    Humberto Banda Ortiz

    2014-07-01

    Full Text Available VaR is the most accepted risk measure worldwide and the leading reference in any risk management assessment. However, its methodology has important limitations which makes it unreliable in contexts of crisis or high uncertainty. For this reason, the aim of this work is to test the VaR accuracy when is employed in contexts of volatility, for which we compare the VaR outcomes in scenarios of both stability and uncertainty, using the parametric method and a historical simulation based on data generated with the Black & Scholes model. VaR main objective is the prediction of the highest expected loss for any given portfolio, but even when it is considered a useful tool for risk management under conditions of markets stability, we found that it is substantially inaccurate in contexts of crisis or high uncertainty. In addition, we found that the Black & Scholes simulations lead to underestimate the expected losses, in comparison with the parametric method and we also found that those disparities increase substantially in times of crisis. In the first section of this work we present a brief context of risk management in finance. In section II we present the existent literature relative to the VaR concept, its methods and applications. In section III we describe the methodology and assumptions used in this work. Section IV is dedicated to expose the findings. And finally, in Section V we present our conclusions.

  13. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  14. Maritime Security Fleet: Factors to Consider before Deciding to Select Participants Competitively

    National Research Council Canada - National Science Library

    1997-01-01

    The Maritime Security Act established the Maritime Security Fleet (MSF) program, authorizing MARAD to enter into agreements with maritime shipping companies to provide DOD access to commercial vessels operating under U.S...

  15. Patient Centeredness in Electronic Communication: Evaluation of Patient-to-Health Care Team Secure Messaging

    Science.gov (United States)

    Luger, Tana M; Volkman, Julie E; Rocheleau, Mary; Mueller, Nora; Barker, Anna M; Nazi, Kim M; Houston, Thomas K; Bokhour, Barbara G

    2018-01-01

    Background As information and communication technology is becoming more widely implemented across health care organizations, patient-provider email or asynchronous electronic secure messaging has the potential to support patient-centered communication. Within the medical home model of the Veterans Health Administration (VA), secure messaging is envisioned as a means to enhance access and strengthen the relationships between veterans and their health care team members. However, despite previous studies that have examined the content of electronic messages exchanged between patients and health care providers, less research has focused on the socioemotional aspects of the communication enacted through those messages. Objective Recognizing the potential of secure messaging to facilitate the goals of patient-centered care, the objectives of this analysis were to not only understand why patients and health care team members exchange secure messages but also to examine the socioemotional tone engendered in these messages. Methods We conducted a cross-sectional coding evaluation of a corpus of secure messages exchanged between patients and health care team members over 6 months at 8 VA facilities. We identified patients whose medical records showed secure messaging threads containing at least 2 messages and compiled a random sample of these threads. Drawing on previous literature regarding the analysis of asynchronous, patient-provider electronic communication, we developed a coding scheme comprising a series of a priori patient and health care team member codes. Three team members tested the scheme on a subset of the messages and then independently coded the sample of messaging threads. Results Of the 711 messages coded from the 384 messaging threads, 52.5% (373/711) were sent by patients and 47.5% (338/711) by health care team members. Patient and health care team member messages included logistical content (82.6%, 308/373 vs 89.1%, 301/338), were neutral in tone (70

  16. 78 FR 9749 - Notice of Sunshine Act Meeting

    Science.gov (United States)

    2013-02-11

    ... to the provisions of the Government in the Sunshine Act, Public Law 94-409, that the Securities and... to approve the 2013 budget of the Public Company Accounting Oversight Board and will consider the related annual accounting support fee for the Board under Section 109 of the Sarbanes-Oxley Act of 2002...

  17. RİSK ÖLÇÜMÜNDE ALTERNATİF YAKLAŞIMLAR: RİSKE MARUZ DEĞER (VaR ve BEKLENEN KAYIP (ES UYGULAMALARI

    Directory of Open Access Journals (Sweden)

    SEZER BOZKUŞ

    2013-06-01

    Full Text Available This article shows that Value-at-Risk (VaR, the most popular risk measure in practice, has a considerable positive bias when used for a portfolio with fat-tail distribution. Numerical examples, i.e. USD/Euro daily prices and ISE-100 Index monthly returns, are given to demonstrate the use of our method. In the search for a suitable alternative to VaR, Expected Shortfall (ES or conditional VaR has been characterized as the coherent risk measure to dominate VaR. We discuss properties of VaR and ES and compare them in terms of consistency with elimination of tail risk, strengths and weaknesses. We conclude that ES is more applicable than VaR since ES is free of tail risk and consistent under more lenient conditions than VaR is.

