WorldWideScience

Sample records for surveillance automatic enforcement

  1. Effective speed management through automatic enforcement.

    NARCIS (Netherlands)

    Oei, H.-l.

    1994-01-01

    This paper analyses several aspects of the Dutch experience of speed enforcement, and presents the results of some speed management experiments in The Netherlands, using automatic warning of speeders and enforcement of speeding. Traditional approaches to manage speed there have not resulted in

  2. The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance

    Science.gov (United States)

    Soghoian, Christopher

    2012-01-01

    Telecommunications carriers and service providers now play an essential role in facilitating modern surveillance by law enforcement agencies. The police merely select the individuals to be monitored, while the actual surveillance is performed by third parties: often the same email providers, search engines and telephone companies to whom consumers…

  3. Automatic video surveillance of outdoor scenes using track before detect

    DEFF Research Database (Denmark)

    Hansen, Morten; Sørensen, Helge Bjarup Dissing; Birkemark, Christian M.

    2005-01-01

    This paper concerns automatic video surveillance of outdoor scenes using a single camera. The first step in automatic interpretation of the video stream is activity detection based on background subtraction. Usually, this process will generate a large number of false alarms in outdoor scenes due...

  4. Standardized rendering from IR surveillance motion imagery

    Science.gov (United States)

    Prokoski, F. J.

    2014-06-01

    Government agencies, including defense and law enforcement, increasingly make use of video from surveillance systems and camera phones owned by non-government entities.Making advanced and standardized motion imaging technology available to private and commercial users at cost-effective prices would benefit all parties. In particular, incorporating thermal infrared into commercial surveillance systems offers substantial benefits beyond night vision capability. Face rendering is a process to facilitate exploitation of thermal infrared surveillance imagery from the general area of a crime scene, to assist investigations with and without cooperating eyewitnesses. Face rendering automatically generates greyscale representations similar to police artist sketches for faces in surveillance imagery collected from proximate locations and times to a crime under investigation. Near-realtime generation of face renderings can provide law enforcement with an investigation tool to assess witness memory and credibility, and integrate reports from multiple eyewitnesses, Renderings can be quickly disseminated through social media to warn of a person who may pose an immediate threat, and to solicit the public's help in identifying possible suspects and witnesses. Renderings are pose-standardized so as to not divulge the presence and location of eyewitnesses and surveillance cameras. Incorporation of thermal infrared imaging into commercial surveillance systems will significantly improve system performance, and reduce manual review times, at an incremental cost that will continue to decrease. Benefits to criminal justice would include improved reliability of eyewitness testimony and improved accuracy of distinguishing among minority groups in eyewitness and surveillance identifications.

  5. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance Broadcast (ADS-B) into a safe,...

  6. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, LLC, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance -- Broadcast (ADS-B) into a...

  7. The Copyright Surveillance Industry

    Directory of Open Access Journals (Sweden)

    Mike Zajko

    2015-09-01

    Full Text Available Creative works are now increasingly distributed as digital “content” through the internet, and copyright law has created powerful incentives to monitor and control these flows. This paper analyzes the surveillance industry that has emerged as a result. Copyright surveillance systems identify copyright infringement online and identify persons to hold responsible for infringing acts. These practices have raised fundamental questions about the nature of identification and attribution on the internet, as well as the increasing use of algorithms to make legal distinctions. New technologies have threatened the profits of some media industries through copyright infringement, but also enabled profitable forms of mass copyright surveillance and enforcement. Rather than a system of perfect control, copyright enforcement continues to be selective and uneven, but its broad reach results in systemic harm and provides opportunities for exploitation. It is only by scrutinizing copyright surveillance practices and copyright enforcement measures that we can evaluate these consequences.

  8. State surveillance of radioactive material transportation. Final report

    International Nuclear Information System (INIS)

    Salomon, S.N.

    1984-02-01

    The main objective of this final report on the state surveillance of the transportation of radioactive material (RAM) is to suggest the most cost-effective inspection areas where enforcement actions might be taken by the states during their participation in the State Hazardous Materials Enforcement Development (SHMED) Program. On the basis of the lessons learned from the surveillance program, these actions are enforcement at low-level radioactive burial sites by means of civil penalties and site use suspension; enforcement at airports and at terminals that forward freight; and enforcement of courier companies. More effective and efficient enforcement can be achieved through instrumented police patrol cars and remote surveillance because they require the least amount of time of enforcement personnel. In addition, there is a strong relationship between effective emergency response and enforcement because the appropriate shipping papers, placarding and knowledge of appropriate emergency response procedures lead to improved emergency response. These lessons originate from a ten-state surveillance program from 1977 through 1981 jointly sponsored by the US Nuclear Regulatory Commission (NRC) and DOT. The states give recommendations in the categories of education, training, expanded surveillance, coordination and enforcement. The topics of special interest covered include low-level radioactive waste disposal sites, airports, cargo terminals, highways, ports, and accidents and incidents. The three most common problems in compliance with RAM transportation regulations reported by the states are incorrect package labeling; improper shipping papers; and incorrect or missing placards. Other common problems reported by the states are summarized. The relationship to other studies, the status of the SHMED Program, a synopsis of state RAM surveillance reports, and NRC/DOT expenditures are given

  9. Automatic Detection and Classification of Audio Events for Road Surveillance Applications

    Directory of Open Access Journals (Sweden)

    Noor Almaadeed

    2018-06-01

    Full Text Available This work investigates the problem of detecting hazardous events on roads by designing an audio surveillance system that automatically detects perilous situations such as car crashes and tire skidding. In recent years, research has shown several visual surveillance systems that have been proposed for road monitoring to detect accidents with an aim to improve safety procedures in emergency cases. However, the visual information alone cannot detect certain events such as car crashes and tire skidding, especially under adverse and visually cluttered weather conditions such as snowfall, rain, and fog. Consequently, the incorporation of microphones and audio event detectors based on audio processing can significantly enhance the detection accuracy of such surveillance systems. This paper proposes to combine time-domain, frequency-domain, and joint time-frequency features extracted from a class of quadratic time-frequency distributions (QTFDs to detect events on roads through audio analysis and processing. Experiments were carried out using a publicly available dataset. The experimental results conform the effectiveness of the proposed approach for detecting hazardous events on roads as demonstrated by 7% improvement of accuracy rate when compared against methods that use individual temporal and spectral features.

  10. New concepts in automatic enforcement. The "Escape" Project, Deliverable 6. Project funded by the European Commission under the Transport RTD Programme of the 4th Framework Programme.

    NARCIS (Netherlands)

    Heidstra, J. Goldenbeld, C. Mäkinen, T. Nilsson, G. & Sagberg, F.

    2010-01-01

    One main reason for automatic enforcement, except of the safety situation, is that the police will not be able to take direct action to each detected violator at normal police enforcement activities in some environments. By using detectors and camera technology the violators can be identified and

  11. An algorithm for generating data accessibility recommendations for flight deck Automatic Dependent Surveillance-Broadcast (ADS-B) applications

    Science.gov (United States)

    2014-09-09

    Automatic Dependent Surveillance-Broadcast (ADS-B) In technology supports the display of traffic data on Cockpit Displays of Traffic Information (CDTIs). The data are used by flightcrews to perform defined self-separation procedures, such as the in-t...

  12. Object Occlusion Detection Using Automatic Camera Calibration for a Wide-Area Video Surveillance System

    Directory of Open Access Journals (Sweden)

    Jaehoon Jung

    2016-06-01

    Full Text Available This paper presents an object occlusion detection algorithm using object depth information that is estimated by automatic camera calibration. The object occlusion problem is a major factor to degrade the performance of object tracking and recognition. To detect an object occlusion, the proposed algorithm consists of three steps: (i automatic camera calibration using both moving objects and a background structure; (ii object depth estimation; and (iii detection of occluded regions. The proposed algorithm estimates the depth of the object without extra sensors but with a generic red, green and blue (RGB camera. As a result, the proposed algorithm can be applied to improve the performance of object tracking and object recognition algorithms for video surveillance systems.

  13. A low cost automatic detection and ranging system for space surveillance in the medium Earth orbit region and beyond.

    Science.gov (United States)

    Danescu, Radu; Ciurte, Anca; Turcu, Vlad

    2014-02-11

    The space around the Earth is filled with man-made objects, which orbit the planet at altitudes ranging from hundreds to tens of thousands of kilometers. Keeping an eye on all objects in Earth's orbit, useful and not useful, operational or not, is known as Space Surveillance. Due to cost considerations, the space surveillance solutions beyond the Low Earth Orbit region are mainly based on optical instruments. This paper presents a solution for real-time automatic detection and ranging of space objects of altitudes ranging from below the Medium Earth Orbit up to 40,000 km, based on two low cost observation systems built using commercial cameras and marginally professional telescopes, placed 37 km apart, operating as a large baseline stereovision system. The telescopes are pointed towards any visible region of the sky, and the system is able to automatically calibrate the orientation parameters using automatic matching of reference stars from an online catalog, with a very high tolerance for the initial guess of the sky region and camera orientation. The difference between the left and right image of a synchronized stereo pair is used for automatic detection of the satellite pixels, using an original difference computation algorithm that is capable of high sensitivity and a low false positive rate. The use of stereovision provides a strong means of removing false positives, and avoids the need for prior knowledge of the orbits observed, the system being able to detect at the same time all types of objects that fall within the measurement range and are visible on the image.

  14. 32 CFR 637.20 - Security surveillance systems.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Security surveillance systems. 637.20 Section 637... ENFORCEMENT AND CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.20 Security surveillance systems. Closed circuit video recording systems, to include those with an audio capability, may be...

  15. Law enforcement suicide: a national analysis.

    Science.gov (United States)

    Violanti, John M; Robinson, Cynthia F; Shen, Rui

    2013-01-01

    Previous research suggests that there is an elevated risk of suicide among workers within law enforcement occupations. The present study examined the proportionate mortality for suicide in law enforcement in comparison to the US working population during 1999, 2003-2004, and 2007, based on Centers for Disease Control and Prevention's National Institute for Occupational Safety and Health National Occupational Mortality Surveillance data. We analyzed data for all law enforcement occupations and focused on two specific law enforcement occupational categories-detectives/criminal investigators/ police and corrections officers. Suicides were also explored by race, gender and ethnicity. The results of the study showed proportionate mortality ratios (PMRs) for suicide were significantly high for all races and sexes combined (all law enforcement--PMR = 169, 95% CI = 150-191, p law enforcement combined category, and a similarly high PMR was found among Hispanic detectives/criminal investigators/police (PMR = 388, p < 0.01, 95% CI = 168-765). There were small numbers of deaths among female and African American officers. The results included significantly increased risk for suicide among detectives/criminal investigators/police and corrections officers, which suggests that additional study could provide better data to inform us for preventive action.

  16. Real-Time FPGA-Based Object Tracker with Automatic Pan-Tilt Features for Smart Video Surveillance Systems

    Directory of Open Access Journals (Sweden)

    Sanjay Singh

    2017-05-01

    Full Text Available The design of smart video surveillance systems is an active research field among the computer vision community because of their ability to perform automatic scene analysis by selecting and tracking the objects of interest. In this paper, we present the design and implementation of an FPGA-based standalone working prototype system for real-time tracking of an object of interest in live video streams for such systems. In addition to real-time tracking of the object of interest, the implemented system is also capable of providing purposive automatic camera movement (pan-tilt in the direction determined by movement of the tracked object. The complete system, including camera interface, DDR2 external memory interface controller, designed object tracking VLSI architecture, camera movement controller and display interface, has been implemented on the Xilinx ML510 (Virtex-5 FX130T FPGA Board. Our proposed, designed and implemented system robustly tracks the target object present in the scene in real time for standard PAL (720 × 576 resolution color video and automatically controls camera movement in the direction determined by the movement of the tracked object.

  17. Nonfatal Injuries to Law Enforcement Officers: A Rise in Assaults.

    Science.gov (United States)

    Tiesman, Hope M; Gwilliam, Melody; Konda, Srinivas; Rojek, Jeff; Marsh, Suzanne

    2018-04-01

    Limited studies exist that describe nonfatal work-related injuries to law enforcement officers. The aim of this study is to provide national estimates and trends of nonfatal injuries to law enforcement officers from 2003 through 2014. Nonfatal injuries were obtained from the National Electronic Injury Surveillance System-Occupational Supplement. Data were obtained for injuries treated in U.S. emergency departments from 2003 to 2014. Nonfatal injury rates were calculated using denominators from the Current Population Survey. Negative binomial regression was used to analyze temporal trends. Data were analyzed in 2016-2017. Between 2003 and 2014, an estimated 669,100 law enforcement officers were treated in U.S. emergency departments for nonfatal injuries. The overall rate of 635 per 10,000 full-time equivalents was three times higher than all other U.S. workers rate (213 per 10,000 full-time equivalents). The three leading injury events were assaults and violent acts (35%), bodily reactions and exertion (15%), and transportation incidents (14%). Injury rates were highest for the youngest officers, aged 21-24 years. Male and female law enforcement officers had similar nonfatal injury rates. Rates for most injuries remained stable; however, rates for assault-related injuries grew among law enforcement officers between 2003 and 2011. National Electronic Injury Surveillance System-Occupational Supplement data demonstrate a significant upward trend in assault injuries among U.S. law enforcement officers and this warrants further investigation. Police-citizen interactions are dynamic social encounters and evidence-based policing is vital to the health and safety of both police and civilians. The law enforcement community should energize efforts toward the study of how policing tactics impact both officer and citizen injuries. Published by Elsevier Inc.

  18. Automatic inference of geometric camera parameters and inter-camera topology in uncalibrated disjoint surveillance cameras

    Science.gov (United States)

    den Hollander, Richard J. M.; Bouma, Henri; Baan, Jan; Eendebak, Pieter T.; van Rest, Jeroen H. C.

    2015-10-01

    Person tracking across non-overlapping cameras and other types of video analytics benefit from spatial calibration information that allows an estimation of the distance between cameras and a relation between pixel coordinates and world coordinates within a camera. In a large environment with many cameras, or for frequent ad-hoc deployments of cameras, the cost of this calibration is high. This creates a barrier for the use of video analytics. Automating the calibration allows for a short configuration time, and the use of video analytics in a wider range of scenarios, including ad-hoc crisis situations and large scale surveillance systems. We show an autocalibration method entirely based on pedestrian detections in surveillance video in multiple non-overlapping cameras. In this paper, we show the two main components of automatic calibration. The first shows the intra-camera geometry estimation that leads to an estimate of the tilt angle, focal length and camera height, which is important for the conversion from pixels to meters and vice versa. The second component shows the inter-camera topology inference that leads to an estimate of the distance between cameras, which is important for spatio-temporal analysis of multi-camera tracking. This paper describes each of these methods and provides results on realistic video data.

  19. Satellite single-axis attitude determination based on Automatic Dependent Surveillance - Broadcast signals

    Science.gov (United States)

    Zhou, Kaixing; Sun, Xiucong; Huang, Hai; Wang, Xinsheng; Ren, Guangwei

    2017-10-01

    The space-based Automatic Dependent Surveillance - Broadcast (ADS-B) is a new technology for air traffic management. The satellite equipped with spaceborne ADS-B system receives the broadcast signals from aircraft and transfers the message to ground stations, so as to extend the coverage area of terrestrial-based ADS-B. In this work, a novel satellite single-axis attitude determination solution based on the ADS-B receiving system is proposed. This solution utilizes the signal-to-noise ratio (SNR) measurement of the broadcast signals from aircraft to determine the boresight orientation of the ADS-B receiving antenna fixed on the satellite. The basic principle of this solution is described. The feasibility study of this new attitude determination solution is implemented, including the link budget and the access analysis. On this basis, the nonlinear least squares estimation based on the Levenberg-Marquardt method is applied to estimate the single-axis orientation. A full digital simulation has been carried out to verify the effectiveness and performance of this solution. Finally, the corresponding results are processed and presented minutely.

  20. Challenge of emerging technologies: balancing the needs of law enforcement against the duty to protect individual rights

    Science.gov (United States)

    Lingerfelt, James A.

    1997-01-01

    This paper discusses three emerging technologies which will revolutionize the business operations of law enforcement: databases and search engines; biometric identification systems; and electronic surveillance and tracking devices. Unfortunately, these technologies may also lead to a serious ethical conflict for law enforcement. The tools will make it easier than ever to accomplish the core business of policing: crime prevention; investigation; and intelligence gathering. The same tools, used improperly, will also lead to routine intrusions on personal privacy. These technologies have been and are being developed for the private sector, the military and the intelligence community. The vendors are now aggressively marketing them to law enforcement and criminal justice agencies. The law enforcement community has embraced the technology, but without considering the long term impact. In the past, the police have abused wiretaps and other early surveillance technology. As a result, a sinister perception about police surveillance practices persists and a cumbersome bureaucracy has been imposed to control their use. Developing and establishing policies governing the use of emerging technologies can prevent these mistakes from being repeated. This paper recommends that criminal justice practitioners begin a discussion now, in advance of these technologies becoming commercially available, with a view to defining clear guidelines for their proper use.

  1. Application of an automatic pattern recognition for aleatory signals for the surveillance of nuclear reactor and rotating machinery

    International Nuclear Information System (INIS)

    Nascimento, J.A. do.

    1982-02-01

    An automatic pattern recognition program PSDREC, developed for the surveillance of nuclear reactor and rotating machinery is described and the relevant theory is outlined. Pattern recognition analysis of noise signals is a powerful technique for assessing 'system normality' in dynamic systems. This program, with applies 8 statistical tests to calculated power spectral density (PSD) distribution, was earlier installed in a PDP-11/45 computer at IPEN. To analyse recorded signals from three systems, namely an operational BWR power reactor (neutron signals), a water pump and a diesel engine (vibration signals) this technique was used. Results of the tests are considered satisfactory. (Author) [pt

  2. Performance-Driven Interface Contract Enforcement for Scientific Components

    Energy Technology Data Exchange (ETDEWEB)

    Dahlgren, Tamara Lynn [Univ. of California, Davis, CA (United States)

    2008-01-01

    Performance-driven interface contract enforcement research aims to improve the quality of programs built from plug-and-play scientific components. Interface contracts make the obligations on the caller and all implementations of the specified methods explicit. Runtime contract enforcement is a well-known technique for enhancing testing and debugging. However, checking all of the associated constraints during deployment is generally considered too costly from a performance stand point. Previous solutions enforced subsets of constraints without explicit consideration of their performance implications. Hence, this research measures the impacts of different interface contract sampling strategies and compares results with new techniques driven by execution time estimates. Results from three studies indicate automatically adjusting the level of checking based on performance constraints improves the likelihood of detecting contract violations under certain circumstances. Specifically, performance-driven enforcement is better suited to programs exercising constraints whose costs are at most moderately expensive relative to normal program execution.

  3. Automatic helmet-wearing detection for law enforcement using CCTV cameras

    Science.gov (United States)

    Wonghabut, P.; Kumphong, J.; Satiennam, T.; Ung-arunyawee, R.; Leelapatra, W.

    2018-04-01

    The objective of this research is to develop an application for enforcing helmet wearing using CCTV cameras. The developed application aims to help law enforcement by police, and eventually resulting in changing risk behaviours and consequently reducing the number of accidents and its severity. Conceptually, the application software implemented using C++ language and OpenCV library uses two different angle of view CCTV cameras. Video frames recorded by the wide-angle CCTV camera are used to detect motorcyclists. If any motorcyclist without helmet is found, then the zoomed (narrow-angle) CCTV is activated to capture image of the violating motorcyclist and the motorcycle license plate in real time. Captured images are managed by database implemented using MySQL for ticket issuing. The results show that the developed program is able to detect 81% of motorcyclists on various motorcycle types during daytime and night-time. The validation results reveal that the program achieves 74% accuracy in detecting the motorcyclist without helmet.

  4. Faraday rotation of Automatic Dependent Surveillance Broadcast (ADS-B) signals as a method of ionospheric characterization

    Science.gov (United States)

    Cushley, A. C.; Kabin, K.; Noel, J. M. A.

    2017-12-01

    Radio waves propagating through plasma in the Earth's ambient magnetic field experience Faraday rotation; the plane of the electric field of a linearly polarized wave changes as a function of the distance travelled through a plasma. Linearly polarized radio waves at 1090 MHz frequency are emitted by Automatic Dependent Surveillance Broadcast (ADS-B) devices which are installed on most commercial aircraft. These radio waves can be detected by satellites in low earth orbits, and the change of the polarization angle caused by propagation through the terrestrial ionosphere can be measured. In this work we discuss how these measurements can be used to characterize the ionospheric conditions. In the present study, we compute the amount of Faraday rotation from a prescribed total electron content value and two of the profile parameters of the NeQuick model.

  5. Normalized Metadata Generation for Human Retrieval Using Multiple Video Surveillance Cameras

    Directory of Open Access Journals (Sweden)

    Jaehoon Jung

    2016-06-01

    Full Text Available Since it is impossible for surveillance personnel to keep monitoring videos from a multiple camera-based surveillance system, an efficient technique is needed to help recognize important situations by retrieving the metadata of an object-of-interest. In a multiple camera-based surveillance system, an object detected in a camera has a different shape in another camera, which is a critical issue of wide-range, real-time surveillance systems. In order to address the problem, this paper presents an object retrieval method by extracting the normalized metadata of an object-of-interest from multiple, heterogeneous cameras. The proposed metadata generation algorithm consists of three steps: (i generation of a three-dimensional (3D human model; (ii human object-based automatic scene calibration; and (iii metadata generation. More specifically, an appropriately-generated 3D human model provides the foot-to-head direction information that is used as the input of the automatic calibration of each camera. The normalized object information is used to retrieve an object-of-interest in a wide-range, multiple-camera surveillance system in the form of metadata. Experimental results show that the 3D human model matches the ground truth, and automatic calibration-based normalization of metadata enables a successful retrieval and tracking of a human object in the multiple-camera video surveillance system.

  6. Faraday Rotation of Automatic Dependent Surveillance-Broadcast (ADS-B) Signals as a Method of Ionospheric Characterization

    Science.gov (United States)

    Cushley, A. C.; Kabin, K.; Noël, J.-M.

    2017-10-01

    Radio waves propagating through plasma in the Earth's ambient magnetic field experience Faraday rotation; the plane of the electric field of a linearly polarized wave changes as a function of the distance travelled through a plasma. Linearly polarized radio waves at 1090 MHz frequency are emitted by Automatic Dependent Surveillance Broadcast (ADS-B) devices that are installed on most commercial aircraft. These radio waves can be detected by satellites in low Earth orbits, and the change of the polarization angle caused by propagation through the terrestrial ionosphere can be measured. In this manuscript we discuss how these measurements can be used to characterize the ionospheric conditions. In the present study, we compute the amount of Faraday rotation from a prescribed total electron content value and two of the profile parameters of the NeQuick ionospheric model.

  7. European human rights, criminal surveillance, and intelligence surveillance : Towards “good enough” oversight, preferably but not necessarily by judges

    NARCIS (Netherlands)

    Malgieri, G.; de Hert, Paul; Gray, David C.; Henderson, Stephen

    2017-01-01

    The two European Courts (the European Court of Human Rights, ECtHR and, to a lesser degree, the European Union Court of Justice, EUCJ) have contributed greatly to the development of a legal framework for surveillance by either law enforcement agencies in the criminal law area or by secret services.

  8. Effects of surveillance on the rule of law, due process and the presumption of innocence

    NARCIS (Netherlands)

    Galetta, Antonella; de Hert, Paul; Wright, D.; Kreissl, R.

    2015-01-01

    This contribution focuses on the impact of surveillance on the rule of law, due process and the presumption of innocence, key values and principles of a democratic order. It illustrates how they are implemented and enforced in contemporary surveillance societies, while referring to European law and

  9. Evaluation of a Surveillance Review Software based on Automatic Image Summaries

    International Nuclear Information System (INIS)

    Rocchi, S.; Hadfi, G.; John, M.; Moeslinger, M.; Murray, J.; Juengling, K.; Sequeira, V.; Versino, C.; )

    2015-01-01

    Surveillance streams from safeguards instruments contain thousands of images. Inspectors review them in order to find safeguards-relevant events. Statistically a very small fraction of the images is expected to be safeguards-relevant. For this reason inspectors need a tool which helps them to focus their attention directly to the relevant parts of the surveillance stream. The current approach for surveillance review makes use of scene change detection within areas of interest (AOIs). The data reduction provided can be effective for the review of regular processes, and requires specific knowledge of the process/environment under review for the proper setting of the AOIs. The VideoZoom approach, developed by the European Commission Joint Research Centre-Institute for Transuranium Elements (JRC-ITU), detects scene changes on the whole image plane. Changes are then summarized and rendered at different levels of abstraction in four layers of summaries, each one revealing more information about the image changes. By means of a zooming interface, the reviewer is able to navigate the summary layers and decide which are to be examined with full photographic detail or skipped because they are clearly not safeguards-relevant. In this way reviewers can make best use of their time by investigating what really requires their attention. VideoZoom was evaluated by a group of IAEA inspectors on a benchmark of image reviews, with promising results in terms of identification of safeguards-relevant events, efficiency and usability. Following the positive results collected during the preliminary benchmark, the IAEA initiated a task under the European Commission Support Programme (EC SP), aimed at the research, development, and evaluation of surveillance review software based on VideoZoom and compatible with surveillance streams produced by NGSS cameras, the current safeguards surveillance technology deployed by the IAEA. This paper provides a description of the VideoZoom approach to

  10. Quality Assessment of Compressed Video for Automatic License Plate Recognition

    DEFF Research Database (Denmark)

    Ukhanova, Ann; Støttrup-Andersen, Jesper; Forchhammer, Søren

    2014-01-01

    Definition of video quality requirements for video surveillance poses new questions in the area of quality assessment. This paper presents a quality assessment experiment for an automatic license plate recognition scenario. We explore the influence of the compression by H.264/AVC and H.265/HEVC s...... recognition in our study has a behavior similar to human recognition, allowing the use of the same mathematical models. We furthermore propose an application of one of the models for video surveillance systems......Definition of video quality requirements for video surveillance poses new questions in the area of quality assessment. This paper presents a quality assessment experiment for an automatic license plate recognition scenario. We explore the influence of the compression by H.264/AVC and H.265/HEVC...... standards on the recognition performance. We compare logarithmic and logistic functions for quality modeling. Our results show that a logistic function can better describe the dependence of recognition performance on the quality for both compression standards. We observe that automatic license plate...

  11. The SBAS Sentinel-1 Surveillance service for automatic and systematic generation of Earth surface displacement within the GEP platform.

    Science.gov (United States)

    Casu, Francesco; De Luca, Claudio; Lanari, Riccardo; Manunta, Michele; Zinno, Ivana

    2017-04-01

    The Geohazards Exploitation Platform (GEP) is an ESA activity of the Earth Observation (EO) ground segment to demonstrate the benefit of new technologies for large scale processing of EO data. GEP aims at providing both on-demand processing services for scientific users of the geohazards community and an integration platform for new EO data analysis processors dedicated to scientists and other expert users. In the Remote Sensing scenario, a crucial role is played by the recently launched Sentinel-1 (S1) constellation that, with its global acquisition policy, has literally flooded the scientific community with a huge amount of data acquired over large part of the Earth on a regular basis (down to 6-days with both Sentinel-1A and 1B passes). Moreover, the S1 data, as part of the European Copernicus program, are openly and freely accessible, thus fostering their use for the development of tools for Earth surface monitoring. In particular, due to their specific SAR Interferometry (InSAR) design, Sentinel-1 satellites can be exploited to build up operational services for the generation of advanced interferometric products that can be very useful within risk management and natural hazard monitoring scenarios. Accordingly, in this work we present the activities carried out for the development, integration, and deployment of the SBAS Sentinel-1 Surveillance service of CNR-IREA within the GEP platform. This service is based on a parallel implementation of the SBAS approach, referred to as P-SBAS, able to effectively run in large distributed computing infrastructures (grid and cloud) and to allow for an efficient computation of large SAR data sequences with advanced DInSAR approaches. In particular, the Surveillance service developed on GEP platform consists on the systematic and automatic processing of Sentinel-1 data on selected Areas of Interest (AoI) to generate updated surface displacement time series via the SBAS-InSAR algorithm. We built up a system that is

  12. Disaster prevention surveillance system

    International Nuclear Information System (INIS)

    Nara, Satoru; Kamiya, Eisei

    2001-01-01

    Fuji Electric Co., Ltd. has supplied many management systems to nuclear reactor institution. 'The nuclear countermeasures-against-calamities special-measures' was enforced. A nuclear entrepreneur has devised the measure about expansion prevention and restoration of a calamity while it endeavors after prevention of generating of a nuclear calamity. Our company have supplied the 'disaster prevention surveillance system' to the Japan Atomic Energy Research Institute Tokai Research Establishment aiming at strengthening of the monitoring function at the time (after the accident) of the accident used as one of the above-mentioned measures. A 'disaster prevention surveillance system' can share the information on the accident spot in an on-site command place, an activity headquarters, and support organizations, when the serious accident happens. This system is composed of various sensors (temperature, pressure and radiation), cameras, computers and network. (author)

  13. Cyber Surveillance for Flood Disasters

    Directory of Open Access Journals (Sweden)

    Shi-Wei Lo

    2015-01-01

    Full Text Available Regional heavy rainfall is usually caused by the influence of extreme weather conditions. Instant heavy rainfall often results in the flooding of rivers and the neighboring low-lying areas, which is responsible for a large number of casualties and considerable property loss. The existing precipitation forecast systems mostly focus on the analysis and forecast of large-scale areas but do not provide precise instant automatic monitoring and alert feedback for individual river areas and sections. Therefore, in this paper, we propose an easy method to automatically monitor the flood object of a specific area, based on the currently widely used remote cyber surveillance systems and image processing methods, in order to obtain instant flooding and waterlogging event feedback. The intrusion detection mode of these surveillance systems is used in this study, wherein a flood is considered a possible invasion object. Through the detection and verification of flood objects, automatic flood risk-level monitoring of specific individual river segments, as well as the automatic urban inundation detection, has become possible. The proposed method can better meet the practical needs of disaster prevention than the method of large-area forecasting. It also has several other advantages, such as flexibility in location selection, no requirement of a standard water-level ruler, and a relatively large field of view, when compared with the traditional water-level measurements using video screens. The results can offer prompt reference for appropriate disaster warning actions in small areas, making them more accurate and effective.

  14. Intelligent agents for adaptive security market surveillance

    Science.gov (United States)

    Chen, Kun; Li, Xin; Xu, Baoxun; Yan, Jiaqi; Wang, Huaiqing

    2017-05-01

    Market surveillance systems have increasingly gained in usage for monitoring trading activities in stock markets to maintain market integrity. Existing systems primarily focus on the numerical analysis of market activity data and generally ignore textual information. To fulfil the requirements of information-based surveillance, a multi-agent-based architecture that uses agent intercommunication and incremental learning mechanisms is proposed to provide a flexible and adaptive inspection process. A prototype system is implemented using the techniques of text mining and rule-based reasoning, among others. Based on experiments in the scalping surveillance scenario, the system can identify target information evidence up to 87.50% of the time and automatically identify 70.59% of cases depending on the constraints on the available information sources. The results of this study indicate that the proposed information surveillance system is effective. This study thus contributes to the market surveillance literature and has significant practical implications.

  15. Constitutionality of enforcement of claims by private enforcement agents

    Directory of Open Access Journals (Sweden)

    Bodiroga Nikola

    2014-01-01

    Full Text Available The main focus of this paper is legal status of private enforcement agents in Serbia. The 2011 Serbian Law on Enforcement and Security has introduced private enforcement agents as legal professionals in charge mainly for carrying out of the enforcement. Special enforcement procedure for collection of utilities and similar claims has become exclusive competence of private enforcement agents. Since enforcement procedure has always been regarded as a set of coercive measures against enforcement debtor, it became questionable whether this coercion could be exercised by private enforcement agents. It has been argued by legal scholars that enforcement of civil judgments and other enforcement deeds belongs only to the state authority. The author tackles this issue from the standpoint of decisions of constitutional courts and jurisprudence of European Court of Human Rights.

  16. Enforcement handbook: Enforcement of DOE nuclear safety requirements

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    This Handbook provides detailed guidance and procedures to implement the General Statement of DOE Enforcement Policy (Enforcement Policy or Policy). A copy of this Enforcement Policy is included for ready reference in Appendix D. The guidance provided in this Handbook is qualified, however, by the admonishment to exercise discretion in determining the proper disposition of each potential enforcement action. As discussed in subsequent chapters, the Enforcement and Investigation Staff will apply a number of factors in assessing each potential enforcement situation. Enforcement sanctions are imposed in accordance with the Enforcement Policy for the purpose of promoting public and worker health and safety in the performance of activities at DOE facilities by DOE contractors (and their subcontractors and suppliers) who are indemnified under the Price-Anderson Amendments Act. These indemnified contractors, and their suppliers and subcontractors, will be referred to in this Handbook collectively as DOE contractors. It should be remembered that the purpose of the Department`s enforcement policy is to improve nuclear safety for the workers and the public, and this goal should be the prime consideration in exercising enforcement discretion.

  17. Enforcement handbook: Enforcement of DOE nuclear safety requirements

    International Nuclear Information System (INIS)

    1995-06-01

    This Handbook provides detailed guidance and procedures to implement the General Statement of DOE Enforcement Policy (Enforcement Policy or Policy). A copy of this Enforcement Policy is included for ready reference in Appendix D. The guidance provided in this Handbook is qualified, however, by the admonishment to exercise discretion in determining the proper disposition of each potential enforcement action. As discussed in subsequent chapters, the Enforcement and Investigation Staff will apply a number of factors in assessing each potential enforcement situation. Enforcement sanctions are imposed in accordance with the Enforcement Policy for the purpose of promoting public and worker health and safety in the performance of activities at DOE facilities by DOE contractors (and their subcontractors and suppliers) who are indemnified under the Price-Anderson Amendments Act. These indemnified contractors, and their suppliers and subcontractors, will be referred to in this Handbook collectively as DOE contractors. It should be remembered that the purpose of the Department's enforcement policy is to improve nuclear safety for the workers and the public, and this goal should be the prime consideration in exercising enforcement discretion

  18. THE NOISE IMMUNITY OF THE DIGITAL DEMODULATOR MFM-AM SIGNAL USED IN DATA COMMUNICATIONS SYSTEMS OF AIR TRAFFIC CONTROL WITH AUTOMATIC DEPENDENT SURVEILLANCE AGAINST A NON-GAUSSIAN NOISE

    Directory of Open Access Journals (Sweden)

    A. L. Senyavskiy

    2015-01-01

    Full Text Available The article analyzes the robustness of the digital demodulator of the signal with the lowest frequency shift keying at a subcarrier frequency with respect to non-Gaussian interference type of atmospheric, industrial noise and interfering frequency -and phase-shift keyed signals. This type of demodulator is used for the transmission of navigation data in the systems of air traffic control with automatic dependent surveillance.

  19. ADVANCED SURVEILLANCE OF ENVIROMENTAL RADIATION IN AUTOMATIC NETWORKS.

    Science.gov (United States)

    Benito, G; Sáez, J C; Blázquez, J B; Quiñones, J

    2018-06-01

    The objective of this study is the verification of the operation of a radiation monitoring network conformed by several sensors. The malfunction of a surveillance network has security and economic consequences, which derive from its maintenance and could be avoided with an early detection. The proposed method is based on a kind of multivariate distance, and the verification for the methodology has been tested at CIEMAT's local radiological early warning network.

  20. A comprehensive review on intelligent surveillance systems

    Directory of Open Access Journals (Sweden)

    Sutrisno Warsono Ibrahim

    2016-05-01

    Full Text Available Intelligent surveillance system (ISS has received growing attention due to the increasing demand on security and safety. ISS is able to automatically analyze image, video, audio or other type of surveillance data without or with limited human intervention. The recent developments in sensor devices, computer vision, and machine learning have an important role in enabling such intelligent system. This paper aims to provide general overview of intelligent surveillance system and discuss some possible sensor modalities and their fusion scenarios such as visible camera (CCTV, infrared camera, thermal camera and radar. This paper also discusses main processing steps in ISS: background-foreground segmentation, object detection and classification, tracking, and behavioral analysis.

  1. Surveillance technologies II; Proceedings of the Meeting, Orlando, FL, Apr. 21-23, 1992

    Science.gov (United States)

    Gowrinathan, Sankaran; Shanley, James F.

    1992-08-01

    Topics addressed include sensor systems and algorithm development; detectors, focal planes, and components; law enforcement technologies; airborne/tactical surveillance sensors; stable optics for geostationary remote sensors; and spaceborne surveillance. Particular attention is given to near-ultraviolet/near-infrared image mixing, ocean topography experiment star tracker performance data, a programmable timing generator for focal plane array testing and operation, a PC-based focal plane evaluation system, augmentation of image resolution for law enforcement, an integrated geophysical approach to the detection of buried objects and clandestine tunnels, the signal attenuation dependence on a segmented window structure, thermal design and performance of the visible ultraviolet experiment sensor, dimensionally stable graphite-fiber-reinforced composite mirror technology, modeling the effects of IR subpixel nonuniformities on sensor performance, and a global vision electrooptical system. (For individual items see A93-29981 to A93-29996)

  2. Tamper Detection for Active Surveillance Systems

    DEFF Research Database (Denmark)

    Theodore, Tsesmelis; Christensen, Lars; Fihl, Preben

    2013-01-01

    If surveillance data are corrupted they are of no use to neither manually post-investigation nor automatic video analysis. It is therefore critical to automatically be able to detect tampering events such as defocusing, occlusion and displacement. In this work we for the first time ad- dress...... of different tampering events. In order to assess the developed methods we have collected a large data set, which contains sequences from different active cameras at different scenarios. We evaluate our sys- tem on these data and the results are encouraging with a very high detecting rate and relatively few...

  3. Enforcement of Privacy Policies over Multiple Online Social Networks for Collaborative Activities

    Science.gov (United States)

    Wu, Zhengping; Wang, Lifeng

    Our goal is to tend to develop an enforcement architecture of privacy policies over multiple online social networks. It is used to solve the problem of privacy protection when several social networks build permanent or temporary collaboration. Theoretically, this idea is practical, especially due to more and more social network tend to support open source framework “OpenSocial”. But as we known different social network websites may have the same privacy policy settings based on different enforcement mechanisms, this would cause problems. In this case, we have to manually write code for both sides to make the privacy policy settings enforceable. We can imagine that, this is a huge workload based on the huge number of current social networks. So we focus on proposing a middleware which is used to automatically generate privacy protection component for permanent integration or temporary interaction of social networks. This middleware provide functions, such as collecting of privacy policy of each participant in the new collaboration, generating a standard policy model for each participant and mapping all those standard policy to different enforcement mechanisms of those participants.

  4. Will smart surveillance systems listen, understand and speak Slovene?

    Directory of Open Access Journals (Sweden)

    Simon Dobrišek

    2013-12-01

    Full Text Available The paper deals with the spoken language technologies that could enable the so-called smart (intelligent surveillance systems to listen, understand and speak Slovenian in the near future. Advanced computational methods of artificial perception and pattern recognition enable such systems to be at least to some extent aware of the environment, the presence of people and other phenomena that could be subject to surveillance. Speech is one such phenomenon that has the potential to be a key source of information in certain security situations. Technologies that enable automatic speech and speaker recognition as well as their psychophysical state by computer analysis of acoustic speech signals provide an entirely new dimension to the development of smart surveillance systems. Automatic recognition of spoken threats, screaming and crying for help, as well as a suspicious psycho-physical state of a speaker provide such systems to some extent with intelligent behaviour. The paper investigates the current state of development of these technologies and the requirements and possibilities of these systems to be used for the Slovenian spoken language, as well as different possible security application scenarios. It also addresses the broader legal and ethical issues raised by the development and use of such technologies, especially as audio surveillance is one of the most sensitive issues of privacy protection.

  5. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  6. Demonstrator for Automatic Target Classification in SAR Imagery

    NARCIS (Netherlands)

    Wit, J.J.M. de; Broek, A.C. van den; Dekker, R.J.

    2006-01-01

    Due to the increasing use of unmanned aerial vehicles (UAV) for reconnaissance, surveillance, and target acquisition applications, the interest in synthetic aperture radar (SAR) systems is growing. In order to facilitate the processing of the enormous amount of SAR data on the ground, automatic

  7. Evaluation of an Electronic Smart-Card Based School Absenteeism Surveillance System

    OpenAIRE

    So, HC; Lam, CK; Tam, YH; Cowling, BJ; Leung, GM; Lau, EHY; Ip, DKM

    2014-01-01

    We evaluated the performance of an electronic smart-card based school absenteeism surveillance system which was initiated in 2008 in Hong Kong. The result demonstrated the feasibility and potential benefit of employing electronic school absenteeism data as captured automatically by a smart card system as an alternative data stream for monitoring influenza activities, and flexibility in establishing surveillance for emerging diseases. The increasing popularity of usage of smart card technology...

  8. Integrated design of intelligent surveillance systems and their user interface

    NARCIS (Netherlands)

    Toet, A.

    2005-01-01

    Modern complex surveillance systems consisting of multiple and heterogeneous sensors, automatic information registration and data analysis techniques, and decision support tools should provide the human operator an integrated, transparent and easily comprehensible view of the surveyed scene.

  9. Semi-automated CCTV surveillance: the effects of system confidence, system accuracy and task complexity on operator vigilance, reliance and workload.

    Science.gov (United States)

    Dadashi, N; Stedmon, A W; Pridmore, T P

    2013-09-01

    Recent advances in computer vision technology have lead to the development of various automatic surveillance systems, however their effectiveness is adversely affected by many factors and they are not completely reliable. This study investigated the potential of a semi-automated surveillance system to reduce CCTV operator workload in both detection and tracking activities. A further focus of interest was the degree of user reliance on the automated system. A simulated prototype was developed which mimicked an automated system that provided different levels of system confidence information. Dependent variable measures were taken for secondary task performance, reliance and subjective workload. When the automatic component of a semi-automatic CCTV surveillance system provided reliable system confidence information to operators, workload significantly decreased and spare mental capacity significantly increased. Providing feedback about system confidence and accuracy appears to be one important way of making the status of the automated component of the surveillance system more 'visible' to users and hence more effective to use. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  10. Semantic-based surveillance video retrieval.

    Science.gov (United States)

    Hu, Weiming; Xie, Dan; Fu, Zhouyu; Zeng, Wenrong; Maybank, Steve

    2007-04-01

    Visual surveillance produces large amounts of video data. Effective indexing and retrieval from surveillance video databases are very important. Although there are many ways to represent the content of video clips in current video retrieval algorithms, there still exists a semantic gap between users and retrieval systems. Visual surveillance systems supply a platform for investigating semantic-based video retrieval. In this paper, a semantic-based video retrieval framework for visual surveillance is proposed. A cluster-based tracking algorithm is developed to acquire motion trajectories. The trajectories are then clustered hierarchically using the spatial and temporal information, to learn activity models. A hierarchical structure of semantic indexing and retrieval of object activities, where each individual activity automatically inherits all the semantic descriptions of the activity model to which it belongs, is proposed for accessing video clips and individual objects at the semantic level. The proposed retrieval framework supports various queries including queries by keywords, multiple object queries, and queries by sketch. For multiple object queries, succession and simultaneity restrictions, together with depth and breadth first orders, are considered. For sketch-based queries, a method for matching trajectories drawn by users to spatial trajectories is proposed. The effectiveness and efficiency of our framework are tested in a crowded traffic scene.

  11. Profiling School Shooters: Automatic Text-Based Analysis

    Directory of Open Access Journals (Sweden)

    Yair eNeuman

    2015-06-01

    Full Text Available School shooters present a challenge to both forensic psychiatry and law enforcement agencies. The relatively small number of school shooters, their various charateristics, and the lack of in-depth analysis of all of the shooters prior to the shooting add complexity to our understanding of this problem. In this short paper, we introduce a new methodology for automatically profiling school shooters. The methodology involves automatic analysis of texts and the production of several measures relevant for the identification of the shooters. Comparing texts written by six school shooters to 6056 texts written by a comparison group of male subjects, we found that the shooters' texts scored significantly higher on the Narcissistic Personality dimension as well as on the Humilated and Revengeful dimensions. Using a ranking/priorization procedure, similar to the one used for the automatic identification of sexual predators, we provide support for the validity and relevance of the proposed methodology.

  12. Surveillance and Datalink Communication Performance Analysis for Distributed Separation Assurance System Architectures

    Science.gov (United States)

    Chung, William W.; Linse, Dennis J.; Alaverdi, Omeed; Ifarraguerri, Carlos; Seifert, Scott C.; Salvano, Dan; Calender, Dale

    2012-01-01

    This study investigates the effects of two technical enablers: Automatic Dependent Surveillance - Broadcast (ADS-B) and digital datalink communication, of the Federal Aviation Administration s Next Generation Air Transportation System (NextGen) under two separation assurance (SA) system architectures: ground-based SA and airborne SA, on overall separation assurance performance. Datalink performance such as successful reception probability in both surveillance and communication messages, and surveillance accuracy are examined in various operational conditions. Required SA performance is evaluated as a function of subsystem performance, using availability, continuity, and integrity metrics to establish overall required separation assurance performance, under normal and off-nominal conditions.

  13. Law Enforcement Locations

    Data.gov (United States)

    Kansas Data Access and Support Center — Law Enforcement Locations in Kansas Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law enforcement agencies "are...

  14. Real-Time Surveillance of Infectious Diseases: Taiwan's Experience.

    Science.gov (United States)

    Jian, Shu-Wan; Chen, Chiu-Mei; Lee, Cheng-Yi; Liu, Ding-Ping

    Integration of multiple surveillance systems advances early warning and supports better decision making during infectious disease events. Taiwan has a comprehensive network of laboratory, epidemiologic, and early warning surveillance systems with nationwide representation. Hospitals and clinical laboratories have deployed automatic reporting mechanisms since 2014 and have effectively improved timeliness of infectious disease and laboratory data reporting. In June 2016, the capacity of real-time surveillance in Taiwan was externally assessed and was found to have a demonstrated and sustainable capability. We describe Taiwan's disease surveillance system and use surveillance efforts for influenza and Zika virus as examples of surveillance capability. Timely and integrated influenza information showed a higher level and extended pattern of influenza activity during the 2015-16 season, which ensured prompt information dissemination and the coordination of response operations. Taiwan also has well-developed disease detection systems and was the first country to report imported cases of Zika virus from Miami Beach and Singapore. This illustrates a high level of awareness and willingness among health workers to report emerging infectious diseases, and highlights the robust and sensitive nature of Taiwan's surveillance system. These 2 examples demonstrate the flexibility of the surveillance systems in Taiwan to adapt to emerging infectious diseases and major communicable diseases. Through participation in the GHSA, Taiwan can more actively collaborate with national counterparts and use its expertise to strengthen global and regional surveillance capacity in the Asia Pacific and in Southeast Asia, in order to advance a world safe and secure from infectious disease.

