WorldWideScience

Sample records for surveillance automatic enforcement

  1. Effective speed management through automatic enforcement.

    NARCIS (Netherlands)

    Oei, H.-l.

    1994-01-01

    This paper analyses several aspects of the Dutch experience of speed enforcement, and presents the results of some speed management experiments in The Netherlands, using automatic warning of speeders and enforcement of speeding. Traditional approaches to manage speed there have not resulted in satis

  2. Automatic Dependent Surveillance - Broadcast Verification and Validation Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Automatic Dependent Surveillance ? Broadcast (ADS-B) is an emerging Communications, Navigation, and Surveillance (CNS) technology that will vastly expand the state...

  3. Automatic enforcement of speed and red light violations : applications, experiences and developments.

    NARCIS (Netherlands)

    Mäkinen, T. & Oei, H.-l.

    1993-01-01

    This paper explains the need for automatic enforcement, and reviews: (1) applications of automatic enforcement. Automatic enforcement has been carried out for about 20 years. Despite this, the number of scientific and experimental studies dealing with the effects of automatic traffic enforcement app

  4. Automatic video surveillance of outdoor scenes using track before detect

    DEFF Research Database (Denmark)

    Hansen, Morten; Sørensen, Helge Bjarup Dissing; Birkemark, Christian M.

    2005-01-01

    This paper concerns automatic video surveillance of outdoor scenes using a single camera. The first step in automatic interpretation of the video stream is activity detection based on background subtraction. Usually, this process will generate a large number of false alarms in outdoor scenes due...

  5. The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance

    Science.gov (United States)

    Soghoian, Christopher

    2012-01-01

    Telecommunications carriers and service providers now play an essential role in facilitating modern surveillance by law enforcement agencies. The police merely select the individuals to be monitored, while the actual surveillance is performed by third parties: often the same email providers, search engines and telephone companies to whom consumers…

  6. The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance

    Science.gov (United States)

    Soghoian, Christopher

    2012-01-01

    Telecommunications carriers and service providers now play an essential role in facilitating modern surveillance by law enforcement agencies. The police merely select the individuals to be monitored, while the actual surveillance is performed by third parties: often the same email providers, search engines and telephone companies to whom consumers…

  7. Automatic surveillance system using fish-eye lens camera

    Institute of Scientific and Technical Information of China (English)

    Xue Yuan; Yongduan Song; Xueye Wei

    2011-01-01

    This letter presents an automatic surveillance system using fish-eye lens camera. Our system achieves wide-area automatic surveillance without a dead angle using only one camera. We propose a new human detection method to select the most adaptive classifier based on the locations of the human candidates.Human regions are detected from the fish-eye image effectively and are corrected for perspective versions.An experiment is performed on indoor video sequences with different illumination and crowded conditions,with results demonstrating the efficiency of our algorithm.%@@ This letter presents an automatic surveillance system using fish-eye lens camera. Our system achieves wide-area automatic surveillance without a dead angle using only one camera. We propose a new human detection method to select the most adaptive classifier based on the locations of the human candidates. Human regions are detected from the fish-eye image effectively and are corrected for perspective versions. An experiment is performed on indoor video sequences with different illumination and crowded conditions, with results demonstrating the efficiency of our algorithm.

  8. Automatic Intruder Combat System: A way to Smart Border Surveillance

    Directory of Open Access Journals (Sweden)

    Dushyant Kumar Singh

    2016-12-01

    Full Text Available Security and safeguard of international borders have always been a dominant issue for every nation. A large part of a nation’s budget is provided to its defense system. Besides wars, illegal intrusion in terms of terrorism is a critical matter that causes severe harm to nation’s property. In India’s perspective, border patrolling by Border Security Forces (BSF has already been practiced from a long time for surveillance. The patrolling parties are equipped with high-end surveillance equipments but yet an alternative to the ply of huge manpower and that too in harsh environmental conditions hasn’t been in existence. An automatic mechanism for smart surveillance and combat is proposed in this paper as a solution to the above-discussed problems. Smart surveillance requires automatic intrusion detection in the surveillance video, which is achieved by using optical flow information as motion features for intruder/human in the scene. The use of optical flow in the proposed smart surveillance makes it robust and more accurate. Use of a simple horizontal feature for fence detection makes system simple and faster to work in real-time. System is also designed to respond against the activities of intruders, of which auto combat is one kind of response.

  9. Edge Segment-Based Automatic Video Surveillance

    Directory of Open Access Journals (Sweden)

    Oksam Chae

    2007-12-01

    Full Text Available This paper presents a moving-object segmentation algorithm using edge information as segment. The proposed method is developed to address challenges due to variations in ambient lighting and background contents. We investigated the suitability of the proposed algorithm in comparison with the traditional-intensity-based as well as edge-pixel-based detection methods. In our method, edges are extracted from video frames and are represented as segments using an efficiently designed edge class. This representation helps to obtain the geometric information of edge in the case of edge matching and moving-object segmentation; and facilitates incorporating knowledge into edge segment during background modeling and motion tracking. An efficient approach for background initialization and robust method of edge matching is presented, to effectively reduce the risk of false alarm due to illumination change and camera motion while maintaining the high sensitivity to the presence of moving object. Detected moving edges are utilized along with watershed algorithm for extracting video object plane (VOP with more accurate boundary. Experiment results with real image sequence reflect that the proposed method is suitable for automated video surveillance applications in various monitoring systems.

  10. A Framework for Automatic Video Surveillance Indexing and Retrieval

    Directory of Open Access Journals (Sweden)

    Fereshteh Falah Chamasemani

    2015-08-01

    Full Text Available The manual search through the surveillance video archives for a specific object or event is very time-consuming and tedious task due to the large volume of video data captured by many installed surveillance cameras. Therefore, the solution to accelerate and facilitate this process is to design an automatic video surveillance with the efficient and effective video indexing, video data model, query formulation and language, as well as visualization interface. There are many challenges, for developing a powerful query processing module, formulating complex queries and selecting suitable similarity matching strategy to detect any abnormality based on semantic content of the video using various query types. This study presents a novel video surveillance indexing and retrieval framework to cope with the above challenges. The proposed framework consists of three main modules i.e., pre-processing, query processing and retrieval processing. Moreover, it supports an efficient search and actively refines the retrieval result by formulating various query types including: query-by-text, query-by-example and query-by-region.

  11. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance Broadcast (ADS-B) into a safe,...

  12. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, LLC, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance ? Broadcast (ADS-B) into a...

  13. Automatic Docking System with Recharging and Battery Replacement for Surveillance Robot

    Directory of Open Access Journals (Sweden)

    M. Meena

    2012-06-01

    Full Text Available Most of the applications like industrial automation, home automation, hospitals, space exploration, military, etc, the surveillance robot are widely used. For that, continuous functioning of surveillance robot is necessary. In this paper, the development of automatic docking system with recharging and battery replacement process for surveillance robot is proposed. The robot can return to the docking station for recharging operations when the battery is low. The charging duration of the battery mounted in the robot is an important issue. To overcome this problem, battery replacement is a perfect solution. The battery is automatically exchanged within 30 seconds. So the robot needs not to be turned off for long duration of time while replacing the battery.

  14. Automatic Reasoning about Causal Events in Surveillance Video

    Directory of Open Access Journals (Sweden)

    Reid IanD

    2011-01-01

    Full Text Available We present a new method for explaining causal interactions among people in video. The input to the overall system is video in which people are low/medium resolution. We extract and maintain a set of qualitative descriptions of single-person activity using the low-level vision techniques of spatiotemporal action recognition and gaze-direction approximation. This models the input to the "sensors" of the person agent in the scene and is a general sensing strategy for a person agent in a variety of application domains. The information subsequently available to the reasoning process is deliberately limited to model what an agent would actually be able to sense. The reasoning is therefore not a classical "all-knowing" strategy but uses these "sensed" facts obtained from the agents, combined with generic domain knowledge, to generate causal explanations of interactions. We present results from urban surveillance video.