  18. Phenomenology of MaVaN’s Models in Reactor Neutrino Data

    Directory of Open Access Journals (Sweden)

    M. F. Carneiro

    2013-01-01

    Full Text Available Mass Varying Neutrinos (MaVaN’s mechanisms were proposed to link the neutrino mass scale with the dark energy density, addressing the coincidence problem. In some scenarios, this mass can present a dependence on the baryonic density felt by neutrinos, creating an effective neutrino mass that depends both on the neutrino and baryonic densities. In this work, we study the phenomenological consequence of MaVaN’s scenarios in which the matter density dependence is induced by Yukawa interactions of a light neutral scalar particle which couples to neutrinos and matter. Under the assumption of one mass scale dominance, we perform an analysis of KamLAND neutrino data which depends on 4 parameters: the two standard oscillation parameters, Δm0,212 and tan2θ12, and two new coefficients which parameterize the environment dependence of neutrino mass. We introduce an Earth’s crust model to compute precisely the density in each point along the neutrino trajectory. We show that this new description of density does not affect the analysis with the standard model case. With the MaVaN model, we observe a first order effect in lower density, which leads to an improvement on the data description.

  19. A Learning-Based Approach to Reactive Security

    Science.gov (United States)

    Barth, Adam; Rubinstein, Benjamin I. P.; Sundararajan, Mukund; Mitchell, John C.; Song, Dawn; Bartlett, Peter L.

    Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.

  20. 75 FR 34934 - Safety Zone; Fireworks for the Virginia Lake Festival, Buggs Island Lake, Clarksville, VA

    Science.gov (United States)

    2010-06-21

    ...-AA00 Safety Zone; Fireworks for the Virginia Lake Festival, Buggs Island Lake, Clarksville, VA AGENCY... Fireworks for the Virginia Lake Festival event. This action is intended to restrict vessel traffic movement... Virginia Lake Festival, Buggs Island Lake, Clarksville, VA (a) Regulated Area. The following area is a...

  1. 17 CFR 170.10 - Proficiency examinations (sections 4p and 17(p) of the Act).

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Proficiency examinations (sections 4p and 17(p) of the Act). 170.10 Section 170.10 Commodity and Securities Exchanges COMMODITY... examinations (sections 4p and 17(p) of the Act). A futures association may prescribe different training...

  2. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-01-09

    ... associated with updates to MTSA; (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security Initiative... Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200...

  3. Report: Fiscal Year 2006 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.

  4. Federal Information Security and Data Breach Notification Laws

    Science.gov (United States)

    2009-01-29

    The following report describes information security and data breach notification requirements included in the Privacy Act, the Federal Information...information for unauthorized purposes. Data breach notification laws typically require covered entities to implement a breach notification policy, and...Feinstein), S. 495 (Leahy), and S. 1178 (Inouye)--were reported favorably out of Senate committees. Those bills include information security and data

  5. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  6. 30 CFR 57.22208 - Auxiliary fans (I-A, II-A, III, and V-A mines).

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Auxiliary fans (I-A, II-A, III, and V-A mines... fans (I-A, II-A, III, and V-A mines). (a) Auxiliary fans, except fans used in shops and other areas... applicable requirements of 30 CFR part 18, and be operated so that recirculation is minimized. Auxiliary fans...

  7. 77 FR 48984 - Privacy Act of 1974; System of Records Notice

    Science.gov (United States)

    2012-08-15

    ... Privacy Act systems, to facilitate their ability to respond to data security breach incidents (see OMB... DEPARTMENT OF HEALTH AND HUMAN SERVICES Privacy Act of 1974; System of Records Notice AGENCY...: In accordance with the requirements of the Privacy Act of 1974, HHS gives notice of a proposed...