  15. An airport surface surveillance solution based on fusion algorithm

    Science.gov (United States)

    Liu, Jianliang; Xu, Yang; Liang, Xuelin; Yang, Yihuang

    2017-01-01

    In this paper, we propose an airport surface surveillance solution combined with Multilateration (MLAT) and Automatic Dependent Surveillance Broadcast (ADS-B). The moving target to be monitored is regarded as a linear stochastic hybrid system moving freely and each surveillance technology is simplified as a sensor with white Gaussian noise. The dynamic model of target and the observation model of sensor are established in this paper. The measurements of sensors are filtered properly by estimators to get the estimation results for current time. Then, we analysis the characteristics of two fusion solutions proposed, and decide to use the scheme based on sensor estimation fusion for our surveillance solution. In the proposed fusion algorithm, according to the output of estimators, the estimation error is quantified, and the fusion weight of each sensor is calculated. The two estimation results are fused with weights, and the position estimation of target is computed accurately. Finally the proposed solution and algorithm are validated by an illustrative target tracking simulation.

  16. Long Baseline Stereovision for Automatic Detection and Ranging of Moving Objects in the Night Sky

    Directory of Open Access Journals (Sweden)

    Vlad Turcu

    2012-09-01

    Full Text Available As the number of objects in Earth’s atmosphere and in low Earth orbit is continuously increasing; accurate surveillance of these objects has become important. This paper presents a generic, low cost sky surveillance system based on stereovision. Two cameras are placed 37 km apart and synchronized by a GPS-controlled external signal. The intrinsic camera parameters are calibrated before setup in the observation position, the translation vectors are determined from the GPS coordinates and the rotation matrices are continuously estimated using an original automatic calibration methodology based on following known stars. The moving objects in the sky are recognized as line segments in the long exposure images, using an automatic detection and classification algorithm based on image processing. The stereo correspondence is based on the epipolar geometry and is performed automatically using the image detection results. The resulting experimental system is able to automatically detect moving objects such as planes, meteors and Low Earth Orbit satellites, and measure their 3D position in an Earth-bound coordinate system.

  17. Antitrust Enforcement in the Electricity and Gas Industries: Problems and Solutions for the EU

    International Nuclear Information System (INIS)

    Leveque, Francois

    2006-01-01

    Antitrust enforcement in the electricity and gas industries raises specific problems that call for specific solutions. Among the issues: How can the anticompetitive effects of mergers be assessed in a changing regulatory environment? Should long-term agreements in energy purchasing be prohibited? What are the benefits of preventive action such as competition advocacy and market surveillance committees? Should Article 82 (a) of the EC Treaty be used to curb excessive pricing?. (author)

  18. A video imaging system and related control hardware for nuclear safeguards surveillance applications

    International Nuclear Information System (INIS)

    Whichello, J.V.

    1987-03-01

    A novel video surveillance system has been developed for safeguards applications in nuclear installations. The hardware was tested at a small experimental enrichment facility located at the Lucas Heights Research Laboratories. The system uses digital video techniques to store, encode and transmit still television pictures over the public telephone network to a receiver located in the Australian Safeguards Office at Kings Cross, Sydney. A decoded, reconstructed picture is then obtained using a second video frame store. A computer-controlled video cassette recorder is used automatically to archive the surveillance pictures. The design of the surveillance system is described with examples of its operation

  19. The temporal relationship between drug supply indicators: an audit of international government surveillance systems.

    Science.gov (United States)

    Werb, Dan; Kerr, Thomas; Nosyk, Bohdan; Strathdee, Steffanie; Montaner, Julio; Wood, Evan

    2013-09-30

    Illegal drug use continues to be a major threat to community health and safety. We used international drug surveillance databases to assess the relationship between multiple long-term estimates of illegal drug price and purity. We systematically searched for longitudinal measures of illegal drug supply indicators to assess the long-term impact of enforcement-based supply reduction interventions. Data from identified illegal drug surveillance systems were analysed using an a priori defined protocol in which we sought to present annual estimates beginning in 1990. Data were then subjected to trend analyses. Data were obtained from government surveillance systems assessing price, purity and/or seizure quantities of illegal drugs; systems with at least 10 years of longitudinal data assessing price, purity/potency or seizures were included. We identified seven regional/international metasurveillance systems with longitudinal measures of price or purity/potency that met eligibility criteria. In the USA, the average inflation-adjusted and purity-adjusted prices of heroin, cocaine and cannabis decreased by 81%, 80% and 86%, respectively, between 1990 and 2007, whereas average purity increased by 60%, 11% and 161%, respectively. Similar trends were observed in Europe, where during the same period the average inflation-adjusted price of opiates and cocaine decreased by 74% and 51%, respectively. In Australia, the average inflation-adjusted price of cocaine decreased 14%, while the inflation-adjusted price of heroin and cannabis both decreased 49% between 2000 and 2010. During this time, seizures of these drugs in major production regions and major domestic markets generally increased. With few exceptions and despite increasing investments in enforcement-based supply reduction efforts aimed at disrupting global drug supply, illegal drug prices have generally decreased while drug purity has generally increased since 1990. These findings suggest that expanding efforts at

  20. Automatic analysis of online image data for law enforcement agencies by concept detection and instance search

    Science.gov (United States)

    de Boer, Maaike H. T.; Bouma, Henri; Kruithof, Maarten C.; ter Haar, Frank B.; Fischer, Noëlle M.; Hagendoorn, Laurens K.; Joosten, Bart; Raaijmakers, Stephan

    2017-10-01

    The information available on-line and off-line, from open as well as from private sources, is growing at an exponential rate and places an increasing demand on the limited resources of Law Enforcement Agencies (LEAs). The absence of appropriate tools and techniques to collect, process, and analyze the volumes of complex and heterogeneous data has created a severe information overload. If a solution is not found, the impact on law enforcement will be dramatic, e.g. because important evidence is missed or the investigation time is too long. Furthermore, there is an uneven level of capabilities to deal with the large volumes of complex and heterogeneous data that come from multiple open and private sources at national level across the EU, which hinders cooperation and information sharing. Consequently, there is a pertinent need to develop tools, systems and processes which expedite online investigations. In this paper, we describe a suite of analysis tools to identify and localize generic concepts, instances of objects and logos in images, which constitutes a significant portion of everyday law enforcement data. We describe how incremental learning based on only a few examples and large-scale indexing are addressed in both concept detection and instance search. Our search technology allows querying of the database by visual examples and by keywords. Our tools are packaged in a Docker container to guarantee easy deployment on a system and our tools exploit possibilities provided by open source toolboxes, contributing to the technical autonomy of LEAs.

  1. A Web-Based, Hospital-Wide Health Care-Associated Bloodstream Infection Surveillance and Classification System: Development and Evaluation.

    Science.gov (United States)

    Tseng, Yi-Ju; Wu, Jung-Hsuan; Lin, Hui-Chi; Chen, Ming-Yuan; Ping, Xiao-Ou; Sun, Chun-Chuan; Shang, Rung-Ji; Sheng, Wang-Huei; Chen, Yee-Chun; Lai, Feipei; Chang, Shan-Chwen

    2015-09-21

    Surveillance of health care-associated infections is an essential component of infection prevention programs, but conventional systems are labor intensive and performance dependent. To develop an automatic surveillance and classification system for health care-associated bloodstream infection (HABSI), and to evaluate its performance by comparing it with a conventional infection control personnel (ICP)-based surveillance system. We developed a Web-based system that was integrated into the medical information system of a 2200-bed teaching hospital in Taiwan. The system automatically detects and classifies HABSIs. In this study, the number of computer-detected HABSIs correlated closely with the number of HABSIs detected by ICP by department (n=20; r=.999 Psystem performed excellently with regard to sensitivity (98.16%), specificity (99.96%), positive predictive value (95.81%), and negative predictive value (99.98%). The system enabled decreasing the delay in confirmation of HABSI cases, on average, by 29 days. This system provides reliable and objective HABSI data for quality indicators, improving the delay caused by a conventional surveillance system.

  2. Through-the-wall surveillance for homeland security and law enforcement

    Science.gov (United States)

    Borek, Stanley E.; Clarke, Bernard J.; Costianes, Peter J.

    2005-05-01

    The Air Force Research Laboratory Information Directorate (AFRL/IF), under sponsorship of the Department of Justice's (DOJ), National Institute of Justice (NIJ) Office of Science and Technology (OS&T), is currently developing and evaluating advanced Through the Wall Surveillance (TWS) technologies. These technologies are partitioned into two categories: inexpensive, handheld systems for locating an individual(s) behind a wall or door; and portable, personal computer (PC) based standoff systems to enable the determination of events during critical incident situations. The technologies utilized are primarily focused on active radars operating in the UHF, L, S (ultra wideband (UWB)), X, and Ku Bands. The data displayed by these systems is indicative of range (1 Dimension), or range and azimuth (2 Dimensions) to the moving individual(s). This paper will highlight the technologies employed in five (5) prototype TWS systems delivered to NIJ and AFRL/IF for test and evaluation. It will discuss the systems backgrounds, applications, current states of evolution, and future plans for enhanced assessment.

  3. Regulatory Enforcement and Compliance

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    1999-01-01

    This study of municipal enforcement of agro-environmental regulations in Denmark provides an empirical understanding of how enforcement affects compliance. A key contribution is sorting out the relative influence of inspectors' different styles of enforcement and choices made by enforcement...... agencies. The latter are shown to be more important in bringing about compliance than are inspectors' enforcement styles. Municipal agencies are shown to increase compliance through the use of third parties, more frequent inspection, and setting priorities for inspection of major items. The findings about...

  4. Speed enforcement in Norway

    DEFF Research Database (Denmark)

    Elvik, Rune

    2015-01-01

    and the police. This model makes predictions both about how drivers will adapt to changes in the amount of enforcement (the more enforcement, the less violations) as well as how the police will adapt to changes in the rate of violations (the less violations, the less enforcement). The paper attempts to test...... in the amount of enforcement. The predictions of the game-theoretic model were supported, although the results were not statistically significant in the model of how the police adapt enforcement to changes in the rate of violations....

  5. Unexpected Arrest-Related Deaths in America: 12 Months of Open Source Surveillance

    Directory of Open Access Journals (Sweden)

    Ho, Jeffrey D

    2009-05-01

    Full Text Available Introduction: Sudden, unexpected arrest-related death (ARD has been associated with drug abuse, extreme delirium or certain police practices. There is insufficient surveillance and causation data available. We report 12 months of surveillance data using a novel data collection methodology.Methods: We used an open-source, prospective method to collect 12 consecutive months of data, including demographics, behavior, illicit substance use, control methods used, and time of collapse after law enforcement contact. Descriptive analysis and chi-square testing were applied.Results: There were 162 ARD events reported that met inclusion criteria. The majority were male with mean age 36 years, and involved bizarre, agitated behavior and reports of drug abuse just prior to death. Law enforcement control techniques included none (14%; empty-hand techniques (69%; intermediate weapons such as TASER device, impact weapon or chemical irritant spray (52%; and deadly force (12%. Time from contact to subject collapse included instantaneous (13%, within the first hour (53% and 1-48 hours (35%. Significant collapse time associations occurred with the use of certain intermediate weapons.Conclusion: This surveillance report can be a foundation for discussing ARD. These data support the premise that ARDs primarily occur in persons with a certain demographic and behavior profile that includes middle-aged males exhibiting agitated, bizarre behavior generally following illicit drug abuse. Collapse time associations were demonstrated with the use of TASER devices and impact weapons. We recommend further study in this area to validate our data collection method and findings. [WestJEM. 2009;10:68-73.

  6. Automatic analysis of online image data for law enforcement agencies by concept detection and instance search

    NARCIS (Netherlands)

    Boer, M.H.T. de; Bouma, H.; Kruithof, M.C.; Haar, F.B. ter; Fischer, N.M.; Hagendoorn, L.K.; Joosten, B.; Raaijmakers, S.

    2017-01-01

    The information available on-line and off-line, from open as well as from private sources, is growing at an exponential rate and places an increasing demand on the limited resources of Law Enforcement Agencies (LEAs). The absence of appropriate tools and techniques to collect, process, and analyze

  7. Heroin and fentanyl overdoses in Kentucky: Epidemiology and surveillance.

    Science.gov (United States)

    Slavova, Svetla; Costich, Julia F; Bunn, Terry L; Luu, Huong; Singleton, Michael; Hargrove, Sarah L; Triplett, Jeremy S; Quesinberry, Dana; Ralston, William; Ingram, Van

    2017-08-01

    The study aims to describe recent changes in Kentucky's drug overdose trends related to increased heroin and fentanyl involvement, and to discuss future directions for improved drug overdose surveillance. The study used multiple data sources (death certificates, postmortem toxicology results, emergency department [ED] records, law enforcement drug submissions, and prescription drug monitoring records) to describe temporal, geographic, and demographic changes in drug overdoses in Kentucky. Fentanyl- and heroin-related overdose death rates increased across all age groups from years 2011 to 2015 with the highest rates consistently among 25-34-year-olds. The majority of the heroin and fentanyl overdose decedents had histories of substantial exposures to legally acquired prescription opioids. Law enforcement drug submission data were strongly correlated with drug overdose ED and mortality data. The 2016 crude rate of heroin-related overdose ED visits was 104/100,000, a 68% increase from 2015 (62/100,000). More fentanyl-related overdose deaths were reported between October, 2015, and September, 2016, than ED visits, in striking contrast with the observed ratio of >10 to 1 heroin-related overdose ED visits to deaths. Many fatal fentanyl overdoses were associated with heroin adulterated with fentanyl; fentanyl and other synthetic drugs. In order to inform coordinated public health and safety responses, drug overdose surveillance must move from a reactive to a proactive mode, utilizing the infrastructure for electronic health records. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. A Survey of Colonoscopic Surveillance After Polypectomy

    Science.gov (United States)

    2014-01-01

    Purpose Several guidelines have been proposed for surveillance colonoscopy after polypectomy. However, some discrepancies still exist between the guidelines and clinical practice. This study was conducted to identify Korean doctors' recommendations for the colonoscopic surveillance interval after polypectomy. Methods A survey of the attendees at the symposium of the 64th Annual Congress of the Korean Surgical Society was conducted. When the prepared clinical scenarios were given, attendees answered using a wireless radio-frequency audience response system. All responders' results were automatically counted immediately. Frequencies of different answers to each question were calculated, and our results were compared with those of previous surveys performed using the same questionnaire in the United States or Japan. Results The number of responder varied from 38 to 41. About 50% of valid responders selected 'follow-up in 3 years' for low-risk lesions, such as a 6-mm hyperplastic polyp, a 6-mm tubular adenoma, or two 6-mm tubular adenomas. Responders most-commonly selected 'follow-up in 1 year' for high-risk lesions, such as a 12-mm tubular adenoma with high grade dysplasia or a 12-mm tubulovillous adenoma. The majority of Korean doctors recommend postpolypectomy colonoscopic surveillance more frequently than American physicians did. Conclusion A discrepancy between the guidelines and clinical practice for the surveillance after polypectomy still exists in Korea. A surveillance program that can be easily and widely applied in clinical practice needs to be established. PMID:24851219

  9. GPU-Accelerated Real-Time Surveillance De-Weathering

    OpenAIRE

    Pettersson, Niklas

    2013-01-01

    A fully automatic de-weathering system to increase the visibility/stability in surveillance applications during bad weather has been developed. Rain, snow and haze during daylight are handled in real-time performance with acceleration from CUDA implemented algorithms. Video from fixed cameras is processed on a PC with no need of special hardware except an NVidia GPU. The system does not use any background model and does not require any precalibration. Increase in contrast is obtained in all h...

  10. EU Law and Mass Internet Metadata Surveillance in the Post-Snowden Era

    Directory of Open Access Journals (Sweden)

    Nora Ni Loideain

    2015-09-01

    Full Text Available Legal frameworks exist within democracies to prevent the misuse and abuse of personal data that law enforcement authorities obtain from private communication service providers. The fundamental rights to respect for private life and the protection of personal data underpin this framework within the European Union. Accordingly, the protection of the principles and safeguards required by these rights is key to ensuring that the oversight of State surveillance powers is robust and transparent. Furthermore, without the robust scrutiny of independent judicial review, the principles and safeguards guaranteed by these rights may become more illusory than real. Following the Edward Snowden revelations, major concerns have been raised worldwide regarding the legality, necessity and proportionality standards governing these laws. In 2014, the highest court in the EU struck down the legal framework that imposed a mandatory duty on communication service providers to undertake the mass retention of metadata for secret intelligence and law enforcement authorities across the EU. This article considers the influence of the Snowden revelations on this landmark judgment. Subsequently, the analysis explores the significance of this ruling for the future reform of EU law governing metadata surveillance and its contribution to the worldwide debate on indiscriminate and covert monitoring in the post-Snowden era.

  11. Calibration and study of the measurement capabilities of real-time gamma spectrometry equipment, developed for the renewal of the network of automatic stations for environmental radiological surveillance of the Generalitat de Catalunya

    International Nuclear Information System (INIS)

    Casanovas, R.; Prieto, E.; Salvado, M.

    2013-01-01

    The renewal of the automatic environmental radiation surveillance network of the Gereralitat of Catalunya has been carried out through the development and implementation of gamma-spectrometry-based equipment. The monitors use scintillation cristals, either NaI(Tl) or LaBr 3 (Ce) and currently, there are 3 types of equipment: water radioactivity monitors, aerosols on a particulate filter monitors and direct measurement monitors. In this paper, we expose the basic features of its operation, the details of their calibration and the minimum detectable activity concentrations for some isotopes

  12. Enforcement and judicial review

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    The 1990 Amendments to the enforcement provisions of the Clean Air Act generally give the Administrator and the courts broader powers to enforce the substantive provisions of the Act. The changes include wider applicability of civil sanctions, increased criminal penalties, broader emergency powers, broader inspection powers, and increased citizen involvement in enforcement and administrative decisionmaking. Another significant change is the addition of an administrative penalty scheme that would allow EPA to use streamlined procedures to assess administrative penalties of up to $200,000 (or more, in some cases). Furthermore, the Amendments extend the prohibition against entering into government contracts with violators to other facilities owned or operated by the convicted person. This chapter summarizes the statutory enforcement provisions of the Clean Air Act. It covers the new civil and criminal enforcement provisions, the new administrative penalty scheme, and the new provisions allowing broader public involvement in enforcement proceedings

  13. Mass Processing of Sentinel-1 Images for Maritime Surveillance

    Directory of Open Access Journals (Sweden)

    Carlos Santamaria

    2017-07-01

    Full Text Available The free, full and open data policy of the EU’s Copernicus programme has vastly increased the amount of remotely sensed data available to both operational and research activities. However, this huge amount of data calls for new ways of accessing and processing such “big data”. This paper focuses on the use of Copernicus’s Sentinel-1 radar satellite for maritime surveillance. It presents a study in which ship positions have been automatically extracted from more than 11,500 Sentinel-1A images collected over the Mediterranean Sea, and compared with ship position reports from the Automatic Identification System (AIS. These images account for almost all the Sentinel-1A acquisitions taken over the area during the two-year period from the start of the operational phase in October 2014 until September 2016. A number of tools and platforms developed at the European Commission’s Joint Research Centre (JRC that have been used in the study are described in the paper. They are: (1 Search for Unidentified Maritime Objects (SUMO, a tool for ship detection in Synthetic Aperture Radar (SAR images; (2 the JRC Earth Observation Data and Processing Platform (JEODPP, a platform for efficient storage and processing of large amounts of satellite images; and (3 Blue Hub, a maritime surveillance GIS and data fusion platform. The paper presents the methodology and results of the study, giving insights into the new maritime surveillance knowledge that can be gained by analysing such a large dataset, and the lessons learnt in terms of handling and processing the big dataset.

  14. The installation and performance test of the surveillance system for DUPIC facility

    International Nuclear Information System (INIS)

    Kim, Dong Young; Kim, Ho Dong; Cha, Hong Ryul

    2000-07-01

    We have developed the real time surveillance system, named by DSSS, for DUPIC test facility. The system acquires data from He-3 neutron monitors(DSNM) and CCD cameras to automatically diagnose the transportation status of nuclear material. This technical report shortly illustrates important features of hardware and software of the system

  15. The installation and performance test of the surveillance system for DUPIC facility

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dong Young; Kim, Ho Dong; Cha, Hong Ryul

    2000-07-01

    We have developed the real time surveillance system, named by DSSS, for DUPIC test facility. The system acquires data from He-3 neutron monitors(DSNM) and CCD cameras to automatically diagnose the transportation status of nuclear material. This technical report shortly illustrates important features of hardware and software of the system.

  16. The temporal relationship between drug supply indicators: an audit of international government surveillance systems

    Science.gov (United States)

    Werb, Dan; Kerr, Thomas; Nosyk, Bohdan; Strathdee, Steffanie; Montaner, Julio; Wood, Evan

    2013-01-01

    Objectives Illegal drug use continues to be a major threat to community health and safety. We used international drug surveillance databases to assess the relationship between multiple long-term estimates of illegal drug price and purity. Design We systematically searched for longitudinal measures of illegal drug supply indicators to assess the long-term impact of enforcement-based supply reduction interventions. Setting Data from identified illegal drug surveillance systems were analysed using an a priori defined protocol in which we sought to present annual estimates beginning in 1990. Data were then subjected to trend analyses. Main outcome measures Data were obtained from government surveillance systems assessing price, purity and/or seizure quantities of illegal drugs; systems with at least 10 years of longitudinal data assessing price, purity/potency or seizures were included. Results We identified seven regional/international metasurveillance systems with longitudinal measures of price or purity/potency that met eligibility criteria. In the USA, the average inflation-adjusted and purity-adjusted prices of heroin, cocaine and cannabis decreased by 81%, 80% and 86%, respectively, between 1990 and 2007, whereas average purity increased by 60%, 11% and 161%, respectively. Similar trends were observed in Europe, where during the same period the average inflation-adjusted price of opiates and cocaine decreased by 74% and 51%, respectively. In Australia, the average inflation-adjusted price of cocaine decreased 14%, while the inflation-adjusted price of heroin and cannabis both decreased 49% between 2000 and 2010. During this time, seizures of these drugs in major production regions and major domestic markets generally increased. Conclusions With few exceptions and despite increasing investments in enforcement-based supply reduction efforts aimed at disrupting global drug supply, illegal drug prices have generally decreased while drug purity has generally

  17. Drug Enforcement Administration

    Science.gov (United States)

    ... de informacin confidencial --> DEA NEWS The Drug Enforcement Administration and Discovery Education name grand winner of Operation ... JUN 15 (Washington) The United States Drug Enforcement Administration, DEA Educational Foundation and Discovery Education awarded Porter ...

  18. Hybrid Multidimensional Relational and Link Analytical Knowledge Discovery for Law Enforcement

    Energy Technology Data Exchange (ETDEWEB)

    Joslyn, Cliff A.; Gillen, David S.; Burke, John S.; Critchlow, Terence J.; Damante, Matt; Fernandes, Robert

    2008-08-01

    The challenges facing the Department of Homeland Security (DHS) require not only multi-dimensional, but also multi-scale data analysis. In particular, the ability to seamlessly move from summary information, such as trends, into detailed analysis of individual entities, while critical for law enforcement, typically requires manually transferring information among multiple tools. Such time-consuming and error prone processes significantly hamper the analysts' ability to quickly explore data and identify threats. As part of a DHS Science and Technology effort, we have been developing and deploying for Immigration and Customs Enforcement the CubeLink system integrating information between relational data cubes and link analytical semantic graphs. In this paper we describe CubeLink in terms of the underlying components, their integration, and the formal mapping from multidimensional data analysis into link analysis. In so doing, we provide a formal basis for one particular form of automatic schema-ontology mapping from OLAP data cubes to semantic graphs databases, and point the way towards future ``intelligent'' OLAP data cubes equipped with meta-data about their dimensional typing.

  19. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    This document includes the US Nuclear Regulatory Commission`s (NRC`s or Commission`s) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC`s policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees` health and safety, the common defense and security, and the environment.

  20. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    International Nuclear Information System (INIS)

    1998-05-01

    This document includes the US Nuclear Regulatory Commission's (NRC's or Commission's) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC's policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees' health and safety, the common defense and security, and the environment

  1. Malware and Disease: Lessons from Cyber Intelligence for Public Health Surveillance.

    Science.gov (United States)

    Smith, Frank L

    2016-01-01

    Malicious software and infectious diseases are similar is several respects, as are the functional requirements for surveillance and intelligence to defend against these threats. Given these similarities, this article compares and contrasts the actors, relationships, and norms at work in cyber intelligence and disease surveillance. Historical analysis reveals that civilian cyber defense is more decentralized, private, and voluntary than public health in the United States. Most of these differences are due to political choices rather than technical necessities. In particular, political resistance to government institutions has shaped cyber intelligence over the past 30 years, which is a troubling sign for attempts to improve disease surveillance through local, state, and federal health departments. Information sharing about malware is also limited, despite information technology being integral to cyberspace. Such limits suggest that automation through electronic health records will not automatically improve public health surveillance. Still, certain aspects of information sharing and analysis for cyber defense are worth emulating or, at the very least, learning from to help detect and manage health threats.

  2. Financial Reporting Enforcement

    DEFF Research Database (Denmark)

    Olsen, Carsten

    the auditors’ auditing efforts, which are made in conjunction with the impact of the enforcement of auditors and limitations on the auditors’ liability. However, research indicates that strict enforcement is a prerequisite for ensuring compliance with accounting regulations (Hail and Leuz 2006, Daske et al...

  3. FPGA-Based Real-Time Motion Detection for Automated Video Surveillance Systems

    Directory of Open Access Journals (Sweden)

    Sanjay Singh

    2016-03-01

    Full Text Available Design of automated video surveillance systems is one of the exigent missions in computer vision community because of their ability to automatically select frames of interest in incoming video streams based on motion detection. This research paper focuses on the real-time hardware implementation of a motion detection algorithm for such vision based automated surveillance systems. A dedicated VLSI architecture has been proposed and designed for clustering-based motion detection scheme. The working prototype of a complete standalone automated video surveillance system, including input camera interface, designed motion detection VLSI architecture, and output display interface, with real-time relevant motion detection capabilities, has been implemented on Xilinx ML510 (Virtex-5 FX130T FPGA platform. The prototyped system robustly detects the relevant motion in real-time in live PAL (720 × 576 resolution video streams directly coming from the camera.

  4. Automatic Emotional State Detection using Facial Expression Dynamic in Videos

    Directory of Open Access Journals (Sweden)

    Hongying Meng

    2014-11-01

    Full Text Available In this paper, an automatic emotion detection system is built for a computer or machine to detect the emotional state from facial expressions in human computer communication. Firstly, dynamic motion features are extracted from facial expression videos and then advanced machine learning methods for classification and regression are used to predict the emotional states. The system is evaluated on two publicly available datasets, i.e. GEMEP_FERA and AVEC2013, and satisfied performances are achieved in comparison with the baseline results provided. With this emotional state detection capability, a machine can read the facial expression of its user automatically. This technique can be integrated into applications such as smart robots, interactive games and smart surveillance systems.

  5. Organizational safety climate and supervisor safety enforcement: Multilevel explorations of the causes of accident underreporting.

    Science.gov (United States)

    Probst, Tahira M

    2015-11-01

    According to national surveillance statistics, over 3 million employees are injured each year; yet, research indicates that these may be substantial underestimates of the true prevalence. The purpose of the current project was to empirically test the hypothesis that organizational safety climate and transactional supervisor safety leadership would predict the extent to which accidents go unreported by employees. Using hierarchical linear modeling and survey data collected from 1,238 employees in 33 organizations, employee-level supervisor safety enforcement behaviors (and to a less consistent extent, organizational-level safety climate) predicted employee accident underreporting. There was also a significant cross-level interaction, such that the effect of supervisor enforcement on underreporting was attenuated in organizations with a positive safety climate. These results may benefit human resources and safety professionals by pinpointing methods of increasing the accuracy of accident reporting, reducing actual safety incidents, and reducing the costs to individuals and organizations that result from underreporting. (c) 2015 APA, all rights reserved).

  6. Security surveillance challenges and proven thermal imaging capabilities in real-world applications

    Science.gov (United States)

    Francisco, Glen L.; Roberts, Sharon

    2004-09-01

    Uncooled thermal imaging was first introduced to the public in early 1980's by Raytheon (legacy Texas Instruments Defense Segment Electronics Group) as a solution for military applications. Since the introduction of this technology, Raytheon has remained the leader in this market as well as introduced commercial versions of thermal imaging products specifically designed for security, law enforcement, fire fighting, automotive and industrial uses. Today, low cost thermal imaging for commercial use in security applications is a reality. Organizations of all types have begun to understand the advantages of using thermal imaging as a means to solve common surveillance problems where other popular technologies fall short. Thermal imaging has proven to be a successful solution for common security needs such as: ¸ vision at night where lighting is undesired and 24x7 surveillance is needed ¸ surveillance over waterways, lakes and ports where water and lighting options are impractical ¸ surveillance through challenging weather conditions where other technologies will be challenged by atmospheric particulates ¸ low maintenance requirements due to remote or difficult locations ¸ low cost over life of product Thermal imaging is now a common addition to the integrated security package. Companies are relying on thermal imaging for specific applications where no other technology can perform.

  7. Voting over law enforcement: Mission impossible

    OpenAIRE

    İnal , Hakan

    2015-01-01

    Median voter theorem has been used in many economic environments including law enforcement. Assumptions of the median voter theorem, however, are generally violated in lawenforcement models. Moreover, it is impossible to have agents with "opposite equilibrium preferences" over enforcement levels in law enforcement models. These limitations on the use of preferences over law enforcement raises questions about the robustness and validity of law enforcement models.

  8. 29 CFR 42.6 - Enforcement strategy.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Enforcement strategy. 42.6 Section 42.6 Labor Office of the Secretary of Labor COORDINATED ENFORCEMENT § 42.6 Enforcement strategy. (a) Each Regional Farm Labor... enforcement strategy for each protective statute pursuant to § 42.20(c)(3). The National Committee shall...

  9. Automatic road traffic safety management system in urban areas

    Directory of Open Access Journals (Sweden)

    Oskarbski Jacek

    2017-01-01

    Full Text Available Traffic incidents and accidents contribute to decreasing levels of transport system reliability and safety. Traffic management and emergency systems on the road, using, among others, automatic detection, video surveillance, communication technologies and institutional solutions improve the organization of the work of various departments involved in traffic and safety management. Automation of incident management helps to reduce the time of a rescue operation as well as of the normalization of the flow of traffic after completion of a rescue operation, which also affects the reduction of the risk of secondary accidents and contributes to reducing their severity. The paper presents the possibility of including city traffic departments in the process of incident management. The results of research on the automatic incident detection in cities are also presented.

  10. 20 CFR 10.740 - In what situations will OWCP automatically presume that a law enforcement officer is covered by...

    Science.gov (United States)

    2010-04-01

    ... authority to assist a Federal law enforcement authority in the protection of the President of the United... will be extended. (b) Coverage for officers of the U.S. Park Police and those officers of the Uniformed...

  11. A novel framework for intelligent surveillance system based on abnormal human activity detection in academic environments.

    Science.gov (United States)

    Al-Nawashi, Malek; Al-Hazaimeh, Obaida M; Saraee, Mohamad

    2017-01-01

    Abnormal activity detection plays a crucial role in surveillance applications, and a surveillance system that can perform robustly in an academic environment has become an urgent need. In this paper, we propose a novel framework for an automatic real-time video-based surveillance system which can simultaneously perform the tracking, semantic scene learning, and abnormality detection in an academic environment. To develop our system, we have divided the work into three phases: preprocessing phase, abnormal human activity detection phase, and content-based image retrieval phase. For motion object detection, we used the temporal-differencing algorithm and then located the motions region using the Gaussian function. Furthermore, the shape model based on OMEGA equation was used as a filter for the detected objects (i.e., human and non-human). For object activities analysis, we evaluated and analyzed the human activities of the detected objects. We classified the human activities into two groups: normal activities and abnormal activities based on the support vector machine. The machine then provides an automatic warning in case of abnormal human activities. It also embeds a method to retrieve the detected object from the database for object recognition and identification using content-based image retrieval. Finally, a software-based simulation using MATLAB was performed and the results of the conducted experiments showed an excellent surveillance system that can simultaneously perform the tracking, semantic scene learning, and abnormality detection in an academic environment with no human intervention.

  12. 12 CFR 411.410 - Enforcement.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Enforcement. 411.410 Section 411.410 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Penalties and Enforcement § 411.410 Enforcement. The head of each agency shall take such actions as are necessary to ensure that...

  13. 25 CFR 12.33 - Are Indian country law enforcement officers paid less than other law enforcement officers?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Are Indian country law enforcement officers paid less than other law enforcement officers? 12.33 Section 12.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER INDIAN COUNTRY LAW ENFORCEMENT Qualifications and Training Requirements § 12.33 Are Indian country law enforcement...

  14. Quota enforcement in resource industries

    DEFF Research Database (Denmark)

    Hansen, Lars Gårn; Jensen, Frank; Nøstbakken, Linda

    cant non-compliance and exogenous constraints on nes and enforcement budget. We propose a new enforcement system based on self-reporting of excess extraction and explicit di erentiation of inspection rates based on compliance history. In particular, we use state-dependent enforcement to induce rms...... to self-report excess extraction. We show that such system increases the e ectiveness of quota management by allowing the regulator to implement a wider range of aggregate extraction targets than under traditional enforcement, while ensuring an ecient allocation of aggregate extraction. In addition......Quotas or permits are frequently used in the management of renewable resources and emissions. However, in many industries there is concern about the basic e ectiveness of quotas due to non-compliance. We develop an enforcement model of a quota-regulated resource and focus on a situation with signi...

  15. System for automatic detection of lung nodules exhibiting growth

    Science.gov (United States)

    Novak, Carol L.; Shen, Hong; Odry, Benjamin L.; Ko, Jane P.; Naidich, David P.

    2004-05-01

    Lung nodules that exhibit growth over time are considered highly suspicious for malignancy. We present a completely automated system for detection of growing lung nodules, using initial and follow-up multi-slice CT studies. The system begins with automatic detection of lung nodules in the later CT study, generating a preliminary list of candidate nodules. Next an automatic system for registering locations in two studies matches each candidate in the later study to its corresponding position in the earlier study. Then a method for automatic segmentation of lung nodules is applied to each candidate and its matching location, and the computed volumes are compared. The output of the system is a list of nodule candidates that are new or have exhibited volumetric growth since the previous scan. In a preliminary test of 10 patients examined by two radiologists, the automatic system identified 18 candidates as growing nodules. 7 (39%) of these corresponded to validated nodules or other focal abnormalities that exhibited growth. 4 of the 7 true detections had not been identified by either of the radiologists during their initial examinations of the studies. This technique represents a powerful method of surveillance that may reduce the probability of missing subtle or early malignant disease.

  16. Compliance and Enforcement Actions (CEA) -

    Data.gov (United States)

    Department of Transportation — Compliance and Enforcement Actions application provides process assistance / improvements for conducting investigation and enforcement activities. The Compliance and...

  17. Mining free-text medical records for companion animal enteric syndrome surveillance.

    Science.gov (United States)

    Anholt, R M; Berezowski, J; Jamal, I; Ribble, C; Stephen, C

    2014-03-01

    Large amounts of animal health care data are present in veterinary electronic medical records (EMR) and they present an opportunity for companion animal disease surveillance. Veterinary patient records are largely in free-text without clinical coding or fixed vocabulary. Text-mining, a computer and information technology application, is needed to identify cases of interest and to add structure to the otherwise unstructured data. In this study EMR's were extracted from veterinary management programs of 12 participating veterinary practices and stored in a data warehouse. Using commercially available text-mining software (WordStat™), we developed a categorization dictionary that could be used to automatically classify and extract enteric syndrome cases from the warehoused electronic medical records. The diagnostic accuracy of the text-miner for retrieving cases of enteric syndrome was measured against human reviewers who independently categorized a random sample of 2500 cases as enteric syndrome positive or negative. Compared to the reviewers, the text-miner retrieved cases with enteric signs with a sensitivity of 87.6% (95%CI, 80.4-92.9%) and a specificity of 99.3% (95%CI, 98.9-99.6%). Automatic and accurate detection of enteric syndrome cases provides an opportunity for community surveillance of enteric pathogens in companion animals. Copyright © 2014 Elsevier B.V. All rights reserved.

  18. Oversight and enforcement at DOE

    International Nuclear Information System (INIS)

    Fergus, I.E., Christopher, R.K.

    1996-01-01

    This paper addresses recent changes to the independent oversight and enforcement programs within the U.S. Department of Energy (DOE) and applications to criticality safety. DOE's Office of Oversight (Oversight hereafter), in the Office of Environment, Safety, and Health (EH), independently evaluates whether management systems ensure adequate protection of the worker, public, and environment. Oversight has adopted a new approach to performing evaluations based on the guiding principles for safety management identified by the Secretary of Energy. The principles Oversight evaluates are line management responsibility for safety and health, comprehensive requirements, and competence commensurate with responsibilities. Recently, the DOE codified the implementation of integrated safety management, further expounding on these basic guiding principles and Oversight's role. The Office of Enforcement and Investigations in EH (Enforcement hereafter) is responsible for enforcement, and relevant documents describe its role. This paper briefly discusses criticality safety aspects of the twin initiatives of Oversight and Enforcement

  19. Assessment of the NRC Enforcement Program

    International Nuclear Information System (INIS)

    Lieberman, J.; Coblentz, L.

    1995-04-01

    On May 12, 1994, the Executive Director for Operations (EDO) established a Review Team composed of senior NRC managers to re-examine the NRC enforcement program. A copy of the Review Team's charter is enclosed as Appendix A. This report presents the Team's assessment. The purpose of this review effort are: (1) to perform an assessment of the NRC's enforcement program to determine whether the defined purposes of the enforcement program are appropriate; (2) to determine whether the NRC's enforcement practices and procedures for issuing enforcement actions are consistent with those purposes; and (3) to provide recommendations on any changes the Review Team believes advisable. In accordance with its charter, the Review Team considered the following principal issues in conducting its assessment of the enforcement program: the balance between providing deterrence and incentives (both positive and negative) for the identification and correction of violations; the appropriateness of NRC sanctions; whether the commission should seek statutory authority to increase the amount of civil penalties; whether the NRC should use different enforcement policies and practices for different licensees (e.g., materials licensees in contrast to power reactors or large fuel facilities); and whether the commission should establish open enforcement conferences as the normal practice

  20. Evaluation of ADS-B Surveillance Data to Identify Flight Operations with Reduced Safety Margin in the National Airspace System, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — As part of the FAA's plans for modernization of the Air Traffic Control (ATC) system, Automatic Dependent Surveillance - Broadcast (ADS-B) will be the basis of the...

  1. Performance of data acceptance criteria over 50 months from an automatic real-time environmental radiation surveillance network

    International Nuclear Information System (INIS)

    Casanovas, R.; Morant, J.J.; Lopez, M.; Hernandez-Giron, I.; Batalla, E.; Salvado, M.

    2011-01-01

    The automatic real-time environmental radiation surveillance network of Catalonia (Spain) comprises two subnetworks; one with 9 aerosol monitors and the other with 8 Geiger monitors together with 2 water monitors located in the Ebre river. Since September 2006, several improvements were implemented in order to get better quality and quantity of data, allowing a more accurate data analysis. However, several causes (natural causes, equipment failure, artificial external causes and incidents in nuclear power plants) may produce radiological measured values mismatched with the own station background, whether spurious without significance or true radiological values. Thus, data analysis for a 50-month period was made and allowed to establish an easily implementable statistical criterion to find those values that require special attention. This criterion proved a very useful tool for creating a properly debugged database and to give a quick response to equipment failures or possible radiological incidents. This paper presents the results obtained from the criterion application, including the figures for the expected, raw and debugged data, percentages of missing data grouped by causes and radiological measurements from the networks. Finally, based on the discussed information, recommendations for the improvement of the network are identified to obtain better radiological information and analysis capabilities. - Highlights: → Causes producing data mismatching with the own stations background are described. → Causes may be natural, equipment failure, external or nuclear plants incidents. → These causes can produce either spurious or true radiological data. → A criterion to find these data was implemented and tested for a 50-month period. → Recommendations for the improvement of the network are identified.

  2. 76 FR 76192 - NRC Enforcement Policy

    Science.gov (United States)

    2011-12-06

    ... NUCLEAR REGULATORY COMMISSION [NRC-2011-0273] NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Proposed enforcement policy revision; request for comment. SUMMARY: The U.S. Nuclear... licensees, vendors, and contractors), on proposed revisions to the NRC's Enforcement Policy (the Policy) and...

  3. OzBot and haptics: remote surveillance to physical presence

    Science.gov (United States)

    Mullins, James; Fielding, Mick; Nahavandi, Saeid

    2009-05-01

    This paper reports on robotic and haptic technologies and capabilities developed for the law enforcement and defence community within Australia by the Centre for Intelligent Systems Research (CISR). The OzBot series of small and medium surveillance robots have been designed in Australia and evaluated by law enforcement and defence personnel to determine suitability and ruggedness in a variety of environments. Using custom developed digital electronics and featuring expandable data busses including RS485, I2C, RS232, video and Ethernet, the robots can be directly connected to many off the shelf payloads such as gas sensors, x-ray sources and camera systems including thermal and night vision. Differentiating the OzBot platform from its peers is its ability to be integrated directly with haptic technology or the 'haptic bubble' developed by CISR. Haptic interfaces allow an operator to physically 'feel' remote environments through position-force control and experience realistic force feedback. By adding the capability to remotely grasp an object, feel its weight, texture and other physical properties in real-time from the remote ground control unit, an operator's situational awareness is greatly improved through Haptic augmentation in an environment where remote-system feedback is often limited.

  4. 78 FR 69133 - Drug Enforcement Administration

    Science.gov (United States)

    2013-11-18

    ... DEPARTMENT OF JUSTICE Drug Enforcement Administration Manufacturer of Controlled Substances..., California 94085, made application by renewal to the Drug Enforcement Administration (DEA) to be registered... Diversion Control, Drug Enforcement Administration. [FR Doc. 2013-27486 Filed 11-15-13; 8:45 am] BILLING...

  5. Face recognition for criminal identification: An implementation of principal component analysis for face recognition

    Science.gov (United States)

    Abdullah, Nurul Azma; Saidi, Md. Jamri; Rahman, Nurul Hidayah Ab; Wen, Chuah Chai; Hamid, Isredza Rahmi A.

    2017-10-01

    In practice, identification of criminal in Malaysia is done through thumbprint identification. However, this type of identification is constrained as most of criminal nowadays getting cleverer not to leave their thumbprint on the scene. With the advent of security technology, cameras especially CCTV have been installed in many public and private areas to provide surveillance activities. The footage of the CCTV can be used to identify suspects on scene. However, because of limited software developed to automatically detect the similarity between photo in the footage and recorded photo of criminals, the law enforce thumbprint identification. In this paper, an automated facial recognition system for criminal database was proposed using known Principal Component Analysis approach. This system will be able to detect face and recognize face automatically. This will help the law enforcements to detect or recognize suspect of the case if no thumbprint present on the scene. The results show that about 80% of input photo can be matched with the template data.

  6. A Master-Slave Surveillance System to Acquire Panoramic and Multiscale Videos

    Directory of Open Access Journals (Sweden)

    Yu Liu

    2014-01-01

    Full Text Available This paper describes a master-slave visual surveillance system that uses stationary-dynamic camera assemblies to achieve wide field of view and selective focus of interest. In this system, the fish-eye panoramic camera is capable of monitoring a large area, and the PTZ dome camera has high mobility and zoom ability. In order to achieve the precise interaction, preprocessing spatial calibration between these two cameras is required. This paper introduces a novel calibration approach to automatically calculate a transformation matrix model between two coordinate systems by matching feature points. In addition, a distortion correction method based on Midpoint Circle Algorithm is proposed to handle obvious horizontal distortion in the captured panoramic image. Experimental results using realistic scenes have demonstrated the efficiency and applicability of the system with real-time surveillance.

  7. AUTOMATIC FAST VIDEO OBJECT DETECTION AND TRACKING ON VIDEO SURVEILLANCE SYSTEM

    Directory of Open Access Journals (Sweden)

    V. Arunachalam

    2012-08-01

    Full Text Available This paper describes the advance techniques for object detection and tracking in video. Most visual surveillance systems start with motion detection. Motion detection methods attempt to locate connected regions of pixels that represent the moving objects within the scene; different approaches include frame-to-frame difference, background subtraction and motion analysis. The motion detection can be achieved by Principle Component Analysis (PCA and then separate an objects from background using background subtraction. The detected object can be segmented. Segmentation consists of two schemes: one for spatial segmentation and the other for temporal segmentation. Tracking approach can be done in each frame of detected Object. Pixel label problem can be alleviated by the MAP (Maximum a Posteriori technique.

  8. Automatic evidence retrieval for systematic reviews.

    Science.gov (United States)

    Choong, Miew Keen; Galgani, Filippo; Dunn, Adam G; Tsafnat, Guy

    2014-10-01

    Snowballing involves recursively pursuing relevant references cited in the retrieved literature and adding them to the search results. Snowballing is an alternative approach to discover additional evidence that was not retrieved through conventional search. Snowballing's effectiveness makes it best practice in systematic reviews despite being time-consuming and tedious. Our goal was to evaluate an automatic method for citation snowballing's capacity to identify and retrieve the full text and/or abstracts of cited articles. Using 20 review articles that contained 949 citations to journal or conference articles, we manually searched Microsoft Academic Search (MAS) and identified 78.0% (740/949) of the cited articles that were present in the database. We compared the performance of the automatic citation snowballing method against the results of this manual search, measuring precision, recall, and F1 score. The automatic method was able to correctly identify 633 (as proportion of included citations: recall=66.7%, F1 score=79.3%; as proportion of citations in MAS: recall=85.5%, F1 score=91.2%) of citations with high precision (97.7%), and retrieved the full text or abstract for 490 (recall=82.9%, precision=92.1%, F1 score=87.3%) of the 633 correctly retrieved citations. The proposed method for automatic citation snowballing is accurate and is capable of obtaining the full texts or abstracts for a substantial proportion of the scholarly citations in review articles. By automating the process of citation snowballing, it may be possible to reduce the time and effort of common evidence surveillance tasks such as keeping trial registries up to date and conducting systematic reviews.