  15. Motion Pattern Extraction and Event Detection for Automatic Visual Surveillance

    Directory of Open Access Journals (Sweden)

    Benabbas Yassine

    2011-01-01

    Full Text Available Efficient analysis of human behavior in video surveillance scenes is a very challenging problem. Most traditional approaches fail when applied in real conditions and contexts like amounts of persons, appearance ambiguity, and occlusion. In this work, we propose to deal with this problem by modeling the global motion information obtained from optical flow vectors. The obtained direction and magnitude models learn the dominant motion orientations and magnitudes at each spatial location of the scene and are used to detect the major motion patterns. The applied region-based segmentation algorithm groups local blocks that share the same motion direction and speed and allows a subregion of the scene to appear in different patterns. The second part of the approach consists in the detection of events related to groups of people which are merge, split, walk, run, local dispersion, and evacuation by analyzing the instantaneous optical flow vectors and comparing the learned models. The approach is validated and experimented on standard datasets of the computer vision community. The qualitative and quantitative results are discussed.

  16. New concepts in automatic enforcement. The "Escape" Project, Deliverable 6. Project funded by the European Commission under the Transport RTD Programme of the 4th Framework Programme.

    NARCIS (Netherlands)

    Heidstra, J. Goldenbeld, C. Mäkinen, T. Nilsson, G. & Sagberg, F.

    2010-01-01

    One main reason for automatic enforcement, except of the safety situation, is that the police will not be able to take direct action to each detected violator at normal police enforcement activities in some environments. By using detectors and camera technology the violators can be identified and sa

  17. New concepts in automatic enforcement. The "Escape" Project, Deliverable 6. Project funded by the European Commission under the Transport RTD Programme of the 4th Framework Programme.

    NARCIS (Netherlands)

    Heidstra, J. Goldenbeld, C. Mäkinen, T. Nilsson, G. & Sagberg, F.

    2010-01-01

    One main reason for automatic enforcement, except of the safety situation, is that the police will not be able to take direct action to each detected violator at normal police enforcement activities in some environments. By using detectors and camera technology the violators can be identified and

  18. New concepts in automatic enforcement. The "Escape" Project, Deliverable 6. Project funded by the European Commission under the Transport RTD Programme of the 4th Framework Programme.

    NARCIS (Netherlands)

    Heidstra, J. Goldenbeld, C. Mäkinen, T. Nilsson, G. & Sagberg, F.

    2010-01-01

    One main reason for automatic enforcement, except of the safety situation, is that the police will not be able to take direct action to each detected violator at normal police enforcement activities in some environments. By using detectors and camera technology the violators can be identified and sa

  19. Object Occlusion Detection Using Automatic Camera Calibration for a Wide-Area Video Surveillance System

    Directory of Open Access Journals (Sweden)

    Jaehoon Jung

    2016-06-01

    Full Text Available This paper presents an object occlusion detection algorithm using object depth information that is estimated by automatic camera calibration. The object occlusion problem is a major factor to degrade the performance of object tracking and recognition. To detect an object occlusion, the proposed algorithm consists of three steps: (i automatic camera calibration using both moving objects and a background structure; (ii object depth estimation; and (iii detection of occluded regions. The proposed algorithm estimates the depth of the object without extra sensors but with a generic red, green and blue (RGB camera. As a result, the proposed algorithm can be applied to improve the performance of object tracking and object recognition algorithms for video surveillance systems.

  20. Object Occlusion Detection Using Automatic Camera Calibration for a Wide-Area Video Surveillance System.

    Science.gov (United States)

    Jung, Jaehoon; Yoon, Inhye; Paik, Joonki

    2016-06-25

    This paper presents an object occlusion detection algorithm using object depth information that is estimated by automatic camera calibration. The object occlusion problem is a major factor to degrade the performance of object tracking and recognition. To detect an object occlusion, the proposed algorithm consists of three steps: (i) automatic camera calibration using both moving objects and a background structure; (ii) object depth estimation; and (iii) detection of occluded regions. The proposed algorithm estimates the depth of the object without extra sensors but with a generic red, green and blue (RGB) camera. As a result, the proposed algorithm can be applied to improve the performance of object tracking and object recognition algorithms for video surveillance systems.

  1. 76 FR 43691 - Unique Device Identification for Postmarket Surveillance and Enforcement; Public Workshop

    Science.gov (United States)

    2011-07-21

    ... HUMAN SERVICES Food and Drug Administration Unique Device Identification for Postmarket Surveillance and... identification of devices through distribution and use. This workshop will not address the FDA's UDI regulatory.... population, Providing an easily accessible source of device identification information to patients and health...

  2. A Simulation of the Reception of Automatic Dependent Surveillance-Broadcast Signals in Low Earth Orbit

    Directory of Open Access Journals (Sweden)

    Richard Van Der Pryt

    2015-01-01

    Full Text Available Automatic Dependent Surveillance-Broadcast (ADS-B is an air traffic surveillance technology in which aircraft transmit position and identification. The development of space-based ADS-B will allow precise control of aircraft in areas that are not covered by radar, such as oceanic regions and high latitudes. The Royal Military College of Canada has developed a spaceborne ADS-B receiver scheduled to fly on the Canadian Advanced Nanospace eXperiment-7 (CanX-7 satellite. The payload is planned to collect data over the North Atlantic region, which will then be compared to truth data provided by air traffic services. A model was created to determine power levels arriving at the satellite to provide confidence in the ADS-B receiver and antenna proposed for CanX-7. The model takes into account neutral atmosphere and ionospheric effects, aircraft-satellite geometry, and antenna radiation patterns. A simulation was run by inserting real aircraft data from the North Atlantic Track System into the model and placing the satellite at altitudes of 400, 600, and 800 km. Results of the simulation indicate that power received at the satellite, ranging between −98.5 dBm and −103 dBm for the selected altitudes, will be sufficient to successfully conduct the mission.

  3. Conceptual Model for Automatic Early Warning Information System of Infectious Diseases Based on Internet Reporting Surveillance System

    Institute of Scientific and Technical Information of China (English)

    JIA-QI MA; LI-PING WANG; XUAO-PENG QI; XIAO-MING SHI; GONG-HUAN YANG

    2007-01-01

    Objective To establish a conceptual model of automatic early warning of infectious diseases based on internet reporting surveillance system,with a view to realizing an automated warning system on a daily basis and timely identifying potential outbreaks of infectious diseases. Methods The statistic conceptual model was established using historic surveillance data with movable percentile method.Results Based on the infectious disease surveillance information platform,the conceptualmodelfor early warning was established.The parameter,threshold,and revised sensitivity and specificity of early warning value were changed to realize dynamic alert of infectious diseases on a daily basis.Conclusion The instructive conceptual model of dynamic alert can be used as a validating tool in institutions of infectious disease surveillance in different districts.

  4. Satellite single-axis attitude determination based on Automatic Dependent Surveillance - Broadcast signals

    Science.gov (United States)

    Zhou, Kaixing; Sun, Xiucong; Huang, Hai; Wang, Xinsheng; Ren, Guangwei

    2017-10-01

    The space-based Automatic Dependent Surveillance - Broadcast (ADS-B) is a new technology for air traffic management. The satellite equipped with spaceborne ADS-B system receives the broadcast signals from aircraft and transfers the message to ground stations, so as to extend the coverage area of terrestrial-based ADS-B. In this work, a novel satellite single-axis attitude determination solution based on the ADS-B receiving system is proposed. This solution utilizes the signal-to-noise ratio (SNR) measurement of the broadcast signals from aircraft to determine the boresight orientation of the ADS-B receiving antenna fixed on the satellite. The basic principle of this solution is described. The feasibility study of this new attitude determination solution is implemented, including the link budget and the access analysis. On this basis, the nonlinear least squares estimation based on the Levenberg-Marquardt method is applied to estimate the single-axis orientation. A full digital simulation has been carried out to verify the effectiveness and performance of this solution. Finally, the corresponding results are processed and presented minutely.