  8. Adenovirus Vector-Derived VA-RNA-Mediated Innate Immune Responses

    Directory of Open Access Journals (Sweden)

    Hiroyuki Mizuguchi

    2011-07-01

    Full Text Available The major limitation of the clinical use of replication-incompetent adenovirus (Ad vectors is the interference by innate immune responses, including induction of inflammatory cytokines and interferons (IFN, following in vivo application of Ad vectors. Ad vector-induced production of inflammatory cytokines and IFNs also results in severe organ damage and efficient induction of acquired immune responses against Ad proteins and transgene products. Ad vector-induced innate immune responses are triggered by the recognition of Ad components by pattern recognition receptors (PRRs. In order to reduce the side effects by Ad vector-induced innate immune responses and to develop safer Ad vectors, it is crucial to clarify which PRRs and which Ad components are involved in Ad vector-induced innate immune responses. Our group previously demonstrated that myeloid differentiating factor 88 (MyD88 and toll-like receptor 9 (TLR9 play crucial roles in the Ad vector-induced inflammatory cytokine production in mouse bone marrow-derived dendritic cells. Furthermore, our group recently found that virus associated-RNAs (VA-RNAs, which are about 160 nucleotide-long non-coding small RNAs encoded in the Ad genome, are involved in IFN production through the IFN-β promoter stimulator-1 (IPS-1-mediated signaling pathway following Ad vector transduction. The aim of this review is to highlight the Ad vector-induced innate immune responses following transduction, especially VA-RNA-mediated innate immune responses. Our findings on the mechanism of Ad vector-induced innate immune responses should make an important contribution to the development of safer Ad vectors, such as an Ad vector lacking expression of VA-RNAs.

  9. 78 FR 15734 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration... Protection Act of 1988 (Pub. L. 100-503) and the Computer Matching and Privacy Protection Amendments of 1990...

  10. 78 FR 38724 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-06-27

    ... 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... Agreement that establishes a computer matching program between the Department of Homeland Security/U.S... and Privacy Protection Act of 1988 (Pub. L. 100-503) and the Computer Matching and Privacy Protection...

  11. 78 FR 15733 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and... computer matching program between the Department of Homeland Security/U.S. Citizenship and Immigration... Protection Act of 1988 (Pub. L. 100-503) and the Computer Matching and Privacy Protection Amendments of 1990...

  12. Employment of security personnel of a security service company does not need approval by the works council

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-secion 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. (Federal Labour Court, decision dated November 28, 1989 - 1 ABR 90/88). (orig./HP) [de

  13. Comparison of topical fixed-combination fortified vancomycin-amikacin (VA solution) to conventional separate therapy in the treatment of bacterial corneal ulcer.

    Science.gov (United States)

    Chiang, C-C; Lin, J-M; Chen, W-L; Chiu, Y-T; Tsai, Y-Y

    2009-02-01

    In an in vitro study, fixed-combination fortified vancomycin and amikacin ophthalmic solutions (VA solution) had the same potency and stable physical properties as the separate components. In this retrospective clinical study, we evaluated the efficacy of the topical VA solution in the treatment of bacterial corneal ulcer and comparison with separate topical fortified vancomycin and amikacin. Separate topical fortified eye drops was used prior to January 2004 and switched to the VA solution afterwards in the treatment of bacterial corneal ulcer. The medical records of 223 patients diagnosed with bacterial corneal ulcers between January 2002 and December 2005 were reviewed retrospectively. There were 122 patients in the VA group and 101 in the separate group. Cure was defined as complete healing of the ulcer accompanied by a nonprogressive stromal infiltrate on two consecutive visits. No significant difference was found between the VA and separate therapy group. The mean treatment duration was 15.4 days in the VA group and 16.1 days in the separate therapy group. The average hospital stay was 5.4 days (VA) and 7.2 days (separate antibiotics). Stromal infiltration regressed significantly without further expansion in both groups. All corneal ulcers completely re-epithelialized without complications related to drugs. VA solution provided similar efficacy to the conventional separate therapy in the treatment of bacterial corneal ulcers; however, it is more convenient and tolerable, promotes patient's compliance, avoids the washout effect, and reduces nurse utilization. Hence, VA solution is a good alternative to separate therapy.

  14. Critical infrastructure system security and resiliency

    CERN Document Server

    Biringer, Betty; Warren, Drake

    2013-01-01

    Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events.Developed at Sandia National Labs, the authors' analytical approach and

  15. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    Science.gov (United States)

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  16. 44 CFR 6.3 - Collection and use of information (Privacy Act statements).

    Science.gov (United States)

    2010-10-01

    ... in compliance with the Act and these regulations. (c) Solicitation of Social Security numbers. Before... such individual refuses to disclose his/her social security account number, the employee of FEMA shall... identity of an individual, and the social security number will become a part of a system of records in...