  9. Automatic exchange of information: towards a new global standard of tax transparency

    Directory of Open Access Journals (Sweden)

    Miguel Eduardo Pecho Trigueros

    2014-07-01

    Full Text Available Tax authorities are increasingly relying on mutual cooperation with their foreign peers to enforce more effectively their internal tax laws. After the banking scandals of 2008 and the subsequent global financial crisis, the Global Forum on Transparency and Exchange of Information for TaxPurposes has proposed the exchange of information upon request as the fiscal transparency standard. However, some measures adopted by the European Union, previous initiatives from the Organization for Economic Cooperation and Development (OECD and, above all, the introduction of the Foreign Account Tax Compliance Act (Fatca by the United States in 2010 have promoted the need to adopt the automatic exchange of information as the new fiscal transparency standard. Automatic exchange of information allows home countries to verify whether their taxpayers have correctly included foreign income, allowing tax authorities to have early warning of possible noncompliance cases. In February 2014, the OECD published its proposal for a new global model of automatic exchange of financial account information. The new global model contains the necessary legal instruments and due diligence and reporting procedures, mainly for financial institutions.

  10. 33 CFR 88.11 - Law enforcement vessels.

    Science.gov (United States)

    2010-07-01

    ... NAVIGATION RULES ANNEX V: PILOT RULES § 88.11 Law enforcement vessels. (a) Law enforcement vessels may display a flashing blue light when engaged in direct law enforcement or public safety activities. This... lights. (b) The blue light described in this section may be displayed by law enforcement vessels of the...

  11. Advanced digital video surveillance for safeguard and physical protection

    International Nuclear Information System (INIS)

    Kumar, R.

    2002-01-01

    Full text: Video surveillance is a very crucial component in safeguard and physical protection. Digital technology has revolutionized the surveillance scenario and brought in various new capabilities like better image quality, faster search and retrieval of video images, less storage space for recording, efficient transmission and storage of video, better protection of recorded video images, and easy remote accesses to live and recorded video etc. The basic safeguard requirement for verifiably uninterrupted surveillance has remained largely unchanged since its inception. However, changes to the inspection paradigm to admit automated review and remote monitoring have dramatically increased the demands on safeguard surveillance system. Today's safeguard systems can incorporate intelligent motion detection with very low rate of false alarm and less archiving volume, embedded image processing capability for object behavior and event based indexing, object recognition, efficient querying and report generation etc. It also demands cryptographically authenticating, encrypted, and highly compressed video data for efficient, secure, tamper indicating and transmission. In physical protection, intelligent on robust video motion detection, real time moving object detection and tracking from stationary and moving camera platform, multi-camera cooperative tracking, activity detection and recognition, human motion analysis etc. is going to play a key rote in perimeter security. Incorporation of front and video imagery exploitation tools like automatic number plate recognition, vehicle identification and classification, vehicle undercarriage inspection, face recognition, iris recognition and other biometric tools, gesture recognition etc. makes personnel and vehicle access control robust and foolproof. Innovative digital image enhancement techniques coupled with novel sensor design makes low cost, omni-directional vision capable, all weather, day night surveillance a reality

  12. 45 CFR 150.203 - Circumstances requiring CMS enforcement.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Circumstances requiring CMS enforcement. 150.203... CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS CMS Enforcement Processes for... requiring CMS enforcement. CMS enforces HIPAA requirements to the extent warranted (as determined by CMS) in...

  13. 20 CFR 655.50 - Enforcement process.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Enforcement process. 655.50 Section 655.50... FOREIGN WORKERS IN THE UNITED STATES Labor Certification Process and Enforcement of Attestations for... Workers) § 655.50 Enforcement process. (a) Authority of the WHD Administrator. The WHD Administrator shall...

  14. Video auto stitching in multicamera surveillance system

    Science.gov (United States)

    He, Bin; Zhao, Gang; Liu, Qifang; Li, Yangyang

    2012-01-01

    This paper concerns the problem of video stitching automatically in a multi-camera surveillance system. Previous approaches have used multiple calibrated cameras for video mosaic in large scale monitoring application. In this work, we formulate video stitching as a multi-image registration and blending problem, and not all cameras are needed to be calibrated except a few selected master cameras. SURF is used to find matched pairs of image key points from different cameras, and then camera pose is estimated and refined. Homography matrix is employed to calculate overlapping pixels and finally implement boundary resample algorithm to blend images. The result of simulation demonstrates the efficiency of our method.

  15. 50 CFR 600.740 - Enforcement policy.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Enforcement policy. 600.740 Section 600... § 600.740 Enforcement policy. (a) The Magnuson-Stevens Act provides four basic enforcement remedies for... and its catch. (4) Criminal prosecution of the owner or operator for some offenses. It shall be the...

  16. Videosorveglianza come supporto interattivo / La vidéosurveillance comme support intéractif / Video surveillance as an interactive support

    Directory of Open Access Journals (Sweden)

    Dischi Franco

    2010-03-01

    Full Text Available Video surveillance is not and cannot be considered a system of image acquistions “end in itself”.The acquired audio-visual “product”, in addition to surveillance and security, provides a useful source of information in case of storage and automatic analysis of data in urban planning to optimise land resources and means of support, for example environmental monitoring to protect habitat, land and ecosystem.These are behavioural precognitive models of video analysis, for a perceptive context of the situation of danger.

  17. Quota enforcement in resource industries

    DEFF Research Database (Denmark)

    Hansen, Lars Gårn; Jensen, Frank; Nøstbakken, Linda

    2014-01-01

    -compliance and exogenous constraints on fines and enforcement budget. We propose a new enforcement system based on self-reporting of excess extraction and explicit differentiation of inspection rates depending on compliance history. We use differentiated inspections to induce firms to self-report excess extraction....... This system increases the effectiveness of the quota by allowing the regulator to implement a wider range of aggregate extraction targets than under traditional enforcement, while ensuring an efficient allocation of extraction. In addition, inspection costs can be reduced without reductions in welfare.......Quotas are frequently used in the management of renewable resources and emissions. However, in many industries there is concern about their basic effectiveness due to non-compliance. We develop an enforcement model of a quota-regulated resource and focus on a situation with significant non...

  18. HSIP Law Enforcement Locations in New Mexico

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — Law Enforcement Locations Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law Enforcement agencies "are publicly...

  19. Extracting foreground ensemble features to detect abnormal crowd behavior in intelligent video-surveillance systems

    Science.gov (United States)

    Chan, Yi-Tung; Wang, Shuenn-Jyi; Tsai, Chung-Hsien

    2017-09-01

    Public safety is a matter of national security and people's livelihoods. In recent years, intelligent video-surveillance systems have become important active-protection systems. A surveillance system that provides early detection and threat assessment could protect people from crowd-related disasters and ensure public safety. Image processing is commonly used to extract features, e.g., people, from a surveillance video. However, little research has been conducted on the relationship between foreground detection and feature extraction. Most current video-surveillance research has been developed for restricted environments, in which the extracted features are limited by having information from a single foreground; they do not effectively represent the diversity of crowd behavior. This paper presents a general framework based on extracting ensemble features from the foreground of a surveillance video to analyze a crowd. The proposed method can flexibly integrate different foreground-detection technologies to adapt to various monitored environments. Furthermore, the extractable representative features depend on the heterogeneous foreground data. Finally, a classification algorithm is applied to these features to automatically model crowd behavior and distinguish an abnormal event from normal patterns. The experimental results demonstrate that the proposed method's performance is both comparable to that of state-of-the-art methods and satisfies the requirements of real-time applications.

  20. Motion Pattern Extraction and Event Detection for Automatic Visual Surveillance

    Directory of Open Access Journals (Sweden)

    Benabbas Yassine

    2011-01-01

    Full Text Available Efficient analysis of human behavior in video surveillance scenes is a very challenging problem. Most traditional approaches fail when applied in real conditions and contexts like amounts of persons, appearance ambiguity, and occlusion. In this work, we propose to deal with this problem by modeling the global motion information obtained from optical flow vectors. The obtained direction and magnitude models learn the dominant motion orientations and magnitudes at each spatial location of the scene and are used to detect the major motion patterns. The applied region-based segmentation algorithm groups local blocks that share the same motion direction and speed and allows a subregion of the scene to appear in different patterns. The second part of the approach consists in the detection of events related to groups of people which are merge, split, walk, run, local dispersion, and evacuation by analyzing the instantaneous optical flow vectors and comparing the learned models. The approach is validated and experimented on standard datasets of the computer vision community. The qualitative and quantitative results are discussed.

  1. Surveillance

    DEFF Research Database (Denmark)

    Albrechtslund, Anders; Coeckelbergh, Mark; Matzner, Tobias

    Studying surveillance involves raising questions about the very nature of concepts such as information, technology, identity, space and power. Besides the maybe all too obvious ethical issues often discussed with regard to surveillance, there are several other angles and approaches that we should...... like to encourage. Therefore, our panel will focus on the philosophical, yet non-ethical issues of surveillance in order to stimulate an intense debate with the audience on the ethical implications of our enquiries. We also hope to provide a broader and deeper understanding of surveillance....

  2. Public healthcare interests require strict competition enforcement.

    Science.gov (United States)

    Loozen, Edith M H

    2015-07-01

    Several countries have introduced competition in their health systems in order to maintain the supply of high quality health care in a cost-effective manner. The introduction of competition triggers competition enforcement. Since healthcare is characterized by specific market failures, many favor healthcare-specific competition enforcement in order not only to account for the competition interest, but also for the healthcare interests. The question is whether healthcare systems based on competition can succeed when competition enforcement deviates from standard practice. This paper analyzes whether healthcare-specific competition enforcement is theoretically sound and practically effective. This is exemplified by the Dutch system that is based on regulated competition and thus crucially depends on getting competition enforcement right. Governments are responsible for correcting market failures. Markets are responsible for maximizing the public healthcare interests. By securing sufficient competitive pressure, competition enforcement makes sure they do. When interpreted according to welfare-economics, competition law takes into account both costs and benefits specific market behavior may have for healthcare. Competition agencies and judiciary are not legitimized to deviate from standard evidentiary requirements. Dutch case law shows that healthcare-specific enforcement favors the healthcare undertakings concerned, but to the detriment of public health care. Healthcare-specific competition enforcement is conceptually flawed and counterproductive. In order for healthcare systems based on competition to succeed, competition enforcement should be strict. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  3. Smart sensing surveillance system

    Science.gov (United States)

    Hsu, Charles; Chu, Kai-Dee; O'Looney, James; Blake, Michael; Rutar, Colleen

    2010-04-01

    Unattended ground sensor (UGS) networks have been widely used in remote battlefield and other tactical applications over the last few decades due to the advances of the digital signal processing. The UGS network can be applied in a variety of areas including border surveillance, special force operations, perimeter and building protection, target acquisition, situational awareness, and force protection. In this paper, a highly-distributed, fault-tolerant, and energyefficient Smart Sensing Surveillance System (S4) is presented to efficiently provide 24/7 and all weather security operation in a situation management environment. The S4 is composed of a number of distributed nodes to collect, process, and disseminate heterogeneous sensor data. Nearly all S4 nodes have passive sensors to provide rapid omnidirectional detection. In addition, Pan- Tilt- Zoom- (PTZ) Electro-Optics EO/IR cameras are integrated to selected nodes to track the objects and capture associated imagery. These S4 camera-connected nodes will provide applicable advanced on-board digital image processing capabilities to detect and track the specific objects. The imaging detection operations include unattended object detection, human feature and behavior detection, and configurable alert triggers, etc. In the S4, all the nodes are connected with a robust, reconfigurable, LPI/LPD (Low Probability of Intercept/ Low Probability of Detect) wireless mesh network using Ultra-wide band (UWB) RF technology, which can provide an ad-hoc, secure mesh network and capability to relay network information, communicate and pass situational awareness and messages. The S4 utilizes a Service Oriented Architecture such that remote applications can interact with the S4 network and use the specific presentation methods. The S4 capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded

  4. 75 FR 60485 - NRC Enforcement Policy Revision

    Science.gov (United States)

    2010-09-30

    ... NUCLEAR REGULATORY COMMISSION [NRC-2008-0497] NRC Enforcement Policy Revision AGENCY: Nuclear Regulatory Commission. ACTION: Policy statement. SUMMARY: The Nuclear Regulatory Commission (NRC or Commission) is publishing a major revision to its Enforcement Policy (Enforcement Policy or Policy) to...

  5. Automated intelligent video surveillance system for ships

    Science.gov (United States)

    Wei, Hai; Nguyen, Hieu; Ramu, Prakash; Raju, Chaitanya; Liu, Xiaoqing; Yadegar, Jacob

    2009-05-01

    To protect naval and commercial ships from attack by terrorists and pirates, it is important to have automatic surveillance systems able to detect, identify, track and alert the crew on small watercrafts that might pursue malicious intentions, while ruling out non-threat entities. Radar systems have limitations on the minimum detectable range and lack high-level classification power. In this paper, we present an innovative Automated Intelligent Video Surveillance System for Ships (AIVS3) as a vision-based solution for ship security. Capitalizing on advanced computer vision algorithms and practical machine learning methodologies, the developed AIVS3 is not only capable of efficiently and robustly detecting, classifying, and tracking various maritime targets, but also able to fuse heterogeneous target information to interpret scene activities, associate targets with levels of threat, and issue the corresponding alerts/recommendations to the man-in- the-loop (MITL). AIVS3 has been tested in various maritime scenarios and shown accurate and effective threat detection performance. By reducing the reliance on human eyes to monitor cluttered scenes, AIVS3 will save the manpower while increasing the accuracy in detection and identification of asymmetric attacks for ship protection.

  6. Video surveillance using distance maps

    Science.gov (United States)

    Schouten, Theo E.; Kuppens, Harco C.; van den Broek, Egon L.

    2006-02-01

    Human vigilance is limited; hence, automatic motion and distance detection is one of the central issues in video surveillance. Hereby, many aspects are of importance, this paper specially addresses: efficiency, achieving real-time performance, accuracy, and robustness against various noise factors. To obtain fully controlled test environments, an artificial development center for robot navigation is introduced in which several parameters can be set (e.g., number of objects, trajectories and type and amount of noise). In the videos, for each following frame, movement of stationary objects is detected and pixels of moving objects are located from which moving objects are identified in a robust way. An Exact Euclidean Distance Map (E2DM) is utilized to determine accurately the distances between moving and stationary objects. Together with the determined distances between moving objects and the detected movement of stationary objects, this provides the input for detecting unwanted situations in the scene. Further, each intelligent object (e.g., a robot), is provided with its E2DM, allowing the object to plan its course of action. Timing results are specified for each program block of the processing chain for 20 different setups. So, the current paper presents extensive, experimentally controlled research on real-time, accurate, and robust motion detection for video surveillance, using E2DMs, which makes it a unique approach.

  7. [Assessment of psychological conditions for the use of firearms in law enforcement].

    Science.gov (United States)

    Vilardell Molas, Jordi; Martí Agustí, Gabriel; Solé i Sanosa, M Angels

    2014-03-01

    To handle firearms safely, an individual needs to be in sound psychological conditions. This point is especially relevant in law enforcement, given that this group is likely to experience situations where there is a reasonably severe risk to life, physical integrity and that of third parties. These conditions cause high levels of stress and become a significant source of psychological strain. The assessment of these psychological conditions in law enforcement must stay ahead of this strain and should act preventively, establishing surveillance that is the product of a consensus between the needs of professionals and organizations. This evaluation should be conducted by technical specialists who understand and know the occupational reality of these professionals. A good assessment methodology starts with the need to discover the basic areas that need exploring, the ideal procedure for assessing these issues and the criteria that determine the aptitude (or lack thereof) for handling firearms. Once these goals have been established, we can be assured that the assessment will follow a set of principles that will give it homogeneity, effectiveness and efficiency. This type of assessment will help accomplish the mission that these security professionals are entrusted to by law, which is to protect the free exercise of rights and freedoms and ensure citizen safety. Copyright © 2014 Elsevier España, S.L. All rights reserved.

  8. 17 CFR 39.6 - Enforceability.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Enforceability. 39.6 Section 39.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES CLEARING ORGANIZATIONS § 39.6 Enforceability. An agreement, contract or transaction submitted to a derivatives clearing...

  9. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1990-05-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1990) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. Also included are a number of enforcement actions that had been previously resolved but not published in this NUREG. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  10. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1989-06-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. Also included are a number of enforcement actions that had been previously resolved but not published in this NUREG. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  11. 7 CFR 501.14 - Non-Federal law enforcement.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Non-Federal law enforcement. 501.14 Section 501.14...-Federal law enforcement. Research Center special policemen may be deputized by State or local law... State or local law enforcement agency, the facilities or services of such State or local law enforcement...

  12. Notification: Audit of EPA's Office of Criminal Enforcement, Forensics and Training's Law Enforcement Availability Pay Reporting

    Science.gov (United States)

    Project #OA-FY18-0075, November 30, 2017. The EPA OIG plans to begin preliminary research on the EPA Office of Criminal Enforcement, Forensics and Training's (OCEFT's) law enforcement availability pay (LEAP) reporting.

  13. 12 CFR 564.7 - Enforcement.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Enforcement. 564.7 Section 564.7 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY APPRAISALS § 564.7 Enforcement. Institutions and institution-affiliated parties, including staff appraisers and fee appraisers, who violate...

  14. 29 CFR 502.15 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Enforcement. 502.15 Section 502.15 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR REGULATIONS ENFORCEMENT OF CONTRACTUAL OBLIGATIONS FOR TEMPORARY ALIEN AGRICULTURAL WORKERS ADMITTED UNDER SECTION 218 OF THE IMMIGRATION...

  15. 29 CFR 501.15 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Enforcement. 501.15 Section 501.15 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR REGULATIONS ENFORCEMENT OF CONTRACTUAL OBLIGATIONS FOR TEMPORARY ALIEN AGRICULTURAL WORKERS ADMITTED UNDER SECTION 218 OF THE IMMIGRATION...

  16. Strengthened enforcement enhances marine sanctuary performance

    Directory of Open Access Journals (Sweden)

    Brendan P. Kelaher

    2015-01-01

    Full Text Available Marine sanctuaries are areas where the extraction of biota is not permitted. Although most marine sanctuaries have a positive influence on biotic communities, not all sanctuaries are meeting their conservation objectives. Amidst possible explanations (e.g., size, age and isolation, insufficient enforcement is often speculated to be a key driver of marine sanctuary underperformance. Despite this, there are few studies directly linking quantitative enforcement data to changes in biotic communities within marine sanctuaries. Here, we used an asymmetrical-BACI experimental design from 2006–2012 to test whether new enforcement initiatives enhanced abundances of target fishes and threatened species in an existing large sub-tropical marine sanctuary relative to areas open to fishing. Implementation of the new enforcement initiatives in 2010 was associated with a 201% increase in annual fine rate and a significant increase in target fish and elasmobranch abundance, as well as sightings of a critically-endangered shark, in the marine sanctuary relative to areas open to fishing. Overall, these results demonstrate that strengthening enforcement can have a rapid positive influence on target fish and perhaps threatened species in a subtropical marine sanctuary. From this, we contend that increased enforcement guided by risk-based compliance planning and operations may be a useful first step for improving underperforming marine sanctuaries.

  17. Fireworks-related injury surveillance in the Philippines: trends in 2010–2014

    Directory of Open Access Journals (Sweden)

    John Bobbie Roca

    2015-11-01

    Full Text Available Analysis of the annual fireworks-related injury surveillance data collected by the Philippines Department of Health (DOH in 2010–2014 was conducted to describe the profile of such injuries in the Philippines. Surveillance data were collected from DOH’s Online National Electronic Injury Surveillance System and analysed. A case was defined as any person who had sustained injury from fireworks in any form within the 16-day surveillance period (21 December to 5 January and had presented to any of the 50 sentinel hospitals. Of the 4649 cases, there were 4706 fireworks-related injuries involving 5076 anatomic sites in 2010–2014. A significant decrease of cases in 2014 was observed when compared with the previous study years (P = 0.02. The number of cases peaked at public holidays. Males (80% were more commonly injured, and children aged 5 to 14 years were primarily affected (47%. Ignition of illegal fireworks accounted for half (50% of the injuries; most injuries (68% occurred in street settings. The majority of injuries (57% were sustained by fireworks igniters. The most common anatomic injury sites were hands (44%, legs (21% and eyes (14%. Illegal fireworks were related to 100% (4/4 of the deaths and 49% (105/214 of the cases who needed amputations. Fireworks-related injuries declined significantly in 2014. Public awareness campaigns may have contributed to reducing the injury occurrences. As illegal fireworks accounted for all deaths and more than half of the amputations, law enforcement should be directed toward preventing importing, distributing and using illegal fireworks.

  18. Fireworks-related injury surveillance in the Philippines: trends in 2010–2014

    Science.gov (United States)

    de los Reyes, Vikki Carr; Racelis, Sheryl; Deveraturda, Imelda; Sucaldito, Ma Nemia; Tayag, Enrique; O’Reilly, Michael

    2015-01-01

    Analysis of the annual fireworks-related injury surveillance data collected by the Philippines Department of Health (DOH) in 2010–2014 was conducted to describe the profile of such injuries in the Philippines. Surveillance data were collected from DOH’s Online National Electronic Injury Surveillance System and analysed. A case was defined as any person who had sustained injury from fireworks in any form within the 16-day surveillance period (21 December to 5 January) and had presented to any of the 50 sentinel hospitals. Of the 4649 cases, there were 4706 fireworks-related injuries involving 5076 anatomic sites in 2010–2014. A significant decrease of cases in 2014 was observed when compared with the previous study years (P = 0.02). The number of cases peaked at public holidays. Males (80%) were more commonly injured, and children aged 5 to 14 years were primarily affected (47%). Ignition of illegal fireworks accounted for half (50%) of the injuries; most injuries (68%) occurred in street settings. The majority of injuries (57%) were sustained by fireworks igniters. The most common anatomic injury sites were hands (44%), legs (21%) and eyes (14%). Illegal fireworks were related to 100% (4/4) of the deaths and 49% (105/214) of the cases who needed amputations. Fireworks-related injuries declined significantly in 2014. Public awareness campaigns may have contributed to reducing the injury occurrences. As illegal fireworks accounted for all deaths and more than half of the amputations, law enforcement should be directed towards preventing importing, distributing and using illegal fireworks. PMID:26798555

  19. 32 CFR 637.7 - Drug enforcement activities.

    Science.gov (United States)

    2010-07-01

    .... Provost marshals and U.S. Army law enforcement supervisors at all levels will ensure that active drug... National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND... important nature of the drug enforcement effort. (a) MPI and DAC detectives/investigators will conduct...

  20. 20 CFR 401.155 - Law enforcement purposes.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Law enforcement purposes. 401.155 Section 401... INFORMATION Disclosure of Official Records and Information § 401.155 Law enforcement purposes. (a) General. The Privacy Act allows us to disclose information for law enforcement purposes under certain...

  1. 75 FR 69573 - Export Enforcement Coordination Center

    Science.gov (United States)

    2010-11-15

    ... Export Enforcement Coordination Center By the authority vested in me as President by the Constitution and... enforcement of United States export control laws and enhanced intelligence exchange in support of such enforcement efforts, it is hereby ordered as follows: Section 1. Policy. Export controls are critical to...

  2. Introduction to surveillance studies

    CERN Document Server

    Petersen, JK

    2012-01-01

    Introduction & OverviewIntroduction Brief History of Surveillance Technologies & TechniquesOptical SurveillanceAerial Surveillance Audio Surveillance Radio-Wave SurveillanceGlobal Positioning Systems Sensors Computers & the Internet Data Cards Biochemical Surveillance Animal Surveillance Biometrics Genetics Practical ConsiderationsPrevalence of Surveillance Effectiveness of Surveillance Freedom & Privacy IssuesConstitutional Freedoms Privacy Safeguards & Intrusions ResourcesReferences Glossary Index

  3. 43 CFR 422.3 - Reclamation law enforcement policy.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Reclamation law enforcement policy. 422.3 Section 422.3 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION, DEPARTMENT OF THE INTERIOR LAW ENFORCEMENT AUTHORITY AT BUREAU OF RECLAMATION PROJECTS § 422.3 Reclamation law enforcement policy. The law enforcement...

  4. Powerful subjects of tax law enforcement

    Directory of Open Access Journals (Sweden)

    Igor Dementyev

    2017-01-01

    Full Text Available УДК 342.6The subject. Competence of government bodies and their officials in the sphere of application of the tax law is considered in the article.The purpose of research is to determine the ratio of tax enforcement and application of the tax law, as well as the relationship between the concepts “party of tax enforcement” and “participant of tax legal relations”.Main results and scope of their application. The circle of participants of tax legal relations is broader than the circle of parties of tax law enforcement. The participants of tax legal relations are simultaneously the subjects of tax law, because they realize their tax status when enter into the tax relationships. The tax and customs authorities are the undoubted parties of the tax law enforcement.Although the financial authorities at all levels of government are not mentioned by article 9 of the Tax Code of the Russian Federation as participants of tax relations, they are parties of tax enforcement, because they make the agreement for deferment or installment payment of regional and local taxes.Scope of application. Clarification of participants of tax legal relations and determination of their mutual responsibility is essential to effective law enforcement.Conclusion. It was concluded that the scope tax law enforcement is tax proceedings, not administrative proceedings, civil (arbitration proceedings or enforcement proceedings.The application of the tax law is carried out not only in the form of tax relations, but also in relations of other branches of law.

  5. 50 CFR 10.22 - Law enforcement offices.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 1 2010-10-01 2010-10-01 false Law enforcement offices. 10.22 Section 10... GENERAL PROVISIONS Addresses § 10.22 Law enforcement offices. Service law enforcement offices and their areas of responsibility follow. Mail should be addressed: “Assistant Regional Director, Division of Law...

  6. 49 CFR 1542.217 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1542.217 Section 1542... Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used... the criminal laws of the State and local jurisdictions in which the airport is located— (1) A crime...

  7. 49 CFR 1544.217 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1544.217 Section 1544... AND COMMERCIAL OPERATORS Operations § 1544.217 Law enforcement personnel. (a) The following applies to... for law enforcement personnel meeting the qualifications and standards specified in §§ 1542.215 and...

  8. 24 CFR 125.401 - Private Enforcement Initiative.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Private Enforcement Initiative. 125... FAIR HOUSING FAIR HOUSING INITIATIVES PROGRAM § 125.401 Private Enforcement Initiative. (a) The Private Enforcement Initiative provides funding on a single-year or multi-year basis, to investigate violations and...

  9. 45 CFR 164.412 - Law enforcement delay.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Law enforcement delay. 164.412 Section 164.412 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED... § 164.412 Law enforcement delay. If a law enforcement official states to a covered entity or business...

  10. Advancements in web-database applications for rabies surveillance

    Directory of Open Access Journals (Sweden)

    Bélanger Denise

    2011-08-01

    Full Text Available Abstract Background Protection of public health from rabies is informed by the analysis of surveillance data from human and animal populations. In Canada, public health, agricultural and wildlife agencies at the provincial and federal level are responsible for rabies disease control, and this has led to multiple agency-specific data repositories. Aggregation of agency-specific data into one database application would enable more comprehensive data analyses and effective communication among participating agencies. In Québec, RageDB was developed to house surveillance data for the raccoon rabies variant, representing the next generation in web-based database applications that provide a key resource for the protection of public health. Results RageDB incorporates data from, and grants access to, all agencies responsible for the surveillance of raccoon rabies in Québec. Technological advancements of RageDB to rabies surveillance databases include 1 automatic integration of multi-agency data and diagnostic results on a daily basis; 2 a web-based data editing interface that enables authorized users to add, edit and extract data; and 3 an interactive dashboard to help visualize data simply and efficiently, in table, chart, and cartographic formats. Furthermore, RageDB stores data from citizens who voluntarily report sightings of rabies suspect animals. We also discuss how sightings data can indicate public perception to the risk of racoon rabies and thus aid in directing the allocation of disease control resources for protecting public health. Conclusions RageDB provides an example in the evolution of spatio-temporal database applications for the storage, analysis and communication of disease surveillance data. The database was fast and inexpensive to develop by using open-source technologies, simple and efficient design strategies, and shared web hosting. The database increases communication among agencies collaborating to protect human health from

  11. 49 CFR 1546.211 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1546.211 Section 1546... § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...) When using a screening system required by § 1546.101(a), (b), or (c), provide for law enforcement...

  12. Employee perceptions of protected area law enforcement

    Science.gov (United States)

    Christopher J. Wynveen; Robert D. Bixler; William E. Hammitt

    2006-01-01

    It is widely accepted that criminal activity negatively impacts visitors? recreation experiences in the nation?s parks and forests (Fletcher 1983). To further understand how law enforcement can effectively manage criminal activity in protected areas, this study was designed to describe law enforcement and non-law enforcement rangers? perceptions of a range of law...

  13. Is hospital information system relevant to detect surgical site infection? Findings from a prospective surveillance study in posterior instrumented spinal surgery.

    Science.gov (United States)

    Boetto, J; Chan-Seng, E; Lonjon, G; Pech, J; Lotthé, A; Lonjon, N

    2015-11-01

    Spinal instrumentation has a high rate of surgical site infection (SSI), but results greatly vary depending on surveillance methodology, surgical procedures, or quality of follow-up. Our aim was to study true incidence of SSI in spinal surgery by significant data collection, and to compare it with the results obtained through the hospital information system. This work is a single center prospective cohort study that included all patients consecutively operated on for spinal instrumentation by posterior approach over a six-month period regardless the etiology. For all patients, a "high definition" prospective method of surveillance was performed by the infection control (IC) department during at least 12 months after surgery. Results were then compared with findings from automatic surveillance though the hospital information system (HIS). One hundred and fifty-four patients were included. We found no hardly difference between "high definition" and automatic surveillance through the HIS, even if HIS tended to under-estimate the infection rate: rate of surgical site infection was 2.60% and gross SSI incidence rate via the hospital information system was 1.95%. Smoking and alcohol consumption were significantly related to a SSI. Our SSI rates to reflect the true incidence of infectious complications in posterior instrumented adult spinal surgery in our hospital and these results were consistent with the lower levels of published infection rate. In-house surveillance by surgeons only is insufficiently sensitive. Further studies with more patients and a longer inclusion time are needed to conclude if SSI case detection through the HIS could be a relevant and effective alternative method. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  14. Use of emergency department electronic medical records for automated epidemiological surveillance of suicide attempts: a French pilot study.

    Science.gov (United States)

    Metzger, Marie-Hélène; Tvardik, Nastassia; Gicquel, Quentin; Bouvry, Côme; Poulet, Emmanuel; Potinet-Pagliaroli, Véronique

    2017-06-01

    The aim of this study was to determine whether an expert system based on automated processing of electronic health records (EHRs) could provide a more accurate estimate of the annual rate of emergency department (ED) visits for suicide attempts in France, as compared to the current national surveillance system based on manual coding by emergency practitioners. A feasibility study was conducted at Lyon University Hospital, using data for all ED patient visits in 2012. After automatic data extraction and pre-processing, including automatic coding of medical free-text through use of the Unified Medical Language System, seven different machine-learning methods were used to classify the reasons for ED visits into "suicide attempts" versus "other reasons". The performance of these different methods was compared by using the F-measure. In a test sample of 444 patients admitted to the ED in 2012 (98 suicide attempts, 48 cases of suicidal ideation, and 292 controls with no recorded non-fatal suicidal behaviour), the F-measure for automatic detection of suicide attempts ranged from 70.4% to 95.3%. The random forest and naïve Bayes methods performed best. This study demonstrates that machine-learning methods can improve the quality of epidemiological indicators as compared to current national surveillance of suicide attempts. Copyright © 2016 John Wiley & Sons, Ltd.

  15. SCM: a practical tool to implement hospital-based syndromic surveillance.

    Science.gov (United States)

    Ye, Chuchu; Li, Zhongjie; Fu, Yifei; Lan, Yajia; Zhu, Weiping; Zhou, Dinglun; Zhang, Honglong; Lai, Shengjie; Buckeridge, David L; Sun, Qiao; Yang, Weizhong

    2016-06-18

    Syndromic surveillance has been widely used for the early warning of infectious disease outbreaks, especially in mass gatherings, but the collection of electronic data on symptoms in hospitals is one of the fundamental challenges that must be overcome during operating a syndromic surveillance system. The objective of our study is to describe and evaluate the implementation of a symptom-clicking-module (SCM) as a part of the enhanced hospital-based syndromic surveillance during the 41st World Exposition in Shanghai, China, 2010. The SCM, including 25 targeted symptoms, was embedded in the sentinels' Hospital Information Systems (HIS). The clinicians used SCM to record these information of all the visiting patients, and data were collated and transmitted automatically in daily batches. The symptoms were categorized into seven targeted syndromes using pre-defined criteria, and statistical algorithms were applied to detect temporal aberrations in the data series. SCM was deployed successfully in each sentinel hospital and was operated during the 184-day surveillance period. A total of 1,730,797 patient encounters were recorded by SCM, and 6.1 % (105,352 visits) met the criteria of the seven targeted syndromes. Acute respiratory and gastrointestinal syndromes were reported most frequently, accounted for 92.1 % of reports in all syndromes, and the aggregated time-series presented an obvious day-of-week variation over the study period. In total, 191 aberration signals were triggered, and none of them were identified as outbreaks after verification and field investigation. SCM has acted as a practical tool for recording symptoms in the hospital-based enhanced syndromic surveillance system during the 41st World Exposition in Shanghai, in the context of without a preexisting electronic tool to collect syndromic data in the HIS of the sentinel hospitals.

  16. Automatic Modulation Recognition by Support Vector Machines Using Wavelet Kernel

    Energy Technology Data Exchange (ETDEWEB)

    Feng, X Z; Yang, J; Luo, F L; Chen, J Y; Zhong, X P [College of Mechatronic Engineering and Automation, National University of Defense Technology, Changsha (China)

    2006-10-15

    Automatic modulation identification plays a significant role in electronic warfare, electronic surveillance systems and electronic counter measure. The task of modulation recognition of communication signals is to determine the modulation type and signal parameters. In fact, automatic modulation identification can be range to an application of pattern recognition in communication field. The support vector machines (SVM) is a new universal learning machine which is widely used in the fields of pattern recognition, regression estimation and probability density. In this paper, a new method using wavelet kernel function was proposed, which maps the input vector xi into a high dimensional feature space F. In this feature space F, we can construct the optimal hyperplane that realizes the maximal margin in this space. That is to say, we can use SVM to classify the communication signals into two groups, namely analogue modulated signals and digitally modulated signals. In addition, computer simulation results are given at last, which show good performance of the method.

  17. Automatic Modulation Recognition by Support Vector Machines Using Wavelet Kernel

    International Nuclear Information System (INIS)

    Feng, X Z; Yang, J; Luo, F L; Chen, J Y; Zhong, X P

    2006-01-01

    Automatic modulation identification plays a significant role in electronic warfare, electronic surveillance systems and electronic counter measure. The task of modulation recognition of communication signals is to determine the modulation type and signal parameters. In fact, automatic modulation identification can be range to an application of pattern recognition in communication field. The support vector machines (SVM) is a new universal learning machine which is widely used in the fields of pattern recognition, regression estimation and probability density. In this paper, a new method using wavelet kernel function was proposed, which maps the input vector xi into a high dimensional feature space F. In this feature space F, we can construct the optimal hyperplane that realizes the maximal margin in this space. That is to say, we can use SVM to classify the communication signals into two groups, namely analogue modulated signals and digitally modulated signals. In addition, computer simulation results are given at last, which show good performance of the method

  18. Activity Recognition Using A Combination of Category Components And Local Models for Video Surveillance

    OpenAIRE

    Lin, Weiyao; Sun, Ming-Ting; Poovendran, Radha; Zhang, Zhengyou

    2015-01-01

    This paper presents a novel approach for automatic recognition of human activities for video surveillance applications. We propose to represent an activity by a combination of category components, and demonstrate that this approach offers flexibility to add new activities to the system and an ability to deal with the problem of building models for activities lacking training data. For improving the recognition accuracy, a Confident-Frame- based Recognition algorithm is also proposed, where th...

  19. 76 FR 22160 - Fifty-Fourth Meeting: RTCA Special Committee 186: Automatic Dependent Surveillance-Broadcast (ADS-B)

    Science.gov (United States)

    2011-04-20

    ... Rooms, 1828 L Street, NW., Suite 805, Washington, DC 20036. FOR FURTHER INFORMATION CONTACT: RTCA Secretariat, 1828 L Street, NW., Suite 805, Washington, DC, 20036, (202) 833-9339; fax (202) 833-9434; Web.... 035-11/SC186-307 FAA Surveillance and Broadcast Services (SBS) Program Status Traffic Situation...

  20. Attaching Hollywood to a Surveillant Assemblage: Normalizing Discourses of Video Surveillance

    Directory of Open Access Journals (Sweden)

    Randy K Lippert

    2015-10-01

    Full Text Available This article examines video surveillance images in Hollywood film. It moves beyond previous accounts of video surveillance in relation to film by theoretically situating the use of these surveillance images in a broader “surveillant assemblage”. To this end, scenes from a sample of thirty-five (35 films of several genres are examined to discern dominant discourses and how they lend themselves to normalization of video surveillance. Four discourses are discovered and elaborated by providing examples from Hollywood films. While the films provide video surveillance with a positive associative association it is not without nuance and limitations. Thus, it is found that some forms of resistance to video surveillance are shown while its deterrent effect is not. It is ultimately argued that Hollywood film is becoming attached to a video surveillant assemblage discursively through these normalizing discourses as well as structurally to the extent actual video surveillance technology to produce the images is used.

  1. 75 FR 37712 - Automatic Dependent Surveillance-Broadcast (ADS-B) Out Performance Requirements To Support Air...

    Science.gov (United States)

    2010-06-30

    ... Performance Requirements To Support Air Traffic Control (ATC) Service; Technical Amendment AGENCY: Federal... FAA amended its regulations to add equipage requirements and performance standards for Automatic... Approval for deviation was renumbered as Sec. 21.618, effective April 14, 2010. On May 28, 2010, the FAA...

  2. Why Border Enforcement Backfired.

    Science.gov (United States)

    Massey, Douglas S; Durand, Jorge; Pren, Karen A

    2016-03-01

    In this article we undertake a systematic analysis of why border enforcement backfired as a strategy of immigration control in the United States. We argue theoretically that border enforcement emerged as a policy response to a moral panic about the perceived threat of Latino immigration to the United States propounded by self-interested bureaucrats, politicians, and pundits who sought to mobilize political and material resources for their own benefit. The end result was a self-perpetuating cycle of rising enforcement and increased apprehensions that resulted in the militarization of the border in a way that was disconnected from the actual size of the undocumented flow. Using an instrumental variable approach, we show how border militarization affected the behavior of unauthorized migrants and border outcomes to transform undocumented Mexican migration from a circular flow of male workers going to three states into an eleven-million person population of settled families living in 50 states.

  3. Price-Anderson Nuclear Safety Enforcement Program. 1996 Annual report

    International Nuclear Information System (INIS)

    1996-01-01

    This first annual report on DOE's Price Anderson Amendments Act enforcement program covers the activities, accomplishments, and planning for calendar year 1996. It also includes the infrastructure development activities of 1995. It encompasses the activities of the headquarters' Office of Enforcement in the Office of Environment, Safety and Health (EH) and Investigation and the coordinators and technical advisors in DOE's Field and Program Offices and other EH Offices. This report includes an overview of the enforcement program; noncompliances, investigations, and enforcement actions; summary of significant enforcement actions; examples where enforcement action was deferred; and changes and improvements to the program

  4. Anticorruption expertise of law-enforcement acts

    Directory of Open Access Journals (Sweden)

    Sergey B. Polyakov

    2015-12-01

    Full Text Available Objective to substantiate public necessity to define the subject methodological and organizational capabilities of anticorruption expertise of law enforcement acts. Methods universal dialecticmaterialistic method was used to study the needs in anticorruption expertise of law enforcement acts in the mechanism of legal regulation based on it general scientific and special formal legal and comparative legal methods of research used for the definition of subjectmatter of the proposed expertise. Results the value of anticorruption expertise of law enforcement was shown corruption factors and corruption indicators enabling legislation were identified ways of conducting such examinations were proposed. Scientific novelty the article examines the need and the subject proposes methods of a new type of anticorruption expertise. Practical significance the conditions of corruption are defined which are created in law enforcement activities and methods for their detection are proposed. nbsp

  5. Fragrances and work-related asthma-California surveillance data, 1993-2012.

    Science.gov (United States)

    Weinberg, Justine Lew; Flattery, Jennifer; Harrison, Robert

    2017-12-01

    Fragrance chemicals are used in a large array of products. Workers may be exposed to these chemicals in the workplace directly when used as air fresheners, or indirectly in personal care products used by coworkers or others. This study characterizes work-related asthma (WRA) cases associated with fragrance exposures in California workplaces from 1993 through 2012. We used the California Work-Related Asthma Prevention Program's surveillance database to identify individuals with physician-diagnosed WRA associated with the use of air fresheners and scented personal care products (perfumes, colognes, etc.). Cases were classified using previously published, standardized surveillance methods. Perfume was the ninth most common exposure identified from 1993 through 2012. A total of 270 WRA cases associated with fragrance exposure were reported during this period, representing 3.8% of all confirmed cases. These 270 cases included 242 associated with perfume or cologne, 32 associated with air freshener, and 4 associated with both. Similar to non-fragrance cases, nearly a quarter of fragrance-associated cases were classified as new-onset asthma. Fragrance-associated cases were significantly more likely to be in office, health, and education jobs than non-fragrance-associated cases. When compared to non-fragrance cases, fragrance cases were significantly more likely to be female (94% vs 62%) and be classified as having work-aggravated asthma (38% vs 20%), yet had similar outcomes compared with cases associated with other exposures. Our surveillance data show that fragrance use in the workplace is associated with WRA. Prevention methods include employee education, enforced fragrance-free policies, well-designed ventilation systems, and good building maintenance.

  6. 78 FR 44165 - Nuclear Regulatory Commission Enforcement Policy

    Science.gov (United States)

    2013-07-23

    ... NUCLEAR REGULATORY COMMISSION [NRC-2013-0159] Nuclear Regulatory Commission Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Enforcement policy; request for comment. SUMMARY: The U.S... Policy. In SRM-SECY-12-0047, ``Revisions to the Nuclear Regulatory Commission Enforcement Policy,'' dated...

  7. 39 CFR 7.7 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Enforcement. 7.7 Section 7.7 Postal Service UNITED STATES POSTAL SERVICE THE BOARD OF GOVERNORS OF THE U.S. POSTAL SERVICE PUBLIC OBSERVATION (ARTICLE VII) § 7.7 Enforcement. (a) Under 5 U.S.C. 552b(g), any person may bring a proceeding in the United States...

  8. Financial Private Regulation and Enforcement

    OpenAIRE

    MILLER, Geoffrey

    2011-01-01

    This paper has been delivered within the context of the research project "Transnational Private Regulatory Regimes: Constitutional foundations and governance design". This paper considers the topic of private regulation and enforcement for internationally active financial services firms. The paper documents the following types of regulation and enforcement that involve significant private input: house rules, contracts, internal compliance, management-based regulation, private standard-sett...

  9. 76 FR 54986 - NRC Enforcement Policy

    Science.gov (United States)

    2011-09-06

    ... NUCLEAR REGULATORY COMMISSION 10 CFR Chapter I [NRC-2011-0209] NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Proposed enforcement policy revision; request for comment. SUMMARY: The U.S. Nuclear Regulatory Commission (NRC or the Commission) is soliciting comments from interested...

  10. 78 FR 5838 - NRC Enforcement Policy

    Science.gov (United States)

    2013-01-28

    ... NUCLEAR REGULATORY COMMISSION [NRC-2013-0014] NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Policy revision; issuance and request for comments. SUMMARY: The U.S. Nuclear Regulatory... Nuclear Regulatory Commission Enforcement Policy,'' December 30, 2009 (ADAMS Accession No. ML093200520);(2...

  11. 77 FR 12865 - Enforcement Actions Summary

    Science.gov (United States)

    2012-03-02

    ...] Enforcement Actions Summary AGENCY: Transportation Security Administration, DHS. ACTION: Notice of availability. SUMMARY: The Transportation Security Administration (TSA) is providing notice that it has issued an annual summary of all enforcement actions taken by TSA under the authority granted in the...

  12. 78 FR 11216 - Enforcement Actions Summary

    Science.gov (United States)

    2013-02-15

    ...] Enforcement Actions Summary AGENCY: Transportation Security Administration, DHS. ACTION: Notice of availability. SUMMARY: The Transportation Security Administration (TSA) is providing notice that it has issued an annual summary of all enforcement actions taken by TSA under the authority granted in the...

  13. 76 FR 9357 - Enforcement Actions Summary

    Science.gov (United States)

    2011-02-17

    ...] Enforcement Actions Summary AGENCY: Transportation Security Administration, DHS. ACTION: Notice of Availability. SUMMARY: The Transportation Security Administration (TSA) is providing notice that it has issued an annual summary of all enforcement actions taken by TSA under the authority granted in the...

  14. Environmental Enforcement Districts

    Data.gov (United States)

    Vermont Center for Geographic Information — Current statewide map of the geographic territories of Environmental Enforcement Officers. Part of a dataset that contains administrative boundaries for Vermont's...

  15. On-line pressurizer surveillance system design to prevent small break LOCA through PORV using micro-computer

    International Nuclear Information System (INIS)

    Lee, Jong-Ho; Chang, Soon-Heung

    1986-01-01

    Small break LOCA caused by a stuck-open PORV is one of the important contributors to nuclear power plant risk. This paper deals with the design of a pressurizer surveillance system using micro-computer to prevent the malfunction of system and has assessed the effect of this improvement through Probabilistic Risk Assessment (PRA) method. Micro-computer diagnoses the malfunction of system by a process checking method and performs automatically backup action related to each malfunction. Owing to this improvement, we can correctly diagnose ''Spurious Opening'', ''Fail to Reclose'' and ''Small break LOCA'' which are difficult for operator to diagnose quickly and correctly and reduce the probability of a human error by an automatic backup action. (author)

  16. Commercial-vehicle enforcement: a guide for law-enforcement managers

    International Nuclear Information System (INIS)

    1987-01-01

    The purpose of the document is to provide a resource for law enforcement agencies to evaluate their programs, and to promote the uniform application of concepts already shown to be effective in other jurisdictions, which identify and address commercial-vehicle traffic safety needs

  17. Non typical results of the first and second irradiation set of the surveillance programme of a boiling water reactor in Switzerland

    Energy Technology Data Exchange (ETDEWEB)

    Ullrich, G; Krompholz, K [Paul Scherrer Inst. (PSI), Villigen (Switzerland)

    1994-12-31

    In the surveillance programme for the pressure vessel of the Muhleberg NPP in Switzerland, tensile and impact tests on the base material (ASTM A 508 Cl 2) and two weldments (main and automatic) as well as the heat affected zone, were performed with two sets of irradiation (neutron fluence of 5.5.10{sup 17} and 1.1.10{sup 18}) leading to different shifts of the transition temperature (except for the automatic welded joints which keep the same large shift). Results and causes of the discrepancy are discussed. (authors). 6 figs., 2 tabs.

  18. Public health efforts to build a surveillance system for child maltreatment mortality: lessons learned for stakeholder engagement.