  5. AUTO GMM-SAMT: An Automatic Object Tracking System for Video Surveillance in Traffic Scenarios

    Directory of Open Access Journals (Sweden)

    Quast Katharina

    2011-01-01

    Full Text Available A complete video surveillance system for automatically tracking shape and position of objects in traffic scenarios is presented. The system, called Auto GMM-SAMT, consists of a detection and a tracking unit. The detection unit is composed of a Gaussian mixture model- (GMM- based moving foreground detection method followed by a method for determining reliable objects among the detected foreground regions using a projective transformation. Unlike the standard GMM detection the proposed detection method considers spatial and temporal dependencies as well as a limitation of the standard deviation leading to a faster update of the mixture model and to smoother binary masks. The binary masks are transformed in such a way that the object size can be used for a simple but fast classification. The core of the tracking unit, named GMM-SAMT, is a shape adaptive mean shift- (SAMT- based tracking technique, which uses Gaussian mixture models to adapt the kernel to the object shape. GMM-SAMT returns not only the precise object position but also the current shape of the object. Thus, Auto GMM-SAMT achieves good tracking results even if the object is performing out-of-plane rotations.

  6. Surveillance

    DEFF Research Database (Denmark)

    Albrechtslund, Anders; Coeckelbergh, Mark; Matzner, Tobias;

    Studying surveillance involves raising questions about the very nature of concepts such as information, technology, identity, space and power. Besides the maybe all too obvious ethical issues often discussed with regard to surveillance, there are several other angles and approaches that we should...... like to encourage. Therefore, our panel will focus on the philosophical, yet non-ethical issues of surveillance in order to stimulate an intense debate with the audience on the ethical implications of our enquiries. We also hope to provide a broader and deeper understanding of surveillance....

  7. Indicators of fishing mortality on reef-shark populations in the world's first shark sanctuary: the need for surveillance and enforcement

    Science.gov (United States)

    Vianna, Gabriel M. S.; Meekan, Mark G.; Ruppert, Jonathan L. W.; Bornovski, Tova H.; Meeuwig, Jessica J.

    2016-09-01

    Shark sanctuaries are promoted as a management tool to achieve conservation goals following global declines of shark populations. We assessed the status of reef-shark populations and indicators of fishing pressure across the world's first shark sanctuary in Palau. Using underwater surveys and stereophotogrammetry, we documented large differences in abundance and size structure of shark populations across the sanctuary, with a strong negative relationship between shark densities and derelict fishing gear on reefs. Densities of 10.9 ± 4.7 (mean ± SE) sharks ha-1 occurred on reefs adjacent to the most populated islands of Palau, contrasting with lower densities of 1.6 ± 0.8 sharks ha-1 on remote uninhabited reefs, where surveillance and enforcement was limited. Our observations suggest that fishing still remains a major factor structuring shark populations in Palau, demonstrating that there is an urgent need for better enforcement and surveillance that targets both illegal and licensed commercial fisheries to provide effective protection for sharks within the sanctuary.

  8. [Application of administrative enforcement while carrying-out of federal sanitary and epidemiological surveillance in the Armed Forces of the Russian Federation].

    Science.gov (United States)

    Zobov, A E; Berskiĭ, O V; Nebredovskiĭ, V N; Zharkov, D A

    2013-05-01

    The article deals with the legal framework of an application of administrative enforcement. The authors analyzed the information about a quantity and structure of administrative violation in the sanitary and epidemiological welfare, revealed during 2009-2011 while carrying-out of federal sanitary and epidemiological surveillance by the Center for Sanitary and Epidemiological Supervision of the Ministry of Defense (TsGSEN MF RF) in military units and organizations of the Armed Forces of the Russian Federation, and applied administrative sanctions. The acquired data was compared with the same data acquired by The Federal Service for Supervision of Consumer Rights Protection and Human Well-Being (Rospotrebnadzor). The results of research give a reason to consider TsGSEN MF activity according to index of application of administrative enforcement as ineffective. It shows the significant underestimate of administrative sanctions for the failure to comply with requirements of the health legislation. The authors formulated practical recommendations for activation of legal mechanics application by the specialists of TsGSEN MF RF while carrying-out of federal sanitary and epidemiological surveillance in the Armed Forces of the Russian Federation.

  9. A low cost automatic detection and ranging system for space surveillance in the medium Earth orbit region and beyond.

    Science.gov (United States)

    Danescu, Radu; Ciurte, Anca; Turcu, Vlad

    2014-02-11

    The space around the Earth is filled with man-made objects, which orbit the planet at altitudes ranging from hundreds to tens of thousands of kilometers. Keeping an eye on all objects in Earth's orbit, useful and not useful, operational or not, is known as Space Surveillance. Due to cost considerations, the space surveillance solutions beyond the Low Earth Orbit region are mainly based on optical instruments. This paper presents a solution for real-time automatic detection and ranging of space objects of altitudes ranging from below the Medium Earth Orbit up to 40,000 km, based on two low cost observation systems built using commercial cameras and marginally professional telescopes, placed 37 km apart, operating as a large baseline stereovision system. The telescopes are pointed towards any visible region of the sky, and the system is able to automatically calibrate the orientation parameters using automatic matching of reference stars from an online catalog, with a very high tolerance for the initial guess of the sky region and camera orientation. The difference between the left and right image of a synchronized stereo pair is used for automatic detection of the satellite pixels, using an original difference computation algorithm that is capable of high sensitivity and a low false positive rate. The use of stereovision provides a strong means of removing false positives, and avoids the need for prior knowledge of the orbits observed, the system being able to detect at the same time all types of objects that fall within the measurement range and are visible on the image.

  10. Quality assessment of Automatic Dependent Surveillance Contract (ADS-C wind and temperature observation from commercial aircraft

    Directory of Open Access Journals (Sweden)

    S. de Haan

    2012-08-01

    Full Text Available Aircraft observations of wind and temperature are very important for upper air meteorology. In this article, the quality of the meteorological information of an Automatic Dependent Surveillance-Contract (ADS-C message is assessed. The ADS-C messages are received at air traffic control centres for surveillance and airline control centres for general aircraft and dispatch management. Comparison against a global numerical prediction (NWP model and Mode-S Enhanced Surveillance (EHS derived wind and temperature observations is performed. Almost 16 thousand ADS-C reports with meteorological information were compiled from the Royal Dutch Airlines (KLM database. The length of the data set is 76 days. The wind and temperature observations are of good quality when compared to the global NWP forecast fields from the European Centre for Medium-Range Weather Forecasts (ECMWF. Comparison of ADS-C wind and temperature observations against Mode-S EHS derived observations in the vicinity of Amsterdam Airport Schiphol shows that the wind observations are of similar quality and the temperature observations of ADS-C are of better quality than those from Mode-S EHS. However, the current ADS-C data set has a lower vertical resolution than Mode-S EHS. High vertical resolution can be achieved by requesting more ADS-C when aircraft are ascending or descending, but could result in increased data communication costs.

  11. Quality assessment of Automatic Dependent Surveillance Contract (ADS-C wind and temperature observation from commercial aircraft

    Directory of Open Access Journals (Sweden)

    S. de Haan

    2013-02-01

    Full Text Available Aircraft observations of wind and temperature are very important for upper air meteorology. In this article, the quality of the meteorological information of an Automatic Dependent Surveillance-Contract (ADS-C message is assessed. The ADS-C messages broadcast by the aircraft are received at air traffic control centres for surveillance and airline control centres for general aircraft and dispatch management. A comparison is performed against a global numerical prediction (NWP model and wind and temperature observations derived from Enhanced Surveillance (EHS air-traffic control radar which interrogates all aircraft in selective mode (Mode-S EHS. Almost 16 000 ADS-C reports with meteorological information were compiled from the Royal Dutch Airlines (KLM database. The length of the data set is 76 consecutive days and started on 1 January 2011. The wind and temperature observations are of good quality when compared to the global NWP forecast fields from the European Centre for Medium-Range Weather Forecasts (ECMWF. Comparison of ADS-C wind and temperature observations against Mode-S EHS derived observations in the vicinity of Amsterdam Airport Schiphol shows that the wind observations are of similar quality and the temperature observations of ADS-C are of better quality than those from Mode-S EHS. However, the current ADS-C data set has a lower vertical resolution than Mode-S EHS. High vertical resolution can be achieved by requesting more ADS-C when aircraft are ascending or descending, but could result in increased data communication costs.