  17. Color perception differentiates Alzheimer's Disease (AD) from Vascular Dementia (VaD) patients.

    Science.gov (United States)

    Arnaoutoglou, N A; Arnaoutoglou, M; Nemtsas, P; Costa, V; Baloyannis, S J; Ebmeier, K P

    2017-08-01

    Alzheimer's Disease (AD) and Vascular Dementia (VaD) are the most common causes of dementia in older people. Both diseases appear to have similar clinical symptoms, such as deficits in attention and executive function, but specific cognitive domains are affected. Current cohort studies have shown a close relationship between αβ deposits and age-related macular degeneration (Johnson et al., 2002; Ratnayaka et al., 2015). Additionally, a close link between the thinning of the retinal nerve fiber (RNFL) and AD patients has been described, while it has been proposed that AD patients suffer from a non-specific type of color blindness (Pache et al., 2003). Our study included 103 individuals divided into three groups: A healthy control group (n = 35), AD (n = 32) according to DSM-IV-TR, NINCDS-ADRDA criteria, and VaD (n = 36) based on ΝΙΝDS-AIREN, as well as Magnetic Resonance Imaging (MRI) results. The severity of patient's cognitive impairment, was measured with the Mini-Mental State Examination (MMSE) and was classified according to the Reisberg global deterioration scale (GDS). Visual perception was examined using the Ishihara plates: "Ishihara Color Vision Test - 38 Plate." The three groups were not statistically different for demographic data (age, gender, and education). The Ishihara color blindness test has a sensitivity of 80.6% and a specificity of 87.5% to discriminate AD and VaD patients when an optimal (32.5) cut-off value of performance is used. Ishihara Color Vision Test - 38 Plate is a promising potential method as an easy and not time-consuming screening test for the differential diagnosis of dementia between AD and VaD.

  18. Employment of security personnel

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. In his comments, W. Hunold accedes to the court's decision and discusses the underlying reasons of this decision and of a previous ruling in the same matter by putting emphasis on the difference between a contract for services and a contract for work, and a contract for temporary employment. The author also discusses the basic features of an employment contract. (orig./HP) [de

  19. 76 FR 27381 - Proposed Information Collection (Notice of Waiver of VA Compensation or Pension To Receive...

    Science.gov (United States)

    2011-05-11

    ... waive VA benefits for the number of days equal to the number of days in which they received training pay... of Waiver of VA Compensation or Pension To Receive Military Pay and Allowances) Activity; Comment... currently approved collection, and allow 60 days for public comment in response to the notice. This notice...

  20. Device-independent quantum key distribution secure against collective attacks

    International Nuclear Information System (INIS)

    Pironio, Stefano; Gisin, Nicolas; AcIn, Antonio; Brunner, Nicolas; Massar, Serge; Scarani, Valerio

    2009-01-01

    Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows from the laws of quantum physics, but contrary to usual QKD, it does not rely on any assumptions about the internal working of the quantum devices used in the protocol. In this paper, we present in detail the security proof for a DIQKD protocol introduced in AcIn et al (2008 Phys. Rev. Lett. 98 230501). This proof exploits the full structure of quantum theory (as opposed to other proofs that exploit only the no-signaling principle), but only holds against collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically in each round of the protocol (although she can act coherently on her systems at any time). The security of any DIQKD protocol necessarily relies on the violation of a Bell inequality. We discuss the issue of loopholes in Bell experiments in this context.

  1. 78 FR 51264 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of the Treasury...

    Science.gov (United States)

    2013-08-20

    ... 1016 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2013-0022] Privacy Act of 1974, as Amended...

  2. 78 FR 16564 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2013-03-15

    ... 1021 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of existing computer... above. SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0073] Privacy Act of 1974, as Amended...

  3. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  4. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  5. 17 CFR 248.16 - Protection of Fair Credit Reporting Act.

    Science.gov (United States)

    2010-04-01

    ... Reporting Act. 248.16 Section 248.16 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Relation to Other Laws; Effective Date § 248.16 Protection of Fair Credit...

  6. 78 FR 70088 - Agency Proposed Business Process Vision Under the Rehabilitation Act of 1973

    Science.gov (United States)

    2013-11-22

    ... site, Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: Background... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0042] Agency Proposed Business Process Vision Under the Rehabilitation Act of 1973 AGENCY: Social Security Administration (SSA). ACTION: Notice of...

  7. Accelerating Research Impact in a Learning Health Care System: VA's Quality Enhancement Research Initiative in the Choice Act Era.