    Science.gov (United States)

    Smith, Lucia Rojas; Gibbs, Deborah; Wetterhall, Scott; Schnitzer, Patricia G; Farris, Tonya; Crosby, Alex E; Leeb, Rebecca T

    2011-01-01

    Reducing the number of largely preventable and tragic deaths due to child maltreatment (CM) requires an understanding of the magnitude of and risk factors for fatal CM and targeted research, policy, and prevention efforts. Public health surveillance offers an opportunity to improve our understanding of the problem of CM. In 2006, the Centers for Disease Control and Prevention (CDC) funded state public health agencies in California, Michigan, and Oregon to implement a model approach for routine and sustainable CM surveillance and evaluated the experience of those efforts. We describe the experiences of 3 state health agencies in building collaborations and partnerships with multiple stakeholders for CM surveillance. Qualitative, structured key informant interviews were carried out during site visits as part of an evaluation of a CDC-funded project to implement a model approach to CM surveillance. Key informants included system stakeholders from state health agencies, law enforcement, child protective services, the medical community, and child welfare advocacy groups in the 3 funded states. Factors that facilitated stakeholder engagement for CM surveillance included the following: streamlining and coordinating the work of Child Death Review Teams (CDRTs); demonstrating the value of surveillance to non-public health partners; codifying relationships with participating agencies; and securing the commitment of decision-makers. Legislative mandates were helpful in bringing key stakeholders together, but it was not sufficient to ensure sustained engagement. The engagement process yielded multiple benefits for the stakeholders including a deeper appreciation of the complexity of defining CM; a greater understanding of risk factors for CM; and enhanced guidance for prevention and control efforts. States considering or currently undertaking CM surveillance can glean useful insights from the experiences of these 3 states and apply them to their own efforts to engage

  19. Immigration Enforcement Within the United States

    Science.gov (United States)

    2006-04-06

    Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Policy Issues...Remained in the United States, (Washington: Center for Immigration Studies, May 2002). Immigration Enforcement Within the United States Introduction ...interior enforcement lack a border component. For example, fugitive taskforces, investigations of alien slavery and sweatshops , and employer sanctions do

  20. Independent component analysis for automatic note extraction from musical trills

    Science.gov (United States)

    Brown, Judith C.; Smaragdis, Paris

    2004-05-01

    The method of principal component analysis, which is based on second-order statistics (or linear independence), has long been used for redundancy reduction of audio data. The more recent technique of independent component analysis, enforcing much stricter statistical criteria based on higher-order statistical independence, is introduced and shown to be far superior in separating independent musical sources. This theory has been applied to piano trills and a database of trill rates was assembled from experiments with a computer-driven piano, recordings of a professional pianist, and commercially available compact disks. The method of independent component analysis has thus been shown to be an outstanding, effective means of automatically extracting interesting musical information from a sea of redundant data.

  1. Hybrid static-runtime information flow and declassification enforcement

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Conti, M.; Etalle, S.; Crispo, B.

    2013-01-01

    There are different paradigms for enforcing information flow and declassification policies. These approaches can be divided into static analyzers and runtime enforcers. Each class has its own strengths and weaknesses, each being able to enforce a different set of policies. In this paper we introduce

  2. Hybrid static-runtime information flow and declassification enforcement

    NARCIS (Netherlands)

    Rocha, Bruno P.S.; Conti, Mauro; Etalle, Sandro; Crispo, Bruno

    There are different paradigms for enforcing information flow and declassification policies. These approaches can be divided into static analyzers and runtime enforcers. Each class has its own strengths and weaknesses, each being able to enforce a different set of policies. In this paper, we

  3. 32 CFR 634.26 - Traffic law enforcement principles.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Traffic law enforcement principles. 634.26 Section 634.26 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW... law enforcement principles. (a) Traffic law enforcement should motivate drivers to operate vehicles...

  4. Smart sensing surveillance system

    Science.gov (United States)

    Hsu, Charles; Chu, Kai-Dee; O'Looney, James; Blake, Michael; Rutar, Colleen

    2010-04-01

    network and use the specific presentation methods. In addition, the S4 is compliant with Open Geospatial Consortium - Sensor Web Enablement (OGC-SWE) standards to efficiently discover, access, use, and control heterogeneous sensors and their metadata. These S4 capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments. The S4 system is directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.

  5. Third party objection and action against enforcement: Request for exclusion

    Directory of Open Access Journals (Sweden)

    Salma Marija

    2014-01-01

    Full Text Available This paper deals with a right of a third party to prevent enforcement on the basis of a claim and evidence that rights or assets seized in enforcement proceeding belong to him (third party and not to the enforcement debtor. In most of jurisdictions that were subject of analysis of this paper, this right of a third party is exercised by filing an objection to the court conducting enforcement proceedings. The claim of the third party is directed towards the enforcement creditor as well as against the enforcement debtor. In the event the claim of the third party is being contested, the court instructs the third party to initiate litigation proceedings for determining whether the third party is entitled to exclusion of such rights or assets from enforcement, especially if such third party holds property rights or some other rights over the assets that are being subject to enforcement proceedings. In majority of analyzed jurisdictions, enforcement proceedings are being suspended provided the third party, in the objection being filed makes prima facie likely, on the basis of credible evidence, that his assets were seized in the enforcement proceedings. However, according to the law of the Republic of Serbia, a credible objection of a third party does not result in suspension of enforcement proceedings, something that is being criticized in this paper. As a result of this provision of the law, a bona fide third party is forced to endure the enforcement although his claim has been made likely and subsequently confirmed in the litigation proceedings. The author, in particular, points to the legal consequences of mala fide enforcement creditor that knew that the assets that are being subject of the enforcement proceedings do not belong to the enforcement debtor. The author is of the opinion that, in such cases, the enforcement creditor should be obliged to pay to the third party damages that such party suffered as a result of enforcement proceedings being

  6. ALGORITHM OF PLACEMENT OF VIDEO SURVEILLANCE CAMERAS AND ITS SOFTWARE IMPLEMENTATION

    Directory of Open Access Journals (Sweden)

    Loktev Alexey Alexeevich

    2012-10-01

    Full Text Available Comprehensive distributed safety, control, and monitoring systems applied by companies and organizations of different ownership structure play a substantial role in the present-day society. Video surveillance elements that ensure image processing and decision making in automated or automatic modes are the essential components of new systems. This paper covers the modeling of video surveillance systems installed in buildings, and the algorithm, or pattern, of video camera placement with due account for nearly all characteristics of buildings, detection and recognition facilities, and cameras themselves. This algorithm will be subsequently implemented as a user application. The project contemplates a comprehensive approach to the automatic placement of cameras that take account of their mutual positioning and compatibility of tasks. The project objective is to develop the principal elements of the algorithm of recognition of a moving object to be detected by several cameras. The image obtained by different cameras will be processed. Parameters of motion are to be identified to develop a table of possible options of routes. The implementation of the recognition algorithm represents an independent research project to be covered by a different article. This project consists in the assessment of the degree of complexity of an algorithm of camera placement designated for identification of cases of inaccurate algorithm implementation, as well as in the formulation of supplementary requirements and input data by means of intercrossing sectors covered by neighbouring cameras. The project also contemplates identification of potential problems in the course of development of a physical security and monitoring system at the stage of the project design development and testing. The camera placement algorithm has been implemented as a software application that has already been pilot tested on buildings and inside premises that have irregular dimensions. The

  7. Enforcement and Compliance History Online | US EPA

    Science.gov (United States)

    ECHO, Enforcement and Compliance History Online, provides compliance and enforcement information for approximately 800,000 EPA-regulated facilities nationwide. ECHO includes permit, inspection, violation, enforcement action, and penalty information about facilities regulated under the Clean Air Act (CAA) Stationary Source Program, Clean Water Act (CWA) National Pollutant Elimination Discharge System (NPDES), and/or Resource Conservation and Recovery Act (RCRA). Information also is provided on surrounding demographics when available.

  8. Development of a web-based epidemiological surveillance system with health system response for improving maternal and newborn health: Field-testing in Thailand.

    Science.gov (United States)

    Liabsuetrakul, Tippawan; Prappre, Tagoon; Pairot, Pakamas; Oumudee, Nurlisa; Islam, Monir

    2017-06-01

    Surveillance systems are yet to be integrated with health information systems for improving the health of pregnant mothers and their newborns, particularly in developing countries. This study aimed to develop a web-based epidemiological surveillance system for maternal and newborn health with integration of action-oriented responses and automatic data analysis with results presentations and to assess the system acceptance by nurses and doctors involved in various hospitals in southern Thailand. Freeware software and scripting languages were used. The system can be run on different platforms, and it is accessible via various electronic devices. Automatic data analysis with results presentations in the forms of graphs, tables and maps was part of the system. A multi-level security system was incorporated into the program. Most doctors and nurses involved in the study felt the system was easy to use and useful. This system can be integrated into country routine reporting system for monitoring maternal and newborn health and survival.

  9. 5 CFR 1201.85 - Enforcing subpoenas.

    Science.gov (United States)

    2010-01-01

    ....85 Administrative Personnel MERIT SYSTEMS PROTECTION BOARD ORGANIZATION AND PROCEDURES PRACTICES AND... in the foreign country. (b) Upon application by the Special Counsel, the Board may seek court enforcement of a subpoena issued by the Special Counsel in the same manner in which it seeks enforcement of...

  10. OSHA Enforcement, Industrial Compliance and Workplace Injuries

    OpenAIRE

    Ann P. Bartel; Lacy Glenn Thomas

    1982-01-01

    This paper develops and tests a three-equation simultaneous model of OSHA enforcement behavior, industrial compliance and workplace injuries. The enforcement equation is based on the assumption that OSHA acts as a political institution that gains support through the transfer of wealth from firms to employees; the empirical results are largely consistent with this notion. Contrary to previous work, we find that OSHA enforcement efforts have, indeed, had a statistically significant impact on in...

  11. Labor Law Enforcement in California, 1970-2000

    OpenAIRE

    Bar-Cohen, Limor; Carrillo, Deana Milam

    2002-01-01

    This chapter examines the record of two state agencies within the California Department of Industrial Relations, the Division of Labor Standards Enforcement (DLSE) and the California Occupational Safety and Health Program (Cal/OSHA), over the 1970-2000 period. Although the data available on the performance of these agencies are severely limited - in most cases consisting only of enforcement activity measures, without any valid measures of enforcement outcomes, it is possible to draw some conc...

  12. Reassembling Surveillance Creep

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    2017-01-01

    We live in societies in which surveillance technologies are constantly introduced, are transformed, and spread to new practices for new purposes. How and why does this happen? In other words, why does surveillance “creep”? This question has received little attention either in theoretical developm......We live in societies in which surveillance technologies are constantly introduced, are transformed, and spread to new practices for new purposes. How and why does this happen? In other words, why does surveillance “creep”? This question has received little attention either in theoretical...... development or in empirical analyses. Accordingly, this article contributes to this special issue on the usefulness of Actor-Network Theory (ANT) by suggesting that ANT can advance our understanding of ‘surveillance creep’. Based on ANT’s model of translation and a historical study of the Danish DNA database......, we argue that surveillance creep involves reassembling the relations in surveillance networks between heterogeneous actors such as the watchers, the watched, laws, and technologies. Second, surveillance creeps only when these heterogeneous actors are adequately interested and aligned. However...

  13. Enforcement Information System

    Data.gov (United States)

    Department of Transportation — EIS is an automated management information system that tracks the FAA’s enforcement actions on a nationwide basis. EIS is the FAA’s primary database for tracking...

  14. Using Acute Flaccid Paralysis Surveillance as a Platform for Vaccine-Preventable Disease Surveillance.

    Science.gov (United States)

    Wassilak, Steven G F; Williams, Cheryl L; Murrill, Christopher S; Dahl, Benjamin A; Ohuabunwo, Chima; Tangermann, Rudolf H

    2017-07-01

    Surveillance for acute flaccid paralysis (AFP) is a fundamental cornerstone of the global polio eradication initiative (GPEI). Active surveillance (with visits to health facilities) is a critical strategy of AFP surveillance systems for highly sensitive and timely detection of cases. Because of the extensive resources devoted to AFP surveillance, multiple opportunities exist for additional diseases to be added using GPEI assets, particularly because there is generally 1 district officer responsible for all disease surveillance. For this reason, integrated surveillance has become a standard practice in many countries, ranging from adding surveillance for measles and rubella to integrated disease surveillance for outbreak-prone diseases (integrated disease surveillance and response). This report outlines the current level of disease surveillance integration in 3 countries (Nepal, India, and Nigeria) and proposes that resources continue for long-term maintenance in resource-poor countries of AFP surveillance as a platform for surveillance of vaccine-preventable diseases and other outbreak-prone diseases. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.

  15. Falling-incident detection and throughput enhancement in a multi-camera video-surveillance system.

    Science.gov (United States)

    Shieh, Wann-Yun; Huang, Ju-Chin

    2012-09-01

    For most elderly, unpredictable falling incidents may occur at the corner of stairs or a long corridor due to body frailty. If we delay to rescue a falling elder who is likely fainting, more serious consequent injury may occur. Traditional secure or video surveillance systems need caregivers to monitor a centralized screen continuously, or need an elder to wear sensors to detect falling incidents, which explicitly waste much human power or cause inconvenience for elders. In this paper, we propose an automatic falling-detection algorithm and implement this algorithm in a multi-camera video surveillance system. The algorithm uses each camera to fetch the images from the regions required to be monitored. It then uses a falling-pattern recognition algorithm to determine if a falling incident has occurred. If yes, system will send short messages to someone needs to be noticed. The algorithm has been implemented in a DSP-based hardware acceleration board for functionality proof. Simulation results show that the accuracy of falling detection can achieve at least 90% and the throughput of a four-camera surveillance system can be improved by about 2.1 times. Copyright © 2011 IPEM. Published by Elsevier Ltd. All rights reserved.

  16. 20 CFR 638.805 - Security and law enforcement.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Security and law enforcement. 638.805 Section... and law enforcement. (a) The Job Corps Director shall provide guidelines to protect the security of... jurisdiction with the appropriate State and locality with respect to criminal law enforcement as long as a...

  17. 45 CFR 5.68 - Exemption seven: Law enforcement.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Exemption seven: Law enforcement. 5.68 Section 5... INFORMATION REGULATIONS Reasons for Withholding Some Records § 5.68 Exemption seven: Law enforcement. We are not required to disclose information or records that the government has compiled for law enforcement...

  18. Redefining syndromic surveillance

    Directory of Open Access Journals (Sweden)

    Rebecca Katz

    2011-12-01

    Full Text Available With growing concerns about international spread of disease and expanding use of early disease detection surveillance methods, the field of syndromic surveillance has received increased attention over the last decade. The purpose of this article is to clarify the various meanings that have been assigned to the term syndromic surveillance and to propose a refined categorization of the characteristics of these systems. Existing literature and conference proceedings were examined on syndromic surveillance from 1998 to 2010, focusing on low- and middle-income settings. Based on the 36 unique definitions of syndromic surveillance found in the literature, five commonly accepted principles of syndromic surveillance systems were identified, as well as two fundamental categories: specific and non-specific disease detection. Ultimately, the proposed categorization of syndromic surveillance distinguishes between systems that focus on detecting defined syndromes or outcomes of interest and those that aim to uncover non-specific trends that suggest an outbreak may be occurring. By providing an accurate and comprehensive picture of this field’s capabilities, and differentiating among system types, a unified understanding of the syndromic surveillance field can be developed, encouraging the adoption, investment in, and implementation of these systems in settings that need bolstered surveillance capacity, particularly low- and middle-income countries.

  19. WGS-based surveillance of third-generation cephalosporin-resistant Escherichia coli from bloodstream infections in Denmark

    DEFF Research Database (Denmark)

    Roer, Louise; Hansen, Frank; Thomsen, Martin Christen Frølund

    2017-01-01

    clone, here observed for the first time in Denmark. Additionally, the analysis revealed three individual cases with possible persistence of closely related clones collected more than 13 months apart. Continuous WGS-based national surveillance of 3GC-R Ec , in combination with more detailed......-genome sequenced and characterized by using the batch uploader from the Center for Genomic Epidemiology (CGE) and automatically analysed using the CGE tools according to resistance profile, MLST, serotype and fimH subtype. Additionally, the phylogenetic relationship of the isolates was analysed by SNP analysis......To evaluate a genome-based surveillance of all Danish third-generation cephalosporin-resistant Escherichia coli (3GC-R Ec ) from bloodstream infections between 2014 and 2015, focusing on horizontally transferable resistance mechanisms. A collection of 552 3GC-R Ec isolates were whole...

  20. 40 CFR 204.57 - Selective enforcement auditing.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing. 204.57 Section 204.57 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT... enforcement auditing. ...

  1. The plays and arts of surveillance: studying surveillance as entertainment

    NARCIS (Netherlands)

    Albrechtslund, Anders; Dubbeld, L.

    2006-01-01

    This paper suggests a direction in the development of Surveillance Studies that goes beyond current attention for the caring, productive and enabling aspects of surveillance practices. That is, surveillance could be considered not just as positively protective, but even as a comical, playful,

  2. Re-identification of persons in multi-camera surveillance under varying viewpoints and illumination

    Science.gov (United States)

    Bouma, Henri; Borsboom, Sander; den Hollander, Richard J. M.; Landsmeer, Sander H.; Worring, Marcel

    2012-06-01

    The capability to track individuals in CCTV cameras is important for surveillance and forensics alike. However, it is laborious to do over multiple cameras. Therefore, an automated system is desirable. In literature several methods have been proposed, but their robustness against varying viewpoints and illumination is limited. Hence performance in realistic settings is also limited. In this paper, we present a novel method for the automatic re-identification of persons in video from surveillance cameras in a realistic setting. The method is computationally efficient, robust to a wide variety of viewpoints and illumination, simple to implement and it requires no training. We compare the performance of our method to several state-of-the-art methods on a publically available dataset that contains the variety of viewpoints and illumination to allow benchmarking. The results indicate that our method shows good performance and enables a human operator to track persons five times faster.

  3. 25 CFR 11.1003 - Law enforcement officer's duties.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Law enforcement officer's duties. 11.1003 Section 11.1003 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Juvenile Offender Procedure § 11.1003 Law enforcement officer's duties. A law enforcement officer who takes a minor into...

  4. 46 CFR 4.03-55 - Law enforcement officer.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Law enforcement officer. 4.03-55 Section 4.03-55 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE CASUALTIES AND INVESTIGATIONS Definitions § 4.03-55 Law enforcement officer. Law enforcement officer means a Coast Guard commissioned, warrant or petty officer...

  5. Certification/enforcement analysis

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    Industry compliance with minimum energy efficiency standards will be assured through a two-part program approach of certification and enforcement activities. The technical support document (TSD) presents the analyses upon which the proposed rule for assuring that consumer product comply with applicable energy efficiency standards is based. Much of the TSD is based upon support provided DOE by Vitro Laboratories. The OAO Corporation provided additional support in the development of the sampling plan incorporated in the proposed rule. Vitro's recommended approach to appliance certification and enforcement, developed after consideration of various program options, benefits, and impacts, establishes the C/E program framework, general criteria, and procedures for assuring a specified level of energy efficiency performance of covered consumer products. The results of the OAO analysis are given in Volume II of the TSD.

  6. 17 CFR 8.05 - Enforcement staff.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Enforcement staff. 8.05... staff. (a) Each exchange shall establish an adequate enforcement staff which shall be authorized by the... staff shall consist of employees of the exchange and/or persons hired on a contract basis. It may not...

  7. Law Enforcement School Programs. Fact Sheet

    Science.gov (United States)

    Arkansas Safe Schools Initiative Division, 2010

    2010-01-01

    The school shooting incidents during the decade of the 1990's prompted an increase of law enforcement presence in schools. The School Violence Resource Center (SVRC) at the Criminal Justice Institute (CJI) University of Arkansas System undertook a project to determine what programs law enforcement agencies currently provide in their local schools…

  8. Fuzzy operation and real time surveillance of a nuclear reactor

    International Nuclear Information System (INIS)

    Si-Fodil, M.; Guely, F.; Siarry, P.; Tyran, J.L.

    1997-01-01

    The operating power of nuclear power plants needs to be modulated according to the thin evolutions of electric power demand. Two parameters are concerned by load following operations: the power axial disequilibrium and the position of control rods. This paper deals with the automation of the control of power axial disequilibrium using boration-dilution. An automatic system based on fuzzy logic is proposed which can be substituted to the expert operator who is in charge of this fastidious manual task. The management of water and boron flow rates are studied in details. A Graphic interface was designed for the real-time surveillance of the reactor. (J.S.)

  9. EPA Enforcement and Compliance History Online: EPA Enforcement Action Data Set

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Enforcement and Compliance History Online (ECHO) data sets have been compiled for access to larger sets of national data to ensure that ECHO meets your data...

  10. Assessing the efficiency of priorities for traffic law enforcement in Norway

    DEFF Research Database (Denmark)

    Elvik, Rune; Sogge, Céline Vallet; Lager, Lasse

    2012-01-01

    attributable to them; and (3) an optimal level of enforcement is selected, i.e. the marginal benefits of enforcement in terms of preventing accidents equal the marginal costs of enforcement. The efficiency of current traffic law enforcement in Norway is assessed in terms of these criteria. It is found......This paper assesses the efficiency of priorities for traffic law enforcement in Norway. Priorities are regarded as efficient if: (1) enforcement ensures a sufficient level of deterrence to keep down the rate of violations; (2) selection of target violations for enforcement is based on the risk...... low. Cost-benefit analyses show that substantially increasing the amount of police enforcement is cost-effective....

  11. Surveillance and Critical Theory

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2015-09-01

    Full Text Available In this comment, the author reflects on surveillance from a critical theory approach, his involvement in surveillance research and projects, and the status of the study of surveillance. The comment ascertains a lack of critical thinking about surveillance, questions the existence of something called “surveillance studies” as opposed to a critical theory of society, and reflects on issues such as Edward Snowden’s revelations, and Foucault and Marx in the context of surveillance.

  12. 48 CFR 1322.406 - Administration and enforcement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Administration and enforcement. 1322.406 Section 1322.406 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE... Involving Construction 1322.406 Administration and enforcement. ...

  13. 48 CFR 1222.406 - Administration and enforcement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Administration and enforcement. 1222.406 Section 1222.406 Federal Acquisition Regulations System DEPARTMENT OF TRANSPORTATION... Involving Construction 1222.406 Administration and enforcement. ...

  14. Automatic Constraint Detection for 2D Layout Regularization.

    Science.gov (United States)

    Jiang, Haiyong; Nan, Liangliang; Yan, Dong-Ming; Dong, Weiming; Zhang, Xiaopeng; Wonka, Peter

    2016-08-01

    In this paper, we address the problem of constraint detection for layout regularization. The layout we consider is a set of two-dimensional elements where each element is represented by its bounding box. Layout regularization is important in digitizing plans or images, such as floor plans and facade images, and in the improvement of user-created contents, such as architectural drawings and slide layouts. To regularize a layout, we aim to improve the input by detecting and subsequently enforcing alignment, size, and distance constraints between layout elements. Similar to previous work, we formulate layout regularization as a quadratic programming problem. In addition, we propose a novel optimization algorithm that automatically detects constraints. We evaluate the proposed framework using a variety of input layouts from different applications. Our results demonstrate that our method has superior performance to the state of the art.

  15. Automatic Constraint Detection for 2D Layout Regularization

    KAUST Repository

    Jiang, Haiyong

    2015-09-18

    In this paper, we address the problem of constraint detection for layout regularization. As layout we consider a set of two-dimensional elements where each element is represented by its bounding box. Layout regularization is important for digitizing plans or images, such as floor plans and facade images, and for the improvement of user created contents, such as architectural drawings and slide layouts. To regularize a layout, we aim to improve the input by detecting and subsequently enforcing alignment, size, and distance constraints between layout elements. Similar to previous work, we formulate the layout regularization as a quadratic programming problem. In addition, we propose a novel optimization algorithm to automatically detect constraints. In our results, we evaluate the proposed framework on a variety of input layouts from different applications, which demonstrates our method has superior performance to the state of the art.

  16. Public education and enforcement research study (PEERS).

    Science.gov (United States)

    2013-08-01

    In 2001, the Federal Railroad Administration (FRA) and the Illinois Commerce Commission (ICC) established the Public Education and Enforcement Research Study (PEERS) to test the effectiveness of various education and enforcement (E&E) techniques to i...

  17. 48 CFR 822.406 - Administration and enforcement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Administration and enforcement. 822.406 Section 822.406 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS... Involving Construction 822.406 Administration and enforcement. ...

  18. A law enforcement perspective of electricity deregulation

    International Nuclear Information System (INIS)

    Horowitz, Ira

    2006-01-01

    In April 2004, the California Attorney General's (AG) office issued a white paper that provided a 'law enforcement perspective of the California energy crisis.' To complete this special issue's coverage, I summarize three aspects of that paper: notably, the deficiencies in market oversight and enforcement that left the deregulated market prone to potential abuse, the principal modus operandi that some market agents used to exploit those deficiencies without fear of retribution, and the AG's 'recommendations for improving enforcement and protecting consumers in deregulated energy markets.'. (author)

  19. A Comparison of Military and Law Enforcement Body Armour

    OpenAIRE

    Robin Orr; Ben Schram; Rodney Pope

    2018-01-01

    Law-enforcement officers increasingly wear body armour for protection; wearing body armour is common practice in military populations. Law-enforcement and military occupational demands are vastly different and military-styled body armour may not be suitable for law-enforcement. This study investigated differences between selected military body armour (MBA: 6.4 kg) and law-enforcement body armour (LEBA: 2.1 kg) in impacts on postural sway, vertical jump, agility, a functional movement screen (...

  20. Ideology, Critique and Surveillance

    Directory of Open Access Journals (Sweden)

    Heidi Herzogenrath-Amelung

    2013-11-01

    Full Text Available The 2013 revelations concerning global surveillance programmes demonstrate in unprecedented clarity the need for Critical Theory of information and communication technologies (ICTs to address the mechanisms and implications of increasingly global, ubiquitous surveillance. This is all the more urgent because of the dominance of the “surveillance ideology” (the promise of security through surveillance that supports the political economy of surveillance. This paper asks which theoretical arguments and concepts can be useful for philosophically grounding a critique of this surveillance ideology. It begins by examining how the surveillance ideology works through language and introduces the concept of the ‘ideological packaging’ of ICTs to show how rhetoric surrounding the implementation of surveillance technologies reinforces the surveillance ideology. It then raises the problem of how ideology-critique can work if it relies on language itself and argues that Martin Heidegger’s philosophy can make a useful contribution to existing critical approaches to language.

  1. GAMING LAW ENFORCEMENT AND CRIMINAL JUSTICE PROBLEMS,

    Science.gov (United States)

    and techniques of gaming as they apply to the study of law enforcement problems in general, and to show how gaming may assist in identifying and overcoming some of the major pitfalls in law enforcement planning. (Author)

  2. Automatic speed management in The Netherlands. [Paper presented at the 75th Annual Meeting of the Transportation Research Board TRB, Washington, D.C., January 7-11, 1996.

    NARCIS (Netherlands)

    Oei, H.-l.

    1996-01-01

    Speed warning and enforcement can be applied locally, on a road-stretch and on a road-network. Local automatic speed warning at an urban intersection reduced the mean speed by 5 km/h. Theoretically a reduction in accidents of 25-65% can be achieved. At a rural intersection, the speed limit was

  3. DOE enforcement program roles and responsibilities: DOE handbook

    International Nuclear Information System (INIS)

    1995-08-01

    The Price-Anderson Act provides indemnification to DOE contractors who manage and conduct nuclear activities in the DOE complex. The government acts as an insurer for these contractors against any findings of liability from the nuclear activities of the contractor within the scope of its contract. 10 CFR Part 820 establishes the legal framework for implementing DOE's Nuclear Safety Enforcement Program. Integration with other DOE organizations and programs would assure that the enforcement process properly considers the actual or potential safety significance of a violation when determining an appropriate enforcement sanction. Achieving a proactive contractor compliance assurance rather than a heavy enforcement hand, will require a foundation of cooperation and teamwork across DOE organizations. This handbook identifies the areas of interface for the DOE Enforcement Program and provides guidance on roles and responsibilities for the key DOE organizational areas. It complements DOE-HDBK-1087-95 and 1089-95

  4. 10 CFR 431.198 - Enforcement testing for distribution transformers.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Enforcement testing for distribution transformers. 431.198... COMMERCIAL AND INDUSTRIAL EQUIPMENT Distribution Transformers Compliance and Enforcement § 431.198 Enforcement testing for distribution transformers. (a) Test notice. Upon receiving information in writing...

  5. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1990-09-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1990) and includes copies of letters, notices, and orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  6. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1994-03-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October - December 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  7. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1991-05-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  8. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1993-09-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  9. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1990-11-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1990) and includes copies of letters, notices, and orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  10. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1992-08-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  11. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1991-02-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1990) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  12. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1993-06-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  13. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1990-03-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  14. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1991-07-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April-June 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  15. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1992-05-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  16. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1993-12-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  17. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1993-03-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  18. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1991-11-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  19. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1992-03-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  20. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1992-11-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July - September 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  1. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1989-12-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  2. Who is Surveilling Whom?

    DEFF Research Database (Denmark)

    Mortensen, Mette

    2014-01-01

    This article concerns the particular form of counter-surveillance termed “sousveillance”, which aims to turn surveillance at the institutions responsible for surveillance. Drawing on the theoretical perspectives “mediatization” and “aerial surveillance,” the article studies WikiLeaks’ publication...

  3. Decentralized enforcement, sequential bargaining, and the clean development mechanism

    Energy Technology Data Exchange (ETDEWEB)

    Hovi, Jon

    2001-07-01

    While there is a vast literature both on international bargaining and on how international agreements can be enforced, very little work has been done on how bargaining and enforcement interact. An important exception is Fearon (1998), who models international cooperation as a two-stage process in which the bargaining process is constrained by a need for decentralized enforcement (meaning that the agreement must be enforced by the parties themselves rather than a third party, such as a court). Using the Clean Development Mechanism as an example, the present paper proposes a different model of this kind of interaction. The model follows Fearon's in so far as we both use the infinitely repeated Prisoners' Dilemma to capture the enforcement phase of the game. However, while Fearon depicts the bargaining stage as a War of Attrition, the present model sees that stage as a sequential bargaining game of the Staahl-Rubinstein type. The implications of the present model are compared both to those of the Staahl-Rubinstein model and to those of the Fearon model. A surprising conclusion is that a need for decentralized enforcement tends to make the bargaining outcome more symmetrical than otherwise. Thus, the impact of bargaining power is actually smaller when the resulting agreement must be enforced by the parties themselves than it is if enforcement is taken care of by a third party. (author)

  4. State enforcement of federal standards: Implications for interstate pollution

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, Emma; Kennedy, Peter W. [Department of Economics, University of Victoria, Victoria, BC V8W 2Y2 (Canada)

    2008-08-15

    This paper explores the relationship between interstate air pollution and the division of power between federal and state agencies in setting and enforcing standards. In the context of the US Clean Air Act we argue that the EPA is able to monitor the adoption of technology-based standards more closely than it can monitor state-level enforcement, and that this causes an effective division of control between federal and state agencies. Our analysis offers three main insights into the interstate pollution problem in this setting. First, states have an incentive to enforce standards less stringently on firms located close to downwind borders, and this leads to excessive interstate pollution in equilibrium. Second, there can arise an inherent substitutability in the regulatory problem between strict standards and compliance effort, and this creates a strategic linkage between the federal policy on standards and state policies on enforcement. In particular, a tighter federal standard can induce less selective enforcement but can also lead to less enforcement overall. Third, states will attempt to neutralize the impact of location-based federal standards (that specifically target interstate pollution) in a way that actually exacerbates the underlying enforcement problem. (author)

  5. SOA-surveillance Nederland

    NARCIS (Netherlands)

    Rijlaarsdam J; Bosman A; Laar MJW van de; CIE

    2000-01-01

    In May 1999 a working group was started to evaluate the current surveillance systems for sexually transmitted diseases (STD) and to make suggestions for a renewed effective and efficient STD surveillance system in the Netherlands. The surveillance system has to provide insight into the prevalence

  6. Civil Enforcement Case Report Data Dictionary | ECHO | US ...

    Science.gov (United States)

    ECHO, Enforcement and Compliance History Online, provides compliance and enforcement information for approximately 800,000 EPA-regulated facilities nationwide. ECHO includes permit, inspection, violation, enforcement action, and penalty information about facilities regulated under the Clean Air Act (CAA) Stationary Source Program, Clean Water Act (CWA) National Pollutant Elimination Discharge System (NPDES), and/or Resource Conservation and Recovery Act (RCRA). Information also is provided on surrounding demographics when available.

  7. Automatic surveillance systems

    International Nuclear Information System (INIS)

    Bruschi, R.; Pallottelli, R.

    1985-01-01

    In this paper are presented studies and realization of a special tool, for supporting the console-operator, during normal or abnormal conditions of the plant. It has been realized by means of real-time simulation techniques and it is able: a) to diagnose plant-faults in real-time mode and, to allow the operator to detect the locations of the causes of the malfunctions; b) to supply the conditions where the plant is going, whether in normal or accidental evolution

  8. 24 CFR 125.201 - Administrative Enforcement Initiative.

    Science.gov (United States)

    2010-04-01

    ... Initiative. 125.201 Section 125.201 Housing and Urban Development Regulations Relating to Housing and Urban... FAIR HOUSING FAIR HOUSING INITIATIVES PROGRAM § 125.201 Administrative Enforcement Initiative. The Administrative Enforcement Initiative provides funding to State and local fair housing agencies administering...

  9. 10 CFR 431.383 - Enforcement process for electric motors.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Enforcement process for electric motors. 431.383 Section... COMMERCIAL AND INDUSTRIAL EQUIPMENT Enforcement § 431.383 Enforcement process for electric motors. (a) Test... motor sold by a particular manufacturer or private labeler, which indicates that the electric motor may...

  10. 40 CFR 63.313 - Implementation and enforcement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Implementation and enforcement. 63.313 Section 63.313 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Standards for Coke Oven Batteries § 63.313 Implementation and enforcement. (a) This subpart can be...

  11. A law enforcement perspective of electricity deregulation

    Energy Technology Data Exchange (ETDEWEB)

    Horowitz, Ira [Warrington College of Business, University of Florida, Gainesville, FL 32611-7169 (United States)

    2006-05-15

    In April 2004, the California Attorney General's (AG) office issued a white paper that provided a 'law enforcement perspective of the California energy crisis.' To complete this special issue's coverage, I summarize three aspects of that paper: notably, the deficiencies in market oversight and enforcement that left the deregulated market prone to potential abuse, the principal modus operandi that some market agents used to exploit those deficiencies without fear of retribution, and the AG's 'recommendations for improving enforcement and protecting consumers in deregulated energy markets.'. (author)

  12. GHOST: global hepatitis outbreak and surveillance technology.

    Science.gov (United States)

    Longmire, Atkinson G; Sims, Seth; Rytsareva, Inna; Campo, David S; Skums, Pavel; Dimitrova, Zoya; Ramachandran, Sumathi; Medrzycki, Magdalena; Thai, Hong; Ganova-Raeva, Lilia; Lin, Yulin; Punkova, Lili T; Sue, Amanda; Mirabito, Massimo; Wang, Silver; Tracy, Robin; Bolet, Victor; Sukalac, Thom; Lynberg, Chris; Khudyakov, Yury

    2017-12-06

    Hepatitis C is a major public health problem in the United States and worldwide. Outbreaks of hepatitis C virus (HCV) infections associated with unsafe injection practices, drug diversion, and other exposures to blood are difficult to detect and investigate. Effective HCV outbreak investigation requires comprehensive surveillance and robust case investigation. We previously developed and validated a methodology for the rapid and cost-effective identification of HCV transmission clusters. Global Hepatitis Outbreak and Surveillance Technology (GHOST) is a cloud-based system enabling users, regardless of computational expertise, to analyze and visualize transmission clusters in an independent, accurate and reproducible way. We present and explore performance of several GHOST implemented algorithms using next-generation sequencing data experimentally obtained from hypervariable region 1 of genetically related and unrelated HCV strains. GHOST processes data from an entire MiSeq run in approximately 3 h. A panel of seven specimens was used for preparation of six repeats of MiSeq libraries. Testing sequence data from these libraries by GHOST showed a consistent transmission linkage detection, testifying to high reproducibility of the system. Lack of linkage among genetically unrelated HCV strains and constant detection of genetic linkage between HCV strains from known transmission pairs and from follow-up specimens at different levels of MiSeq-read sampling indicate high specificity and sensitivity of GHOST in accurate detection of HCV transmission. GHOST enables automatic extraction of timely and relevant public health information suitable for guiding effective intervention measures. It is designed as a virtual diagnostic system intended for use in molecular surveillance and outbreak investigations rather than in research. The system produces accurate and reproducible information on HCV transmission clusters for all users, irrespective of their level of bioinformatics

  13. The Cost of Enforcing Building Energy Codes: Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Alison [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Vine, Ed [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Price, Sarah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Sturges, Andrew [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Rosenquist, Greg [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-04-01

    The purpose of this literature review is to summarize key findings regarding the costs associated with enforcing building energy code compliance—primarily focusing on costs borne by local government. The review takes into consideration over 150 documents that discuss, to some extent, code enforcement. This review emphasizes those documents that specifically focus on costs associated with energy code enforcement. Given the low rates of building energy code compliance that have been reported in existing studies, as well as the many barriers to both energy code compliance and enforcement, this study seeks to identify the costs of initiatives to improve compliance and enforcement. Costs are reported primarily as presented in the original source. Some costs are given on a per home or per building basis, and others are provided for jurisdictions of a certain size. This literature review gives an overview of state-based compliance rates, barriers to code enforcement, and U.S. Department of Energy (DOE) and key stakeholder involvement in improving compliance with building energy codes. In addition, the processes and costs associated with compliance and enforcement of building energy codes are presented. The second phase of this study, which will be presented in a different report, will consist of surveying 34 experts in the building industry at the national and state or local levels in order to obtain additional cost information, building on the findings from the first phase, as well as recommendations for where to most effectively spend money on compliance and enforcement.

  14. NRC Enforcement Policy Review, July 1995-July 1997

    International Nuclear Information System (INIS)

    Lieberman, J.; Pedersen, R.M.

    1998-04-01

    On June 30, 1995, the Nuclear Regulatory Commission (NRC) issued a complete revision of its General Statement of Policy and Procedure for Enforcement Action (Enforcement Policy) (60 FR 34381). In approving the 1995 revision to the Enforcement Policy, the Commission directed the staff to perform a review of its implementation of the Policy after approximately 2 years of experience and to consider public comments. This report represents the results of that review

  15. Law enforcement attitudes toward overdose prevention and response

    Science.gov (United States)

    Green, Traci C.; Zaller, Nickolas; Palacios, Wilson R.; Bowman, Sarah E.; Ray, Madeline; Heimer, Robert; Case, Patricia

    2014-01-01

    Background Law enforcement is often the first to respond to medical emergencies in the community, including overdose. Due to the nature of their job, officers have also witnessed first-hand the changing demographic of drug users and devastating effects on their community associated with the epidemic of nonmedical prescription opioid use in the United States. Despite this seminal role, little data exist on law enforcement attitudes toward overdose prevention and response. Methods We conducted key informant interviews as part of a 12-week Rapid Assessment and Response (RAR) process that aimed to better understand and prevent nonmedical prescription opioid use and overdose deaths in locations in Connecticut and Rhode Island experiencing overdose “outbreaks.” Interviews with 13 law enforcement officials across three study sites were analyzed to uncover themes on overdose prevention and naloxone. Results Findings indicated support for law enforcement involvement in overdose prevention. Hesitancy around naloxone administration by laypersons was evident. Interview themes highlighted officers’ feelings of futility and frustration with their current overdose response options, the lack of accessible local drug treatment, the cycle of addiction, and the pervasiveness of easily accessible prescription opioid medications in their communities. Overdose prevention and response, which for some officers included law enforcement-administered naloxone, were viewed as components of community policing and good police-community relations. Conclusion Emerging trends, such as existing law enforcement medical interventions and Good Samaritan Laws, suggest the need for broader law enforcement engagement around this pressing public health crisis, even in suburban and small town locations, to promote public safety. PMID:24051061

  16. Law enforcement attitudes toward overdose prevention and response.

    Science.gov (United States)

    Green, Traci C; Zaller, Nickolas; Palacios, Wilson R; Bowman, Sarah E; Ray, Madeline; Heimer, Robert; Case, Patricia

    2013-12-01

    Law enforcement is often the first to respond to medical emergencies in the community, including overdose. Due to the nature of their job, officers have also witnessed first-hand the changing demographic of drug users and devastating effects on their community associated with the epidemic of nonmedical prescription opioid use in the United States. Despite this seminal role, little data exist on law enforcement attitudes toward overdose prevention and response. We conducted key informant interviews as part of a 12-week Rapid Assessment and Response (RAR) process that aimed to better understand and prevent nonmedical prescription opioid use and overdose deaths in locations in Connecticut and Rhode Island experiencing overdose "outbreaks." Interviews with 13 law enforcement officials across three study sites were analyzed to uncover themes on overdose prevention and naloxone. Findings indicated support for law enforcement involvement in overdose prevention. Hesitancy around naloxone administration by laypersons was evident. Interview themes highlighted officers' feelings of futility and frustration with their current overdose response options, the lack of accessible local drug treatment, the cycle of addiction, and the pervasiveness of easily accessible prescription opioid medications in their communities. Overdose prevention and response, which for some officers included law enforcement-administered naloxone, were viewed as components of community policing and good police-community relations. Emerging trends, such as existing law enforcement medical interventions and Good Samaritan Laws, suggest the need for broader law enforcement engagement around this pressing public health crisis, even in suburban and small town locations, to promote public safety. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  17. Significant NRC Enforcement Actions

    Data.gov (United States)

    Nuclear Regulatory Commission — This dataset provides a list of Nuclear Regulartory Commission (NRC) issued significant enforcement actions. These actions, referred to as "escalated", are issued by...

  18. EPA Administrative Enforcement Dockets

    Data.gov (United States)

    U.S. Environmental Protection Agency — The EPA Administrative Enforcement Dockets database contains the electronic dockets for administrative penalty cases filed by EPA Regions and Headquarters. Visitors...

  19. 32 CFR 634.33 - Training of law enforcement personnel.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Training of law enforcement personnel. 634.33 Section 634.33 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.33 Training of law enforcement personnel. (a) A...

  20. 21 CFR 1309.26 - Exemption of law enforcement officials.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Exemption of law enforcement officials. 1309.26 Section 1309.26 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION OF MANUFACTURERS, DISTRIBUTORS, IMPORTERS AND EXPORTERS OF LIST I CHEMICALS Requirements for Registration § 1309.26 Exemption of law enforcement...

  1. 21 CFR 1301.24 - Exemption of law enforcement officials.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Exemption of law enforcement officials. 1301.24 Section 1301.24 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION OF MANUFACTURERS, DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Exceptions to Registration and Fees § 1301.24 Exemption of law enforcement...

  2. A Review on Regulatory Enforcement Policy

    International Nuclear Information System (INIS)

    Lim, Ji Han; Lee, Kyung Joo; Choi, Young Sung

    2017-01-01

    This paper examine the meaning and principle of enforcement through examples from other countries. Regulatory enforcement is the last stage of safety regulation and how it is exercised when one failing to meet regulatory requirements can have significant ripple effect across the industry. Thus, right philosophy and principle should be established. It is not recommended to emphasize neither deterrence approach nor behavior modification approach. This should be also taken into consideration when setting up the principle and system of regulatory enforcement. In the process of Vienna Declaration, Europe and the U.S showed the fundamental differences in their approaches to safety regulation. Considering this, it is required to remain cautious at all times on what to be improved in the aspect of internal consistency within our system and also in the aspect of procedure.

  3. Surveillance for work-related skull fractures in Michigan.

    Science.gov (United States)

    Kica, Joanna; Rosenman, Kenneth D

    2014-12-01

    The objective was to develop a multisource surveillance system for work-related skull fractures. Records on work-related skull fractures were obtained from Michigan's 134 hospitals, Michigan's Workers' Compensation Agency and death certificates. Cases from the three sources were matched to eliminate duplicates from more than one source. Workplaces where the most severe injuries occurred were referred to OSHA for an enforcement inspection. There were 318 work related skull fractures, not including facial fractures, between 2010 and 2012. In 2012, after the inclusion of facial fractures, 316 fractures were identified of which 218 (69%) were facial fractures. The Bureau of Labor Statistic's (BLS) 2012 estimate of skull fractures in Michigan, which includes facial fractures, was 170, which was 53.8% of those identified from our review of medical records. The inclusion of facial fractures in the surveillance system increased the percentage of women identified from 15.4% to 31.2%, decreased severity (hospitalization went from 48.7% to 10.6% and loss of consciousness went from 56.5% to 17.8%), decreased falls from 48.2% to 27.6%, and increased assaults from 5.0% to 20.2%, shifted the most common industry from construction (13.3%) to health care and social assistance (15.0%) and the highest incidence rate from males 65+ (6.8 per 100,000) to young men, 20-24 years (9.6 per 100,000). Workplace inspections resulted in 45 violations and $62,750 in penalties. The Michigan multisource surveillance system of workplace injuries had two major advantages over the existing national system: (a) workplace investigations were initiated hazards identified and safety changes implemented at the facilities where the injuries occurred; and (b) a more accurate count was derived, with 86% more work-related skull fractures identified than BLS's employer based estimate. A more comprehensive system to identify and target interventions for workplace injuries was implemented using hospital and

  4. 32 CFR 806b.8 - Obtaining law enforcement records.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Obtaining law enforcement records. 806b.8 Section 806b.8 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Obtaining Law Enforcement Records and Confidentiality Promises § 806b.8 Obtaining law enforcement records. The Commander, Air...

  5. 25 CFR 11.909 - Law enforcement records.

    Science.gov (United States)

    2010-04-01

    ... BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Children's Court § 11.909 Law enforcement records. (a) Law enforcement records and files... minor's parents or guardian, the presenting officer, or others by order of the children's court. ...

  6. 15 CFR 922.103 - Management and enforcement.

    Science.gov (United States)

    2010-01-01

    ... provisions of any grant or cooperative agreement. NOAA may act to deputize enforcement agents of the American Samoa Government (ASG) to enforce the regulations in this subpart in accordance with existing law. If NOAA chooses to exercise this provision, a memorandum of understanding shall be executed between NOAA...