  12. The SBAS Sentinel-1 Surveillance service for automatic and systematic generation of Earth surface displacement within the GEP platform.

    Science.gov (United States)

    Casu, Francesco; De Luca, Claudio; Lanari, Riccardo; Manunta, Michele; Zinno, Ivana

    2017-04-01

    The Geohazards Exploitation Platform (GEP) is an ESA activity of the Earth Observation (EO) ground segment to demonstrate the benefit of new technologies for large scale processing of EO data. GEP aims at providing both on-demand processing services for scientific users of the geohazards community and an integration platform for new EO data analysis processors dedicated to scientists and other expert users. In the Remote Sensing scenario, a crucial role is played by the recently launched Sentinel-1 (S1) constellation that, with its global acquisition policy, has literally flooded the scientific community with a huge amount of data acquired over large part of the Earth on a regular basis (down to 6-days with both Sentinel-1A and 1B passes). Moreover, the S1 data, as part of the European Copernicus program, are openly and freely accessible, thus fostering their use for the development of tools for Earth surface monitoring. In particular, due to their specific SAR Interferometry (InSAR) design, Sentinel-1 satellites can be exploited to build up operational services for the generation of advanced interferometric products that can be very useful within risk management and natural hazard monitoring scenarios. Accordingly, in this work we present the activities carried out for the development, integration, and deployment of the SBAS Sentinel-1 Surveillance service of CNR-IREA within the GEP platform. This service is based on a parallel implementation of the SBAS approach, referred to as P-SBAS, able to effectively run in large distributed computing infrastructures (grid and cloud) and to allow for an efficient computation of large SAR data sequences with advanced DInSAR approaches. In particular, the Surveillance service developed on GEP platform consists on the systematic and automatic processing of Sentinel-1 data on selected Areas of Interest (AoI) to generate updated surface displacement time series via the SBAS-InSAR algorithm. We built up a system that is

  13. AUTOMATIC FAST VIDEO OBJECT DETECTION AND TRACKING ON VIDEO SURVEILLANCE SYSTEM

    Directory of Open Access Journals (Sweden)

    V. Arunachalam

    2012-08-01

    Full Text Available This paper describes the advance techniques for object detection and tracking in video. Most visual surveillance systems start with motion detection. Motion detection methods attempt to locate connected regions of pixels that represent the moving objects within the scene; different approaches include frame-to-frame difference, background subtraction and motion analysis. The motion detection can be achieved by Principle Component Analysis (PCA and then separate an objects from background using background subtraction. The detected object can be segmented. Segmentation consists of two schemes: one for spatial segmentation and the other for temporal segmentation. Tracking approach can be done in each frame of detected Object. Pixel label problem can be alleviated by the MAP (Maximum a Posteriori technique.

  14. A multispectral automatic target recognition application for maritime surveillance, search, and rescue

    Science.gov (United States)

    Schoonmaker, Jon; Reed, Scott; Podobna, Yuliya; Vazquez, Jose; Boucher, Cynthia

    2010-04-01

    Due to increased security concerns, the commitment to monitor and maintain security in the maritime environment is increasingly a priority. A country's coast is the most vulnerable area for the incursion of illegal immigrants, terrorists and contraband. This work illustrates the ability of a low-cost, light-weight, multi-spectral, multi-channel imaging system to handle the environment and see under difficult marine conditions. The system and its implemented detecting and tracking technologies should be organic to the maritime homeland security community for search and rescue, fisheries, defense, and law enforcement. It is tailored for airborne and ship based platforms to detect, track and monitor suspected objects (such as semi-submerged targets like marine mammals, vessels in distress, and drug smugglers). In this system, automated detection and tracking technology is used to detect, classify and localize potential threats or objects of interest within the imagery provided by the multi-spectral system. These algorithms process the sensor data in real time, thereby providing immediate feedback when features of interest have been detected. A supervised detection system based on Haar features and Cascade Classifiers is presented and results are provided on real data. The system is shown to be extendable and reusable for a variety of different applications.

  15. Standardized rendering from IR surveillance motion imagery

    Science.gov (United States)

    Prokoski, F. J.

    2014-06-01

    Government agencies, including defense and law enforcement, increasingly make use of video from surveillance systems and camera phones owned by non-government entities.Making advanced and standardized motion imaging technology available to private and commercial users at cost-effective prices would benefit all parties. In particular, incorporating thermal infrared into commercial surveillance systems offers substantial benefits beyond night vision capability. Face rendering is a process to facilitate exploitation of thermal infrared surveillance imagery from the general area of a crime scene, to assist investigations with and without cooperating eyewitnesses. Face rendering automatically generates greyscale representations similar to police artist sketches for faces in surveillance imagery collected from proximate locations and times to a crime under investigation. Near-realtime generation of face renderings can provide law enforcement with an investigation tool to assess witness memory and credibility, and integrate reports from multiple eyewitnesses, Renderings can be quickly disseminated through social media to warn of a person who may pose an immediate threat, and to solicit the public's help in identifying possible suspects and witnesses. Renderings are pose-standardized so as to not divulge the presence and location of eyewitnesses and surveillance cameras. Incorporation of thermal infrared imaging into commercial surveillance systems will significantly improve system performance, and reduce manual review times, at an incremental cost that will continue to decrease. Benefits to criminal justice would include improved reliability of eyewitness testimony and improved accuracy of distinguishing among minority groups in eyewitness and surveillance identifications.

  16. Maritime surveillance with synthetic aperture radar (SAR) and automatic identification system (AIS) onboard a microsatellite constellation

    Science.gov (United States)

    Peterson, E. H.; Zee, R. E.; Fotopoulos, G.

    2012-11-01

    New developments in small spacecraft capabilities will soon enable formation-flying constellations of small satellites, performing cooperative distributed remote sensing at a fraction of the cost of traditional large spacecraft missions. As part of ongoing research into applications of formation-flight technology, recent work has developed a mission concept based on combining synthetic aperture radar (SAR) with automatic identification system (AIS) data. Two or more microsatellites would trail a large SAR transmitter in orbit, each carrying a SAR receiver antenna and one carrying an AIS antenna. Spaceborne AIS can receive and decode AIS data from a large area, but accurate decoding is limited in high traffic areas, and the technology relies on voluntary vessel compliance. Furthermore, vessel detection amidst speckle in SAR imagery can be challenging. In this constellation, AIS broadcasts of position and velocity are received and decoded, and used in combination with SAR observations to form a more complete picture of maritime traffic and identify potentially non-cooperative vessels. Due to the limited transmit power and ground station downlink time of the microsatellite platform, data will be processed onboard the spacecraft. Herein we present the onboard data processing portion of the mission concept, including methods for automated SAR image registration, vessel detection, and fusion with AIS data. Georeferencing in combination with a spatial frequency domain method is used for image registration. Wavelet-based speckle reduction facilitates vessel detection using a standard CFAR algorithm, while leaving sufficient detail for registration of the filtered and compressed imagery. Moving targets appear displaced from their actual position in SAR imagery, depending on their velocity and the image acquisition geometry; multiple SAR images acquired from different locations are used to determine the actual positions of these targets. Finally, a probabilistic inference

  17. Performance of data acceptance criteria over 50 months from an automatic real-time environmental radiation surveillance network