    Science.gov (United States)

    Kilbourne, Amy M; Elwy, A Rani; Sales, Anne E; Atkins, David

    2017-07-01

    Since 1998, the Veterans Health Administration (VHA) Quality Enhancement Research Initiative (QUERI) has supported more rapid implementation of research into clinical practice. With the passage of the Veterans Access, Choice and Accountability Act of 2014 (Choice Act), QUERI further evolved to support VHA's transformation into a Learning Health Care System by aligning science with clinical priority goals based on a strategic planning process and alignment of funding priorities with updated VHA priority goals in response to the Choice Act. QUERI updated its strategic goals in response to independent assessments mandated by the Choice Act that recommended VHA reduce variation in care by providing a clear path to implement best practices. Specifically, QUERI updated its application process to ensure its centers (Programs) focus on cross-cutting VHA priorities and specify roadmaps for implementation of research-informed practices across different settings. QUERI also increased funding for scientific evaluations of the Choice Act and other policies in response to Commission on Care recommendations. QUERI's national network of Programs deploys effective practices using implementation strategies across different settings. QUERI Choice Act evaluations informed the law's further implementation, setting the stage for additional rigorous national evaluations of other VHA programs and policies including community provider networks. Grounded in implementation science and evidence-based policy, QUERI serves as an example of how to operationalize core components of a Learning Health Care System, notably through rigorous evaluation and scientific testing of implementation strategies to ultimately reduce variation in quality and improve overall population health.

  8. Some controversy about law on private security

    Directory of Open Access Journals (Sweden)

    Stajić Ljubomir

    2014-01-01

    Full Text Available The Republic of Serbia is one of the last countries that legally regulate the private security sector, which is a new conceptual system of the national security system. Since the law is expected to solve many issues and dilemmas, and bring order to the area, which by some accounts is a very profitable branch of economy. Expectations were that by the end to regulate issues such as: 1 the need for institutionalization of partnership between the public and private sectors for mutual benefit, 2 the need of expressing mutual interest to establish the desired condition of security in the entire society and 3 the need to define the mechanisms and authority to achieve mentioned above. Based on this, legal framework of private security should explicitly provide: 1 a new role of the private sector, 2 communication and data exchange between the public and private sector, 3 mandatory notification about prepared or committed criminal acts on which there is information, 4 cooperation in the tasks of necessarily protected facilities, 4 cooperation in crisis situations including natural disasters, traffic accidents, strikes, sabotage, terrorist attacks, etc., 5 cooperate in the selection and training of staff and 6 cooperation in planning activities and project design of security. This paper presents a critical review of some theoretical and professional controversies in the solutions provided by law, for the purpose of answering whether it is achieving the purpose of passing of such a legal act.

  9. 76 FR 10898 - Public Safety and Homeland Security Bureau; Federal Advisory Committee Act; Emergency Response...

    Science.gov (United States)

    2011-02-28

    ... FEDERAL COMMUNICATIONS COMMISSION Public Safety and Homeland Security Bureau; Federal Advisory..., Public Safety and Homeland Security Bureau, Federal Communications Commission, 445 12th Street, SW., Room..., Public Safety and Homeland Security Bureau. [FR Doc. 2011-4398 Filed 2-25-11; 8:45 am] BILLING CODE 6712...

  10. QCD sum-rules for V-A spectral functions

    International Nuclear Information System (INIS)

    Chakrabarti, J.; Mathur, V.S.

    1980-01-01

    The Borel transformation technique of Shifman et al is used to obtain QCD sum-rules for V-A spectral functions. In contrast to the situation in the original Weinberg sum-rules and those of Bernard et al, the problem of saturating the sum-rules by low lying resonances is brought under control. Furthermore, the present sum-rules, on saturation, directly determine useful phenomenological parameters

  11. Waves from the Sun: to the 100th anniversary of V.A. Troitskaya's birth

    Science.gov (United States)

    Guglielmi, Anatol; Potapov, Alexander

    2017-09-01

    It has been one hundred years since the birth of the outstanding scientist Professor V.A. Troitskaya. Her remarkable achievements in solar-terrestrial physics are widely known. For many years, Valeria A. Troitskaya was the President of the International Association of Geomagnetism and Aeronomy. This article deals with only one aspect of the multifaceted creative activity of V.A. Troitskaya. It relates to the problem of sources of ultra-low frequency (ULF) electromagnetic oscillations and waves outside Earth’s magnetosphere. We were fortunate to work under the leadership of V.A. Troitskaya on this problem. In this paper, we briefly describe the history from the emergence of the idea of the extramagnetospheric origin of dayside permanent ULF oscillations in the late 1960s to the modern quest made by ground and satellite means for ULF waves excited by solar surface oscillations propagating in the interplanetary medium and reaching Earth.