  7. Child Support Enforcement Annual Data Report Form 157

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  8. Enhanced Disease Surveillance during the 2012 Republican National Convention, Tampa, FL

    Science.gov (United States)

    Atrubin, David; Wiese, Michael; Snider, Rebecca; Workman, Kiley; McDougle, Warren

    2013-01-01

    Objective To describe disease and illness surveillance utilized during the 2012 Republican National Convention (RNC) held August 26–30, 2012 in Tampa, FL. Introduction While the Tampa Bay Area has previously hosted other high profile events that required heightened disease surveillance (e.g., two Super Bowls), the 2012 RNC marked the first national special security event (NSSE) held in Florida. The Hillsborough County Health Department (HCHD), in conjunction with the Pinellas County Health Department (PinCHD) coordinated disease surveillance activities during this time frame. This presentation will focus of the disease surveillance efforts of the Hillsborough County Health Department during the 2012 RNC. In addition to the surveillance systems that are used routinely, the HCHD Epidemiology Program implemented additional systems designed to rapidly detect individual cases and outbreaks of public health importance. The short duration of RNC, coupled with the large number of visitors to our area, provided additional surveillance challenges. Tropical Storm Isaac, which threatened Tampa in the days leading up to RNC, and an overwhelming law enforcement presence likely dissuaded many protestors from coming to Tampa. As a result, a tiny fraction of the number of protestors that were expected actually showed up. Methods Our normal daily analysis of the emergency department (ED) data using the Electronic Surveillance System for the Early Notification of Community-based Epidemics (ESSENCE) was expanded to look in detail at ED volumes and chief complaints of those patients who live outside of a 5-county Tampa Bay area. This analysis used patient zip code to determine place of residence. Additionally, ESSENCE queries were utilized to look for heat, tear gas, and RNC related exposures. The ESSENCE system also receives Poison Control data every 15 minutes. Expanded analyses of the Poison Control data were conducted as well. Two Disaster Medical Assistance Teams (DMATs) were

  9. Effective enforcement of the forest practices code

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-31

    The British Columbia Forest Practices Code establishes a scheme to guide and direct forest harvesting and other forest uses in concert with other related acts. The Code is made up of the Forest Practices Code of British Columbia Act, regulations, standards, and guidebooks. This document provides information on Code enforcement. It reviews the roles of the three provincial resource ministries and the Attorney General in enforcing the code, the various activities undertaken to ensure compliance (including inspections, investigations, and responses to noncompliance), and the role of the public in helping to enforce the Code. The appendix contains a list of Ministry of Forests office locations and telephone numbers.

  10. Drug Enforcement Administration.

    Science.gov (United States)

    Department of Justice, Washington, DC.

    This fact sheet contains information relating to drug abuse and abusers; drug traffic legislation; law enforcement; and descriptions of commonly used narcotics, stimulants, depressants, and hallucinogens. Also included is a short but explicit listing of audiovisual aids, an annotated bibliography, and drug identification pictures. The booklet…

  11. ORBiT: Oak Ridge Bio-surveillance Toolkit for Public Health Dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Ramanathan, Arvind [ORNL; Pullum, Laura L [ORNL; Hobson, Tanner C [ORNL; Steed, Chad A [ORNL; Chennubhotla, Chakra [University of Pittsburgh School of Medicine; Quinn, Shannon [University of Pittsburgh School of Medicine

    2015-01-01

    With novel emerging infectious diseases being reported across different parts of the world, there is a need to build effective bio-surveillance systems that can track, monitor and report such events in a timely manner. Apart from monitoring for emerging disease outbreaks, it is also important to identify susceptible geographic regions and populations where these diseases may have a significant impact. The digitization of health related information through electronic health records (EHR) and electronic healthcare claim reimbursements (eHCR) and the continued growth of self-reported health information through social media provides both tremendous opportunities and challenges in developing novel public health surveillance tools. In this paper, we present an overview of Oak Ridge Bio-surveillance Toolkit (ORBiT), which we have developed specifically to address data analytic challenges in the realm of public health surveillance. In particular, ORBiT provides an extensible environment to pull together diverse, large-scale datasets and analyze them to identify spatial and temporal patterns for various bio-surveillance related tasks. We demonstrate the utility of ORBiT in automatically extracting a small number of spatial and temporal patterns during the 2009-2010 pandemic H1N1 flu season using eHCR data. These patterns provide quantitative insights into the dynamics of how the pandemic flu spread across different parts of the country. We discovered that the eHCR data exhibits multi-scale patterns from which we could identify a small number of states in the United States (US) that act as bridge regions contributing to one or more specific influenza spread patterns. Similar to previous studies, the patterns show that the south-eastern regions of the US were widely affected by the H1N1 flu pandemic. Several of these south-eastern states act as bridge regions, which connect the north-east and central US in terms of flu occurrences. These quantitative insights show how the e

  12. An automated, broad-based, near real-time public health surveillance system using presentations to hospital Emergency Departments in New South Wales, Australia

    Directory of Open Access Journals (Sweden)

    Chiu Clayton

    2005-12-01

    Full Text Available Abstract Background In a climate of concern over bioterrorism threats and emergent diseases, public health authorities are trialling more timely surveillance systems. The 2003 Rugby World Cup (RWC provided an opportunity to test the viability of a near real-time syndromic surveillance system in metropolitan Sydney, Australia. We describe the development and early results of this largely automated system that used data routinely collected in Emergency Departments (EDs. Methods Twelve of 49 EDs in the Sydney metropolitan area automatically transmitted surveillance data from their existing information systems to a central database in near real-time. Information captured for each ED visit included patient demographic details, presenting problem and nursing assessment entered as free-text at triage time, physician-assigned provisional diagnosis codes, and status at departure from the ED. Both diagnoses from the EDs and triage text were used to assign syndrome categories. The text information was automatically classified into one or more of 26 syndrome categories using automated "naïve Bayes" text categorisation techniques. Automated processes were used to analyse both diagnosis and free text-based syndrome data and to produce web-based statistical summaries for daily review. An adjusted cumulative sum (cusum was used to assess the statistical significance of trends. Results During the RWC the system did not identify any major public health threats associated with the tournament, mass gatherings or the influx of visitors. This was consistent with evidence from other sources, although two known outbreaks were already in progress before the tournament. Limited baseline in early monitoring prevented the system from automatically identifying these ongoing outbreaks. Data capture was invisible to clinical staff in EDs and did not add to their workload. Conclusion We have demonstrated the feasibility and potential utility of syndromic surveillance using

  13. 40 CFR 205.57 - Selective enforcement auditing requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing requirements. 205.57 Section 205.57 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE... Selective enforcement auditing requirements. ...

  14. 49 CFR 1542.215 - Law enforcement support.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement support. 1542.215 Section 1542.215..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.215 Law... program under § 1542.103(a) or (b) must provide: (1) Law enforcement personnel in the number and manner...

  15. 27 CFR 478.134 - Sale of firearms to law enforcement officers.

    Science.gov (United States)

    2010-04-01

    ... AMMUNITION Records § 478.134 Sale of firearms to law enforcement officers. (a) Law enforcement officers... complete Form 4473 or Form 5300.35. The law enforcement officer purchasing the firearm may purchase a...) In Federal law enforcement offices, the supervisor in charge of the office to which the Federal...

  16. Hunting, law enforcement, and African primate conservation.

    Science.gov (United States)

    N'Goran, Paul K; Boesch, Christophe; Mundry, Roger; N'Goran, Eliezer K; Herbinger, Ilka; Yapi, Fabrice A; Kühl, Hjalmar S

    2012-06-01

    Primates are regularly hunted for bushmeat in tropical forests, and systematic ecological monitoring can help determine the effect hunting has on these and other hunted species. Monitoring can also be used to inform law enforcement and managers of where hunting is concentrated. We evaluated the effects of law enforcement informed by monitoring data on density and spatial distribution of 8 monkey species in Taï National Park, Côte d'Ivoire. We conducted intensive surveys of monkeys and looked for signs of human activity throughout the park. We also gathered information on the activities of law-enforcement personnel related to hunting and evaluated the relative effects of hunting, forest cover and proximity to rivers, and conservation effort on primate distribution and density. The effects of hunting on monkeys varied among species. Red colobus monkeys (Procolobus badius) were most affected and Campbell's monkeys (Cercopithecus campbelli) were least affected by hunting. Density of monkeys irrespective of species was up to 100 times higher near a research station and tourism site in the southwestern section of the park, where there is little hunting, than in the southeastern part of the park. The results of our monitoring guided law-enforcement patrols toward zones with the most hunting activity. Such systematic coordination of ecological monitoring and law enforcement may be applicable at other sites. ©2012 Society for Conservation Biology.

  17. SeeCoast: persistent surveillance and automated scene understanding for ports and coastal areas

    Science.gov (United States)

    Rhodes, Bradley J.; Bomberger, Neil A.; Freyman, Todd M.; Kreamer, William; Kirschner, Linda; L'Italien, Adam C.; Mungovan, Wendy; Stauffer, Chris; Stolzar, Lauren; Waxman, Allen M.; Seibert, Michael

    2007-04-01

    SeeCoast is a prototype US Coast Guard port and coastal area surveillance system that aims to reduce operator workload while maintaining optimal domain awareness by shifting their focus from having to detect events to being able to analyze and act upon the knowledge derived from automatically detected anomalous activities. The automated scene understanding capability provided by the baseline SeeCoast system (as currently installed at the Joint Harbor Operations Center at Hampton Roads, VA) results from the integration of several components. Machine vision technology processes the real-time video streams provided by USCG cameras to generate vessel track and classification (based on vessel length) information. A multi-INT fusion component generates a single, coherent track picture by combining information available from the video processor with that from surface surveillance radars and AIS reports. Based on this track picture, vessel activity is analyzed by SeeCoast to detect user-defined unsafe, illegal, and threatening vessel activities using a rule-based pattern recognizer and to detect anomalous vessel activities on the basis of automatically learned behavior normalcy models. Operators can optionally guide the learning system in the form of examples and counter-examples of activities of interest, and refine the performance of the learning system by confirming alerts or indicating examples of false alarms. The fused track picture also provides a basis for automated control and tasking of cameras to detect vessels in motion. Real-time visualization combining the products of all SeeCoast components in a common operating picture is provided by a thin web-based client.

  18. 49 CFR 26.105 - What enforcement actions apply in FAA programs?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false What enforcement actions apply in FAA programs? 26... Enforcement § 26.105 What enforcement actions apply in FAA programs? (a) Compliance with all requirements of this part by airport sponsors and other recipients of FAA financial assistance is enforced through the...

  19. Law Enforcement Support Office (LESO) 1999 National Conference

    National Research Council Canada - National Science Library

    Lytle, Michael

    1999-01-01

    The Law Enforcement Support Office (LESO) national conference was a three-day forum to inform and update federal, state and local law enforcement agents, of the DoD role supporting the National Drug Control Strategy...

  20. Citizen enforcement and the smoking gun

    International Nuclear Information System (INIS)

    Unterberger, G.L.

    1991-01-01

    This article addresses the provisions for private citizens to bring lawsuits in federal court against regulated parties violating federal air pollution-control laws and the steps that operators of facilities subject to air pollution-control laws need to take to help avoid significant enforcement liabilities. The topics of the article include a look at citizen enforcement since 1970, the 1990 amendments to the Clean Air Act, construction and management with these regulations

  1. Utilization of Local Law Enforcement Aerial Resources in Consequence Management (CM) Response

    Energy Technology Data Exchange (ETDEWEB)

    Wasiolek, Piotr T.; Malchow, Russell L.

    2013-03-12

    During the past decade the U.S. Department of Homeland Security (DHS) was instrumental in enhancing the nation’s ability to detect and prevent a radiological or nuclear attack in the highest risk cities. Under the DHS Securing the Cities initiative, nearly 13,000 personnel in the New York City region have been trained in preventive radiological and nuclear detection operations, and nearly 8,500 pieces of radiological detection equipment have been funded. As part of the preventive radiological/nuclear detection (PRND) mission, several cities have received funding to purchase commercial aerial radiation detection systems. In 2008, the U.S. Department of Energy, National Nuclear Security Administration Aerial Measuring System (AMS) program started providing Mobile Aerial Radiological Surveillance (MARS) training to such assets, resulting in over 150 HAZMAT teams’ officers and pilots from 10 law enforcement organizations and fire departments being trained in the aerial radiation detection. From the beginning, the MARS training course covered both the PRND and consequence management (CM) missions. Even if the law enforcement main focus is PRND, their aerial assets can be utilized in the collection of initial radiation data for post-event radiological CM response. Based on over 50 years of AMS operational experience and information collected during MARS training, this presentation will focus on the concepts of CM response using aerial assets as well as utilizing law enforcement/fire department aerial assets in CM. Also discussed will be the need for establishing closer relationships between local jurisdictions’ aerial radiation detection capabilities and state and local radiation control program directors, radiological health department managers, etc. During radiological events these individuals may become primary experts/advisers to Incident Commanders for radiological emergency response, especially in the early stages of a response. The knowledge of the existence

  2. Surveillance Culture

    DEFF Research Database (Denmark)

    2017-01-01

    What does it mean to live in a world full of surveillance? In this documentary film, we take a look at everyday life in Denmark and how surveillance technologies and practices influence our norms and social behaviour. Researched and directed by Btihaj Ajana and Anders Albrechtslund....

  3. Remote data entry and retrieval for law enforcement

    Science.gov (United States)

    Kwasowsky, Bohdan R.; Capraro, Gerard T.; Berdan, Gerald B.; Capraro, Christopher T.

    1997-02-01

    Law enforcement personnel need to capture and retrieve quality multimedia data in `real time' while in the field. This is not done today, for the most part. Most law enforcement officers gather data on handwritten forms and retrieve data via voice communications or fax. This approach is time consuming, costly, prone to errors, and may require months before some data are entered into a usable law enforcement database. With advances in the computing and communications industries, it is now possible to communicate with anyone using a laptop computer or personal digital assistant (PDA), given a phone line, an RF modem, or cellular capability. Many law enforcement officers have access to laptop computers within their vehicles and can stay in touch with their command center and/or retrieve data from local, state, or federal databases. However, this same capability is not available once they leave the vehicle or if the officer is on a beat, motorcycle, or horseback. This paper investigates the issues and reviews the state of the art for integrating a PDA into the gathering and retrieving of multimedia data for law enforcement.

  4. Neural nets for the plausibility check of measured values in the integrated measurement and information system for the surveillance of environmental radioactivity (IMIS)

    International Nuclear Information System (INIS)

    Haase, G.

    2003-01-01

    Neural nets to the plausibility check of measured values in the ''integrated measurement and information system for the surveillance of environmental radioactivity, IMIS'' is a research project supported by the Federal Minister for the Environment, Nature Conservation and Nuclear Safety. A goal of this project was the automatic recognition of implausible measured values in the data base ORACLE, which measured values from surveillance of environmental radioactivity of most diverse environmental media contained. The conversion of this project [ 1 ] was realized by institut of logic, complexity and deduction systems of the university Karlsruhe under the direction of Professor Dr. Menzel, Dr. Martin Riedmueller and Martin Lauer. (orig.)

  5. Automatic Imitation

    Science.gov (United States)

    Heyes, Cecilia

    2011-01-01

    "Automatic imitation" is a type of stimulus-response compatibility effect in which the topographical features of task-irrelevant action stimuli facilitate similar, and interfere with dissimilar, responses. This article reviews behavioral, neurophysiological, and neuroimaging research on automatic imitation, asking in what sense it is "automatic"…

  6. Integrating malaria surveillance with climate data for outbreak detection and forecasting: the EPIDEMIA system.

    Science.gov (United States)

    Merkord, Christopher L; Liu, Yi; Mihretie, Abere; Gebrehiwot, Teklehaymanot; Awoke, Worku; Bayabil, Estifanos; Henebry, Geoffrey M; Kassa, Gebeyaw T; Lake, Mastewal; Wimberly, Michael C

    2017-02-23

    Early indication of an emerging malaria epidemic can provide an opportunity for proactive interventions. Challenges to the identification of nascent malaria epidemics include obtaining recent epidemiological surveillance data, spatially and temporally harmonizing this information with timely data on environmental precursors, applying models for early detection and early warning, and communicating results to public health officials. Automated web-based informatics systems can provide a solution to these problems, but their implementation in real-world settings has been limited. The Epidemic Prognosis Incorporating Disease and Environmental Monitoring for Integrated Assessment (EPIDEMIA) computer system was designed and implemented to integrate disease surveillance with environmental monitoring in support of operational malaria forecasting in the Amhara region of Ethiopia. A co-design workshop was held with computer scientists, epidemiological modelers, and public health partners to develop an initial list of system requirements. Subsequent updates to the system were based on feedback obtained from system evaluation workshops and assessments conducted by a steering committee of users in the public health sector. The system integrated epidemiological data uploaded weekly by the Amhara Regional Health Bureau with remotely-sensed environmental data freely available from online archives. Environmental data were acquired and processed automatically by the EASTWeb software program. Additional software was developed to implement a public health interface for data upload and download, harmonize the epidemiological and environmental data into a unified database, automatically update time series forecasting models, and generate formatted reports. Reporting features included district-level control charts and maps summarizing epidemiological indicators of emerging malaria outbreaks, environmental risk factors, and forecasts of future malaria risk. Successful implementation and

  7. Appendix F. Developmental enforcement algorithm definition document : predictive braking enforcement algorithm definition document.

    Science.gov (United States)

    2012-05-01

    The purpose of this document is to fully define and describe the logic flow and mathematical equations for a predictive braking enforcement algorithm intended for implementation in a Positive Train Control (PTC) system.

  8. 77 FR 32901 - State Enforcement of Household Goods Consumer Protection

    Science.gov (United States)

    2012-06-04

    ... enforce certain consumer protection provisions of Title 49 of the United States Code (U.S.C.) and related... bring civil actions in the U.S. district courts to enforce the consumer protection provisions that apply..., 386, and 387 State Enforcement of Household Goods Consumer Protection AGENCY: Federal Motor Carrier...

  9. [Surveillance Plan on Recent Outbreak of Measles and Rubella in Catalonia, Spain].

    Science.gov (United States)

    Jané, Mireia; Torner, Nuria; Vidal, Ma José

    2015-01-01

    Measles and rubella are two immuno-preventive illnesses. In Catalonia, since 1988 all children are given two doses of measles and rubella vaccine with high levels of vaccination coverage. The measles elimination programme has been carried out since 1990 in Catalonia. This programme includes achieving and keeping high immunization levels among population with high vaccination coverage, intense epidemiological surveillance and an immediate response to the appearance of a case or outbreak. In 2014, the measles incidence rate was 1.9 cases/ 100,000 inhabitants. There were 4 recent outbreaks in 2006, 2011, 2013 and 2014 that affected 381, 289, 31 and 124 people respectively. All outbreaks were triggered by an imported case. In 2011 and 2014 measles outbreaks, 6% and 5.5% of affected people were health care workers. All outbreaks presented a great variety of measles genotypes. Concerning rubella elimination programme, since 2002, 68 cases of postnatal rubella and 5 cases of congenital rubella were confirmed. Regarding measles and rubella surveillance and control, in addition to strengthen vaccination coverage, it is essential immediate notification, within the first 24 hours since suspicion and laboratory confirmation. In addition there is a need to enforce vaccination among health care workers as well as in other susceptible and unvaccinated people. It is recommended to vaccinate all people who were born after 1966 and who have not been vaccinated with two doses of trivalent measles-mumps-rubella vaccine. Furthermore, we have to emphasize that the progress concerning genotypes study allows identifying various imported cases from other European countries with active outbreaks, aspect that makes easier the surveillance of these illnesses.

  10. 40 CFR 1068.401 - What is a selective enforcement audit?

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false What is a selective enforcement audit? 1068.401 Section 1068.401 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR POLLUTION CONTROLS GENERAL COMPLIANCE PROVISIONS FOR ENGINE PROGRAMS Selective Enforcement Auditing § 1068.401 What is a selective enforcement audit...

  11. Verification of Security Policy Enforcement in Enterprise Systems

    Science.gov (United States)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  12. 76 FR 4369 - Special Law Enforcement Commissions

    Science.gov (United States)

    2011-01-25

    ...This notice announces the online publication of the Interim Special Law Enforcement Commission Policy, Rules and Procedures, the Interim Special Law Enforcement Commission Protocols and the Interim Domestic Violence Waiver that will be used by the Office of Justice Services following passage of the Tribal Law and Order Act of 2010. The documents are published on the Indian Affairs Web site.

  13. Restraint use law enforcement intervention in Latino communities.

    Science.gov (United States)

    Schaechter, Judy; Uhlhorn, Susan B

    2011-11-01

    Motor vehicle crashes are the leading cause of death for U.S. Latinos aged 1 to 35 years. Restraint use is an effective means of prevention of motor vehicle crash injury. Effective interventions to raise restraint use include the following: legislation, law enforcement, education, and equipment distribution. The effects of law enforcement interventions in Latino immigrant communities are understudied. We measured the community-level effect of a combined intervention that included warnings and citations phase enforcement in Latino communities. We designed and implemented in two of three Latino-majority communities a multicomponent intervention consisting of a community awareness campaign, restraint use education with equipment distribution, and a two-staged law enforcement intervention. Restraint use observations were conducted in all three communities at baseline, after the warnings phase and again after the citations phase of the intervention were completed. The combined intervention of community awareness, education, child passenger restraint distribution, and law enforcement focused on educational traffic stops with incentives and warnings was associated with a significant increase in both driver and child passenger restraint use in one intervention community, but only driver restraint increased to a level of significance in the other intervention community; significant increase was also noted among nonintervention drivers. The citations phase of the intervention did not result in a significant increase in restraint use and was complicated by interruptions due to unlicensed drivers. The combined effort of community awareness, education, equipment distribution and law enforcement intervention that included incentives and warnings may be effective at increasing seat belt use in Latino communities without the need for citations.

  14. Prospects of development of the court decrees enforcement system

    Directory of Open Access Journals (Sweden)

    Kristina Sergeyevna Morkovskaya

    2015-06-01

    Full Text Available Objective the relevance of the topic the insufficient level of its scientific elaboration predetermined the research objectives which consist in the analysis of the institution of enforcement proceedings the identification of key challenges trends and ways to improve the current system of court decrees enforcement. Methods the methodological basis of the undertaken research is scientific method of cognition in conjunction with certain specific scientific methods the laws of formal logic historical method comparative legal method and systematic analysis of theoretical works studied in this work. Results the emerging trends in the enforcement proceedings reform in the country cannot be considered to be satisfactory in general although some initiatives seem quite appropriate in case of the proper performance. If you the situation cannot be rectified with the execution of judicial decrees basing on own experience only it is necessary to pay attention to foreign practices and to provide citizens with the right to an effective judicial protection. Of all approaches to reforming of the enforcement institution analyzed in the article the preferred for the Russian legal reality is modernization of the existing nonjudicial system of enforcement through civil procedural means. Scientific novelty at present neither the civil procedure nor the general theory of law has not developed a unified understanding of the civil procedural tools for improving the efficiency of enforcement proceedings. Practical value the main provisions and conclusions of the article can be used in research and teaching when viewing the issues of the effectiveness of enforcement proceedings. nbsp

  15. 12 CFR 403.11 - Enforcement and investigation procedures.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Enforcement and investigation procedures. 403.11 Section 403.11 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES CLASSIFICATION, DECLASSIFICATION, AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION § 403.11 Enforcement and investigation...

  16. Fusing Intelligence With Law Enforcement Information: An Analytic Imperative

    National Research Council Canada - National Science Library

    Thornlow, Christopher C

    2005-01-01

    ... and Law Enforcement Communities to fuse and analyze foreign threat intelligence with domestic law enforcement information in a timely fashion to provide adequate indications and warning of such an...

  17. Next Generation Space Surveillance System-of-Systems

    Science.gov (United States)

    McShane, B.

    2014-09-01

    International economic and military dependence on space assets is pervasive and ever-growing in an environment that is now congested, contested, and competitive. There are a number of natural and man-made risks that need to be monitored and characterized to protect and preserve the space environment and the assets within it. Unfortunately, today's space surveillance network (SSN) has gaps in coverage, is not resilient, and has a growing number of objects that get lost. Risks can be efficiently and effectively mitigated, gaps closed, resiliency improved, and performance increased within a next generation space surveillance network implemented as a system-of-systems with modern information architectures and analytic techniques. This also includes consideration for the newest SSN sensors (e.g. Space Fence) which are born Net-Centric out-of-the-box and able to seamlessly interface with the JSpOC Mission System, global information grid, and future unanticipated users. Significant opportunity exists to integrate legacy, traditional, and non-traditional sensors into a larger space system-of-systems (including command and control centers) for multiple clients through low cost sustainment, modification, and modernization efforts. Clients include operations centers (e.g. JSpOC, USSTRATCOM, CANSPOC), Intelligence centers (e.g. NASIC), space surveillance sensor sites (e.g. AMOS, GEODSS), international governments (e.g. Germany, UK), space agencies (e.g. NASA), and academic institutions. Each has differing priorities, networks, data needs, timeliness, security, accuracy requirements and formats. Enabling processes and technologies include: Standardized and type accredited methods for secure connections to multiple networks, machine-to-machine interfaces for near real-time data sharing and tip-and-queue activities, common data models for analytical processing across multiple radar and optical sensor types, an efficient way to automatically translate between differing client and

  18. Automated graphic image generation system for effective representation of infectious disease surveillance data.

    Science.gov (United States)

    Inoue, Masashi; Hasegawa, Shinsaku; Suyama, Akihiko; Meshitsuka, Shunsuke

    2003-11-01

    Infectious disease surveillance schemes have been established to detect infectious disease outbreak in the early stages, to identify the causative viral strains, and to rapidly assess related morbidity and mortality. To make a scheme function well, two things are required. Firstly, it must have sufficient sensitivity and be timely to guarantee as short a delay as possible from collection to redistribution of information. Secondly, it must provide a good representation of the results of the surveillance. To do this, we have developed a database system that can redistribute the information via the Internet. The feature of this system is to automatically generate the graphic images based on the numerical data stored in the database by using Hypertext Preprocessor (PHP) script and Graphics Drawing (GD) library. It dynamically displays the information as a map or bar chart as well as a numerical impression according to the real time demand of the users. This system will be a useful tool for medical personnel and researchers working on infectious disease problems and will save significant time in the redistribution of information.

  19. Digital Surveillance: A Novel Approach to Monitoring the Illegal Wildlife Trade

    Science.gov (United States)

    Joly, Damien; Mekaru, Sumiko; Brownstein, John S.

    2012-01-01

    A dearth of information obscures the true scale of the global illegal trade in wildlife. Herein, we introduce an automated web crawling surveillance system developed to monitor reports on illegally traded wildlife. A resource for enforcement officials as well as the general public, the freely available website, http://www.healthmap.org/wildlifetrade, provides a customizable visualization of worldwide reports on interceptions of illegally traded wildlife and wildlife products. From August 1, 2010 to July 31, 2011, publicly available English language illegal wildlife trade reports from official and unofficial sources were collected and categorized by location and species involved. During this interval, 858 illegal wildlife trade reports were collected from 89 countries. Countries with the highest number of reports included India (n = 146, 15.6%), the United States (n = 143, 15.3%), South Africa (n = 75, 8.0%), China (n = 41, 4.4%), and Vietnam (n = 37, 4.0%). Species reported as traded or poached included elephants (n = 107, 12.5%), rhinoceros (n = 103, 12.0%), tigers (n = 68, 7.9%), leopards (n = 54, 6.3%), and pangolins (n = 45, 5.2%). The use of unofficial data sources, such as online news sites and social networks, to collect information on international wildlife trade augments traditional approaches drawing on official reporting and presents a novel source of intelligence with which to monitor and collect news in support of enforcement against this threat to wildlife conservation worldwide. PMID:23236444

  20. Digital surveillance: a novel approach to monitoring the illegal wildlife trade.

    Science.gov (United States)

    Sonricker Hansen, Amy L; Li, Annie; Joly, Damien; Mekaru, Sumiko; Brownstein, John S

    2012-01-01

    A dearth of information obscures the true scale of the global illegal trade in wildlife. Herein, we introduce an automated web crawling surveillance system developed to monitor reports on illegally traded wildlife. A resource for enforcement officials as well as the general public, the freely available website, http://www.healthmap.org/wildlifetrade, provides a customizable visualization of worldwide reports on interceptions of illegally traded wildlife and wildlife products. From August 1, 2010 to July 31, 2011, publicly available English language illegal wildlife trade reports from official and unofficial sources were collected and categorized by location and species involved. During this interval, 858 illegal wildlife trade reports were collected from 89 countries. Countries with the highest number of reports included India (n = 146, 15.6%), the United States (n = 143, 15.3%), South Africa (n = 75, 8.0%), China (n = 41, 4.4%), and Vietnam (n = 37, 4.0%). Species reported as traded or poached included elephants (n = 107, 12.5%), rhinoceros (n = 103, 12.0%), tigers (n = 68, 7.9%), leopards (n = 54, 6.3%), and pangolins (n = 45, 5.2%). The use of unofficial data sources, such as online news sites and social networks, to collect information on international wildlife trade augments traditional approaches drawing on official reporting and presents a novel source of intelligence with which to monitor and collect news in support of enforcement against this threat to wildlife conservation worldwide.

  1. Digital surveillance: a novel approach to monitoring the illegal wildlife trade.

    Directory of Open Access Journals (Sweden)

    Amy L Sonricker Hansen

    Full Text Available A dearth of information obscures the true scale of the global illegal trade in wildlife. Herein, we introduce an automated web crawling surveillance system developed to monitor reports on illegally traded wildlife. A resource for enforcement officials as well as the general public, the freely available website, http://www.healthmap.org/wildlifetrade, provides a customizable visualization of worldwide reports on interceptions of illegally traded wildlife and wildlife products. From August 1, 2010 to July 31, 2011, publicly available English language illegal wildlife trade reports from official and unofficial sources were collected and categorized by location and species involved. During this interval, 858 illegal wildlife trade reports were collected from 89 countries. Countries with the highest number of reports included India (n = 146, 15.6%, the United States (n = 143, 15.3%, South Africa (n = 75, 8.0%, China (n = 41, 4.4%, and Vietnam (n = 37, 4.0%. Species reported as traded or poached included elephants (n = 107, 12.5%, rhinoceros (n = 103, 12.0%, tigers (n = 68, 7.9%, leopards (n = 54, 6.3%, and pangolins (n = 45, 5.2%. The use of unofficial data sources, such as online news sites and social networks, to collect information on international wildlife trade augments traditional approaches drawing on official reporting and presents a novel source of intelligence with which to monitor and collect news in support of enforcement against this threat to wildlife conservation worldwide.

  2. 25 CFR 12.36 - Does other law enforcement training count?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Does other law enforcement training count? 12.36 Section 12.36 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER INDIAN COUNTRY LAW ENFORCEMENT Qualifications and Training Requirements § 12.36 Does other law enforcement training count? All requests for evaluation of equivalent...

  3. Accounting for enforcement costs in the spatial allocation of marine zones.

    Science.gov (United States)

    Davis, Katrina; Kragt, Marit; Gelcich, Stefan; Schilizzi, Steven; Pannell, David

    2015-02-01

    Marine fish stocks are in many cases extracted above sustainable levels, but they may be protected through restricted-use zoning systems. The effectiveness of these systems typically depends on support from coastal fishing communities. High management costs including those of enforcement may, however, deter fishers from supporting marine management. We incorporated enforcement costs into a spatial optimization model that identified how conservation targets can be met while maximizing fishers' revenue. Our model identified the optimal allocation of the study area among different zones: no-take, territorial user rights for fisheries (TURFs), or open access. The analysis demonstrated that enforcing no-take and TURF zones incurs a cost, but results in higher species abundance by preventing poaching and overfishing. We analyzed how different enforcement scenarios affected fishers' revenue. Fisher revenue was approximately 50% higher when territorial user rights were enforced than when they were not. The model preferentially allocated area to the enforced-TURF zone over other zones, demonstrating that the financial benefits of enforcement (derived from higher species abundance) exceeded the costs. These findings were robust to increases in enforcement costs but sensitive to changes in species' market price. We also found that revenue under the existing zoning regime in the study area was 13-30% lower than under an optimal solution. Our results highlight the importance of accounting for both the benefits and costs of enforcement in marine conservation, particularly when incurred by fishers. © 2014 Society for Conservation Biology.

  4. Enforcing Transferable Permit Systems in the Presence of Market Power

    International Nuclear Information System (INIS)

    Chavez, C.A.; Stanlund, J.K.

    2003-01-01

    We derive an enforcement strategy for a transferable permit system in the presence of market power that achieves complete compliance in a cost-effective manner. We show that the presence of a firm with market influence makes designing an enforcement strategy more difficult than enforcing a perfectly competitive system. We also re-consider the suggestion that a firm with market influence should be allocated permits so that it chooses to not participate in the permit market. When enforcement and its costs are taken into account, that suggestion does not hold except in a very special case

  5. Limits on surveillance: frictions, fragilities and failures in the operation of camera surveillance.

    NARCIS (Netherlands)

    Dubbeld, L.

    2004-01-01

    Public video surveillance tends to be discussed in either utopian or dystopian terms: proponents maintain that camera surveillance is the perfect tool in the fight against crime, while critics argue that the use of security cameras is central to the development of a panoptic, Orwellian surveillance

  6. Immigration Enforcement Actions - Annual Report

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  7. Effectiveness of vehicle weight enforcement in a developing country using weigh-in-motion sorting system considering vehicle by-pass and enforcement capability

    Directory of Open Access Journals (Sweden)

    Mohamed Rehan Karim

    2014-03-01

    Full Text Available Vehicle overloading has been identified as one of the major contributors to road pavement damage in Malaysia. In this study, the weigh-in-motion (WIM system has been used to function as a vehicle weight sorting tool to complement the exsiting static weigh bridge enforcement station. Data collected from the developed system is used to explore the effectiveness of using WIM system in terms of generating more accurate data for enforcement purposes and at the same time improving safety and reducing the number of vehicle weight violations on the roads. This study specifically focus on the effect of vehicle by-pass and static weigh station enforcement capability on the overall effectiveness of vehicle weight enforcement system in a developing country. Results from this study suggest that the WIM system will significantly enhance the effectiveness and efficiency of the current vehicle weight enforcement, thus generating substantial revenue that would greatly off-set the current road maintenance budget that comes from tax payers money. If there is substantial reduction in overloaded vehicles, the public will still gain through reduction in road maintenance budget, less accident risks involving heavy trucks, and lesser greenhouse gases (GHGs emissions.

  8. Enforcement, Integration, and the Future of Immigration Federalism

    Directory of Open Access Journals (Sweden)

    Cristina Rodriguez

    2017-06-01

    Full Text Available The federal government has a monopoly over the terms of immigration law, and it superintends the nation’s singular immigration enforcement bureaucracy. But our federalism nonetheless provides a vital playing field for sharp debates over the status of immigrants in American life. The forms of state and local involvement in immigration policy are varied, but they fall into two basic categories of mutually dependent and re-enforcing policies: enforcement federalism and integration federalism. Whereas enforcement federalism concerns the extent to which localities should assist or resist federal removal policies, integration federalism encompasses measures designed to assist immigrants, regardless of status, to plant roots and acculturate to life in the United States. Both forms of immigration federalism take shape through a wide variety of intergovernmental relations, not only between the federal government on the one hand and states and localities on the other, but also between states and the cities within them — an increasingly important dimension of immigration federalism today. These relations have important legal characteristics, and constitutional and statutory law bring them into being and mediate them. But the nature of any given intergovernmental dynamic will be shaped just as much by a combination of ideology and institutional imperatives. These elements can either unite the center and the periphery in common cause or produce the sort of conflict that has made immigration federalism a high-profile issue for decades. Given the density of the intergovernmental dynamics that shape the country’s immigration policy, developing a comprehensive strategy for immigration federalism requires more than a predilection toward or away from centralization of government authority. It requires a clear view on the appropriate metes and bounds of immigration enforcement, as well as a set of beliefs about the proper place in the social order of

  9. Handbook of surveillance technologies

    CERN Document Server

    Petersen, JK

    2012-01-01

    From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry. The Handbook of Surveillance Technologies, Third Edition is the only comprehensive work to chronicle the background and current applications of the full-range of surveillance technologies--offering the latest in surveillance and privacy issues.Cutting-Edge--updates its bestselling predecessor with discussions on social media, GPS circuits in cell phones and PDAs, new GIS s

  10. Containment and surveillance devices

    International Nuclear Information System (INIS)

    Campbell, J.W.; Johnson, C.S.; Stieff, L.R.

    The growing acceptance of containment and surveillance as a means to increase safeguards effectiveness has provided impetus to the development of improved surveillance and containment devices. Five recently developed devices are described. The devices include one photographic and two television surveillance systems and two high security seals that can be verified while installed

  11. 40 CFR 205.160 - Selective enforcement auditing (SEA) requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing (SEA) requirements. 205.160 Section 205.160 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... Selective enforcement auditing (SEA) requirements. ...

  12. Weight enforcement and evasion : Oregon case study: final report.

    Science.gov (United States)

    2002-03-01

    This study examines the incidence of overweight trucks and its relation to regulatory enforcement activity. Addressed are questions of scale operations in relation to weight violations and the effectiveness of enforcement levels, automated preclearan...

  13. The Legality and Validity of Administrative Enforcement

    Directory of Open Access Journals (Sweden)

    Sergei V. Iarkovoi

    2018-01-01

    Full Text Available The article discusses the concept and content of the validity of adopted by the executive authorities and other bodies of public administration legal acts and committed by them legal actions as an important characteristic of law enforcement by these bodies. The Author concludes that the validity of the administrative law enforcement is not an independent requirement for it, and acts as an integral part of its legal requirements.

  14. An integrated national mortality surveillance system for death registration and mortality surveillance, China.

    Science.gov (United States)

    Liu, Shiwei; Wu, Xiaoling; Lopez, Alan D; Wang, Lijun; Cai, Yue; Page, Andrew; Yin, Peng; Liu, Yunning; Li, Yichong; Liu, Jiangmei; You, Jinling; Zhou, Maigeng

    2016-01-01

    In China, sample-based mortality surveillance systems, such as the Chinese Center for Disease Control and Prevention's disease surveillance points system and the Ministry of Health's vital registration system, have been used for decades to provide nationally representative data on health status for health-care decision-making and performance evaluation. However, neither system provided representative mortality and cause-of-death data at the provincial level to inform regional health service needs and policy priorities. Moreover, the systems overlapped to a considerable extent, thereby entailing a duplication of effort. In 2013, the Chinese Government combined these two systems into an integrated national mortality surveillance system to provide a provincially representative picture of total and cause-specific mortality and to accelerate the development of a comprehensive vital registration and mortality surveillance system for the whole country. This new system increased the surveillance population from 6 to 24% of the Chinese population. The number of surveillance points, each of which covered a district or county, increased from 161 to 605. To ensure representativeness at the provincial level, the 605 surveillance points were selected to cover China's 31 provinces using an iterative method involving multistage stratification that took into account the sociodemographic characteristics of the population. This paper describes the development and operation of the new national mortality surveillance system, which is expected to yield representative provincial estimates of mortality in China for the first time.

  15. Challenges and Specifications for Robust Face and Gait Recognition Systems for Surveillance Application

    Directory of Open Access Journals (Sweden)

    BUCIU Ioan

    2014-05-01

    Full Text Available Automated person recognition (APR based on biometric signals addresses the process of automatically recognize a person according to his physiological traits (face, voice, iris, fingerprint, ear shape, body odor, electroencephalogram – EEG, electrocardiogram, or hand geometry, or behavioural patterns (gait, signature, hand-grip, lip movement. The paper aims at briefly presenting the current challenges for two specific non-cooperative biometric approaches, namely face and gait biometrics as well as approaches that consider combination of the two in the attempt of a more robust system for accurate APR, in the context of surveillance application. Open problems from both sides are also pointed out.

  16. Digital dashboard design using multiple data streams for disease surveillance with influenza surveillance as an example.

    Science.gov (United States)

    Cheng, Calvin K Y; Ip, Dennis K M; Cowling, Benjamin J; Ho, Lai Ming; Leung, Gabriel M; Lau, Eric H Y

    2011-10-14

    Great strides have been made exploring and exploiting new and different sources of disease surveillance data and developing robust statistical methods for analyzing the collected data. However, there has been less research in the area of dissemination. Proper dissemination of surveillance data can facilitate the end user's taking of appropriate actions, thus maximizing the utility of effort taken from upstream of the surveillance-to-action loop. The aims of the study were to develop a generic framework for a digital dashboard incorporating features of efficient dashboard design and to demonstrate this framework by specific application to influenza surveillance in Hong Kong. Based on the merits of the national websites and principles of efficient dashboard design, we designed an automated influenza surveillance digital dashboard as a demonstration of efficient dissemination of surveillance data. We developed the system to synthesize and display multiple sources of influenza surveillance data streams in the dashboard. Different algorithms can be implemented in the dashboard for incorporating all surveillance data streams to describe the overall influenza activity. We designed and implemented an influenza surveillance dashboard that utilized self-explanatory figures to display multiple surveillance data streams in panels. Indicators for individual data streams as well as for overall influenza activity were summarized in the main page, which can be read at a glance. Data retrieval function was also incorporated to allow data sharing in standard format. The influenza surveillance dashboard serves as a template to illustrate the efficient synthesization and dissemination of multiple-source surveillance data, which may also be applied to other diseases. Surveillance data from multiple sources can be disseminated efficiently using a dashboard design that facilitates the translation of surveillance information to public health actions.

  17. Android-based E-Traffic law enforcement system in Surakarta City

    Science.gov (United States)

    Yulianto, Budi; Setiono

    2018-03-01

    The urban advancement is always overpowered by the increasing number of vehicles as the need for movement of people and goods. This can lead to traffic problems if there is no effort on the implementation of traffic management and engineering, and traffic law enforcement. In this case, the Government of Surakarta City has implemented various policies and regulations related to traffic management and engineering in order to run traffic in an orderly, safe and comfortable manner according to the applicable law. However, conditions in the field shows that traffic violations still occurred frequently due to the weakness of traffic law enforcement in terms of human resources and the system. In this connection, a tool is needed to support traffic law enforcement, especially in relation to the reporting system of traffic violations. This study aims to develop an Android-based traffic violations reporting application (E-Traffic Law Enforcement) as part of the traffic law enforcement system in Surakarta City. The Android-apps records the location and time of the traffic violations incident along with the visual evidence of the infringement. This information will be connected to the database system to detect offenders and to do the traffic law enforcement process.

  18. 19 CFR 210.78 - Notice of enforcement action to Government agencies.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Notice of enforcement action to Government agencies. 210.78 Section 210.78 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Enforcement Procedures and Advisory...

  19. Informed consent: Enforcing pharmaceutical companies' obligations abroad.

    Science.gov (United States)

    Lee, Stacey B

    2010-06-15

    The past several years have seen an evolution in the obligations of pharmaceutical companies conducting clinical trials abroad. Key players, such as international human rights organizations, multinational pharmaceutical companies, the United States government and courts, and the media, have played a significant role in defining these obligations. This article examines how such obligations have developed through the lens of past, present, and future recommendations for informed consent protections. In doing so, this article suggests that, no matter how robust obligations appear, they will continue to fall short of providing meaningful protection until they are accompanied by a substantive enforcement mechanism that holds multinational pharmaceutical companies accountable for their conduct. Issues of national sovereignty, particularly in the United States, will continue to prevent meaningful enforcement by an international tribunal or through one universally adopted code of ethics. This article argues that, rather than continuing to pursue an untenable international approach, the Alien Torts Statute (ATS) offers a viable enforcement mechanism, at least for US-based pharmaceutical companies. Recent federal appellate court precedent interpreting the ATS provides the mechanism for granting victims redress and enforcing accountability of sponsors (usually pharmaceutical companies and research and academic institutions) for informed consent misconduct. Substantive human rights protections are vital in order to ensure that every person can realize the "right to health." This article concludes that by building on the federal appellate court's ATS analysis, which grants foreign trial participants the right to pursue claims of human rights violations in US courts, a mechanism can be created for enforcing not only substantive informed consent, but also human rights protections.

  20. Law Enforcement Strategies for Preventing Rail Trespassing Risk Factors.

    Science.gov (United States)

    2016-03-01

    The Volpe Center has investigated law enforcement methods that have successfully prevented trespassing along the railroad right of way. The types of law enforcement strategies currently being used and procedures followed in the field are documented, ...

  1. The Frontlines of Medicine Project: a proposal for the standardized communication of emergency department data for public health uses including syndromic surveillance for biological and chemical terrorism.

    Science.gov (United States)

    Barthell, Edward N; Cordell, William H; Moorhead, John C; Handler, Jonathan; Feied, Craig; Smith, Mark S; Cochrane, Dennis G; Felton, Christopher W; Collins, Michael A

    2002-04-01

    The Frontlines of Medicine Project is a collaborative effort of emergency medicine (including emergency medical services and clinical toxicology), public health, emergency government, law enforcement, and informatics. This collaboration proposes to develop a nonproprietary, "open systems" approach for reporting emergency department patient data. The common element is a standard approach to sending messages from individual EDs to regional oversight entities that could then analyze the data received. ED encounter data could be used for various public health initiatives, including syndromic surveillance for chemical and biological terrorism. The interlinking of these regional systems could also permit public health surveillance at a national level based on ED patient encounter data. Advancements in the Internet and Web-based technologies could allow the deployment of these standardized tools in a rapid time frame.

  2. Practical Run-Time Norm Enforcement with Bounded Lookahead

    NARCIS (Netherlands)

    Alechina, Natasha; Bulling, Nils; Dastani, Mehdi; Logan, Brian

    2015-01-01

    Norms have been widely proposed as a means of coordinating and controlling the behaviour of agents in a multi-agent system. A key challenge in normative MAS is norm enforcement: how and when to restrict the agents’ behaviour in order to obtain a desirable outcome? Even if a norm can be enforced

  3. Influenza surveillance

    Directory of Open Access Journals (Sweden)

    Karolina Bednarska

    2016-04-01

    Full Text Available Influenza surveillance was established in 1947. From this moment WHO (World Health Organization has been coordinating international cooperation, with a goal of monitoring influenza virus activity, effective diagnostic of the circulating viruses and informing society about epidemics or pandemics, as well as about emergence of new subtypes of influenza virus type A. Influenza surveillance is an important task, because it enables people to prepare themselves for battle with the virus that is constantly mutating, what leads to circulation of new and often more virulent strains of influenza in human population. As vaccination is the most effective method of fighting the virus, one of the major tasks of GISRS is developing an optimal antigenic composition of the vaccine for the current epidemic season. European Influenza Surveillance Network (EISN has also developed over the years. EISN is running integrated epidemiological and virological influenza surveillance, to provide appropriate data to public health experts in member countries, to enable them undertaking relevant activities based on the current information about influenza activity. In close cooperation with GISRS and EISN are National Influenza Centres - national institutions designated by the Ministry of Health in each country.