    Energy Technology Data Exchange (ETDEWEB)

    Casanovas, R., E-mail: ramon.casanovas@urv.cat [Unitat de Fisica Medica, Facultat de Medicina i Ciencies de la Salut, Universitat Rovira i Virgili, ES-43201 Reus (Tarragona) (Spain); Morant, J.J. [Servei de Proteccio Radiologica, Facultat de Medicina i Ciencies de la Salut, Universitat Rovira i Virgili, ES-43201 Reus (Tarragona) (Spain); Lopez, M. [Unitat de Fisica Medica, Facultat de Medicina i Ciencies de la Salut, Universitat Rovira i Virgili, ES-43201 Reus (Tarragona) (Spain); Servei de Proteccio Radiologica, Facultat de Medicina i Ciencies de la Salut, Universitat Rovira i Virgili, ES-43201 Reus (Tarragona) (Spain); Hernandez-Giron, I. [Unitat de Fisica Medica, Facultat de Medicina i Ciencies de la Salut, Universitat Rovira i Virgili, ES-43201 Reus (Tarragona) (Spain); Batalla, E. [Servei de Coordinacio d' Activitats Radioactives, Departament d' Economia i Finances, Generalitat de Catalunya, ES-08018 Barcelona (Spain); Salvado, M. [Unitat de Fisica Medica, Facultat de Medicina i Ciencies de la Salut, Universitat Rovira i Virgili, ES-43201 Reus (Tarragona) (Spain)

    2011-08-15

    The automatic real-time environmental radiation surveillance network of Catalonia (Spain) comprises two subnetworks; one with 9 aerosol monitors and the other with 8 Geiger monitors together with 2 water monitors located in the Ebre river. Since September 2006, several improvements were implemented in order to get better quality and quantity of data, allowing a more accurate data analysis. However, several causes (natural causes, equipment failure, artificial external causes and incidents in nuclear power plants) may produce radiological measured values mismatched with the own station background, whether spurious without significance or true radiological values. Thus, data analysis for a 50-month period was made and allowed to establish an easily implementable statistical criterion to find those values that require special attention. This criterion proved a very useful tool for creating a properly debugged database and to give a quick response to equipment failures or possible radiological incidents. This paper presents the results obtained from the criterion application, including the figures for the expected, raw and debugged data, percentages of missing data grouped by causes and radiological measurements from the networks. Finally, based on the discussed information, recommendations for the improvement of the network are identified to obtain better radiological information and analysis capabilities. - Highlights: > Causes producing data mismatching with the own stations background are described. > Causes may be natural, equipment failure, external or nuclear plants incidents. > These causes can produce either spurious or true radiological data. > A criterion to find these data was implemented and tested for a 50-month period. > Recommendations for the improvement of the network are identified.

  18. Can road traffic law enforcement permanently reduce the number of accidents?

    Science.gov (United States)

    Bjørnskau, T; Elvik, R

    1992-10-01

    In this paper it is argued that conventional analyses of road user adaptation to traffic law enforcement, based on parametric rational-choice theory, are flawed. Such analyses only consider road-user actions as a response to enforcement level and penalty size and do not simultaneously consider enforcement as a response to road-user behaviour. If each party is considered a rational agent who adapts to the other's behaviour, the proper way to analyze the outcomes is by the way of game theory. A game-theoretic model is presented and the main implications are: (i) most attempts at enforcing road traffic legislation will not have any lasting effects, either on road-user behaviour or on accidents; (ii) imposing stricter penalties (in the form of higher fines or longer prison sentences) will not affect road-user behaviour; (iii) imposing stricter penalties will reduce the level of enforcement; (iv) implementing automatic traffic surveillance techniques and/or allocating enforcement resources according to a chance mechanism, and not according to police estimates of violation probability, can make enforcement effects last, but both alternatives are difficult to implement. Relevant empirical studies are reviewed, and they seem to support the conclusions arrived at by the game-theoretic model.

  19. Police enforcement and driving speed.

    NARCIS (Netherlands)

    2008-01-01

    Speed limits are violated frequently in the Netherlands. As speed is an important factor in road crashes, the surveillance of driving speeds is one of the spearheads in the policy plans of the Dutch police. Different methods of speed enforcement have proved to be effective in reducing speed and cras

  20. Enforcement Reports

    Data.gov (United States)

    U.S. Department of Health & Human Services — Whereas not all recalls are announced in the media or on our Recalls press release page, all recalls montiored by FDA are included in FDA's weekly Enforcement Report...

  1. THE NOISE IMMUNITY OF THE DIGITAL DEMODULATOR MFM-AM SIGNAL USED IN DATA COMMUNICATIONS SYSTEMS OF AIR TRAFFIC CONTROL WITH AUTOMATIC DEPENDENT SURVEILLANCE AGAINST A NON-GAUSSIAN NOISE

    Directory of Open Access Journals (Sweden)

    A. L. Senyavskiy

    2015-01-01

    Full Text Available The article analyzes the robustness of the digital demodulator of the signal with the lowest frequency shift keying at a subcarrier frequency with respect to non-Gaussian interference type of atmospheric, industrial noise and interfering frequency -and phase-shift keyed signals. This type of demodulator is used for the transmission of navigation data in the systems of air traffic control with automatic dependent surveillance.

  2. A Reinforcement Learning Model Equipped with Sensors for Generating Perception Patterns: Implementation of a Simulated Air Navigation System Using ADS-B (Automatic Dependent Surveillance-Broadcast) Technology.

    Science.gov (United States)

    Álvarez de Toledo, Santiago; Anguera, Aurea; Barreiro, José M; Lara, Juan A; Lizcano, David

    2017-01-19

    Over the last few decades, a number of reinforcement learning techniques have emerged, and different reinforcement learning-based applications have proliferated. However, such techniques tend to specialize in a particular field. This is an obstacle to their generalization and extrapolation to other areas. Besides, neither the reward-punishment (r-p) learning process nor the convergence of results is fast and efficient enough. To address these obstacles, this research proposes a general reinforcement learning model. This model is independent of input and output types and based on general bioinspired principles that help to speed up the learning process. The model is composed of a perception module based on sensors whose specific perceptions are mapped as perception patterns. In this manner, similar perceptions (even if perceived at different positions in the environment) are accounted for by the same perception pattern. Additionally, the model includes a procedure that statistically associates perception-action pattern pairs depending on the positive or negative results output by executing the respective action in response to a particular perception during the learning process. To do this, the model is fitted with a mechanism that reacts positively or negatively to particular sensory stimuli in order to rate results. The model is supplemented by an action module that can be configured depending on the maneuverability of each specific agent. The model has been applied in the air navigation domain, a field with strong safety restrictions, which led us to implement a simulated system equipped with the proposed model. Accordingly, the perception sensors were based on Automatic Dependent Surveillance-Broadcast (ADS-B) technology, which is described in this paper. The results were quite satisfactory, and it outperformed traditional methods existing in the literature with respect to learning reliability and efficiency.

  3. A Reinforcement Learning Model Equipped with Sensors for Generating Perception Patterns: Implementation of a Simulated Air Navigation System Using ADS-B (Automatic Dependent Surveillance-Broadcast Technology

    Directory of Open Access Journals (Sweden)

    Santiago Álvarez de Toledo

    2017-01-01

    Full Text Available Over the last few decades, a number of reinforcement learning techniques have emerged, and different reinforcement learning-based applications have proliferated. However, such techniques tend to specialize in a particular field. This is an obstacle to their generalization and extrapolation to other areas. Besides, neither the reward-punishment (r-p learning process nor the convergence of results is fast and efficient enough. To address these obstacles, this research proposes a general reinforcement learning model. This model is independent of input and output types and based on general bioinspired principles that help to speed up the learning process. The model is composed of a perception module based on sensors whose specific perceptions are mapped as perception patterns. In this manner, similar perceptions (even if perceived at different positions in the environment are accounted for by the same perception pattern. Additionally, the model includes a procedure that statistically associates perception-action pattern pairs depending on the positive or negative results output by executing the respective action in response to a particular perception during the learning process. To do this, the model is fitted with a mechanism that reacts positively or negatively to particular sensory stimuli in order to rate results. The model is supplemented by an action module that can be configured depending on the maneuverability of each specific agent. The model has been applied in the air navigation domain, a field with strong safety restrictions, which led us to implement a simulated system equipped with the proposed model. Accordingly, the perception sensors were based on Automatic Dependent Surveillance-Broadcast (ADS-B technology, which is described in this paper. The results were quite satisfactory, and it outperformed traditional methods existing in the literature with respect to learning reliability and efficiency.