  12. Scholar and teacher: V.A. Kitaev at the history department of Volgograd State University

    Directory of Open Access Journals (Sweden)

    Kuznetsov Oleg Viktorovich

    2013-11-01

    Full Text Available Vladimir A. Kitaev was born 1941. He was the first dean of the Faculty of History and the first head of the Department of History of the USSR (now the Department of History of Russia of Volgograd State University, reputable scientist, recognized expert in the history of the Russian social thought. The article shows the role of V.A. Kitaev in the formation and development of the faculty and the department. A characteristic of V.A. Kitaev’ sresearch and teaching activities is given. Kitaev’s featuresas a scholar and teacher such as great erudition, science scrupulosity, exactingness to himself andto his disciples, are marked. V.A. Kitaev worked at Volgograd State University for 16 years. All the while, he headed the Department andwas the dean for the first four years. The main thing is what he wanted in those positions – along with their colleagues was to lay and develop the traditions of the classical university, university atmosphere of the faculty and the university. The major scientific issues that are developed by V.A. Kitaev were: the history of liberalism and the fate of liberal reforms (modernization in Russia, the history of the Russian conservative thought, the problem of revolutionary violence as an inevitable result of the practical realization of socialist ideas. As an advocate of “establishing full-fledged liberal order”, V.A. Kitaev had, in essence, to ascertain: in Russia XIX – early XX century did not yet develop the historical conditions for the triumph of liberal ideas. The weakness and indecision of Russian liberals and their fear of the revolutionary movement, the constant fluctuation between the reform and reaction did not allow them to become independent of the political force that would determine the fate of the country in the end.

  13. The missing millions: organized labor, business, and the defeat of Clinton's Health Security Act.

    Science.gov (United States)

    Gottschalk, M

    1999-06-01

    During the battle over comprehensive health care reform in the early 1990s, organized labor was not only unable to put together a winning coalition but also found itself divided and on the defensive as it struggled to prevent any further erosion of the private-sector safety net of the U.S. welfare state. Labor's relative ineffectiveness has deep institutional and political roots and was not merely a consequence of its dwindling membership base. Several key institutions of the private welfare state, notably the Taft-Hartley health and welfare funds and the Employment Retirement Income Security Act (ERISA) preemption, brought the interests of organized labor more closely in line with those of large employers and commercial insurers and aggravated divisions within organized labor and between unions and public interest groups. In addition, several political factors conspired to reinforce labor's tendency to stick to a policy path on health care issues that was predicated on an employer-mandate solution and that had been charted primarily by business and leading Democrats. As a result, organized labor did not emerge from the 1993-1994 struggle with its political base fortified nor with a viable long-term political strategy to achieve universal health care and to shift the political debate over health policy in a more desirable direction.

  14. Measuring relational security in forensic mental health services.

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  15. Measuring relational security in forensic mental health services

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  16. 75 FR 65035 - Sunshine Act; Notice of a Matter To Be Added to the Agenda for Consideration at an Agency Meeting

    Science.gov (United States)

    2010-10-21

    ... NATIONAL CREDIT UNION ADMINISTRATION Sunshine Act; Notice of a Matter To Be Added to the Agenda for Consideration at an Agency Meeting Time and Date: 10 a.m., Thursday, October 21, 2010. Place: Board Room, 7th Floor, Room 7047, 1775 Duke Street, Alexandria, VA 22314-3428. Status: Open. Matters To...

  17. 38 CFR 17.1000 - Payment or reimbursement for emergency services for nonservice-connected conditions in non-VA...

    Science.gov (United States)

    2010-07-01

    ... for emergency services for nonservice-connected conditions in non-VA facilities. 17.1000 Section 17.1000 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS MEDICAL Payment Or Reimbursement for Emergency Services for Nonservice-Connected Conditions in Non-Va Facilities § 17.1000 Payment...

  18. 75 FR 62623 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Internal Revenue Service (IRS...

    Science.gov (United States)

    2010-10-12

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0015] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match Number 1016 AGENCY: Social Security... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching...

  19. 77 FR 27108 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Child Support...

    Science.gov (United States)

    2012-05-08

    ...: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching... protections for such persons. The Privacy Act, as amended, regulates the use of computer matching by Federal... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0010] Privacy Act of 1974, as Amended...

  20. 77 FR 38880 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Railroad Retirement Board (SSA...

    Science.gov (United States)

    2012-06-29

    ... Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0002] Privacy Act of 1974, as Amended...