  4. Implementing a public web based GIS service for feedback of surveillance data on communicable diseases in Sweden

    Directory of Open Access Journals (Sweden)

    Ekdahl Karl

    2004-06-01

    Full Text Available Abstract Background Surveillance data allow for analysis, providing public health officials and policy-makers with a basis for long-term priorities and timely information on possible outbreaks for rapid response (data for action. In this article we describe the considerations and technology behind a newly introduced public web tool in Sweden for easy retrieval of county and national surveillance data on communicable diseases. Methods The web service was designed to automatically present updated surveillance statistics of some 50 statutory notifiable diseases notified to the Swedish Institute for Infectious Disease Control (SMI. The surveillance data is based on clinical notifications from the physician having treated the patient and laboratory notifications, merged into cases using a unique personal identification number issued to all Swedish residents. The web service use notification data from 1997 onwards, stored in a relational database at the SMI. Results The web service presents surveillance data to the user in various ways; tabulated data containing yearly and monthly disease data per county, age and sex distribution, interactive maps illustrating the total number of cases and the incidence per county and time period, graphs showing the total number of cases per week and graphs illustrating trends in the disease data. The system design encompasses the database (storing the data, the web server (holding the web service and an in-the-middle computer (to ensure good security standards. Conclusions The web service has provided the health community, the media, and the public with easy access to both timely and detailed surveillance data presented in various forms. Since it was introduced in May 2003, the system has been accessed more than 1,000,000 times, by more than 10,000 different viewers (over 12.600 unique IP-numbers.

  5. Internet surveillance, regulation, and chilling effects online: a comparative case study

    Directory of Open Access Journals (Sweden)

    Jonathon W. Penney

    2017-05-01

    Full Text Available With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online—the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work helps fill this void with a first-of-its-kind online survey that examines multiple dimensions of chilling effects online by comparing and analyzing responses to hypothetical scenarios involving different kinds of regulatory actions—including an anti-cyberbullying law, public/private sector surveillance, and an online regulatory scheme, based on the Digital Millennium Copyright Act (DMCA, enforced through personally received legal threats/notices. The results suggest not only the existence and significance of regulatory chilling effects online across these different scenarios but also evidence a differential impact—with personally received legal notices and government surveillance online consistently having the greatest chilling effect on people’s activities online—and certain online activities like speech, search, and personal sharing also impacted differently. The results also offer, for the first time, insights based on demographics and other similar factors about how certain people and groups may be more affected than others, including findings that younger people and women are more likely to be chilled; younger people and women are less likely to take steps to resist regulatory actions and defend themselves; and anti

  6. 40 CFR 205.171 - Selective enforcement auditing (SEA) requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing (SEA) requirements. 205.171 Section 205.171 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... § 205.171 Selective enforcement auditing (SEA) requirements. ...

  7. Do social networks influence small-scale fishermen's enforcement of sea tenure?

    Directory of Open Access Journals (Sweden)

    Kara Stevens

    Full Text Available Resource systems with enforced rules and strong monitoring systems typically have more predictable resource abundance, which can confer economic and social benefits to local communities. Co-management regimes demonstrate better social and ecological outcomes, but require an active role by community members in management activities, such as monitoring and enforcement. Previous work has emphasized understanding what makes fishermen comply with rules. This research takes a different approach to understand what influences an individual to enforce rules, particularly sea tenure. We conducted interviews and used multiple regression and Akaike's Information Criteria model selection to evaluate the effect of social networks, food security, recent catch success, fisherman's age and personal gear investment on individual's enforcement of sea tenure. We found that fishermen's enforcement of sea tenure declined between the two time periods measured and that social networks, age, food security, and changes in gear investment explained enforcement behavior across three different communities on Nicaragua's Atlantic Coast, an area undergoing rapid globalization.

  8. Easier surveillance of climate-related health vulnerabilities through a Web-based spatial OLAP application

    Directory of Open Access Journals (Sweden)

    Gosselin Pierre

    2009-04-01

    integrating an initial collection of geo-referenced multi-scale indicators that were identified by Canadian specialists and end-users as relevant for the surveillance of the public health impacts of climate change. This system was developed in a multidisciplinary context involving researchers, policy makers and practitioners, using BI and web-mapping concepts (more particularly SOLAP technologies, while exploring new solutions for frequent automatic updating of data and for providing contextual warnings for users (to minimize the risk of data misinterpretation. According to the project participants, the final system succeeds in facilitating surveillance activities in a way not achievable with today's GIS. Regarding the experiments on frequent automatic updating and contextual user warnings, the results obtained indicate that these are meaningful and achievable goals but they still require research and development for their successful implementation in the context of surveillance and multiple organizations. Conclusion Surveillance of climate-related health vulnerabilities may be more efficiently supported using a combination of BI and GIS concepts, and more specifically, SOLAP technologies (in that it facilitates and accelerates multi-scale spatial and temporal analysis to a point where a user can maintain an uninterrupted train of thought by focussing on "what" she/he wants (not on "how" to get it and always obtain instant answers, including to the most complex queries that take minutes or hours with OLTP systems (e.g., aggregated, temporal, comparative. The developed system respects Newell's cognitive band of 10 seconds when performing knowledge discovery (exploring data, looking for hypotheses, validating models. The developed system provides new operators for easily and rapidly exploring multidimensional data at different levels of granularity, for different regions and epochs, and for visualizing the results in synchronized maps, tables and charts. It is naturally adapted

  9. Easier surveillance of climate-related health vulnerabilities through a Web-based spatial OLAP application.

    Science.gov (United States)

    Bernier, Eveline; Gosselin, Pierre; Badard, Thierry; Bédard, Yvan

    2009-04-03

    -referenced multi-scale indicators that were identified by Canadian specialists and end-users as relevant for the surveillance of the public health impacts of climate change. This system was developed in a multidisciplinary context involving researchers, policy makers and practitioners, using BI and web-mapping concepts (more particularly SOLAP technologies), while exploring new solutions for frequent automatic updating of data and for providing contextual warnings for users (to minimize the risk of data misinterpretation). According to the project participants, the final system succeeds in facilitating surveillance activities in a way not achievable with today's GIS. Regarding the experiments on frequent automatic updating and contextual user warnings, the results obtained indicate that these are meaningful and achievable goals but they still require research and development for their successful implementation in the context of surveillance and multiple organizations. Surveillance of climate-related health vulnerabilities may be more efficiently supported using a combination of BI and GIS concepts, and more specifically, SOLAP technologies (in that it facilitates and accelerates multi-scale spatial and temporal analysis to a point where a user can maintain an uninterrupted train of thought by focussing on "what" she/he wants (not on "how" to get it) and always obtain instant answers, including to the most complex queries that take minutes or hours with OLTP systems (e.g., aggregated, temporal, comparative)). The developed system respects Newell's cognitive band of 10 seconds when performing knowledge discovery (exploring data, looking for hypotheses, validating models). The developed system provides new operators for easily and rapidly exploring multidimensional data at different levels of granularity, for different regions and epochs, and for visualizing the results in synchronized maps, tables and charts. It is naturally adapted to deal with multiscale indicators such as those

  10. Regional Disease Surveillance Meeting - Final Paper

    Energy Technology Data Exchange (ETDEWEB)

    Lesperance, Ann M.; Mahy, Heidi A.

    2006-08-08

    On June 1, 2006, public health officials working in surveillance, epidemiological modeling, and information technology communities from the Seattle/Tacoma area and State of Washington met with members of the Pacific Northwest National Laboratory (PNNL) to discuss the current state of disease surveillance and gaps and needs to improve the current systems. The meeting also included a discussion of PNNL initiatives that might be appropriate to enhance disease surveillance and the current tools being used for disease surveillance. Participants broke out into two groups to identify critical gaps and needs for improving a surveillance system, and discuss the requirements for developing improved surveillance. Each group developed a list of key priorities summarizing the requirements for improved surveillance. The objective of this meeting was to work towards the development of an improved disease surveillance system.

  11. Overview of the recognition and enforcement of international commercial arbitration

    Directory of Open Access Journals (Sweden)

    Sergey Kravtsov

    2017-01-01

    Full Text Available The subject. This informational article is devoted to the peculiarities of recognition and enforcement of international commercial arbitration awards according to different countries’ legislation and international legal regulation.The purpose of the article is to identify legal patterns of recognition and enforcement of international commercial arbitration awards in different countries.Methodology. The study is based on comparative law and formal law methods, analysis and synthesis.Results, scope of application. Enforcement of arbitral awards in foreign countries is ensured and guaranteed by multilateral conventions, bilateral treaties and national legislation. The New York Convention 1958 in a certain way limits the scope of legal protection of arbitral awards and leaves the procedure for recognition and enforcement of arbitral awards for consideration of the state court. The author analyses of differentiation of the recognition and enforcement regime of so-called "domestic" and "foreign" solutions of international commercial arbitration in terms of doctrinal approaches and practice of foreign countries. Special attention is given to the analysis of foreign arbitral awards of recognition and enforcement procedures is given to a denial of recognition and enforcement of foreign arbitral awards and their reasons. In spite of the explicit grounds for refusal of recognition and enforcement of foreign arbitral awards in New York Convention 1958, some countries try to establish certain exceptions to the rule in the national legislation. Results may be applicable in improvement of international legal regulation.Conclusions. The courts of the countries – participants of the New York Convention 1958 cannot cancel the foreign arbitral award or revise it substantially. The refutation of this award is possible only in the court of the state in whose territory the relevant arbitral award was made, and such court is not formally bound by the rules of the

  12. 28 CFR 0.29j - Law enforcement authority.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Law enforcement authority. 0.29j Section 0.29j Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE 4-Office of the Inspector General § 0.29j Law enforcement authority. Subject to guidelines promulgated by the Attorney General, Special Agents of the Offic...

  13. A review of zoonotic disease surveillance supported by the Armed Forces Health Surveillance Center.

    Science.gov (United States)

    Burke, R L; Kronmann, K C; Daniels, C C; Meyers, M; Byarugaba, D K; Dueger, E; Klein, T A; Evans, B P; Vest, K G

    2012-05-01

    The Armed Forces Health Surveillance Center (AFHSC), Division of Global Emerging Infections Surveillance and Response System conducts disease surveillance through a global network of US Department of Defense research laboratories and partnerships with foreign ministries of agriculture, health and livestock development in over 90 countries worldwide. In 2010, AFHSC supported zoonosis survey efforts were organized into four main categories: (i) development of field assays for animal disease surveillance during deployments and in resource limited environments, (ii) determining zoonotic disease prevalence in high-contact species which may serve as important reservoirs of diseases and sources of transmission, (iii) surveillance in high-risk human populations which are more likely to become exposed and subsequently infected with zoonotic pathogens and (iv) surveillance at the human-animal interface examining zoonotic disease prevalence and transmission within and between human and animal populations. These efforts have aided in the detection, identification and quantification of the burden of zoonotic diseases such as anthrax, brucellosis, Crimean Congo haemorrhagic fever, dengue fever, Hantaan virus, influenza, Lassa fever, leptospirosis, melioidosis, Q fever, Rift Valley fever, sandfly fever Sicilian virus, sandfly fever Naples virus, tuberculosis and West Nile virus, which are of military and public health importance. Future zoonotic surveillance efforts will seek to develop local capacity for zoonotic surveillance focusing on high risk populations at the human-animal interface. © 2011 Blackwell Verlag GmbH.

  14. National Enforcement Initiative: Preventing Animal Waste from Contaminating Surface and Ground Water

    Science.gov (United States)

    This page describes EPA's goal in preventing animal waste from contaminating surface and ground Water. It is an EPA National Enforcement Initiative. Both enforcement cases, and a map of enforcement actions are provided.

  15. Posts to online news message boards and public discourse surrounding DUI enforcement.

    Science.gov (United States)

    Connor, Susan M; Wesolowski, Kathryn

    2009-12-01

    This study analyzes posts to online news message boards covering driving under the influence (DUI) enforcement efforts to determine their usefulness for informing traffic safety program planning and public relations efforts aimed at mainstream drinking drivers. A series of Google searches were conducted using keywords designed to capture news stories regarding impaired driving enforcement efforts. For each search, the first 100 Web pages returned were reviewed and articles were included in analysis if they were from an independent news source and contained user comments. Coders captured data on 28 fields for each post, including tone in relation to enforcement, tone of interpersonal communication with other posters, and expressed feelings regarding drinking and driving. Fifty-six news articles covering DUI enforcement efforts met study criteria, with 615 posts. The majority of posts (57%) were neutral on DUI enforcement; 24 percent (148) took a negative tone and 19 percent (115) positive. Posts that discussed checkpoints were 2.6 times more likely to take a negative tone toward enforcement than those that did not. Twenty-one percent of anti-enforcement posts challenged the idea that driving after drinking was necessarily dangerous. Of the 321 posts involving direct communication between posters, 67 percent involved disagreement with another post. Profanity or belittling comments appeared in 10 percent of posts. Public responses to DUI enforcement news articles provide insight into the beliefs and thought processes of those who oppose enforcement efforts or view drinking and driving as no big deal. Primary objections to enforcement focused on civil and personal rights issues, skepticism regarding law enforcement's motives and objectivity, and the belief that drinking driving is not a "real" crime. Online news message boards could be useful in informing campaigns and helping program planners frame media events and press releases to best appeal to the most at

  16. The Impact of Financial Reporting Enforcement and IFRS Adoption on Executive Compensation

    DEFF Research Database (Denmark)

    Banghøj, Jesper; Marton, Jan; Plenborg, Thomas

    This study examines whether both IFRS adoption and the level of financial reporting enforcement impact the contractual usefulness of financial statements, as reflected in payperformance sensitivity. Using a sample of 8,440 executive year observations from 522 firms in 16 European countries we find....... This suggests that the impact of enforcement on pay‐performance sensitivity vanishes after the implementation of IFRS. These results indicate that IFRS dominate enforcement when it comes to the contractual usefulness of financial statements. The findings should be of interest to both enforcement authorities...... that when earnings are based on local GAAP, the payperformance sensitivity is positive and significant only when the level of enforcement is high. When earnings are based on IFRS, we find that the pay‐performance sensitivity is (equally) positive and significant across different levels of enforcement...

  17. Future law enforcement officers and social workers: perceptions of domestic violence.

    Science.gov (United States)

    McMullan, Elizabeth C; Carlan, Philip E; Nored, Lisa S

    2010-08-01

    This study compares perceptions of domestic violence for college students planning to work in law enforcement with students aspiring to careers in social work and non-law-enforcement criminal justice (N = 491). The study involves students attending four public universities across one Southern state who completed a survey (spring of 2006) measuring whether various scenarios were (1) related to domestic violence, and (2) worthy of being reported to law enforcement. Findings indicate that all student groups (law enforcement, non-law-enforcement criminal justice, and social work) tended to identify the various scenarios as domestic violence (and worthy of being reported) regardless of the person's sexual orientation, violence severity, and offender's or victim's gender. However, law enforcement students are less sensitive to domestic violence when compared with social work and non-law enforcement criminal justice students. Findings reveal that (1) graduate students, (2) female students, and (3) White students (compared with African American students in general) attending majority White universities were more likely to identify domestic violence and its worthiness of being reported.The data in this study indicate that criminal justice programs produce graduates who are reasonably sensitive toward the importance of appropriate domestic violence response but could still improve using the techniques employed within social work programs.

  18. Surface Environmental Surveillance Procedures Manual

    International Nuclear Information System (INIS)

    Hanf, Robert W.; Poston, Ted M.

    2000-01-01

    Shows and explains certain procedures needed for surface environmental surveillance. Hanford Site environmental surveillance is conducted by the Pacific Northwest National Laboratory (PNNL) for the U.S. Department of Energy (DOE) under the Surface Environmental Surveillance Project (SESP). The basic requirements for site surveillance are set fourth in DOE Order 5400.1, General Environmental Protection Program Requirements. Guidance for the SESP is provided in DOE Order 5484.1, Environmental Protection, Safety, and Health Protection Information Reporting Requirements and DOE Order 5400.5, Radiation Protection of the Public and Environment. Guidelines for environmental surveillance activities are provided in DOE/EH-0173T, Environmental Regulatory Guide for Radiological Effluent Monitoring and Environmental Surveillance. An environmental monitoring plan for the Hanford Site is outlined in DOE/RL 91-50 Rev. 2, Environmental Monitoring Plan, United States Department of Energy, Richland Operations Office. Environmental surveillance data are used in assessing the impact of current and past site operations on human health and the environment, demonstrating compliance with applicable local, state, and federal environmental regulations, and verifying the adequacy of containment and effluent controls. SESP sampling schedules are reviewed, revised, and published each calendar year in the Hanford Site Environmental Surveillance Master Sampling Schedule. Environmental samples are collected by SESP staff in accordance with the approved sample collection procedures documented in this manual. Personnel training requirements are documented in SESP-TP-01 Rev.2, Surface Environmental Surveillance Project Training Program.

  19. Critical Surveillance Studies in the Information Society

    Directory of Open Access Journals (Sweden)

    Thomas Allmer

    2011-11-01

    Full Text Available The overall aim of this paper is to clarify how we can theorize and systemize economic surveillance. Surveillance studies scholars like David Lyon stress that economic surveillance such as monitoring consumers or the workplace are central aspects of surveillance societies. The approach that is advanced in this work recognizes the importance of the role of the economy in contemporary surveillance societies. The paper at hand constructs theoretically founded typologies in order to systemize the existing literature of surveillance studies and to analyze examples of surveillance. Therefore, it mainly is a theoretical approach combined with illustrative examples. This contribution contains a systematic discussion of the state of the art of surveillance and clarifies how different notions treat economic aspects of surveillance. In this work it is argued that the existing literature is insufficient for studying economic surveillance. In contrast, a typology of surveillance in the modern economy, which is based on foundations of a political economy approach, allows providing a systematic analysis of economic surveillance on the basis of current developments on the Internet. Finally, some political recommendations are drawn in order to overcome economic surveillance. This contribution can be fruitful for scholars who want to undertake a systematic analysis of surveillance in the modern economy and who want to study the field of surveillance critically.

  20. World Alliance for Risk Factor Surveillance White Paper on Surveillance and Health Promotion

    Directory of Open Access Journals (Sweden)

    Stefano Campostrini

    2015-02-01

    Full Text Available This is not a research paper on risk factor surveillance. It is an effort by a key group of researchers and practitioners of risk factor surveillance to define the current state of the art and to identify the key issues involved in the current practice of behavioral risk factor surveillance. Those of us who are the principal authors have worked and carried out research in this area for some three decades. As a result of a series of global meetings beginning in 1999 and continuing every two years since then, a collective working group of the International Union of Health Promotion and Education (IUHPE was formed under the name World Alliance of Risk Factor Surveillance (WARFS. Under this banner the organization sought to write a comprehensive statement on the importance of surveillance to health promotion and public health. This paper, which has been revised and reviewed by established peers in the field, is the result. It provides the reader with a clear summary of the major issues that need to be considered by any and all seeking to carry out behavioral risk factor surveillance.

  1. 25 CFR 11.1103 - Law enforcement officer's duties.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Law enforcement officer's duties. 11.1103 Section 11.1103 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Minor-in-Need-of-Care Procedure § 11.1103 Law enforcement officer's duties. Upon taking a minor into custody the officer...

  2. Firearm Prevalence and Homicides of Law Enforcement Officers in the United States.

    Science.gov (United States)

    Swedler, David I; Simmons, Molly M; Dominici, Francesca; Hemenway, David

    2015-10-01

    In the United States, state firearm ownership has been correlated with homicide rates. More than 90% of homicides of law enforcement officers (LEOs) are committed with firearms. We examined the relationship between state firearm ownership rates and LEO occupational homicide rates. We obtained the number LEOs killed from 1996 to 2010 from a Federal Bureau of Investigation (FBI) database. We calculated homicide rates per state as the number of officers killed per number of LEOs per state, obtained from another FBI database. We obtained the mean household firearm ownership for each state from the Behavioral Risk Factor Surveillance System. Using Poisson regression and controlling for factors known to affect homicide rates, we associated firearm ownership with the homicide rates for LEOs (incidence rate ratio = 1.044; P = .005); our results were supported by cross-sectional and longitudinal sensitivity analyses. LEO homicide rates were 3 times higher in states with high firearm ownership compared with states with low firearm ownership. High public gun ownership is a risk for occupational mortality for LEOs in the United States. States could consider methods for reducing firearm ownership as a way to reduce occupational deaths of LEOs.

  3. 29 CFR 1614.503 - Enforcement of final Commission decisions.

    Science.gov (United States)

    2010-07-01

    ... ADEA, the Equal Pay Act or the Rehabilitation Act and to seek judicial review of the agency's refusal... 1614.503 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION FEDERAL SECTOR EQUAL EMPLOYMENT OPPORTUNITY Remedies and Enforcement § 1614.503 Enforcement of final...

  4. 49 CFR 26.103 - What enforcement actions apply in FHWA and FTA programs?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false What enforcement actions apply in FHWA and FTA... Enforcement § 26.103 What enforcement actions apply in FHWA and FTA programs? The provisions of this section apply to enforcement actions under FHWA and FTA programs: (a) Noncompliance complaints. Any person who...

  5. Conservation Law Enforcement Program Standardization

    National Research Council Canada - National Science Library

    Rogers, Stan

    2004-01-01

    The ultimate goal of standardization is to develop a safe and effective program that is recognized within the USAF, DoD, and by other Federal and state law enforcement agencies, and the general public...

  6. 29 CFR 42.20 - Regional Farm Labor Coordinated Enforcement Committee.

    Science.gov (United States)

    2010-07-01

    ... Coordinated Enforcement Committee. (a) Under the leadership of the ESA Regional Administrator, each region... Committee shall: (1) Meet regularly on at least a quarterly basis; (2) Exchange information on enforcement...

  7. Sharing Powers Within Exclusive Competences: Rethinking EU Antitrust Law Enforcement

    OpenAIRE

    Van Cleynenbreugel, Pieter

    2016-01-01

    Although the establishment of competition rules forms part of the EU’s exclusive competences, the application and enforcement of those rules has always been shared consistently between the EU and its Member States.The sharing of enforcement powers is conceptualised traditionally as a delegation of the exercise of exclusively conferred competences. The Court of Justice of the European Union’s case law in the context of EU antitrust law enforcement nevertheless raises profound questions as to t...

  8. Evaluation of the novel respiratory virus surveillance program: Pediatric Early Warning Sentinel Surveillance (PEWSS).

    Science.gov (United States)

    Armour, Patricia A; Nguyen, Linh M; Lutman, Michelle L; Middaugh, John P

    2013-01-01

    Infections caused by respiratory viruses are associated with recurrent epidemics and widespread morbidity and mortality. Routine surveillance of these pathogens is necessary to determine virus activity, monitor for changes in circulating strains, and plan for public health preparedness. The Southern Nevada Health District in Las Vegas, Nevada, recruited five pediatric medical practices to serve as sentinel sites for the Pediatric Early Warning Sentinel Surveillance (PEWSS) program. Sentinel staff collected specimens throughout the year from ill children who met the influenza-like illness case definition and submitted specimens to the Southern Nevada Public Health Laboratory for molecular testing for influenza and six non-influenza viruses. Laboratory results were analyzed and reported to the medical and general communities in weekly bulletins year-round. PEWSS data were also used to establish viral respiratory seasonal baselines and in influenza vaccination campaigns. The surveillance program was evaluated using the Centers for Disease Control and Prevention's (CDC's) Updated Guidelines for Evaluating Public Health Surveillance Systems. PEWSS met three of six program usefulness criteria and seven of nine surveillance system attributes, which exceeded the CDC Guidelines evaluation criteria for a useful and complete public health surveillance program. We found that PEWSS is a useful and complete public health surveillance system that is simple, flexible, accessible, and stable.

  9. Surveillance of the environmental radioactivity

    International Nuclear Information System (INIS)

    Schneider, Th.; Gitzinger, C.; Jaunet, P.; Eberbach, F.; Clavel, B.; Hemidy, P.Y.; Perrier, G.; Kiper, Ch.; Peres, J.M.; Josset, M.; Calvez, M.; Leclerc, M.; Leclerc, E.; Aubert, C.; Levelut, M.N.; Debayle, Ch.; Mayer, St.; Renaud, Ph.; Leprieur, F.; Petitfrere, M.; Catelinois, O.; Monfort, M.; Baron, Y.; Target, A.

    2008-01-01

    The objective of these days was to present the organisation of the surveillance of the environmental radioactivity and to allow an experience sharing and a dialog on this subject between the different actors of the radiation protection in france. The different presentations were as follow: evolution and stakes of the surveillance of radioactivity in environment; the part of the European commission, regulatory aspects; the implementation of the surveillance: the case of Germany; Strategy and logic of environmental surveillance around the EDF national centers of energy production; environmental surveillance: F.B.F.C. site of Romans on Isere; steps of the implementation 'analysis for release decree at the F.B.F.C./C.E.R.C.A. laboratory of Romans; I.R.S.N. and the environmental surveillance: situation and perspectives; the part of a non institutional actor, the citizenship surveillance done by A.C.R.O.; harmonization of sampling methods: the results of inter operators G.T. sampling; sustainable observatory of environment: data traceability and samples conservation; inter laboratories tests of radioactivity measurements; national network of environmental radioactivity measurement: laboratories agreements; the networks of environmental radioactivity telemetry: modernization positioning; programme of observation and surveillance of surface environment and installations of the H.A.-M.A.V.L. project (high activity and long life medium activity); Evolution of radionuclides concentration in environment and adaptation of measurements techniques to the surveillance needs; the national network of radioactivity measurement in environment; modes of data restoration of surveillance: the results of the Loire environment pilot action; method of sanitary impacts estimation in the area of ionizing radiations; the radiological impact of atmospheric nuclear tests in French Polynesia; validation of models by the measure; network of measurement and alert management of the atmospheric

  10. 49 CFR 1542.221 - Records of law enforcement response.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Records of law enforcement response. 1542.221 Section 1542.221 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.221 Records of law enforcement...

  11. When is public enforcement of insider trading regulations effective?

    NARCIS (Netherlands)

    Wielhouwer, J.L.

    2013-01-01

    In this paper we investigate when public enforcement of insider trading regulations reduces the amount of insider trading. We model a game between a potentially self-interested regulator enforcing insider trading laws and a trader who may be trading on inside information. We show that equilibrium

  12. A Case for Criminal Enforcement of Federal Environmental Laws

    Science.gov (United States)

    1989-02-19

    enforcement scheme can actually contribute to improper disposal. Szasz , Corporations. Organized Crime. and the Disposal of Hazardous Waste: An...the Syndicate Control Mystiaue, 1 Nat’l Envtl. Enforcement J. 3 (Dec. 1986). 150. See Szasz , supra note 79. 151. United States v. MacDonald & Watson

  13. Law Enforcement of Cyber Terorism in Indonesia

    Directory of Open Access Journals (Sweden)

    Sri Ayu Astuti

    2015-12-01

    Full Text Available Cyber terrorism is one of the category of crimes that cross border organized and has been established as an extraordinary crime. This crime is becoming a serious threat to countries in the world. In this regard, the Government's attitude of firmness needed to enforce cyber laws against the freedom development in social media. The development of the immeasurable it in the country of Indonesia required the limitations by doing legal liability over the behavior of law which deviates towards the use of technology tools. Strict law enforcement efforts as a clear attitude to stop actively moving massive terrorism, by enacting the provisions of the law on information and electronic transactions as well as the law of terrorism effectively. How To Cite: Astuti, S. (2015. Law Enforcement of Cyber Terorism in Indonesia. Rechtsidee, 2(2, 157-178. doi:http://dx.doi.org/10.21070/jihr.v2i2.82

  14. a Cloud-Based Architecture for Smart Video Surveillance

    Science.gov (United States)

    Valentín, L.; Serrano, S. A.; Oves García, R.; Andrade, A.; Palacios-Alonso, M. A.; Sucar, L. Enrique

    2017-09-01

    Turning a city into a smart city has attracted considerable attention. A smart city can be seen as a city that uses digital technology not only to improve the quality of people's life, but also, to have a positive impact in the environment and, at the same time, offer efficient and easy-to-use services. A fundamental aspect to be considered in a smart city is people's safety and welfare, therefore, having a good security system becomes a necessity, because it allows us to detect and identify potential risk situations, and then take appropriate decisions to help people or even prevent criminal acts. In this paper we present an architecture for automated video surveillance based on the cloud computing schema capable of acquiring a video stream from a set of cameras connected to the network, process that information, detect, label and highlight security-relevant events automatically, store the information and provide situational awareness in order to minimize response time to take the appropriate action.

  15. Human-centered automation of testing, surveillance and maintenance

    International Nuclear Information System (INIS)

    Bhatt, S.C.; Sun, B.K.H.

    1991-01-01

    Manual surveillance and testing of instrumentation, control and protection systems at nuclear power plants involves system and human errors which can lead to substantial plant down time. Frequent manual testing can also contribute significantly to operation and maintenance cost. Automation technology offers potential for prudent applications at the power plant to reduce testing errors and cost. To help address the testing problems and to harness the benefit of automation application, input from utilities is obtained on suitable automation approaches. This paper includes lessens from successful past experience at a few plants where some island of automation exist. The results are summarized as a set of specifications for semi automatic testing. A human-centered automation methodology is proposed with the guidelines for optimal human/computer division of tasks given. Implementation obstacles for significant changes of testing practices are identified and methods acceptable to nuclear power plants for addressing these obstacles have been suggested

  16. Individual psychological features of law enforcement officers convicted of crimes

    Directory of Open Access Journals (Sweden)

    Lyutykh V.A.

    2016-06-01

    Full Text Available The relevance of this topic is caused by a significant number of crimes committed by law enforcement officers and the necessity of active prevention. The aim of the study was to determine the individual psychological characteristics of law enforcement officers convicted of intentional crimes. The hypothesis was suggested that the main difference of individual psychological characteristics of law enforcement officers convicted of intentional crimes from individual psychological characteristics of law-abiding law enforcement officers is the difference between the principal values of the person both the main motives of activity adopted by an individual and the structure and the hierarchy of these values. This article describes the progress and results of empirical research conducted on the materials of psychodiagnostic examination of: employees who have been convicted of intentional crimes; law-abiding employees; people entering an internal affairs agency. Test subjects - men 18-46 years old, 90 people. Recommendations for practical psychologist of internal affairs agencies on detection of individual psychological personality features typical for law enforcement officers convicted of intentional crimes are formulated based on the obtained results.

  17. Automatic differentiation bibliography

    Energy Technology Data Exchange (ETDEWEB)

    Corliss, G.F. [comp.

    1992-07-01

    This is a bibliography of work related to automatic differentiation. Automatic differentiation is a technique for the fast, accurate propagation of derivative values using the chain rule. It is neither symbolic nor numeric. Automatic differentiation is a fundamental tool for scientific computation, with applications in optimization, nonlinear equations, nonlinear least squares approximation, stiff ordinary differential equation, partial differential equations, continuation methods, and sensitivity analysis. This report is an updated version of the bibliography which originally appeared in Automatic Differentiation of Algorithms: Theory, Implementation, and Application.

  18. Inappropriate colonoscopic surveillance of hyperplastic polyps.

    LENUS (Irish Health Repository)

    Keane, R A

    2011-11-15

    Colonoscopic surveillance of hyperplastic polyps alone is controversial and may be inappropriate. The colonoscopy surveillance register at a university teaching hospital was audited to determine the extent of such hyperplastic polyp surveillance. The surveillance endoscopy records were reviewed, those patients with hyperplastic polyps were identified, their clinical records were examined and contact was made with each patient. Of the 483 patients undergoing surveillance for colonic polyps 113 (23%) had hyperplastic polyps alone on last colonoscopy. 104 patients remained after exclusion of those under appropriate surveillance. 87 of the 104 patients (84%) were successfully contacted. 37 patients (8%) were under appropriate colonoscopic surveillance for a significant family history of colorectal carcinoma. 50 (10%) patients with hyperplastic polyps alone and no other clinical indication for colonoscopic surveillance were booked for follow up colonoscopy. This represents not only a budgetary but more importantly a clinical opportunity cost the removal of which could liberate valuable colonoscopy time for more appropriate indications.

  19. Spatial service delivery system for smart licensing & enforcement management

    Science.gov (United States)

    Wahap, N. A.; Ismail, N. M.; Nor, N. M.; Ahmad, N.; Omar, M. F.; Termizi, A. A. A.; Zainal, D.; Noordin, N. M.; Mansor, S.

    2016-06-01

    Spatial information has introduced a new sense of urgency for a better understanding of the public needs in term of what, when and where they need services and through which devices, platform or physical locations they need them. The objective of this project is to value- add existing license management process for business premises which comes under the responsibility of Local Authority (PBT). Manipulation of geospatial and tracing technology via mobile platform allows enforcement officers to work in real-time, use a standardized system, improve service delivery, and optimize operation management. This paper will augment the scope and capabilities of proposed concept namely, Smart Licensing/Enforcement Management (SLEm). It will review the current licensing and enforcement practice of selected PBT in comparison to the enhanced method. As a result, the new enhanced system is expected to offer a total solution for licensing/enforcement management whilst increasing efficiency and transparency for smart city management and governance.

  20. Deporting the American Dream: Immigration Enforcement and Latino Foreclosures

    Directory of Open Access Journals (Sweden)

    Jacob S. Rugh

    2016-12-01

    Full Text Available Over the past decade, Latinos have been buffeted by two major forces: a record number of immigrant deportations and the housing foreclosure crisis. Yet, prior work has not assessed the link between the two. We hypothesize that deportations exacerbate rates of foreclosure among Latinos by removing income earners from owner-occupied households. We employ a quasi-experimental approach that leverages variation in county applications for 287(g immigration enforcement agreements with Immigration and Customs Enforcement and data on foreclosure filings from 2005–2012. These models uncover a substantial association of enforcement with Hispanic foreclosure rates. The association is stronger in counties with more immigrant detentions and a larger share of undocumented persons in owner-occupied homes. The results imply that local immigration enforcement plays an important role in understanding why Latinos experienced foreclosures most often. The reduced home ownership and wealth that result illustrate how legal status and deportation perpetuate the racial stratification of Latinos.

  1. Price-Anderson Nuclear Safety Enforcement Program. 1997 annual report

    International Nuclear Information System (INIS)

    1998-01-01

    This report summarizes activities in the Department of Energy's Price-Anderson Amendments Act (PAAA) Enforcement Program in calendar year 1997 and highlights improvements planned for 1998. The DOE Enforcement Program involves the Office of Enforcement and Investigation in the DOE Headquarters Office of Environment, Safety and Health, as well as numerous PAAA Coordinators and technical advisors in DOE Field and Program Offices. The DOE Enforcement Program issued 13 Notices of Violation (NOV's) in 1997 for cases involving significant or potentially significant nuclear safety violations. Six of these included civil penalties totaling $440,000. Highlights of these actions include: (1) Brookhaven National Laboratory Radiological Control Violations / Associated Universities, Inc.; (2) Bioassay Program Violations at Mound / EG ampersand G, Inc.; (3) Savannah River Crane Operator Uptake / Westinghouse Savannah River Company; (4) Waste Calciner Worker Uptake / Lockheed-Martin Idaho Technologies Company; and (5) Reactor Scram and Records Destruction at Sandia / Sandia Corporation (Lockheed-Martin). Sandia / Sandia Corporation (Lockheed-Martin)

  2. Child Support Enforcement Annual Data Reports Form 157 - YR 2013

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  3. Medical support for law enforcement-extended operations incidents.

    Science.gov (United States)

    Levy, Matthew J; Tang, Nelson

    2014-01-01

    As the complexity and frequency of law enforcement-extended operations incidents continue to increase, so do the opportunities for adverse health and well-being impacts on the responding officers. These types of clinical encounters have not been well characterized nor have the medical response strategies which have been developed to effectively manage these encounters been well described. The purpose of this article is to provide a descriptive epidemiology of the clinical encounters reported during extended law enforcement operations, as well as to describe a best practices approach for their effective management. This study retrospectively examined the clinical encounters of the Maryland State Police (MSP) Tactical Medical Unit (TMU) during law enforcement extended operations incidents lasting 8 or more hours. In addition, a qualitative analysis was performed on clinical data collected by federal law enforcement agencies during their extended operations. Forty-four percent of missions (455/1,047) supported by the MSP TMU lasted 8 or more hours. Twenty-six percent of these missions (117/455) resulted in at least one patient encounter. Nineteen percent of patient chief complaints (45/238) were related to heat illness/ dehydration. Fifteen percent of encounters (36/238) were for musculoskeletal injury/pain. Eight percent of patients (19/238) had nonspecific sick call (minor illness) complaints. The next most common occurring complaints were cold-related injuries, headache, sinus congestion, and wound/laceration, each of which accounted for 7 percent of patients (16/238), respectively. Analysis of federal law enforcement agencies' response to such events yielded similar clinical encounters. A wide range of health problems are reported by extended law enforcement operations personnel. Timely and effective treatment of these problems can help ensure that the broader operations mission is not compromised. An appropriate operational strategy for managing health complaints

  4. Improving Law Enforcement Cross Cultural Competencies through Continued Education

    Science.gov (United States)

    Sereni-Massinger, Christine; Wood, Nancy

    2016-01-01

    Over the last thirty years Community Oriented Policing (COP) has spawned advancements in creating community partnerships with law enforcement agencies. Agencies that focus on such partnerships have served to reduce crime and resolve conflict. However, community opinions towards law enforcement have become increasingly negative due to recent civil…

  5. Converging requirements and emerging challenges to public health diseases surveillance and bio surveillance

    International Nuclear Information System (INIS)

    Rao, V.; Abel, T.

    2009-01-01

    Disease surveillance systems are a critical component of an early warning system for public health agencies to prepare and respond to major public health catastrophes. With a growing emphasis for more robust early indicator and warning systems to track emerging and dangerous diseases of suspicious nature, considerable emphasis is now placed on deployment of more expanded electronic disease surveillance systems. The architectural considerations for bio surveillance information system are based on collection, analysis and dissemination of human, veterinary and agricultural related disease surveillance to broader regional areas likely to be affected in the event of an emerging disease, or due to bioterrorism and better coordinate plans, preparations and response by governmental agencies and multilateral forums. The diseases surveillance systems architectures by intent and design could as well support biological threat monitoring and threat reduction initiatives. As an illustrative sample set, this paper will describe the comparative informatics requirements for a disease surveillance systems developed by CSC for the US Centers for Diseases Control and Prevention (CDC) currently operational nationwide, and biological weapons threat assessment developed as part of the Threat Agent Detection and Response (TADR) Network under the US Biological Threat Reduction Program and deployed at Uzbekistan, Kazakhstan, Georgia, and Azerbaijan.(author)

  6. EPA Enforcement and Compliance History Online

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Environmental Protection Agency's Enforcement and Compliance History Online (ECHO) website provides customizable and downloadable information about environmental...

  7. Fragile convergence: understanding variation in the enforcement of China's industrial pollution law

    NARCIS (Netherlands)

    van Rooij, B.; Lo, C.W.H.

    2010-01-01

    Official statistics and independent survey data show that in the last decade China has witnessed a remarkable change in its enforcement of environmental pollution violations, moving toward more formalistic and coercive law enforcement with more enforcement cases as well as higher fines. The data

  8. Occupational Homicides of Law Enforcement Officers, 2003-2013: Data From the National Violent Death Reporting System.

    Science.gov (United States)

    Blair, Janet M; Fowler, Katherine A; Betz, Carter J; Baumgardner, Jason L

    2016-11-01

    Law enforcement officers (LEOs) in the U.S. are at an increased risk for homicide. The purpose of this study is to describe the characteristics of homicides of LEOs in 17 U.S. states participating in the National Violent Death Reporting System. This active surveillance system uses data from death certificates, coroner/medical examiner reports, and law enforcement reports. This study used quantitative and qualitative methods to analyze National Violent Death Reporting System data for 2003-2013. Deaths of LEOs feloniously killed in the line of duty were selected for analysis. LEO homicides and the circumstances preceding or occurring during the incident were characterized. Analyses were conducted October 2015-June 2016. A total of 128 officer homicides from 121 incidents were identified. Most (93.7%) LEO victims were male, 60.9% were aged 30-49 years (average age, 40.9 years). Approximately 21.9% of LEOs were killed during an ambush, and 19.5% were killed during traffic stops or pursuits. Of the 14.1% of LEOs killed responding to domestic disturbances, most disturbances were intimate partner violence related. More than half (57.0%) of homicides were precipitated by another crime, and of these, 71.2% involved crimes in progress. Most suspects were male. Ninety-one percent of homicides of LEOs were committed with a firearm. This information is critical to help describe encounter situations faced by LEOs. The results of this study can be used to help educate and train LEOs on hazards, inform prevention efforts designed to promote LEO safety, and prevent homicide among this population. Published by Elsevier Inc.

  9. The Convention on the Recognition and Enforcement of Foreign ...

    African Journals Online (AJOL)

    The Convention on the Recognition and Enforcement of Foreign Arbitral Awards, often referred to as the New York Convention, has established itself as a regulatory and enforcement instrument which is crucial to international trade. This is evident from the fact that more than 150 countries have so far ratified the convention.

  10. 36 CFR 1270.50 - Consultation with law enforcement agencies.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Consultation with law enforcement agencies. 1270.50 Section 1270.50 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PRESIDENTIAL RECORDS PRESIDENTIAL RECORDS Presidential Records Compiled for Law Enforcement Purposes § 1270.50 Consultation with...

  11. Antitrust Enforcement and Marginal Deterrence

    NARCIS (Netherlands)

    Houba, H.E.D.; Motchenkova, E.; Wen, Q.

    2011-01-01

    Abstract: We study antitrust enforcement in which the fine must obey four legal principles: punishments should fit the crime, proportionality, bankruptcy considerations, and minimum fines. We integrate these legal principles into an infinitely-repeated oligopoly model. Bankruptcy considerations

  12. Surveillance of antibiotic resistance

    Science.gov (United States)

    Johnson, Alan P.

    2015-01-01

    Surveillance involves the collection and analysis of data for the detection and monitoring of threats to public health. Surveillance should also inform as to the epidemiology of the threat and its burden in the population. A further key component of surveillance is the timely feedback of data to stakeholders with a view to generating action aimed at reducing or preventing the public health threat being monitored. Surveillance of antibiotic resistance involves the collection of antibiotic susceptibility test results undertaken by microbiology laboratories on bacteria isolated from clinical samples sent for investigation. Correlation of these data with demographic and clinical data for the patient populations from whom the pathogens were isolated gives insight into the underlying epidemiology and facilitates the formulation of rational interventions aimed at reducing the burden of resistance. This article describes a range of surveillance activities that have been undertaken in the UK over a number of years, together with current interventions being implemented. These activities are not only of national importance but form part of the international response to the global threat posed by antibiotic resistance. PMID:25918439

  13. An empirical investigation of compliance and enforcement problems

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Jensen, Frank

    2011-01-01

    contributes to the literature by investigating compliance and enforcement in the empirical case of a mixed trawl fishery targeting Norway lobster in Kattegat and Skagerrak located north of Denmark with help from a simulated model. The paper presents results from two simulation models of the case study: one....... Another conclusion from the case study is that only small welfare effects are obtained by increasing enforcement efforts to reduce non-compliance....

  14. A Global Cancer Surveillance Framework Within Noncommunicable Disease Surveillance: Making the Case for Population-Based Cancer Registries.

    Science.gov (United States)

    Piñeros, Marion; Znaor, Ariana; Mery, Les; Bray, Freddie

    2017-01-01

    The growing burden of cancer among several major noncommunicable diseases (NCDs) requires national implementation of tailored public health surveillance. For many emerging economies where emphasis has traditionally been placed on the surveillance of communicable diseases, it is critical to understand the specificities of NCD surveillance and, within it, of cancer surveillance. We propose a general framework for cancer surveillance that permits monitoring the core components of cancer control. We examine communalities in approaches to the surveillance of other major NCDs as well as communicable diseases, illustrating key differences in the function, coverage, and reporting in each system. Although risk factor surveys and vital statistics registration are the foundation of surveillance of NCDs, population-based cancer registries play a unique fundamental role specific to cancer surveillance, providing indicators of population-based incidence and survival. With an onus now placed on governments to collect these data as part of the monitoring of NCD targets, the integration of cancer registries into existing and future NCD surveillance strategies is a vital requirement in all countries worldwide. The Global Initiative for Cancer Registry Development, endorsed by the World Health Organization, provides a means to enhance cancer surveillance capacity in low- and middle-income countries. © The Author 2017. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  15. A GIS-driven integrated real-time surveillance pilot system for national West Nile virus dead bird surveillance in Canada

    Directory of Open Access Journals (Sweden)

    Aramini Jeff

    2006-04-01

    Full Text Available Abstract Background An extensive West Nile virus surveillance program of dead birds, mosquitoes, horses, and human infection has been launched as a result of West Nile virus first being reported in Canada in 2001. Some desktop and web GIS have been applied to West Nile virus dead bird surveillance. There have been urgent needs for a comprehensive GIS services and real-time surveillance. Results A pilot system was developed to integrate real-time surveillance, real-time GIS, and Open GIS technology in order to enhance West Nile virus dead bird surveillance in Canada. Driven and linked by the newly developed real-time web GIS technology, this integrated real-time surveillance system includes conventional real-time web-based surveillance components, integrated real-time GIS components, and integrated Open GIS components. The pilot system identified the major GIS functions and capacities that may be important to public health surveillance. The six web GIS clients provide a wide range of GIS tools for public health surveillance. The pilot system has been serving Canadian national West Nile virus dead bird surveillance since 2005 and is adaptable to serve other disease surveillance. Conclusion This pilot system has streamlined, enriched and enhanced national West Nile virus dead bird surveillance in Canada, improved productivity, and reduced operation cost. Its real-time GIS technology, static map technology, WMS integration, and its integration with non-GIS real-time surveillance system made this pilot system unique in surveillance and public health GIS.

  16. TEXT CLASSIFICATION FOR AUTOMATIC DETECTION OF E-CIGARETTE USE AND USE FOR SMOKING CESSATION FROM TWITTER: A FEASIBILITY PILOT.

    Science.gov (United States)

    Aphinyanaphongs, Yin; Lulejian, Armine; Brown, Duncan Penfold; Bonneau, Richard; Krebs, Paul

    2016-01-01

    Rapid increases in e-cigarette use and potential exposure to harmful byproducts have shifted public health focus to e-cigarettes as a possible drug of abuse. Effective surveillance of use and prevalence would allow appropriate regulatory responses. An ideal surveillance system would collect usage data in real time, focus on populations of interest, include populations unable to take the survey, allow a breadth of questions to answer, and enable geo-location analysis. Social media streams may provide this ideal system. To realize this use case, a foundational question is whether we can detect e-cigarette use at all. This work reports two pilot tasks using text classification to identify automatically Tweets that indicate e-cigarette use and/or e-cigarette use for smoking cessation. We build and define both datasets and compare performance of 4 state of the art classifiers and a keyword search for each task. Our results demonstrate excellent classifier performance of up to 0.90 and 0.94 area under the curve in each category. These promising initial results form the foundation for further studies to realize the ideal surveillance solution.