  4. A Reinforcement Learning Model Equipped with Sensors for Generating Perception Patterns: Implementation of a Simulated Air Navigation System Using ADS-B (Automatic Dependent Surveillance-Broadcast) Technology

    Science.gov (United States)

    Álvarez de Toledo, Santiago; Anguera, Aurea; Barreiro, José M.; Lara, Juan A.; Lizcano, David

    2017-01-01

    Over the last few decades, a number of reinforcement learning techniques have emerged, and different reinforcement learning-based applications have proliferated. However, such techniques tend to specialize in a particular field. This is an obstacle to their generalization and extrapolation to other areas. Besides, neither the reward-punishment (r-p) learning process nor the convergence of results is fast and efficient enough. To address these obstacles, this research proposes a general reinforcement learning model. This model is independent of input and output types and based on general bioinspired principles that help to speed up the learning process. The model is composed of a perception module based on sensors whose specific perceptions are mapped as perception patterns. In this manner, similar perceptions (even if perceived at different positions in the environment) are accounted for by the same perception pattern. Additionally, the model includes a procedure that statistically associates perception-action pattern pairs depending on the positive or negative results output by executing the respective action in response to a particular perception during the learning process. To do this, the model is fitted with a mechanism that reacts positively or negatively to particular sensory stimuli in order to rate results. The model is supplemented by an action module that can be configured depending on the maneuverability of each specific agent. The model has been applied in the air navigation domain, a field with strong safety restrictions, which led us to implement a simulated system equipped with the proposed model. Accordingly, the perception sensors were based on Automatic Dependent Surveillance-Broadcast (ADS-B) technology, which is described in this paper. The results were quite satisfactory, and it outperformed traditional methods existing in the literature with respect to learning reliability and efficiency. PMID:28106849

  5. New Network of Automatic Stations integrated in the CSNs Environmental Radiological Surveillance Network; Nueva Red de Estaciones Automaticas integrada en la Red de Vigilancia Radiologica Ambiental del CSN

    Energy Technology Data Exchange (ETDEWEB)

    Parages Perez del Yerro, C.; Garcia Cadierno, J. P.; Calvin Cuartero, M.

    2016-05-01

    In 1992, the Council put into operation a network comprising 25 automatic stations for continuous monitoring of the radiological quality of the air and the detection of anomalous situations. It has now decided to undertake the renewal and modernisation of these installations, incorporating sensors and automatic connection and communication systems based on the best technology currently available. (Author)

  6. Law Enforcement Locations

    Data.gov (United States)

    Kansas Data Access and Support Center — Law Enforcement Locations in Kansas Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law enforcement agencies "are...

  7. Cyber surveillance for flood disasters

    National Research Council Canada - National Science Library

    Lo, Shi-Wei; Wu, Jyh-Horng; Lin, Fang-Pang; Hsu, Ching-Han

    2015-01-01

    ... river areas and sections. Therefore, in this paper, we propose an easy method to automatically monitor the flood object of a specific area, based on the currently widely used remote cyber surveillance systems and image...

  8. Enforcement and illegal migration

    OpenAIRE

    Orrenius, Pia

    2014-01-01

    Border enforcement of immigration laws attempts to raise the costs of illegal immigration, while interior enforcement also lowers the benefits. Border and interior enforcement therefore reduce the net benefits of illegal immigration and should lower the probability that an individual will decide to migrate. While some empirical studies find that border and interior enforcement serve as significant deterrents to illegal immigration, immigration enforcement is costly and carries significant uni...

  9. Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Union Slough National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  10. Law enforcement suicide: a national analysis.

    Science.gov (United States)

    Violanti, John M; Robinson, Cynthia F; Shen, Rui

    2013-01-01

    Previous research suggests that there is an elevated risk of suicide among workers within law enforcement occupations. The present study examined the proportionate mortality for suicide in law enforcement in comparison to the US working population during 1999, 2003-2004, and 2007, based on Centers for Disease Control and Prevention's National Institute for Occupational Safety and Health National Occupational Mortality Surveillance data. We analyzed data for all law enforcement occupations and focused on two specific law enforcement occupational categories-detectives/criminal investigators/ police and corrections officers. Suicides were also explored by race, gender and ethnicity. The results of the study showed proportionate mortality ratios (PMRs) for suicide were significantly high for all races and sexes combined (all law enforcement--PMR = 169, 95% CI = 150-191, p law enforcement combined category, and a similarly high PMR was found among Hispanic detectives/criminal investigators/police (PMR = 388, p < 0.01, 95% CI = 168-765). There were small numbers of deaths among female and African American officers. The results included significantly increased risk for suicide among detectives/criminal investigators/police and corrections officers, which suggests that additional study could provide better data to inform us for preventive action.

  11. Access Control Enforcement Testing

    OpenAIRE

    El Kateb, Donia; Elrakaiby, Yehia; Mouelhi, Tejeddine; Le Traon, Yves

    2012-01-01

    A policy-based access control architecture com- prises Policy Enforcement Points (PEPs), which are modules that intercept subjects access requests and enforce the access decision reached by a Policy Decision Point (PDP), the module implementing the access decision logic. In applications, PEPs are generally implemented manually, which can introduce errors in policy enforcement and lead to security vulnerabilities. In this paper, we propose an approach to systematically test and validate the co...

  12. Environmental Enforcement Districts

    Data.gov (United States)

    Vermont Center for Geographic Information — Current statewide map of the geographic territories of Environmental Enforcement Officers. Part of a dataset that contains administrative boundaries for Vermont's...

  13. Significant NRC Enforcement Actions

    Data.gov (United States)

    Nuclear Regulatory Commission — This dataset provides a list of Nuclear Regulartory Commission (NRC) issued significant enforcement actions. These actions, referred to as "escalated", are issued by...

  14. EPA Administrative Enforcement Dockets

    Data.gov (United States)

    U.S. Environmental Protection Agency — The EPA Administrative Enforcement Dockets database contains the electronic dockets for administrative penalty cases filed by EPA Regions and Headquarters. Visitors...

  15. Solving the surveillance dilemma for pro-environmental behaviour : The motivating power of in-group goals

    NARCIS (Netherlands)

    Milovanovic, Marko; Steg, Linda; Spears, Russell

    2016-01-01

    Policy makers often employ extrinsic incentives, regulations and enforcements to promote sustainable energy use. Surveillance is one such classic means to encourage or enforce positive behaviour. However, such strategies backfire if they encourage extrinsic motivation, potentially alienating those w

  16. Compliance and Enforcement Actions (CEA) -

    Data.gov (United States)

    Department of Transportation — Compliance and Enforcement Actions application provides process assistance / improvements for conducting investigation and enforcement activities. The Compliance and...

  17. Balancing security and liberty within the European human rights framework. A critical reading of the Court’s case law in the light of surveillance and criminal law enforcement strategies after 9/11

    Directory of Open Access Journals (Sweden)

    Paul J.A. de Hert

    2005-07-01

    Full Text Available Literature concerning human rights protection by the European Court on Human Rights after 9/11 is very often coloured by optimism. Some authors hold that judicial control by the European Court on national anti-terrorism measures is very strict, especially compared to U.S. judicial review. Others suggest the existence of a strict privacy test developed by the European Court as a bulwark again anti-terrorism measures that give too much discretion to law enforcement authorities. In this paper we discuss the ‘classical’ European framework with regard to ‘hard’ anti-terrorism measures and the privacy framework that is relevant for new, ‘softer’ anti-terrorism measures. it is argued that this optimistic reading of the European human rights framework in the area of security especially with regard to the latter is flawed and based on a misunderstanding of the case law of the European Court. This analysis leaves little room for optimism about judicial review of the legislator in Europe and urges for an attitude of self-restraint.