  17. Constitutional Basis for the Enforcement of ''Executive'' Policies that ...

    African Journals Online (AJOL)

    Although "executive" policies remain an important governance tool, there appears to be confusion on the status and possible basis for their judicial enforcement in South Africa. The aim of this article is to critically reflect on the status and possible constitutional basis for the enforceability of "executive" policies that give effect ...

  18. Immigration Enforcement Actions: Fiscal Year 2012

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  19. Immigration Enforcement Actions: Fiscal Year 2004

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  20. Immigration Enforcement Actions: Fiscal Year 2007

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  1. Immigration Enforcement Actions: Fiscal Year 2008

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  2. Immigration Enforcement Actions: Fiscal Year 2010

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  3. Immigration Enforcement Actions: Fiscal Year 2011

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  4. Immigration Enforcement Actions: Fiscal Year 2006

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  5. Immigration Enforcement Actions: Fiscal Year 2009

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  6. Immigration Enforcement Actions: Fiscal Year 2005

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  7. Real-time monitoring of school absenteeism to enhance disease surveillance: a pilot study of a mobile electronic reporting system.

    Science.gov (United States)

    Lawpoolsri, Saranath; Khamsiriwatchara, Amnat; Liulark, Wongwat; Taweeseneepitch, Komchaluch; Sangvichean, Aumnuyphan; Thongprarong, Wiraporn; Kaewkungwal, Jaranit; Singhasivanon, Pratap

    2014-05-12

    School absenteeism is a common source of data used in syndromic surveillance, which can eventually be used for early outbreak detection. However, the absenteeism reporting system in most schools, especially in developing countries, relies on a paper-based method that limits its use for disease surveillance or outbreak detection. The objective of this study was to develop an electronic real-time reporting system on school absenteeism for syndromic surveillance. An electronic (Web-based) school absenteeism reporting system was developed to embed it within the normal routine process of absenteeism reporting. This electronic system allowed teachers to update students' attendance status via mobile tablets. The data from all classes and schools were then automatically sent to a centralized database for further analysis and presentation, and for monitoring temporal and spatial patterns of absent students. In addition, the system also had a disease investigation module, which provided a link between absenteeism data from schools and local health centers, to investigate causes of fever among sick students. The electronic school absenteeism reporting system was implemented in 7 primary schools in Bangkok, Thailand, with total participation of approximately 5000 students. During May-October 2012 (first semester), the percentage of absentees varied between 1% and 10%. The peak of school absenteeism (sick leave) was observed between July and September 2012, which coincided with the peak of dengue cases in children aged 6-12 years being reported to the disease surveillance system. The timeliness of a reporting system is a critical function in any surveillance system. Web-based application and mobile technology can potentially enhance the use of school absenteeism data for syndromic surveillance and outbreak detection. This study presents the factors that determine the implementation success of this reporting system.

  8. An on-line pressurizer surveillance system design to prevent small-break loss-of-coolant accidents through power-operated relief valves using a microcomputer

    International Nuclear Information System (INIS)

    Lee, J.H.; Chang, S.H.

    1987-01-01

    A small-break loss-of-coolant accident (LOCA) caused by a stuck-open power-operated relief valve is one of the important contributors to nuclear power plant risk. A pressurizer surveillance system was designed to use a microcomputer to prevent the malfunction of the system; the effect of this improvement has been assessed through probabilistic risk assessment. The microcomputer diagnoses the malfunction of the system by a process-checking method and automatically performs the backup action related to each malfunction. This improvement means that we can correctly diagnose ''spurious opening,'' ''failure to reclose,'' and ''small-break LOCA,'' which are difficult for operators to diagnose quickly and correctly, and by taking automatic backup action one can reduce the probability of human error

  9. Enforcement of entailment constraints in distributed service-based business processes.

    Science.gov (United States)

    Hummer, Waldemar; Gaubatz, Patrick; Strembeck, Mark; Zdun, Uwe; Dustdar, Schahram

    2013-11-01

    A distributed business process is executed in a distributed computing environment. The service-oriented architecture (SOA) paradigm is a popular option for the integration of software services and execution of distributed business processes. Entailment constraints, such as mutual exclusion and binding constraints, are important means to control process execution. Mutually exclusive tasks result from the division of powerful rights and responsibilities to prevent fraud and abuse. In contrast, binding constraints define that a subject who performed one task must also perform the corresponding bound task(s). We aim to provide a model-driven approach for the specification and enforcement of task-based entailment constraints in distributed service-based business processes. Based on a generic metamodel, we define a domain-specific language (DSL) that maps the different modeling-level artifacts to the implementation-level. The DSL integrates elements from role-based access control (RBAC) with the tasks that are performed in a business process. Process definitions are annotated using the DSL, and our software platform uses automated model transformations to produce executable WS-BPEL specifications which enforce the entailment constraints. We evaluate the impact of constraint enforcement on runtime performance for five selected service-based processes from existing literature. Our evaluation demonstrates that the approach correctly enforces task-based entailment constraints at runtime. The performance experiments illustrate that the runtime enforcement operates with an overhead that scales well up to the order of several ten thousand logged invocations. Using our DSL annotations, the user-defined process definition remains declarative and clean of security enforcement code. Our approach decouples the concerns of (non-technical) domain experts from technical details of entailment constraint enforcement. The developed framework integrates seamlessly with WS-BPEL and the Web

  10. NRC program of inspection and enforcement

    International Nuclear Information System (INIS)

    LeDoux, J.C.; Rehfuss, C.

    1978-01-01

    The Nuclear Regulatory Commission (NRC) regulates civilian uses of nuclear materials to ensure the protection of the public health and safety and the environment. The Office of Inspection and Enforcement (IE) develops and implements the inspection, investigation, and enforcement programs for the NRC. The IE conducts inspection programs for reactors under construction and in operation, nuclear industry vendors, fuel facilities and users of nuclear materials, and all aspects of the safeguarding of facilities and materials. Recently the IE began implementing a program that will place inspectors on site at nuclear power reactors and will provide for national appraisal of licensee performance and for an evaluation of the effectiveness of the inspection programs

  11. Enforcing the climate regime: Game theory and the Marrakesh Accords

    International Nuclear Information System (INIS)

    Hovi, Jon

    2002-01-01

    The article reviews basic insights about compliance and ''hard'' enforcement that can be derived from various non-cooperative equilibrium concepts and evaluates the Marrakesh Accords in light of these insights. Five different notions of equilibrium are considered - the Nash equilibrium, the sub game perfect equilibrium, the re negotiation proof equilibrium, the coalition proof equilibrium and the perfect Bayesian equilibrium. These various types of equilibrium have number of implications for effective enforcement: 1. Consequences of non-compliance should be more than proportionate. 2. To be credible punishment needs to take place in the Pareto frontier, rather than by reversion to some suboptimal state. 3. An effective enforcement system must be able to curb collective as well as individual incentives to cheat. 4. A fully transparent enforcement regime could in fact turn out to be detrimental for compliance levels. It is concluded that constructing an effective system for ''hard'' enforcement of the Kyoto Protocol is a formidable task that has only partially been accomplished by the Marrakesh Accords. A possible explanation is that the design of a compliance system for the climate regime involved a careful balancing of the desire to minimise non-compliance against other important considerations. (Author)

  12. Analysis of Environmental Law Enforcement Mechanism Based on Economic Principle

    Science.gov (United States)

    Cao, Hongjun; Shao, Haohao; Cai, Xuesen

    2017-11-01

    Strengthening and improving the environmental law enforcement mechanism is an important way to protect the ecological environment. This paper is based on economical principles, we did analysis of the marginal management costs by using Pigou means and the marginal transaction costs by using Coase means vary with the quantity growth of pollutant discharge Enterprises. We analyzed all this information, then we got the conclusion as follows. In the process of strengthening the environmental law enforcement mechanism, firstly, we should fully mobilize all aspects of environmental law enforcement, such as legislative bodies and law enforcement agencies, public welfare organizations, television, newspapers, enterprises, people and so on, they need to form a reasonable and organic structure system; then we should use various management means, such as government regulation, legal sanctions, fines, persuasion and denounce, they also need to form an organic structural system.

  13. 50 CFR 17.107 - Facilitating enforcement.

    Science.gov (United States)

    2010-10-01

    ... WILDLIFE AND PLANTS (CONTINUED) ENDANGERED AND THREATENED WILDLIFE AND PLANTS (CONTINUED) Manatee Protection Areas § 17.107 Facilitating enforcement. Water vehicles operating in manatee sanctuary or refuge...

  14. On the Enforcement of Specific Performance in Civil Law Countries

    DEFF Research Database (Denmark)

    Lando, Henrik; Rose, Caspar

    2003-01-01

    requires actions to beundertaken, and we relate this to costs of enforcement. We arguethat it is administratively costly to run a system of enforcementthat renders specific performance attractive to the aggrieved party,and that the Civil Law countries have (like Common Law countries)chosen not to incur...... these costs of enforcement. This is especiallyclear in the case of Denmark, where specific performance of actionshas been abandoned as a legal remedy.At the normative level, we argue that enforcement costs providesan additional rationale, over and above the rationales of the theoryof efficient breach...

  15. National automatic network of environmental radiological monitoring (RENAMORA)

    International Nuclear Information System (INIS)

    Gonzalez M, J.L.; Sanchez H, L.

    2003-01-01

    Inside the programs of Environmental Radiological Surveillance that it carries out the National Commission of Nuclear Security and Safeguards (CNSNS), it develops an National Automatic Network of Environmental Radiological Monitoring (RENAMORA), where it is carried out a registration of speed of environmental dose in continuous and simultaneous forms with the same moment of the measurement. This net allows to account with the meticulous and opportune information that will help to characterize, in dynamics form, the radiological conditions of diverse geographical zones of the country, including the sites that by normative require bigger surveillance, like its are the Laguna Verde Nuclear power station (CNLV), the Nuclear Center of Mexico (ININ) and the Radioactive waste storage center (CADER). This net is in its first development stage; three points inside the state of Veracruz, in the surroundings of the CNLV, already its are operating; the obtained data of rapidity of environmental dose are being stored in a database inside a primary data center located in the facilities of the CNSNS in Mexico city and its will be analyzed according to the project advances. At the moment, its are installing the first ten teams corresponding to the first phase of the RENAMORA (three stages); its are carried out operation tests, transmission, reception and administration of data. The obtained data will be interpreted, analyzed and inter compared to evaluate the risk levels to that it would be hold the population and to determine thresholds that allow to integrate the alarm systems that its had considered for emergency situations. (Author)

  16. Issues ignored in laboratory quality surveillance

    International Nuclear Information System (INIS)

    Zeng Jing; Li Xingyuan; Zhang Tingsheng

    2008-01-01

    According to the work requirement of the related laboratory quality surveillance in ISO17025, this paper analyzed and discussed the issued ignored in the laboratory quality surveillance. In order to solve the present problem, it is required to understand the work responsibility in the quality surveillance correctly, to establish the effective working routine in the quality surveillance, and to conduct, the quality surveillance work. The object in the quality surveillance shall be 'the operator' who engaged in the examination/calibration directly in the laboratory, especially the personnel in training (who is engaged in the examination/calibration). The quality supervisors shall be fully authorized, so that they can correctly understand the work responsibility in quality surveillance, and are with the rights for 'full supervision'. The laboratory also shall arrange necessary training to the quality supervisor, so that they can obtain sufficient guide in time and are with required qualification or occupation prerequisites. (authors)

  17. 75 FR 652 - Energy Conservation Program: Certification, Compliance, and Enforcement Requirements for Certain...

    Science.gov (United States)

    2010-01-05

    ...; Comment Request; Certification, Compliance, and Enforcement Requirements for Consumer Products and Certain...: Certification, Compliance, and Enforcement Requirements for Certain Consumer Products and Commercial and... certification, compliance, and enforcement requirements for various consumer products and commercial and...

  18. 7 CFR 1145.3 - Enforcement.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Enforcement. 1145.3 Section 1145.3 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements... contracts and based on the results of the investigation will take appropriate action. ...

  19. 12 CFR 268.503 - Enforcement of final EEOC decisions.

    Science.gov (United States)

    2010-01-01

    ... the decision pursuant to title VII, the ADEA, the Equal Pay Act or the Rehabilitation Act and to seek... RESERVE SYSTEM RULES REGARDING EQUAL OPPORTUNITY Remedies and Enforcement § 268.503 Enforcement of final... Procedures Act, 5 U.S.C. 701 et seq., and the mandamus statute, 28 U.S.C. 1361, or to commence de novo...

  20. 49 CFR 212.115 - Enforcement actions.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF TRANSPORTATION STATE SAFETY PARTICIPATION REGULATIONS State/Federal Roles § 212.115 Enforcement... assess and compromise penalties, to issue emergency orders and compliance orders, institute or cause to...

  1. Surviving Surveillance: How Pregnant Women and Mothers Living With HIV Respond to Medical and Social Surveillance.

    Science.gov (United States)

    Greene, Saara; Ion, Allyson; Kwaramba, Gladys; Lazarus, Lisa; Loutfy, Mona

    2017-12-01

    Pregnant women and mothers living with HIV are under surveillance of service providers, family members, and the community at large. Surveillance occurs throughout the medical management of their HIV during pregnancy, preventing HIV transmission to their baby, infant feeding practices, and as part of assessments related to their ability to mother. Enacted and anticipatory HIV-related stigma can exacerbate the negative impact that being under surveillance has on mothers living with HIV as they move through their pregnancy, birthing, and mothering experiences. In response, women living with HIV find ways to manage their experiences of surveillance through engaging in acts of distancing, planning, and resisting at different points in time, and sometimes enacting all three practices at once. Positioning the narratives of pregnant women and mothers living with HIV in relation to their experiences of surveillance illuminates the relationship between the surveillance of mothers living with HIV and HIV-related stigma.

  2. Legal Enforcement of Social Rights: Enabling Conditions and Impact Assessment

    NARCIS (Netherlands)

    S. Gloppen (Siri)

    2009-01-01

    textabstractThis article commends the concise and useful analysis of courts and the legal enforcement of economic, social and cultural rights given in Christian Courtis’ book, Courts and the Legal Enforcement of Economic, Social and Cultural Rights: Comparative Experiences of Justiciability. Yet, in

  3. Law enforcement attitudes towards naloxone following opioid overdose training.

    Science.gov (United States)

    Purviance, Donna; Ray, Bradley; Tracy, Abigail; Southard, Erik

    2017-01-01

    Opioid intoxication and overdoses are life-threatening emergencies requiring rapid treatment. One response to this has been to train law enforcement to detect the signs of an opioid overdose and train them to administer naloxone to reverse the effects. Although not a new concept, few studies have attempted to examine this policy. At 4 different locations in Indiana, law enforcement personnel were trained to detect the signs of an opioid-related overdose and how to administer naloxone to reverse the effects of the overdose. Pre and post surveys were administered at each location (N = 97). To examine changes in attitudes following training, the authors included items from the Opioid Overdose Attitudes Scale (OOAS), which measures respondents' competency, concerns, and readiness to administer naloxone. Among the full sample, naloxone training resulted in significant increases in competency, concerns, and readiness. Examining changes in attitudes by each location revealed that the training had the greatest effect on competency to administer naloxone and in easing concerns that law enforcement personal might have in administering naloxone. This study adds to others in showing that law enforcement personnel are receptive to naloxone training and that the OOAS is able to capture these attitudes. This study advances this literature by examining pre-post changes across multiple locations. As the distribution of naloxone continues to proliferate, this study and the OOAS may be valuable towards the development of an evidence-based training model for law enforcement.

  4. State and local law enforcement agency efforts to prevent sales to obviously intoxicated patrons.

    Science.gov (United States)

    Lenk, Kathleen M; Toomey, Traci L; Nelson, Toben F; Jones-Webb, Rhonda; Erickson, Darin J

    2014-04-01

    Alcohol sales to intoxicated patrons are illegal and may lead to public health issues such as traffic crashes and violence. Over the past several decades, considerable effort has been made to reduce alcohol sales to underage persons but less attention has been given to the issue of sales to obviously intoxicated patrons. Studies have found a high likelihood of sales to obviously intoxicated patrons (i.e., overservice), but little is known about efforts by enforcement agencies to reduce these sales. We conducted a survey of statewide alcohol enforcement agencies and local law enforcement agencies across the US to assess their strategies for enforcing laws prohibiting alcohol sales to intoxicated patrons at licensed alcohol establishments. We randomly sampled 1,631 local agencies (1,082 participated), and surveyed all 49 statewide agencies that conduct alcohol enforcement. Sales to obviously intoxicated patrons were reported to be somewhat or very common in their jurisdiction by 55 % of local agencies and 90 % of state agencies. Twenty percent of local and 60 % of state agencies reported conducting enforcement efforts to reduce sales to obviously intoxicated patrons in the past year. Among these agencies, fewer than half used specific enforcement strategies on at least a monthly basis to prevent overservice of alcohol. Among local agencies, enforcement efforts were more common among agencies that had a full-time officer specifically assigned to carry out alcohol enforcement efforts. Enforcement of laws prohibiting alcohol sales to obviously intoxicated patrons is an underutilized strategy to reduce alcohol-related problems, especially among local law enforcement agencies.

  5. Reporting and Surveillance for Norovirus Outbreaks

    Science.gov (United States)

    ... Vaccine Surveillance Network (NVSN) Foodborne Diseases Active Surveillance Network (FoodNet) National Outbreak Reporting System (NORS) Estimates of Foodborne Illness in the United States CDC's Vessel Sanitation Program CDC Feature: Surveillance for Norovirus Outbreaks Top ...

  6. Reactor Vessel Surveillance Program for Advanced Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Kyeong-Hoon; Kim, Tae-Wan; Lee, Gyu-Mahn; Kim, Jong-Wook; Park, Keun-Bae; Kim, Keung-Koo

    2008-10-15

    This report provides the design requirements of an integral type reactor vessel surveillance program for an integral type reactor in accordance with the requirements of Korean MEST (Ministry of Education, Science and Technology Development) Notice 2008-18. This report covers the requirements for the design of surveillance capsule assemblies including their test specimens, test block materials, handling tools, and monitors of the surveillance capsule neutron fluence and temperature. In addition, this report provides design requirements for the program for irradiation surveillance of reactor vessel materials, a layout of specimens and monitors in the surveillance capsule, procedures of installation and retrieval of the surveillance capsule assemblies, and the layout of the surveillance capsule assemblies in the reactor.

  7. Forensic Speaker Recognition Law Enforcement and Counter-Terrorism

    CERN Document Server

    Patil, Hemant

    2012-01-01

    Forensic Speaker Recognition: Law Enforcement and Counter-Terrorism is an anthology of the research findings of 35 speaker recognition experts from around the world. The volume provides a multidimensional view of the complex science involved in determining whether a suspect’s voice truly matches forensic speech samples, collected by law enforcement and counter-terrorism agencies, that are associated with the commission of a terrorist act or other crimes. While addressing such topics as the challenges of forensic case work, handling speech signal degradation, analyzing features of speaker recognition to optimize voice verification system performance, and designing voice applications that meet the practical needs of law enforcement and counter-terrorism agencies, this material all sounds a common theme: how the rigors of forensic utility are demanding new levels of excellence in all aspects of speaker recognition. The contributors are among the most eminent scientists in speech engineering and signal process...

  8. Between visibility and surveillance

    DEFF Research Database (Denmark)

    Uldam, Julie

    As activists move from alternative media platforms to commercial social media platforms they face increasing challenges in protecting their online security and privacy. While government surveillance of activists is well-documented in both scholarly research and the media, corporate surveillance...

  9. 7 CFR 3016.43 - Enforcement.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Enforcement. 3016.43 Section 3016.43 Agriculture Regulations of the Department of Agriculture (Continued) OFFICE OF THE CHIEF FINANCIAL OFFICER, DEPARTMENT OF AGRICULTURE UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL...

  10. 17 CFR 37.9 - Enforceability.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Enforceability. 37.9 Section 37.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES TRANSACTION... pursuant to the rules of, a registered derivatives transaction execution facility shall not be void...

  11. Optimal enforcement of competition law

    NARCIS (Netherlands)

    Motchenkova, E.

    2005-01-01

    Despite the recent theoretical developments in the field of antitrust law enforcement, much still needs to be done in order to prevent collusion and price-fixing in the major indiustries. Although penalties were recently increased considerably and new instruments of cartel deterrence such as

  12. 18 CFR 39.9 - Enforcement of Commission Rules and Orders.

    Science.gov (United States)

    2010-04-01

    ... CERTIFICATION OF THE ELECTRIC RELIABILITY ORGANIZATION; AND PROCEDURES FOR THE ESTABLISHMENT, APPROVAL, AND ENFORCEMENT OF ELECTRIC RELIABILITY STANDARDS § 39.9 Enforcement of Commission Rules and Orders. (a) The... or a Regional Entity to ensure compliance with a Reliability Standard or any Commission order...

  13. Automatic Fiscal Stabilizers

    Directory of Open Access Journals (Sweden)

    Narcis Eduard Mitu

    2013-11-01

    Full Text Available Policies or institutions (built into an economic system that automatically tend to dampen economic cycle fluctuations in income, employment, etc., without direct government intervention. For example, in boom times, progressive income tax automatically reduces money supply as incomes and spendings rise. Similarly, in recessionary times, payment of unemployment benefits injects more money in the system and stimulates demand. Also called automatic stabilizers or built-in stabilizers.

  14. From imitation to implementation: How two- and three-year-old children learn to enforce social norms.

    Science.gov (United States)

    Hardecker, Susanne; Tomasello, Michael

    2017-06-01

    Young children enforce social norms from early on, but little research has examined how this enforcement behaviour emerges. This study investigated whether observing an adult's norm enforcement influences children's own enforcement of that norm compared with observing an action demonstration without enforcement. Additionally, children experienced enforcement either following their own (second-party) or a third-party's transgression (N = 120). Results revealed that observing enforcement increased two- and three-year-old children's protest against the sanctioned action regardless of second- or third-party context. However, only three-year-olds generalized their enforcement to a novel action not matching the norm, whereas two-year-olds only protested against the previously sanctioned action. Importantly, without any enforcement demonstration, two-year-olds rarely protested at all while three-year-olds did so quite frequently. Thus, providing an opportunity to imitate enforcement seems to give rise to enforcement behaviour in two-year-olds while three-year-olds already understand normative implications following a variety of cues and even apply norm enforcement without any demonstration of how to do it. Statement of contribution What is already known on this subject? Children conform to social norms from early in development. Young children from 2 to 3 years of age also enforce social norms on third parties. What does this study add? Observing enforcement by an adult increases two- and three-year-olds' protest against the sanctioned action. It does not matter whether children experienced enforcement on their own or a third party's action. Three-, but not two-year-olds, generalize their enforcement to novel actions that do not match the norm. © 2016 The British Psychological Society.

  15. Scoring sensor observations to facilitate the exchange of space surveillance data

    Science.gov (United States)

    Weigel, M.; Fiedler, H.; Schildknecht, T.

    2017-08-01

    In this paper, a scoring metric for space surveillance sensor observations is introduced. A scoring metric allows for direct comparison of data quantity and data quality, and makes transparent the effort made by different sensor operators. The concept might be applied to various sensor types like tracking and surveillance radar, active optical laser tracking, or passive optical telescopes as well as combinations of different measurement types. For each measurement type, a polynomial least squares fit is performed on the measurement values contained in the track. The track score is the average sum over the polynomial coefficients uncertainties and scaled by reference measurement accuracy. Based on the newly developed scoring metric, an accounting model and a rating model are introduced. Both models facilitate the exchange of observation data within a network of space surveillance sensors operators. In this paper, optical observations are taken as an example for analysis purposes, but both models can also be utilized for any other type of observations. The rating model has the capability to distinguish between network participants with major and minor data contribution to the network. The level of sanction on data reception is defined by the participants themselves enabling a high flexibility. The more elaborated accounting model translates the track score to credit points earned for data provision and spend for data reception. In this model, data reception is automatically limited for participants with low contribution to the network. The introduced method for observation scoring is first applied for transparent data exchange within the Small Aperture Robotic Telescope Network (SMARTnet). Therefore a detailed mathematical description is presented for line of sight measurements from optical telescopes, as well as numerical simulations for different network setups.

  16. An Interfacing System for Radiation Surveillance Using a Radio Communication Network

    International Nuclear Information System (INIS)

    Arunsiri, T.; Punnachaiya, S.; Pattarasumun, A.

    1998-01-01

    The development of an interfacing system for environmental radiation surveillance using radio communication network is aimed to improve a way by which environmental radiation measurement is transmitted and reported from the regional area monitoring station network. This also includes an automatic warning of beacon status via the radio link network to the center of environmental radiation control when an abnormal radiation level is detected. The interfacing system was developed by simulating the EGAT radio link network, the NT 2612, and can be separated into two parts. The first part was for a mobile station which can manage the output data from the radiation measurement system in the standard form of RS-232, IEEE-488, BCD and analog signal. This was accomplished by modulating the signal in selected baud rates ranging from 150 to 9600 bps using an economical radio packet capable of identifying and recalling the station code number. The other part is the linking system between the output data and the microcomputer equipped with a software to manage and evaluate the data from 10 surveillance stations for convenient handing of data output, statistical analysis and transmitting warning signal. Data transmission was tested using a baud rate of 1200 bps and was found to contain no detectable error when digital signal was transmitted while analog signal transmission resulted in deviations of less than ± 0.003%. The development of this radio link system provides a future trend for the environmental radiation monitoring network for countries with nuclear power plants or neighboring countries needed to continuously monitor for any abnormal radiation level in the environment. In case that the radiation surveillance system detects a high level of radiation, a warning signal will be transmitted and appropriate actions may be immediately exercised to control impacts of radiation on environment and living things according to international guidelines

  17. Enforcing the climate regime: Game theory and the Marrakesh Accords

    Energy Technology Data Exchange (ETDEWEB)

    Hovi, Jon

    2002-07-01

    The article reviews basic insights about compliance and ''hard'' enforcement that can be derived from various non-cooperative equilibrium concepts and evaluates the Marrakesh Accords in light of these insights. Five different notions of equilibrium are considered - the Nash equilibrium, the sub game perfect equilibrium, the re negotiation proof equilibrium, the coalition proof equilibrium and the perfect Bayesian equilibrium. These various types of equilibrium have number of implications for effective enforcement: 1. Consequences of non-compliance should be more than proportionate. 2. To be credible punishment needs to take place in the Pareto frontier, rather than by reversion to some suboptimal state. 3. An effective enforcement system must be able to curb collective as well as individual incentives to cheat. 4. A fully transparent enforcement regime could in fact turn out to be detrimental for compliance levels. It is concluded that constructing an effective system for ''hard'' enforcement of the Kyoto Protocol is a formidable task that has only partially been accomplished by the Marrakesh Accords. A possible explanation is that the design of a compliance system for the climate regime involved a careful balancing of the desire to minimise non-compliance against other important considerations. (Author)

  18. Reactor protection system with automatic self-testing and diagnostic

    International Nuclear Information System (INIS)

    Gaubatz, D.C.

    1996-01-01

    A reactor protection system is disclosed having four divisions, with quad redundant sensors for each scram parameter providing input to four independent microprocessor-based electronic chassis. Each electronic chassis acquires the scram parameter data from its own sensor, digitizes the information, and then transmits the sensor reading to the other three electronic chassis via optical fibers. To increase system availability and reduce false scrams, the reactor protection system employs two levels of voting on a need for reactor scram. The electronic chassis perform software divisional data processing, vote 2/3 with spare based upon information from all four sensors, and send the divisional scram signals to the hardware logic panel, which performs a 2/4 division vote on whether or not to initiate a reactor scram. Each chassis makes a divisional scram decision based on data from all sensors. Automatic detection and discrimination against failed sensors allows the reactor protection system to automatically enter a known state when sensor failures occur. Cross communication of sensor readings allows comparison of four theoretically ''identical'' values. This permits identification of sensor errors such as drift or malfunction. A diagnostic request for service is issued for errant sensor data. Automated self test and diagnostic monitoring, sensor input through output relay logic, virtually eliminate the need for manual surveillance testing. This provides an ability for each division to cross-check all divisions and to sense failures of the hardware logic. 16 figs

  19. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...

  20. Remote container monitoring and surveillance systems

    International Nuclear Information System (INIS)

    Resnik, W.M.; Kadner, S.P.

    1995-01-01

    Aquila Technologies Group is developing a monitoring and surveillance system to monitor containers of nuclear materials. The system will both visually and physically monitor the containers. The system is based on the combination of Aquila's Gemini All-Digital Surveillance System and on Aquila's AssetLAN trademark asset tracking technology. This paper discusses the Gemini Digital Surveillance system as well as AssetLAN technology. The Gemini architecture with emphasis on anti-tamper security features is also described. The importance of all-digital surveillance versus other surveillance methods is also discussed. AssetLAN trademark technology is described, emphasizing the ability to continually track containers (as assets) by location utilizing touch memory technology. Touch memory technology provides unique container identification, as well as the ability to store and retrieve digital information on the container. This information may relate to container maintenance, inspection schedules, and other information. Finally, this paper describes the combination of the Gemini system with AssetLAN technology, yielding a self contained, container monitoring and area/container surveillance system. Secure container fixture design considerations are discussed. Basic surveillance review functions are also discussed

  1. Building on mental health training for law enforcement: strengthening community partnerships.

    Science.gov (United States)

    Campbell, Jorien; Ahalt, Cyrus; Hagar, Randall; Arroyo, William

    2017-09-11

    Purpose The purpose of this paper is to describe the current state of law enforcement training related to the high number of interactions with persons with mental illness, and to recommend next steps in preparing law enforcement to effectively meet this challenge. Design/methodology/approach The authors reviewed the current literature on relevant law enforcement training programs, focusing primarily on crisis intervention team (CIT) training, and used the case example of California to identify opportunities to improve and enhance law enforcement preparedness for the challenge of responding to persons with mental illness. Findings Broad-based community partnerships working together to develop programs that meet the local needs of both those with mental illness and law enforcement, the availability of mental health treatment centers with no-refusal policies, and a coordinating person or agency to effectively liaise among stakeholders are critical enhancements to CIT training. Originality/value As increasing attention is paid to adverse interactions between police and vulnerable populations, this paper identifies policies that would build on existing training programs to improve police responses to persons with mental illness.

  2. Monitoring, Accounting and Enforcement in Emissions Trading Regimes

    International Nuclear Information System (INIS)

    Peterson, S.

    2003-01-01

    Monitoring, accounting and enforcement have been addressed in quite a number of presentations, papers and discussions in the past four CATEP workshops. Besides drawing conclusions from the experiences with existing trading regimes, different aspects of compliance have been analysed in more detail and finally there has been a special focus on standardised accounting systems. This paper tries to summarise the diverse findings to get a comprehensive picture of what is needed to assure high compliance in emissions trading regimes and identify any specific problems. The first section focuses on real trading regimes that are all local or at most national. It describes the monitoring, accounting and enforcement systems in existing and planned trading regimes to get an idea of what such systems include and to draw conclusions from experience. One focus is on enforcement mechanisms, as different from monitoring and accounting, which are basically a question of regulation and technology, penalties and compliance are a question of choices by participants and can be analysed with analytic tools. Section 3 deals with specific monitoring, accounting and enforcement problems in international emissions trading. It describes the development of internationally standardised systems and discusses the commitment period reserve as one instrument to avoid overselling of permits in international emission trading under the Kyoto Protocol. Section 5 provides a summary and conclusion

  3. Child Support Enforcement Annual Data Report Form 157 – YR 2014

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  4. Enforcing Competition Rules in South Africa: Thieves at the Dinner ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2013-03-01

    Mar 1, 2013 ... Describing and analyzing competition law in South Africa, this book promotes a deeper understanding of the development of this foundational economic law within its specific national, social and economic context. Enforcing Competition Rules in South Africa draws strongly on case law and enforcement ...

  5. Recruiting & Retaining Women: A Self-Assessment Guide for Law Enforcement.

    Science.gov (United States)

    Harrington, Penny E.

    This document presents information, guidelines, and resource materials to help law enforcement administrators address issues related to recruiting and retaining women in law enforcement. Its 14 chapters contain the following sections: statement of the problem; legal issues; possible solutions, model policies, and practices; expert assistance,…

  6. Task force on compliance and enforcement. Final report. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    1978-03-01

    Recommendations for measures to strengthen the FEA enforcement program in the area of petroleum price regulation are presented. Results of task force efforts are presented in report and recommendations sections concerned with pending cases, compliance program organization, enforcement powers, compliance strategy, and audit staffing and techniques. (JRD)

  7. ENFORCEMENT OF MORTGAGE CONTRACT

    Directory of Open Access Journals (Sweden)

    Alisa A. BELU

    2016-07-01

    Full Text Available A chattel mortgage contract is the expression of a real guarantee that gives the creditor precedence over other creditors, in addition to the general pledge upon the belongings of the debtor. It refers to the sale of mortgaged movable assets, exclusively or prioritized in favor of the mortgaging creditor, in case the debtor does not comply with his / her commitments, under the signed mortgage contract. Beginning from this purpose, shared by both sides (as the chattel mortgage contract is synallagmatic, in case the debtor is unable to fulfill his / her commitments, the sides reach a situation of enforcement of the signed chattel mortgage contract. Given the legal status of the chattel mortgage contract [Art. 2387-2477 Noul Cod Civil , Universul Juridic, Bucureşti, 2016, ISBN 978-606-673-792-0], the principle of binding force of the contract and the principle according to which signed legal conventions will entail legal effects, the Romanian law maker developed the proper legal framework for the enforcement of the chattel mortgage contract. [art. 622 si urm. Noul Cod de Procedură Civilă, ed. Hamangiu, Bucureşti, 2016, ISBN 978-606-27-0459-9].

  8. Enforcement/certification program for appliance efficiency standards. Task II, report

    Energy Technology Data Exchange (ETDEWEB)

    1979-09-28

    The research and analysis program at Vitro Labs. in support of the appliance certification and enforcement program provides Vitro's recommended approach to appliance certification and enforcement (C/E). The approach established the C/E program framework, general criteria, and procedures for assuring a specified level of energy-efficiency performance for 13 categories of consumer products (furnaces, humidifiers, dehumidifiers, dishwashers, television, clothes washers, freezers, air conditioners, stoves, refrigerators, water heaters). Section 2 summarizes the recommended approach. Section 3 contains detailed evaluations and comparisons for four independent alternative approaches considered (minimal government intevention, strong certification control, strong enforcement audit, and mixed certification/enforcement). The fifth C/E approach (strong remedy/deterrent) involves the remedies available to the government should non-compliance be discovered and could affect the choice among the approaches, but this approach has not been evaluated. Section 4 summarizes the analysis methodology used to select the recommended approach. Additional information is provided in 6 appendices.

  9. Retail price as an outcome measure for the effectiveness of drug law enforcement.

    Science.gov (United States)

    Bright, David A; Ritter, Alison

    2010-09-01

    One outcome measure of law enforcement effectiveness is the reduction in drug consumption which occurs as a result of law enforcement interventions. A theoretical relationship between drug consumption and retail price has promoted the use of retail price as a surrogate measure for consumption. In the current article, retail price is examined as a potential outcome measure for the effectiveness of law enforcement. The predictions regarding the relationship between law enforcement intensity and price are only partially supported by research. Explanations for the disconnect between the drug law enforcement activity and retail price include: rapid adaptation by market players, enforcement swamping, assumptions of rational actors, short-run versus long-run effects, structure of the illicit market, simultaneous changes that affect price in perverse ways, the role of violence in markets, and data limitations. Researchers who use retail price as an outcome measure need to take into account the complex relationship between drug law enforcement interventions and the retail price of illicit drugs. Viable outcome measures which can be used as complements to retail price are worth investigation. Copyright 2009 Elsevier B.V. All rights reserved.

  10. U.S. Environmental Protection Agency Office of Enforcement and Compliance Assurance New Mapping Tool for Enforcement Cases

    Data.gov (United States)

    U.S. Environmental Protection Agency — The new mapping tool shows facilities in the United States where the EPA concluded formal environmental enforcement actions between October 1, 2008 and September 30,...

  11. Firearm Prevalence and Homicides of Law Enforcement Officers in the United States

    Science.gov (United States)

    Simmons, Molly M.; Dominici, Francesca; Hemenway, David

    2015-01-01

    Objectives. In the United States, state firearm ownership has been correlated with homicide rates. More than 90% of homicides of law enforcement officers (LEOs) are committed with firearms. We examined the relationship between state firearm ownership rates and LEO occupational homicide rates. Methods. We obtained the number LEOs killed from 1996 to 2010 from a Federal Bureau of Investigation (FBI) database. We calculated homicide rates per state as the number of officers killed per number of LEOs per state, obtained from another FBI database. We obtained the mean household firearm ownership for each state from the Behavioral Risk Factor Surveillance System. Results. Using Poisson regression and controlling for factors known to affect homicide rates, we associated firearm ownership with the homicide rates for LEOs (incidence rate ratio = 1.044; P = .005); our results were supported by cross-sectional and longitudinal sensitivity analyses. LEO homicide rates were 3 times higher in states with high firearm ownership compared with states with low firearm ownership. Conclusions. High public gun ownership is a risk for occupational mortality for LEOs in the United States. States could consider methods for reducing firearm ownership as a way to reduce occupational deaths of LEOs. PMID:26270316

  12. 19 CFR Appendix A to Part 210 - Adjudication and Enforcement

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Adjudication and Enforcement A Appendix A to Part 210 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Pt. 210, App. A Appendix A to Part 210—Adjudication and...

  13. Moka with Ristretto

    Science.gov (United States)

    2017-11-01

    system that can automatically provide hardware- enforcement of termination for program components identified to execute in a sub-Turing Complete space...SP 󈧒), Washington, DC, 2014. [21] F. Schneider, " Enforceable Security Policies," ACM Transactions on Information and System Security, pp. 30-50...CPU branch tracing functions to automatically enforce forward only execution on applicable portions of a given program. 15. SUBJECT TERMS Language

  14. When Reputation Enforces Evolutionary Cooperation in Unreliable MANETs.

    Science.gov (United States)

    Tang, Changbing; Li, Ang; Li, Xiang

    2015-10-01

    In self-organized mobile ad hoc networks (MANETs), network functions rely on cooperation of self-interested nodes, where a challenge is to enforce their mutual cooperation. In this paper, we study cooperative packet forwarding in a one-hop unreliable channel which results from loss of packets and noisy observation of transmissions. We propose an indirect reciprocity framework based on evolutionary game theory, and enforce cooperation of packet forwarding strategies in both structured and unstructured MANETs. Furthermore, we analyze the evolutionary dynamics of cooperative strategies and derive the threshold of benefit-to-cost ratio to guarantee the convergence of cooperation. The numerical simulations verify that the proposed evolutionary game theoretic solution enforces cooperation when the benefit-to-cost ratio of the altruistic exceeds the critical condition. In addition, the network throughput performance of our proposed strategy in structured MANETs is measured, which is in close agreement with that of the full cooperative strategy.

  15. Expedited enforcement of UST regulations in New Mexico

    International Nuclear Information System (INIS)

    Sutton-Mendoza, S.A.

    1993-01-01

    New Mexico is the first state to implement an expedited enforcement program to enhance compliance with the Underground Storage Tank Regulations (USTR). UST field inspectors conduct inspections at UST facilities to ensure compliance with the USTR. If the inspector detects a violation, a field Notice of Violation is issued to the owner/operator and a penalty assessed. Prior to expedited enforcement 14% of the violations were corrected. Since implementing the program the Underground Storage Tank Bureau has conducted 592 inspections, issued 181 field Notices of Violation and 52% of those cited have complied. As a result of the enforcement program 85% of the facilities inspected are in compliance with USTR. This program has been successful in gaining compliance with USTR, specifically the release detection requirements. The UST Bureau has significantly increased compliance with the Regulations; and thereby reduced the threats to New Mexico's environment posed by petroleum products and hazardous substances released from underground storage tanks

  16. Microbiological Food Safety Surveillance in China

    Directory of Open Access Journals (Sweden)

    Xiaoyan Pei

    2015-08-01

    Full Text Available Microbiological food safety surveillance is a system that collects data regarding food contamination by foodborne pathogens, parasites, viruses, and other harmful microbiological factors. It helps to understand the spectrum of food safety, timely detect food safety hazards, and provide relevant data for food safety supervision, risk assessment, and standards-setting. The study discusses the microbiological surveillance of food safety in China, and introduces the policies and history of the national microbiological surveillance system. In addition, the function and duties of different organizations and institutions are provided in this work, as well as the generation and content of the surveillance plan, quality control, database, and achievement of the microbiological surveillance of food safety in China.

  17. 31 CFR 31.218 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Enforcement. 31.218 Section 31.218 Money and Finance: Treasury Office of the Secretary of the Treasury TROUBLED ASSET RELIEF PROGRAM... more of the following sanctions: (1) Rejection of work tainted by an organizational conflict of...

  18. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2006-01-01

    .... but provides the strong security guarantees of modern languages such as Java. A second avenue of language-based work explored a general class of policy enforcement mechanism based on in-line reference monitors (IRM...

  19. SAVY-4000 Field Surveillance Plan Update for 2017

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, Elizabeth J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Stone, Timothy Amos [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Smith, Paul Herrick [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Reeves, Kirk Patrick [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Veirs, Douglas Kirk [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Prochnow, David Adrian [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-03-20

    The Packaging Surveillance Program section of the Department of Energy (DOE) Manual 441.1-­1, Nuclear Material Packaging Manual (DOE 2008), requires DOE contractors to “ensure that a surveillance program is established and implemented to ensure the nuclear material storage package continues to meet its design criteria.”This 2017 update reflects changes to the surveillance plan resulting from surveillance findings as documented in Reeves et al. 2016. These findings include observations of corrosion in SAVY and Hagan containers and the indication (in one SAVY container) of possible filter membrane thermal degradation. This surveillance plan update documents the rationale for selecting surveillance containers, specifies the containers for 2017 surveillance, and identifies a minimum set of containers for 2018 surveillance. This update contains important changes to the previous surveillance plans.

  20. Sanitary surveillance and bioethics

    Directory of Open Access Journals (Sweden)

    Volnei Garrafa

    2017-08-01

    Full Text Available Regulatory practices in the field of health surveillance are indispensable. The aim of this study is to show ‒ taking the Brazilian National Surveillance Agency, governing body of sanitary surveillance in Brazil as a reference ‒ that bioethics provides public bodies a series of theoretical tools from the field of applied ethics for the proper exercise and control of these practices. To that end, the work uses two references of bioethics for the development of a comparative and supportive analysis to regulatory activities in the field of health surveillance: the Universal Declaration on Bioethics and Human Rights of Unesco and the theory of intervention bioethics. We conclude that organizations and staff working with regulatory activities can take advantage of the principles and frameworks proposed by bioethics, especially those related to the Declaration and the theory of intervention bioethics, the latter being set by the observation and use of the principles of prudence, precaution, protection and prevention.

  1. Forensic imaging tools for law enforcement

    Energy Technology Data Exchange (ETDEWEB)

    SMITHPETER,COLIN L.; SANDISON,DAVID R.; VARGO,TIMOTHY D.

    2000-01-01

    Conventional methods of gathering forensic evidence at crime scenes are encumbered by difficulties that limit local law enforcement efforts to apprehend offenders and bring them to justice. Working with a local law-enforcement agency, Sandia National Laboratories has developed a prototype multispectral imaging system that can speed up the investigative search task and provide additional and more accurate evidence. The system, called the Criminalistics Light-imaging Unit (CLU), has demonstrated the capabilities of locating fluorescing evidence at crime scenes under normal lighting conditions and of imaging other types of evidence, such as untreated fingerprints, by direct white-light reflectance. CLU employs state of the art technology that provides for viewing and recording of the entire search process on videotape. This report describes the work performed by Sandia to design, build, evaluate, and commercialize CLU.

  2. Congenital rubella syndrome surveillance as a platform for surveillance of other congenital infections, Peru, 2004-2007.

    Science.gov (United States)

    Whittembury, Alvaro; Galdos, Jorge; Lugo, María; Suárez-Ognio, Luis; Ortiz, Ana; Cabezudo, Edwin; Martínez, Mario; Castillo-Solórzano, Carlos; Andrus, Jon Kim

    2011-09-01

    Rubella during pregnancy can cause serious fetal abnormalities and death. Peru has had integrated measles/rubella surveillance since 2000 but did not implement congenital rubella syndrome (CRS) surveillance until 2004, in accordance with the Pan American Health Organization recommendations for rubella elimination. The article describes the experience from the CRS sentinel surveillance system in Peru. Peru has maintained a national sentinel surveillance system for reporting confirmed and suspected CRS cases since 2004. A surveillance protocol was implemented with standardized case definitions and instruments in the selected sentinel sites. Each sentinel site completes their case investigations and report forms and sends the reports to the Health Region Epidemiology Department, which forwards the data to the national Epidemiology Department. CRS surveillance data were analyzed for the period 2004-2007. During the period 2004-2007, 16 health facilities, which are located in 9 of the 33 health regions, representing the 3 main geographical areas (coast, mountain, and jungle), were included as sentinel sites for the CRS surveillance. A total of 2061 suspected CRS cases were reported to the system. Of these, 11 were classified as CRS and 23 as congenital rubella infection. Factors significantly associated with rubella vertical transmission were: (1) in the mother, maternal history of rash during pregnancy (odds ratio [OR], 12.0; 95% confidence interval [CI], 3.8-37.8); (2) and in the infant, pigmentary retinopathy (OR, 18.4; 95% CI, 3.2-104.6), purpura (OR, 14.7; 95% CI, 2.8-78.3), and developmental delay (OR, 4.4; 95% CI, 1.75-11.1). The surveillance system has been able to identify rubella vertical transmission, reinforcing the evidence that rubella was a public health problem in Peru. This system may serve as a platform to implement surveillance for other congenital infections in Peru.

  3. The effect of enforcement on speed behaviour : a literature review.

    NARCIS (Netherlands)

    Oei, H.-l.

    1998-01-01

    The objective of this literature study is to give an overview of research on speed enforcement and its effect on speed behaviour and safety. This study will be used to find new strategies and tactics to enhance the efficiency and effectiveness of speed enforcement by the police in terms of behaviour

  4. Technical Review of Law Enforcement Standards and Guides Relative to Incident Management

    Energy Technology Data Exchange (ETDEWEB)

    Stenner, Robert D.; Salter, R.; Stanton, J. R.; Fisher, D.

    2009-03-24

    In an effort to locate potential law enforcement-related standards that support incident management, a team from the Pacific Northwest National Laboratory (PNNL) contacted representatives from the National Institute of Standards-Office of Law Enforcement Standards (NIST-OLES), National Institute of Justice (NIJ), Federal Bureau of Investigation (FBI), Secret Service, ASTM International committees that have a law enforcement focus, and a variety of individuals from local and regional law enforcement organizations. Discussions were held with various state and local law enforcement organizations. The NIJ has published several specific equipment-related law enforcement standards that were included in the review, but it appears that law enforcement program and process-type standards are developed principally by organizations that operate at the state and local level. Input is provided from state regulations and codes and from external non-government organizations (NGOs) that provide national standards. The standards that are adopted from external organizations or developed independently by state authorities are available for use by local law enforcement agencies on a voluntary basis. The extent to which they are used depends on the respective jurisdictions involved. In some instances, use of state and local disseminated standards is mandatory, but in most cases, use is voluntary. Usually, the extent to which these standards are used appears to depend on whether or not jurisdictions receive certification from a “governing” entity due to their use and compliance with the standards. In some cases, these certification-based standards are used in principal but without certification or other compliance monitoring. In general, these standards appear to be routinely used for qualification, selection for employment, and training. In these standards, the term “Peace Officer” is frequently used to refer to law enforcement personnel. This technical review of national law

  5. The role of supplementary environmental surveillance to complement acute flaccid paralysis surveillance for wild poliovirus in Pakistan - 2011-2013.

    Directory of Open Access Journals (Sweden)

    Tori L Cowger

    Full Text Available More than 99% of poliovirus infections are non-paralytic and therefore, not detected by acute flaccid paralysis (AFP surveillance. Environmental surveillance (ES can detect circulating polioviruses from sewage without relying on clinical presentation. With extensive ES and continued circulation of polioviruses, Pakistan presents a unique opportunity to quantify the impact of ES as a supplement to AFP surveillance on overall completeness and timeliness of poliovirus detection.Genetic, geographic and temporal data were obtained for all wild poliovirus (WPV isolates detected in Pakistan from January 2011 through December 2013. We used viral genetics to assess gaps in AFP surveillance and ES as measured by detection of 'orphan viruses' (≥1.5% different in VP1 capsid nucleotide sequence. We compared preceding detection of closely related circulating isolates (≥99% identity detected by AFP surveillance or ES to determine which surveillance system first detected circulation before the presentation of each polio case.A total of 1,127 WPV isolates were detected by AFP surveillance and ES in Pakistan from 2011-2013. AFP surveillance and ES combined exhibited fewer gaps (i.e., % orphan viruses in detection than AFP surveillance alone (3.3% vs. 7.7%, respectively. ES detected circulation before AFP surveillance in nearly 60% of polio cases (200 of 346. For polio cases reported from provinces conducting ES, ES detected circulation nearly four months sooner on average (117.6 days than did AFP surveillance.Our findings suggest ES in Pakistan is providing earlier, more sensitive detection of wild polioviruses than AFP surveillance alone. Overall, targeted ES through strategic selection of sites has important implications in the eradication endgame strategy.

  6. Risk based surveillance for vector borne diseases

    DEFF Research Database (Denmark)

    Bødker, Rene

    of samples and hence early detection of outbreaks. Models for vector borne diseases in Denmark have demonstrated dramatic variation in outbreak risk during the season and between years. The Danish VetMap project aims to make these risk based surveillance estimates available on the veterinarians smart phones...... in Northern Europe. This model approach may be used as a basis for risk based surveillance. In risk based surveillance limited resources for surveillance are targeted at geographical areas most at risk and only when the risk is high. This makes risk based surveillance a cost effective alternative...... sample to a diagnostic laboratory. Risk based surveillance models may reduce this delay. An important feature of risk based surveillance models is their ability to continuously communicate the level of risk to veterinarians and hence increase awareness when risk is high. This is essential for submission...

  7. Post-Crackdown Effectiveness of Field-Based Forest Law Enforcement in the Brazilian Amazon

    Science.gov (United States)

    Börner, Jan; Kis-Katos, Krisztina; Hargrave, Jorge; König, Konstantin

    2015-01-01

    Regulatory enforcement of forest conservation laws is often dismissed as an ineffective approach to reducing tropical forest loss. Yet, effective enforcement is often a precondition for alternative conservation measures, such as payments for environmental services, to achieve desired outcomes. Fair and efficient policies to reducing emissions from deforestation and forest degradation (REDD) will thus crucially depend on understanding the determinants and requirements of enforcement effectiveness. Among potential REDD candidate countries, Brazil is considered to possess the most advanced deforestation monitoring and enforcement infrastructure. This study explores a unique dataset of over 15 thousand point coordinates of enforcement missions in the Brazilian Amazon during 2009 and 2010, after major reductions of deforestation in the region. We study whether local deforestation patterns have been affected by field-based enforcement and to what extent these effects vary across administrative boundaries. Spatial matching and regression techniques are applied at different spatial resolutions. We find that field-based enforcement operations have not been universally effective in deterring deforestation during our observation period. Inspections have been most effective in reducing large-scale deforestation in the states of Mato Grosso and Pará, where average conservation effects were 4.0 and 9.9 hectares per inspection, respectively. Despite regional and actor-specific heterogeneity in inspection effectiveness, field-based law enforcement is highly cost-effective on average and might be enhanced by closer collaboration between national and state-level authorities. PMID:25875656

  8. The law enforcement agencies in Turkey

    International Nuclear Information System (INIS)

    Aygun, A.

    2001-01-01

    Full text: In Turkey, the law enforcement agencies are gathered into two main authorities. These are as below. 1. Under the Ministry of Interior: General Commander of Gendarmarie; General Directorate of National Police; General Commandery of Coast Guard; 2. Within the Undersecretariat of Customs there are two main service units to combat smuggling. These are: General Directorate of Customs Enforcement (GDCE) and General Directorate of Customs. The responsible areas of these administrations are legally as below: The region of Gendarmarie: It covers rural areas. In that region, Gendarmarie is responsible, inter alia, combating smuggling; The region of police: General Directorate of National Police has performed its tasks, one of which is to combat smuggling in the city areas; The region of Territorial Waters: Coast Guard is related authority in territorial water for, among other things, fighting smuggling. The region of Customs: General Directorate of Customs Enforcement fulfills in these regions as the authority and responsible law enforcement agent. The main difference between GDCE and other law enforcement agencies are: GDCE is the only Administration whose main aim is to struggle against smuggling; Generally, all units conduct their operations in their responsible region, however, if it is necessary, depending on the case, an operation can be performed jointly only in another region in cooperation with the relevant agent. In that context, as far as General Directorate of Customs Enforcement is concerned, fulfilling an operation in other regions is not a legal necessity. Any units of GDCE can seize and do operation all over Turkey by itself, without any regional limitations from legislation. Organizational Structure of the Customs Administration in Turkey - The principle functions of the General Directorate of Customs are: implementation of customs policies, collection of customs taxes, inspection of passengers and goods, also, investigation of smuggling

  9. The corruption process of a law enforcement officer: a paradigm of occupational stress and deviancy.

    Science.gov (United States)

    McCafferty, F L; Souryal, S; McCafferty, M A

    1998-01-01

    The public does not want all laws enforced. In the closed society of law enforcement institutions, police discretion, the conspiracy of silence, the lack of an administration with integrity, and susceptible law enforcement officers contribute to the development of corruption from occupational deviance. Corruption in law enforcement agencies may have similar roots in business, law, medicine, and other professions. Understanding the law enforcement corruption paradigm may therefore be helpful in correcting and curbing corruption in other professions.

  10. Who Guards the Guards? Understanding Deviance and Corruption of Law Enforcement Officials

    Directory of Open Access Journals (Sweden)

    Ercan BALCIOĞLU

    2015-12-01

    Full Text Available Law enforcement officials must be honest in performing both their judicial and administrative responsibilities and duties within the criminal justice system to maintain public tranquility, social trust and order, and securing the justice. There are, however, different kinds phenomena in which several kinds of deviance from acceptable norms of behavior is existing among the law enforcement professionals. Studies dealing with deviance of law enforcement officials have been limited in the Turkish context. This study, first, categorize the kinds of deviant behavior among the law enforcement officials as pointed out by numerous scientific studies. Etiology of these types of behavior, than, is examined based on the existing literature. First of all, as a kind of white collar crime which observing among deviant behavior of police personal will be categorized according to international literature. Finally, this study brings the general consensus on the preventive measures as applied in several countries on law enforcement officials’ deviant behaviors to the attention of the Turkish reader

  11. The Use of Satellite Imagery for Domestic Law Enforcement

    Science.gov (United States)

    2013-12-01

    traditionally conducted in a surveillance covey within close proximity to a potential perpetrator, may today involve a greater standoff that necessitate a...surveillance techniques, modern policing has been become to a science unto itself. What was traditionally conducted in a surveillance covey, within close ...current systems, the pictures still provided early analyst a means to determine an area order of battle. Specific weapons system and 17 Keyhole (KH

  12. A CLOUD-BASED ARCHITECTURE FOR SMART VIDEO SURVEILLANCE

    Directory of Open Access Journals (Sweden)

    L. Valentín

    2017-09-01

    Full Text Available Turning a city into a smart city has attracted considerable attention. A smart city can be seen as a city that uses digital technology not only to improve the quality of people’s life, but also, to have a positive impact in the environment and, at the same time, offer efficient and easy-to-use services. A fundamental aspect to be considered in a smart city is people’s safety and welfare, therefore, having a good security system becomes a necessity, because it allows us to detect and identify potential risk situations, and then take appropriate decisions to help people or even prevent criminal acts. In this paper we present an architecture for automated video surveillance based on the cloud computing schema capable of acquiring a video stream from a set of cameras connected to the network, process that information, detect, label and highlight security-relevant events automatically, store the information and provide situational awareness in order to minimize response time to take the appropriate action.

  13. 49 CFR 801.57 - Records compiled for law enforcement purposes.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Records compiled for law enforcement purposes. 801... compiled for law enforcement purposes. Pursuant to 5 U.S.C. 552(b)(7), any records compiled for law or..., would disclose investigative procedures and practices, or would endanger the life or security of law...

  14. Randomized Trial of Law Enforcement Training on Autism Spectrum Disorders

    Science.gov (United States)

    Teagardin, Jill; Dixon, Dennis R.; Smith, Marlena N.; Granpeesheh, Doreen

    2012-01-01

    The core symptoms of autism spectrum disorders (ASD) are likely to affect interactions between law enforcement officers and persons with ASD. If law enforcement officers are not trained to identify and appropriately respond to persons with ASD, it is possible that officers may exacerbate a situation, resulting in unnecessary trauma, injury, or…

  15. 43 CFR 422.5 - Responsibilities of the Law Enforcement Administrator.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Responsibilities of the Law Enforcement Administrator. 422.5 Section 422.5 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION, DEPARTMENT OF THE INTERIOR LAW ENFORCEMENT AUTHORITY AT BUREAU OF RECLAMATION PROJECTS Responsibilities § 422.5 Responsibilities of...

  16. Attitude of Nigerian courts to the enforcement of foreign judgments ...

    African Journals Online (AJOL)

    ... serious need of reform. The study therefore called on the Nigerian Minister of Justice to do the needful so that the position of the law as it pertains to the enforcement of foreign judgment in Nigeria will be well settled and devoid of ambiguity. Keywords: Foreign Judgment, Enforcement, Registration, Recognition, Commerce ...

  17. Corruption in law enforcement: a paradigm of occupational stress and deviancy.

    Science.gov (United States)

    McCafferty, F L; McCafferty, M A

    1998-01-01

    In the closed society of a law enforcement agency, factors such as the conspiracy of silence, authoritarian supervision, and police discretion contribute to corruption. This article describes various types of corrupt behavior by police officers, reports the incidence of corruption in law enforcement agencies, discusses psychiatric conditions that may arise from corruption and also contribute to further corruption, and reviews proposed remedies for corruption. It also suggests that an understanding of corruption in law enforcement might be helpful in understanding, correcting, and preventing corruption in other professions, including medicine.

  18. Mapping HIV/STI behavioural surveillance in Europe

    Directory of Open Access Journals (Sweden)

    Lert France

    2010-10-01

    Full Text Available Abstract Background Used in conjunction with biological surveillance, behavioural surveillance provides data allowing for a more precise definition of HIV/STI prevention strategies. In 2008, mapping of behavioural surveillance in EU/EFTA countries was performed on behalf of the European Centre for Disease prevention and Control. Method Nine questionnaires were sent to all 31 member States and EEE/EFTA countries requesting data on the overall behavioural and second generation surveillance system and on surveillance in the general population, youth, men having sex with men (MSM, injecting drug users (IDU, sex workers (SW, migrants, people living with HIV/AIDS (PLWHA, and sexually transmitted infection (STI clinics patients. Requested data included information on system organisation (e.g. sustainability, funding, institutionalisation, topics covered in surveys and main indicators. Results Twenty-eight of the 31 countries contacted supplied data. Sixteen countries reported an established behavioural surveillance system, and 13 a second generation surveillance system (combination of biological surveillance of HIV/AIDS and STI with behavioural surveillance. There were wide differences as regards the year of survey initiation, number of populations surveyed, data collection methods used, organisation of surveillance and coordination with biological surveillance. The populations most regularly surveyed are the general population, youth, MSM and IDU. SW, patients of STI clinics and PLWHA are surveyed less regularly and in only a small number of countries, and few countries have undertaken behavioural surveys among migrant or ethnic minorities populations. In many cases, the identification of populations with risk behaviour and the selection of populations to be included in a BS system have not been formally conducted, or are incomplete. Topics most frequently covered are similar across countries, although many different indicators are used. In most

  19. Towards One Health disease surveillance: The Southern African Centre for Infectious Disease Surveillance approach

    Directory of Open Access Journals (Sweden)

    Esron D. Karimuribo

    2012-06-01

    Full Text Available Africa has the highest burden of infectious diseases in the world and yet the least capacity for its risk management. It has therefore become increasingly important to search for ‘fit-for- purpose’ approaches to infectious disease surveillance and thereby targeted disease control. The fact that the majority of human infectious diseases are originally of animal origin means we have to consider One Health (OH approaches which require inter-sectoral collaboration for custom-made infectious disease surveillance in the endemic settings of Africa. A baseline survey was conducted to assess the current status and performance of human and animal health surveillance systems and subsequently a strategy towards OH surveillance system was developed. The strategy focused on assessing the combination of participatory epidemiological approaches and the deployment of mobile technologies to enhance the effectiveness of disease alerts and surveillance at the point of occurrence, which often lies in remote areas. We selected three study sites, namely the Ngorongoro, Kagera River basin and Zambezi River basin ecosystems. We have piloted and introduced the next-generation Android mobile phones running the EpiCollect application developed by Imperial College to aid geo-spatial and clinical data capture and transmission of this data from the field to the remote Information Technology (IT servers at the research hubs for storage, analysis, feedback and reporting. We expect that the combination of participatory epidemiology and technology will significantly improve OH disease surveillance in southern Africa.

  20. Towards one health disease surveillance: the Southern African Centre for Infectious Disease Surveillance approach.

    Science.gov (United States)

    Karimuribo, Esron D; Sayalel, Kuya; Beda, Eric; Short, Nick; Wambura, Philemon; Mboera, Leonard G; Kusiluka, Lughano J M; Rweyemamu, Mark M

    2012-06-20

    Africa has the highest burden of infectious diseases in the world and yet the least capacity for its risk management. It has therefore become increasingly important to search for 'fit-for- purpose' approaches to infectious disease surveillance and thereby targeted disease control. The fact that the majority of human infectious diseases are originally of animal origin means we have to consider One Health (OH) approaches which require inter-sectoral collaboration for custom-made infectious disease surveillance in the endemic settings of Africa. A baseline survey was conducted to assess the current status and performance of human and animal health surveillance systems and subsequently a strategy towards OH surveillance system was developed. The strategy focused on assessing the combination of participatory epidemiological approaches and the deployment of mobile technologies to enhance the effectiveness of disease alerts and surveillance at the point of occurrence, which often lies in remote areas. We selected three study sites, namely the Ngorongoro, Kagera River basin and Zambezi River basin ecosystems. We have piloted and introduced the next-generation Android mobile phones running the EpiCollect application developed by Imperial College to aid geo-spatial and clinical data capture and transmission of this data from the field to the remote Information Technology (IT) servers at the research hubs for storage, analysis, feedback and reporting. We expect that the combination of participatory epidemiology and technology will significantly improve OH disease surveillance in southern Africa.

  1. LEXICAL FEATURES OF THE MODERN ENGLISH DISCOURSE OF THE LAW ENFORCEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Teneneva Irina Vitalyevna

    2015-06-01

    Full Text Available This paper presents the results of a study of terminological units and discourse formulas which constitute the lexical basis of the discourse of the English law enforcement system. Due to the current expanding cooperation of Russian law enforcement units with their foreign partners the area addressed is of great interest to those involved in teaching foreign languages for specific purposes at law faculties and schools, yet has not received an adequate treatment to this point. The article reveals an interdisciplinary character of the law enforcement terminology, which accounts for numerous transterms used in it. The study identifies the reasons for the integration of the law enforcement terminology with other terminological systems and also names the main sources of transterms. Other highly productive methods of concept nomination in the area include syntactic and morphosyntactic term formation. This enriches the law enforcement terminology with multicomponent terms and their abbreviated and elliptical variants. The analysis of discourse formulas suggests syntactic heterogeneity of these structures, their stylistic neutrality, monosemy and semantic transparency. This layer of the law enforcement discourse is also characterized by information compression by means of abbreviations and digital encoding. The results of the research can be applied in English textbook and translation dictionary designing.

  2. Institutional Design of Enforcement in the EU: The Case of Financial Markets

    Directory of Open Access Journals (Sweden)

    Miroslava Scholten

    2014-12-01

    Full Text Available Enforcement of EU law has become increasingly ‘Europeanized’. But how is and can it be organized in the integrated legal order of the EU to promote effective enforcement? In light of the recent institutional and substantive changes in the area of EU financial markets regulation, this article identifies four models (S, M, L, and XL models of enforcement of EU law. It discusses the possibilities and challenges to effective enforcement of each of such models and the major trade-offs which policy-makers face at the EU and national levels when designing enforcement frameworks, namely centralization vs. decentralization (an institutional perspective and harmonization vs. differentiation (substantive and procedural perspectives. It argues that at least a minimum degree of institutional centralization is necessary to promote the uniform enforcement and implementation of EU policies in a Union with 28 legal systems. The more specific details, such as specific institutional shape of centralized bodies (should it be a network, an agency or an EU institution? and of the distribution of functions between the national and EU level are better addressed on a case-by-case basis in light of the political, economic, and social characteristics of the sector at stake.

  3. Rotating machinery surveillance system reduces plant downtime and radiation exposure

    International Nuclear Information System (INIS)

    Bohanick, J.S.; Robinson, J.C.; Allen, J.W.

    1988-01-01

    A rotating machinery surveillance system (RMSS) was permanently installed at Grand Gulf nuclear station (GGNS) as part of a program sponsored by the US Department of Energy whose goal was to reduce radiation exposure to power plant personnel resulting from the inspection, maintenance, and repair of rotating machinery. The RMSS was installed at GGNS in 1983 to continuously monitor 173 analog vibration signals from proximity probes mounted on 26 machine trains and ∼450 process data points via a computer data link. Vibration frequency spectra, i.e., the vibration amplitude versus frequency of vibration, and various characterizations of these spectra are the fundamental data collected by the RMSS for performing machinery diagnostics. The RMSS collects vibration frequency spectra on a daily basis for all the monitored rotating equipment and automatically stores the collected spectra for review by the vibration engineer. Vibration spectra automatically stored by the RMSS fall into categories that include the last normal, alarm, minimum and maximum, past three-day data set, baseline, current, and user-saved spectra. During first and second fuel-cycle operation at GGNS, several significant vibration problems were detected by the RMSS. Two of these are presented in this paper: recirculation pumps and turbine-generator bearing degradation. The total reduction in personnel radiation exposure at GGNS from 1985 to 1987 due to the presence of the RMSS was estimated to be in the range from 49 to 54 person-rem

  4. 43 CFR 422.7 - Authorization to perform law enforcement duties.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Authorization to perform law enforcement duties. 422.7 Section 422.7 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION, DEPARTMENT OF THE INTERIOR LAW ENFORCEMENT AUTHORITY AT BUREAU OF RECLAMATION PROJECTS Program Requirements § 422.7 Authorization to perfor...

  5. 29 CFR 783.37 - Enforcement policy for non-seaman's work.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Enforcement policy for non-seaman's work. 783.37 Section... policy for non-seaman's work. In the enforcement of the Act, an employee will be regarded as “employed as... STATEMENTS OF GENERAL POLICY OR INTERPRETATION NOT DIRECTLY RELATED TO REGULATIONS APPLICATION OF THE FAIR...

  6. THE USE OF ELECTRONIC DATA PROCESSING IN CORRECTIONS AND LAW ENFORCEMENT,

    Science.gov (United States)

    Reviews the reasons, methods, accomplishments and goals of the use of electronic data processing in the fields of correction and law enforcement . Suggest...statistical and case history data in building a sounder theoretical base in the field of law enforcement . (Author)

  7. A Comparison of Military and Law Enforcement Body Armour

    Science.gov (United States)

    Pope, Rodney

    2018-01-01

    Law-enforcement officers increasingly wear body armour for protection; wearing body armour is common practice in military populations. Law-enforcement and military occupational demands are vastly different and military-styled body armour may not be suitable for law-enforcement. This study investigated differences between selected military body armour (MBA: 6.4 kg) and law-enforcement body armour (LEBA: 2.1 kg) in impacts on postural sway, vertical jump, agility, a functional movement screen (FMS), task simulations (vehicle exit; victim recovery), and subjective measures. Ten volunteer police officers (six females, four males) were randomly allocated to one of the designs on each of two days. Body armour type did not significantly affect postural sway, vertical jump, vehicle exit and 5 m sprint times, or victim recovery times. Both armour types increased sway velocity and sway-path length in the final five seconds compared to the first 5 s of a balance task. The MBA was associated with significantly slower times to complete the agility task, poorer FMS total scores, and poorer subjective ratings of performance and comfort. The LEBA was perceived as more comfortable and received more positive performance ratings during the agility test and task simulations. The impacts of MBA and LEBA differed significantly and they should not be considered interchangeable. PMID:29443905

  8. A Comparison of Military and Law Enforcement Body Armour.

    Science.gov (United States)

    Orr, Robin; Schram, Ben; Pope, Rodney

    2018-02-14

    Law-enforcement officers increasingly wear body armour for protection; wearing body armour is common practice in military populations. Law-enforcement and military occupational demands are vastly different and military-styled body armour may not be suitable for law-enforcement. This study investigated differences between selected military body armour (MBA: 6.4 kg) and law-enforcement body armour (LEBA: 2.1 kg) in impacts on postural sway, vertical jump, agility, a functional movement screen (FMS), task simulations (vehicle exit; victim recovery), and subjective measures. Ten volunteer police officers (six females, four males) were randomly allocated to one of the designs on each of two days. Body armour type did not significantly affect postural sway, vertical jump, vehicle exit and 5 m sprint times, or victim recovery times. Both armour types increased sway velocity and sway-path length in the final five seconds compared to the first 5 s of a balance task. The MBA was associated with significantly slower times to complete the agility task, poorer FMS total scores, and poorer subjective ratings of performance and comfort. The LEBA was perceived as more comfortable and received more positive performance ratings during the agility test and task simulations. The impacts of MBA and LEBA differed significantly and they should not be considered interchangeable.

  9. A Comparison of Military and Law Enforcement Body Armour

    Directory of Open Access Journals (Sweden)

    Robin Orr

    2018-02-01

    Full Text Available Law-enforcement officers increasingly wear body armour for protection; wearing body armour is common practice in military populations. Law-enforcement and military occupational demands are vastly different and military-styled body armour may not be suitable for law-enforcement. This study investigated differences between selected military body armour (MBA: 6.4 kg and law-enforcement body armour (LEBA: 2.1 kg in impacts on postural sway, vertical jump, agility, a functional movement screen (FMS, task simulations (vehicle exit; victim recovery, and subjective measures. Ten volunteer police officers (six females, four males were randomly allocated to one of the designs on each of two days. Body armour type did not significantly affect postural sway, vertical jump, vehicle exit and 5 m sprint times, or victim recovery times. Both armour types increased sway velocity and sway-path length in the final five seconds compared to the first 5 s of a balance task. The MBA was associated with significantly slower times to complete the agility task, poorer FMS total scores, and poorer subjective ratings of performance and comfort. The LEBA was perceived as more comfortable and received more positive performance ratings during the agility test and task simulations. The impacts of MBA and LEBA differed significantly and they should not be considered interchangeable.

  10. Comparison of automatic traps to capture mosquitoes (Diptera: Culicidae in rural areas in the tropical Atlantic rainforest

    Directory of Open Access Journals (Sweden)

    Ivy Luizi Rodrigues de Sa

    2013-12-01

    Full Text Available In several countries, surveillance of insect vectors is accomplished with automatic traps. This study addressed the performance of Mosquito Magnet® Independence (MMI in comparison with those of CDC with CO2 and lactic acid (CDC-A and CDC light trap (CDC-LT. The collection sites were in a rural region located in a fragment of secondary tropical Atlantic rainforest, southeastern Brazil. Limatus durhami and Limatus flavisetosus were the dominant species in the MMI, whereas Ochlerotatus scapularis was most abundant in CDC-A. Culex ribeirensis and Culex sacchettae were dominant species in the CDC-LT. Comparisons among traps were based on diversity indices. Results from the diversity analyses showed that the MMI captured a higher abundance of mosquitoes and that the species richness estimated with it was higher than with CDC-LT. Contrasting, difference between MMI and CDC-A was not statistically significant. Consequently, the latter trap seems to be both an alternative for the MMI and complementary to it for ecological studies and entomological surveillance.

  11. Finding weak points automatically

    International Nuclear Information System (INIS)

    Archinger, P.; Wassenberg, M.

    1999-01-01

    Operators of nuclear power stations have to carry out material tests at selected components by regular intervalls. Therefore a full automaticated test, which achieves a clearly higher reproducibility, compared to part automaticated variations, would provide a solution. In addition the full automaticated test reduces the dose of radiation for the test person. (orig.) [de

  12. 25 CFR 12.41 - Who keeps statistics for Indian country law enforcement activities?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Who keeps statistics for Indian country law enforcement activities? 12.41 Section 12.41 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER INDIAN COUNTRY LAW ENFORCEMENT Records and Information § 12.41 Who keeps statistics for Indian country law enforcement activities? The Director...

  13. The Expanded Application of Forensic Science and Law Enforcement Methodologies in Army Counterintelligence

    Science.gov (United States)

    2017-09-01

    enforcement (LE) capabilities during the investigation of criminal offenses has become commonplace in the U.S. criminal justice system . These... system , and FORENSICS AND LAW ENFORCEMENT IN ARMY COUNTERINTELLIGENCE 22 would likely need to go to their local Army CID or military police...THE EXPANDED APPLICATION OF FORENSIC SCIENCE AND LAW ENFORCEMENT METHODOLOGIES IN ARMY COUNTERINTELLIGENCE A RESEARCH PROJECT

  14. Targeting adults who provide alcohol to underage youth: results from a national survey of local law enforcement agencies.

    Science.gov (United States)

    Jones-Webb, Rhonda; Toomey, Traci L; Lenk, Kathleen M; Nelson, Toben F; Erickson, Darin J

    2015-06-01

    We investigated what local enforcement agencies are doing to target adults who provide alcohol to underage youth; what types of enforcement activities are being conducted to target adult providers; and factors that encourage enforcement activities that target adult providers. We surveyed 1,056 local law enforcement agencies in the US and measured whether or not the agency conducted enforcement activities that target adults who provide alcohol to underage youth. We also measured whether certain agency and jurisdiction characteristics were associated with enforcement activities that target adults who provide alcohol to underage youth. Less than half (42%) of local enforcement agencies conducted enforcement efforts targeting adults who provide alcohol to underage youth. Agencies that conducted the enforcement activities targeting adult providers were significantly more likely to have a full time officer specific to alcohol enforcement, a division specific to alcohol enforcement, a social host law, and to perceive underage drinking was very common. Results suggest that targeting social providers (i.e., adults over 21 years of age) will require greater law enforcement resources, implementation of underage drinking laws (e.g., social host policies), and changing perceptions among law enforcement regarding underage drinking. Future studies are needed to identify the most effective enforcement efforts and to examine how enforcement efforts are prospectively linked to alcohol consumption.

  15. Participatory Surveillance and Photo Sharing Practices

    DEFF Research Database (Denmark)

    Albrechtslund, Anders; Damkjaer, Maja Sonne; Bøge, Ask Risom

    2019-01-01

    -material perspective on photo-sharing practices. Information, Communication & Society, 19(4), 475–488. Sontag, S. (1977). On Photography. Picador. Steeves, V., & Jones, O. (2010). Editorial: Surveillance, Children and Childhood. Surveillance & Society, 7(3/4), 187–191....... that parents do not generally plan to store or organize their photos, and even less their children’s photos. This seems to indicate a shift from a pre-digital perception of photos as objects to be packaged, accumulated, framed etc. which can age and disappear (see Sontag, 1977) to something perceived less....... References: Albrechtslund, A. (2008). Online Social Networking as Participatory Surveillance. First Monday, 13(3). Fotel, T., & Thomsen, T. U. (2002). The Surveillance of Children’s Mobility. Surveillance & Society, 1(4), 535-554. Lobinger, K. (2016). Photographs as things–photographs of things. A texto...

  16. Cost effectiveness of surveillance for GI cancers.

    Science.gov (United States)

    Omidvari, Amir-Houshang; Meester, Reinier G S; Lansdorp-Vogelaar, Iris

    2016-12-01

    Gastrointestinal (GI) diseases are among the leading causes of death in the world. To reduce the burden of GI diseases, surveillance is recommended for some diseases, including for patients with inflammatory bowel diseases, Barrett's oesophagus, precancerous gastric lesions, colorectal adenoma, and pancreatic neoplasms. This review aims to provide an overview of the evidence on cost-effectiveness of surveillance of individuals with GI conditions predisposing them to cancer, specifically focussing on the aforementioned conditions. We searched the literature and reviewed 21 studies. Despite heterogeneity of studies in terms of settings, study populations, surveillance strategies and outcomes, most reviewed studies suggested at least some surveillance of patients with these GI conditions to be cost-effective. For some high-risk conditions frequent surveillance with 3-month intervals was warranted, while for other conditions, surveillance may only be cost-effective every 10 years. Further studies based on more robust effectiveness evidence are needed to inform and optimise surveillance programmes for GI cancers. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Public involvement in environmental surveillance at Hanford

    International Nuclear Information System (INIS)

    Hanf, R.W. Jr.; Patton, G.W.; Woodruff, R.K.; Poston, T.M.

    1994-08-01

    Environmental surveillance at the Hanford Site began during the mid-1940s following the construction and start-up of the nation's first plutonium production reactor. Over the past approximately 45 years, surveillance operations on and off the Site have continued, with virtually all sampling being conducted by Hanford Site workers. Recently, the US Department of Energy Richland Operations Office directed that public involvement in Hanford environmental surveillance operations be initiated. Accordingly, three special radiological air monitoring stations were constructed offsite, near hanford's perimeter. Each station is managed and operated by two local school teaches. These three stations are the beginning of a community-operated environmental surveillance program that will ultimately involve the public in most surveillance operations around the Site. The program was designed to stimulate interest in Hanford environmental surveillance operations, and to help the public better understand surveillance results. The program has also been used to enhance educational opportunities at local schools

  18. The Surveillance and On-demand Sentinel-1 SBAS Services on the Geohazards Exploitation Platforms

    Science.gov (United States)

    Casu, F.; de Luca, C.; Zinno, I.; Manunta, M.; Lanari, R.

    2017-12-01

    The Geohazards Exploitation Platform (GEP) is an ESA R&D activity of the EO ground segment to demonstrate the benefit of new technologies for large scale processing of EO data. GEP aims at providing on-demand processing services for specific user needs, as well as systematic processing services to address the need of the geohazards community for common information layers and, finally, to integrate newly developed processors for scientists and other expert users. In this context, a crucial role is played by the recently launched Sentinel-1 (S1) constellation that, with its global acquisition policy, has flooded the scientific community with a huge amount of data acquired over large part of the Earth on a regular basis (down to 6-days with both Sentinel-1A and 1B passes). The Sentinel-1 data, as part of the European Copernicus program, are openly and freely accessible, thus fostering their use for the development of automated and systematic tools for Earth surface monitoring. In particular, due to their specific SAR Interferometry (InSAR) design, Sentinel-1 satellites can be exploited to build up operational services for the easy and rapid generation of advanced InSAR products useful for risk management and natural hazard monitoring. In this work we present the activities carried out for the development, integration, and deployment of two SBAS Sentinel-1 services of CNR-IREA within the GEP framework, namely the Surveillance and On-demand services. The Surveillance service consists on the systematic and automatic processing of Sentinel-1 data over selected Areas of Interest (AoI) to generate updated surface displacement time series via the SBAS-InSAR algorithm. We built up a system that is automatically triggered by every new Sentinel-1 acquisition over the AoI, once it is available on the S1 catalogue. Then, the system processes the new acquisitions only, thus saving storage space and computing time. The processing, which relies on the Parallel version of the SBAS (P

  19. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L.E.

    1993-01-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest Laboratory (PNL) for the US Department of Energy (DOE). Samples are routinely collected and analyzed to determine the quality of air, surface water, ground water, soil, sediment, wildlife, vegetation, foodstuffs, and farm products at Hanford Site and surrounding communities. This document contains the planned schedule for routine sample collection for the Surface Environmental Surveillance Project (SESP) and Drinking Water Project, and Ground-Water Surveillance Project.

  20. The automatic component of habit in health behavior: habit as cue-contingent automaticity.

    Science.gov (United States)

    Orbell, Sheina; Verplanken, Bas

    2010-07-01

    Habit might be usefully characterized as a form of automaticity that involves the association of a cue and a response. Three studies examined habitual automaticity in regard to different aspects of the cue-response relationship characteristic of unhealthy and healthy habits. In each study, habitual automaticity was assessed by the Self-Report Habit Index (SRHI). In Study 1 SRHI scores correlated with attentional bias to smoking cues in a Stroop task. Study 2 examined the ability of a habit cue to elicit an unwanted habit response. In a prospective field study, habitual automaticity in relation to smoking when drinking alcohol in a licensed public house (pub) predicted the likelihood of cigarette-related action slips 2 months later after smoking in pubs had become illegal. In Study 3 experimental group participants formed an implementation intention to floss in response to a specified situational cue. Habitual automaticity of dental flossing was rapidly enhanced compared to controls. The studies provided three different demonstrations of the importance of cues in the automatic operation of habits. Habitual automaticity assessed by the SRHI captured aspects of a habit that go beyond mere frequency or consistency of the behavior. PsycINFO Database Record (c) 2010 APA, all rights reserved.

  1. Elementary Surveillance (ELS) and Enhanced Surveillance (EHS) Validation via Mode S Secondary Radar Surveillance

    National Research Council Canada - National Science Library

    Grappel, Robert D; Harris, Garrett S; Kozar, Mark J; Wiken, Randall T

    2008-01-01

    ...) and Enhanced Surveillance (ERS) data link applications. The intended audience for this report is an engineering staff assigned the task of implementing a monitoring system used to determine ELS and EHS compliance...

  2. Laser surveillance system (LASSY)

    International Nuclear Information System (INIS)

    Boeck, H.

    1991-09-01

    Laser Surveillance System (LASSY) is a beam of laser light which scans a plane above the water or under-water in a spent-fuel pond. The system can detect different objects and estimates its coordinates and distance as well. LASSY can operate in stand-alone configuration or in combination with a video surveillance to trigger signal to a videorecorder. The recorded information on LASSY computer's disk comprises date, time, start and stop angle of detected alarm, the size of the disturbance indicated in number of deviated points and some other information. The information given by the laser system cannot be fully substituted by TV camera pictures since the scanning beam creates a horizontal surveillance plan. The engineered prototype laser system long-term field test has been carried out in Soluggia (Italy) and has shown its feasibility and reliability under the conditions of real spent fuel storage pond. The verification of the alarm table on the LASSY computer with the recorded video pictures of TV surveillance system confirmed that all alarm situations have been detected. 5 refs

  3. Enforcement and Compliance History Online (ECHO) Facilities

    Data.gov (United States)

    U.S. Environmental Protection Agency — ECHO provides integrated compliance and enforcement information for about 800,000 regulated facilities nationwide. Its features range from simple to advanced,...

  4. Automatic recognition of offensive team formation in american football plays

    KAUST Repository

    Atmosukarto, Indriyati

    2013-06-01

    Compared to security surveillance and military applications, where automated action analysis is prevalent, the sports domain is extremely under-served. Most existing software packages for sports video analysis require manual annotation of important events in the video. American football is the most popular sport in the United States, however most game analysis is still done manually. Line of scrimmage and offensive team formation recognition are two statistics that must be tagged by American Football coaches when watching and evaluating past play video clips, a process which takes many man hours per week. These two statistics are also the building blocks for more high-level analysis such as play strategy inference and automatic statistic generation. In this paper, we propose a novel framework where given an American football play clip, we automatically identify the video frame in which the offensive team lines in formation (formation frame), the line of scrimmage for that play, and the type of player formation the offensive team takes on. The proposed framework achieves 95% accuracy in detecting the formation frame, 98% accuracy in detecting the line of scrimmage, and up to 67% accuracy in classifying the offensive team\\'s formation. To validate our framework, we compiled a large dataset comprising more than 800 play-clips of standard and high definition resolution from real-world football games. This dataset will be made publicly available for future comparison. © 2013 IEEE.

  5. Flow enforcement algorithms for ATM networks

    DEFF Research Database (Denmark)

    Dittmann, Lars; Jacobsen, Søren B.; Moth, Klaus

    1991-01-01

    Four measurement algorithms for flow enforcement in asynchronous transfer mode (ATM) networks are presented. The algorithms are the leaky bucket, the rectangular sliding window, the triangular sliding window, and the exponentially weighted moving average. A comparison, based partly on teletraffic...

  6. 30 CFR 903.843 - Federal enforcement.

    Science.gov (United States)

    2010-07-01

    ... request, to a designated Arizona State agency with jurisdiction over mining. ... Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND ENFORCEMENT, DEPARTMENT OF THE INTERIOR PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE ARIZONA § 903.843 Federal...

  7. Risk sharing relations and enforcement mechanisms

    NARCIS (Netherlands)

    Barr, A.; Dekker, M.; Fafchamps, M.

    2008-01-01

    We investigate whether the set of available enforcement mechanisms affects the formation of risk sharing relations by applying dyadic regression analysis to data from a specifically designed behavioural experiment, two surveys and a genealogical mapping exercise. During the experiment participants

  8. 76 FR 7681 - Establishment of the Intellectual Property Enforcement Advisory Committees

    Science.gov (United States)

    2011-02-11

    ..., promote job creation, and reduce threats posed to national security and to public health and safety, it is... extent that such sharing of information is consistent with law enforcement protocols for handling such..., including subcommittees addressing particular enforcement issues, efforts, training, and information sharing...

  9. 43 CFR 422.9 - Reclamation law enforcement contracts and cooperative agreements.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Reclamation law enforcement contracts and... PROJECTS Program Requirements § 422.9 Reclamation law enforcement contracts and cooperative agreements. (a... Federal laws. (b) Each contract and cooperative agreement authorizing the exercise of Reclamation law...

  10. 7 CFR 1494.801 - Enforcement and termination of agreements with CCC.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Enforcement and termination of agreements with CCC. 1494.801 Section 1494.801 Agriculture Regulations of the Department of Agriculture (Continued... PROGRAMS Export Enhancement Program Operations § 1494.801 Enforcement and termination of agreements with...

  11. 29 CFR 786.1 - Enforcement policy concerning performance of nonexempt work.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Enforcement policy concerning performance of nonexempt work... OF LABOR STATEMENTS OF GENERAL POLICY OR INTERPRETATION NOT DIRECTLY RELATED TO REGULATIONS MISCELLANEOUS EXEMPTIONS Carriers by Air § 786.1 Enforcement policy concerning performance of nonexempt work...

  12. 29 CFR 786.100 - Enforcement policy concerning performance of nonexempt work.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Enforcement policy concerning performance of nonexempt work..., DEPARTMENT OF LABOR STATEMENTS OF GENERAL POLICY OR INTERPRETATION NOT DIRECTLY RELATED TO REGULATIONS MISCELLANEOUS EXEMPTIONS Switchboard Operator Exemption § 786.100 Enforcement policy concerning performance of...

  13. 29 CFR 786.200 - Enforcement policy concerning performance of nonexempt work.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Enforcement policy concerning performance of nonexempt work..., DEPARTMENT OF LABOR STATEMENTS OF GENERAL POLICY OR INTERPRETATION NOT DIRECTLY RELATED TO REGULATIONS MISCELLANEOUS EXEMPTIONS Taxicab Operators § 786.200 Enforcement policy concerning performance of nonexempt work...

  14. Smart Health Surveillance with Automated Database Using Android Mobile Device

    Directory of Open Access Journals (Sweden)

    Anitha Karthi

    2017-08-01

    Full Text Available ABSTRACT Smart Health Surveillance system is to measure and display the Electrocardiogram (ECG and temperature of patient’s body continuously and also to communicate to the doctor. The system measures ECG using infrared sensor and the temperatures at oral and wrist of the patient using temperature sensors. Microcontroller, receives the data from the sensors, displays the same and communicates to the web server automatically. In the existing system, patient’s vital parameters are obtained and the obtained values are entered into database and then uploaded into a web-based server manually. The existing system has no alert signal, during abnormal condition to the surrounding and to the doctor. The proposed system consists of a visualization module of the server program, which graphically displays the recorded biomedical signals on android mobile devices used by doctors at the receiver end. It also gives a buzzer or an alarm in case of abnormal condition of the patient.

  15. Enforcement actions: significant actions resolved. Quarterly progress report, July-September 1982

    International Nuclear Information System (INIS)

    1982-10-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July to September 1982) and includes copies of letters, notices, and orders sent by the Nuclear Regulatory Commission to the licensee with respect to the enforcement action. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, in the interest of promoting public health and safety as well as common defense and security. This publication is issued on a quarterly basis to include significant enforcement actions resolved during the preceding quarter

  16. 5 CFR 551.541 - Employees engaged in fire protection activities or law enforcement activities.

    Science.gov (United States)

    2010-01-01

    ... activities or law enforcement activities. 551.541 Section 551.541 Administrative Personnel OFFICE OF... activities or law enforcement activities. (a) An employee engaged in fire protection activities or law enforcement activities (as described in §§ 551.215 and 551.216, respectively) who receives compensation for...

  17. [Micron]ADS-B Detect and Avoid Flight Tests on Phantom 4 Unmanned Aircraft System

    Science.gov (United States)

    Arteaga, Ricardo; Dandachy, Mike; Truong, Hong; Aruljothi, Arun; Vedantam, Mihir; Epperson, Kraettli; McCartney, Reed

    2018-01-01

    Researchers at the National Aeronautics and Space Administration Armstrong Flight Research Center in Edwards, California and Vigilant Aerospace Systems collaborated for the flight-test demonstration of an Automatic Dependent Surveillance-Broadcast based collision avoidance technology on a small unmanned aircraft system equipped with the uAvionix Automatic Dependent Surveillance-Broadcast transponder. The purpose of the testing was to demonstrate that National Aeronautics and Space Administration / Vigilant software and algorithms, commercialized as the FlightHorizon UAS"TM", are compatible with uAvionix hardware systems and the DJI Phantom 4 small unmanned aircraft system. The testing and demonstrations were necessary for both parties to further develop and certify the technology in three key areas: flights beyond visual line of sight, collision avoidance, and autonomous operations. The National Aeronautics and Space Administration and Vigilant Aerospace Systems have developed and successfully flight-tested an Automatic Dependent Surveillance-Broadcast Detect and Avoid system on the Phantom 4 small unmanned aircraft system. The Automatic Dependent Surveillance-Broadcast Detect and Avoid system architecture is especially suited for small unmanned aircraft systems because it integrates: 1) miniaturized Automatic Dependent Surveillance-Broadcast hardware; 2) radio data-link communications; 3) software algorithms for real-time Automatic Dependent Surveillance-Broadcast data integration, conflict detection, and alerting; and 4) a synthetic vision display using a fully-integrated National Aeronautics and Space Administration geobrowser for three dimensional graphical representations for ownship and air traffic situational awareness. The flight-test objectives were to evaluate the performance of Automatic Dependent Surveillance-Broadcast Detect and Avoid collision avoidance technology as installed on two small unmanned aircraft systems. In December 2016, four flight tests

  18. Traffic enforcement in Europe: effects, measures, needs and future. Final report of the ESCAPE Consortium. (The acroynm ESCAPE stands for Enhanced Safety Coming from Appropriate Police Enforcement).

    NARCIS (Netherlands)

    Mäkinen, T. Zaidel, D.M. Andersson, G. Biecheler-Fretel, M.-B. Christ, R. Cauzard, J.-P. Elvik, R. Goldenbeld, C. Gelau, C. Heidstra, J. Jayet, M.-C. Nilsson, G. Papaioanou, P. Quimby, A. Rehnova, V. & Vaa, T.

    2003-01-01

    The objectives of the project were to identify important issues of traffic law enforcement in the EU, examine traditional and innovative enforcement approaches and tools, and assess their potential to improve compliance for increased safety on roads. The following main issues were addressed: the

  19. Microprocessor controlled system for automatic and semi-automatic syntheses of radiopharmaceuticals

    International Nuclear Information System (INIS)

    Ruth, T.J.; Adam, M.J.; Morris, D.; Jivan, S.

    1986-01-01

    A computer based system has been constructed to control the automatic synthesis of 2-deoxy-2-( 18 F)fluoro-D-glucose and is also being used in the development of an automatic synthesis of L-6-( 18 F)fluorodopa. (author)

  20. Image simulation for automatic license plate recognition

    Science.gov (United States)

    Bala, Raja; Zhao, Yonghui; Burry, Aaron; Kozitsky, Vladimir; Fillion, Claude; Saunders, Craig; Rodríguez-Serrano, José

    2012-01-01

    Automatic license plate recognition (ALPR) is an important capability for traffic surveillance applications, including toll monitoring and detection of different types of traffic violations. ALPR is a multi-stage process comprising plate localization, character segmentation, optical character recognition (OCR), and identification of originating jurisdiction (i.e. state or province). Training of an ALPR system for a new jurisdiction typically involves gathering vast amounts of license plate images and associated ground truth data, followed by iterative tuning and optimization of the ALPR algorithms. The substantial time and effort required to train and optimize the ALPR system can result in excessive operational cost and overhead. In this paper we propose a framework to create an artificial set of license plate images for accelerated training and optimization of ALPR algorithms. The framework comprises two steps: the synthesis of license plate images according to the design and layout for a jurisdiction of interest; and the modeling of imaging transformations and distortions typically encountered in the image capture process. Distortion parameters are estimated by measurements of real plate images. The simulation methodology is successfully demonstrated for training of OCR.