  18. Video Surveillance using Distance Maps

    NARCIS (Netherlands)

    Schouten, Theo E.; Kuppens, Harco C.; Broek, van den Egon L.; Kehtarnavaz, Nasser; Laplante, Phillip A.

    2006-01-01

    Human vigilance is limited; hence, automatic motion and distance detection is one of the central issues in video surveillance. Hereby, many aspects are of importance, this paper specially addresses: efficiency, achieving real-time performance, accuracy, and robustness against various noise factors.

  19. Video surveillance using distance maps

    NARCIS (Netherlands)

    Schouten, Theo E.; Kuppens, Harco C.; van den Broek, Egon; Kehtarnavaz, Nasser; Laplante, Phillip A,

    2006-01-01

    Human vigilance is limited; hence, automatic motion and distance detection is one of the central issues in video surveillance. Hereby, many aspects are of importance, this paper specially addresses: efficiency, achieving real-time performance, accuracy, and robustness against various noise factors.

  20. Introduction to surveillance studies

    CERN Document Server

    Petersen, JK

    2012-01-01

    Introduction & OverviewIntroduction Brief History of Surveillance Technologies & TechniquesOptical SurveillanceAerial Surveillance Audio Surveillance Radio-Wave SurveillanceGlobal Positioning Systems Sensors Computers & the Internet Data Cards Biochemical Surveillance Animal Surveillance Biometrics Genetics Practical ConsiderationsPrevalence of Surveillance Effectiveness of Surveillance Freedom & Privacy IssuesConstitutional Freedoms Privacy Safeguards & Intrusions ResourcesReferences Glossary Index

  1. Tamper Detection for Active Surveillance Systems

    DEFF Research Database (Denmark)

    Theodore, Tsesmelis; Christensen, Lars; Fihl, Preben;

    2013-01-01

    If surveillance data are corrupted they are of no use to neither manually post-investigation nor automatic video analysis. It is therefore critical to automatically be able to detect tampering events such as defocusing, occlusion and displacement. In this work we for the first time ad- dress...

  2. Enforcement Information System

    Data.gov (United States)

    Department of Transportation — EIS is an automated management information system that tracks the FAA’s enforcement actions on a nationwide basis. EIS is the FAA’s primary database for tracking...

  3. ENFORCE Conceptual Framework

    OpenAIRE

    Lysemoset, Tom; MAHLER, Tobias; Solhaug, Bjørnar; Bing, Jon; Elgesom, Dag; Stølen, Ketil

    2007-01-01

    ENFORCE is a multi-disciplinary research project addressing trust management. The research objectives include the development of a methodology for the capture and analysis of policies for security and trust management, the development of a methodology for legal risk analysis to ensure trust, as well as the development of a language suitable for the specification of trust management policies. This report documents the ENFORCE conceptual framework for trust management by clarifying the notion o...

  4. Surveillance Pleasures

    DEFF Research Database (Denmark)

    Albrechtslund, Anders

    and leisure have not been studied with the same intensity as e.g. policing, civil liberties and social sorting. This paper offers a study of trends in surveillance pleasures, i.e. watching and eavesdropping in popular culture. My focus is the existential aspects and ethical dilemmas of surveillance...

  5. ADS-B- Automatic Dependent Surveillance- Broadcast

    Directory of Open Access Journals (Sweden)

    Borivoj Galović

    2002-01-01

    Full Text Available The CU/Tent system of air traffic is facing many drawbacksand problems that restrict its further development and makes itdifficult to follow the trends of increase in the traffic volume.By means of their technology, the systems such as ADS-8create rhe basis for further building, upgrading, improving anddeveloping of a completely new concept of the air traffic system.Through their functions they fully fit into and support the basicfunctions of communication, navigation and swveillancewhich form the basis of the new concept that needs to be implementedas soon as possible.

  6. Automatic Digital Plate Reading for Surveillance Cultures.

    Science.gov (United States)

    Kirn, Thomas J

    2016-10-01

    The automation of specimen processing and culture workup has rapidly emerged in clinical microbiology laboratories throughout the world and more recently in the United States. While many U.S. laboratories have implemented some form of automated specimen processing and some have begun performing digital plate reading, automated colony analysis is just beginning to be utilized clinically. In this issue of the Journal of Clinical Microbiology, M. L. Faron et al. (J Clin Microbiol 54:2470-2475, 2016, http://dx.doi.org/10.1128/JCM.01040-16) report the results of their evaluation of the performance of the WASPLab Chromogenic Detection Module (CDM) for categorizing chromogenic agar plates as negative or "nonnegative" for vancomycin-resistant enterococci (VRE). Their major finding was 100% sensitivity for detection of "nonnegative" specimens using CDM compared to manual methods for specimens plated on two different types of VRE chromogenic agar plates. Additionally, utilization of digital plate reading in conjunction with automated colony analysis was predicted to result in significant savings based on greatly reduced labor costs. Copyright © 2016, American Society for Microbiology. All Rights Reserved.

  7. AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA

    Directory of Open Access Journals (Sweden)

    Veena G.S

    2013-12-01

    Full Text Available The proposed work aims to create a smart application camera, with the intention of eliminating the need for a human presence to detect any unwanted sinister activities, such as theft in this case. Spread among the campus, are certain valuable biometric identification systems at arbitrary locations. The application monitosr these systems (hereafter referred to as “object” using our smart camera system based on an OpenCV platform. By using OpenCV Haar Training, employing the Viola-Jones algorithm implementation in OpenCV, we teach the machine to identify the object in environmental conditions. An added feature of face recognition is based on Principal Component Analysis (PCA to generate Eigen Faces and the test images are verified by using distance based algorithm against the eigenfaces, like Euclidean distance algorithm or Mahalanobis Algorithm. If the object is misplaced, or an unauthorized user is in the extreme vicinity of the object, an alarm signal is raised.

  8. 基于手部轨迹识别的ATM智能视频监控系统%Intelligent Video Surveillance System of Automatic Teller Machine Based on Hand Trajectory Recognition

    Institute of Scientific and Technical Information of China (English)

    陈琼; 鱼滨

    2012-01-01

    In order to prevent the criminal behaviors for Automatic Teller Machine(ATM) timely, this paper designs on ATM intelligent video surveillance system based on hand trajectory recognition. A background model is built by Gaussian-mixture background modeling method with the video images collected in the monitored area, and the information of human body can be obtained by background subtraction method and tracking algorithm. By analyzing the area change of human body, it can judge whether there exist abnormal behaviors. If there is, it will give an alarm. Otherwise, it will detect the hand trajectory with the skin detection algorithm based on color space and some location constraints, then match and recognize the movement trajectory of hand by building an Hidden Markov Model(HMM) to determine whether there exist other abnormal behaviours further. Experimental results show that the recognition rate for the criminal behaviors of the method proposed can reach up to 88%.%为实时阻止针对自动取款机的犯罪行为发生,设计一种基于手部轨迹识别的ATM智能视频监控系统.对于采集所得的监控区域内的视频图像,利用混合高斯背景建模方法为视频图像建立背景模型,通过背景剪除法和跟踪算法得到监控区域内的人体信息,分析进入监控区域的人体面积变化情况,由此判断是否有异常行为发生,存在异常则报警,否则采用基于颜色空间的皮肤检测算法和位置约束检测人手部分,利用隐马尔可夫模型对分段的手部运动轨迹分别进行匹配识别,进一步判断是否存在犯罪行为.实验结果表明,该方法对于犯罪行为的识别率能达到88%.

  9. Urban Street Gang Enforcement.

    Science.gov (United States)

    Institute for Law and Justice, Inc., Alexandria, VA.

    Strategies to enhance prosecution of gang-related crimes are presented, with a focus on enforcement and prosecution targeting urban street gangs. The model programs introduced offer strategies largely based on the practical experiences of agencies that participated in a demonstration program, the Urban Street Gang Drug Trafficking Enforcement…

  10. Speed enforcement in Norway

    DEFF Research Database (Denmark)

    Elvik, Rune

    2015-01-01

    This paper probes the relationship between changes in the risk of apprehension for speeding in Norway and changes in the amount of speeding. The paper is based on a game-theoretic model of how the rate of violations and the amount of enforcement is determined by the interaction between drivers...

  11. Lectures on Law Enforcement.

    Science.gov (United States)

    Nettleship, Lois

    Three lectures on law enforcement are presented that were prepared for study purposes at Johnson County Community College. The first lecture examines the fundamental ideas of the Age of Enlightenment and discusses their influence on the American Revolution, the United States Constitution, and the Bill of Rights. Major provisions of the Bill of…

  12. Regulatory Enforcement and Compliance

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    1999-01-01

    agencies. The latter are shown to be more important in bringing about compliance than are inspectors' enforcement styles. Municipal agencies are shown to increase compliance through the use of third parties, more frequent inspection, and setting priorities for inspection of major items. The findings about...

  13. Selective enforcement of regulation

    Institute of Scientific and Technical Information of China (English)

    Donghua; Chen; Dequan; Jiang; Shangkun; Liang; Fangping; Wang

    2011-01-01

    Regulatory agencies may,whether outside of set rules or within their discretion,depart from the original goals or principles set for enforcing the rules,which we term selective enforcement.Taking China,a country in transition,as an example,and using cases and large-sample tests,we present empirical evidence of selective enforcement.The results show that the China Securities Regulatory Commission(CSRC) takes into account whether companies violating the rules have a state-owned background and the strength of that background when investigating and punishing non-compliance.After controlling for the degree of violation,state-owned-enterprises(SOEs) are punished less severely than private companies;and the higher the hierarchy of the SOE in question,the less severe the punishment.It also takes longer for SOEs to be punished.We also find that companies that violate the rules less seriously have a greater tendency to apply for refinancing than those that violate the rules more seriously.This may be because the severity of the violation can affect listed companies’ expectations of obtaining refinancing.The analysis and conclusions of this study prove useful in understanding the causes and consequences of selective enforcement in transition economies.

  14. Performance-Driven Interface Contract Enforcement for Scientific Components

    Energy Technology Data Exchange (ETDEWEB)

    Dahlgren, Tamara Lynn [Univ. of California, Davis, CA (United States)

    2008-01-01

    Performance-driven interface contract enforcement research aims to improve the quality of programs built from plug-and-play scientific components. Interface contracts make the obligations on the caller and all implementations of the specified methods explicit. Runtime contract enforcement is a well-known technique for enhancing testing and debugging. However, checking all of the associated constraints during deployment is generally considered too costly from a performance stand point. Previous solutions enforced subsets of constraints without explicit consideration of their performance implications. Hence, this research measures the impacts of different interface contract sampling strategies and compares results with new techniques driven by execution time estimates. Results from three studies indicate automatically adjusting the level of checking based on performance constraints improves the likelihood of detecting contract violations under certain circumstances. Specifically, performance-driven enforcement is better suited to programs exercising constraints whose costs are at most moderately expensive relative to normal program execution.

  15. 吉西他滨相关性血液系统不良反应的自动监测研究%Study on gemcitabine-related hematologic adverse drug reaction by automatic surveillance

    Institute of Scientific and Technical Information of China (English)

    寇炜; 郭代红; 王伟兰; 贾王平; 王啸宇

    2016-01-01

    [AbstrAct]Objective:To study the incidence of hematologic adverse drug reaction caused by gemcitabine.Methods:The research objects were screened out by adverse drug events' active surveillance and assessment system developed by our hospital. The collected data of the hospitalized patients in General Hospital of PLA who received gemcitabine from January 1, 2016 to June 30, 2016 were analyzed retrospectively. The incidence of hematologic ADR caused by gemcitabine and the related factors were investigated. results: A total of 620 cases using gemcitabine were automatically monitored. Positive alarm rate of leukopenia, neutropenia, thrombocytopenia and anemia were 92.11%, 98.73%, 95.08% and 85.00% respectively. Incidence of leukopenia, neutropenia, thrombocytopenia and anemia induced by gemcitabine were 33.18%, 18.48%, 10.49% and 18.48% respectively. And the incidences of severe ADR were 4.27%, 4.50%, 3.44% and 0 respectively. By analyzing the data of the three modules as a whole, it was found that overall incidence of gemcitabine-related hematologic ADR was 45.29%, and the adverse reactions occurred mostly in the age of 45 to 75 years old. There was no signiifcant difference in incidence of hematologic ADR among the gender, age, BMI and frequencies of hospitalization (P > 0.05).conclusion:By using the automatic surveillance and assessment system, pharmacists can effectively and accurately screen the hematologic ADR induced by anti-cancer drugs and make guidance for rational drug use in order to reduce and avoid the occurrence of adverse reactions. The rate of gemcitabine-related hematologic ADR is high and hematological indexes should be closely monitored in the course of clinical drug use to prevent the occurrence of adverse reactions.%目的:研究住院患者使用吉西他滨致血液系统药品不良反应发生情况。方法:采用回顾性分析,通过对我院开发的“医疗机构ADE主动监测与智能评估警示系统”事件

  16. Automatic sequences

    CERN Document Server

    Haeseler, Friedrich

    2003-01-01

    Automatic sequences are sequences which are produced by a finite automaton. Although they are not random they may look as being random. They are complicated, in the sense of not being not ultimately periodic, they may look rather complicated, in the sense that it may not be easy to name the rule by which the sequence is generated, however there exists a rule which generates the sequence. The concept automatic sequences has special applications in algebra, number theory, finite automata and formal languages, combinatorics on words. The text deals with different aspects of automatic sequences, in particular:· a general introduction to automatic sequences· the basic (combinatorial) properties of automatic sequences· the algebraic approach to automatic sequences· geometric objects related to automatic sequences.

  17. Enforcement response policy. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Levenstein, D.

    1987-12-01

    The directive discusses the policy which updates guidance on classifying violations, selecting appropriate enforcement action in response to various RCRA violators, and taking Federal enforcement action in States with authorized programs.

  18. CASTLE: an advanced technology partnership serving law enforcement

    Science.gov (United States)

    McCoig, Thomas M.

    1997-01-01

    The Center for Applied Science and Technology for Law Enforcement (CASTLE) is supported by the National Institute of Justice Office of Science and Technology and is establishing partnerships with the National Law Enforcement Corrections and Technology Center in Charleston, South Carolina. Additionally, CASTLE is working with the American Society of Crime Lab Directors (ASCLD) to direct effective interface with and support of state and local crime laboratories. Extremely sophisticated, often one-of-a-kind, equipment and very-capable scientific expertise are resident at U.S. federal government laboratories and, until recently, have not been applied often to law enforcement problems, particularly at the state and local level. While there have been a number of research and development programs at national laboratories sponsored by agencies such as the National Institute of Justice, most of these have been focused on long-term objectives to meet broad national needs. In discussions with local law enforcement personnel, it is apparent that there are much more immediate technology needs, which are not being addressed by nationwide programs, in fundamental areas including video and audio surveillance, trace and physical evidence sampling, and forensic laboratory analysis. In a pilot program, Oak Ridge National Laboratory (ORNL), a significant component of the nation's science and technology resources located in Tennessee, recently made a commitment to support law enforcement where possible with advanced technology. ORNL formed the Center for Applied Science and Technology for Law Enforcement (CASTLE), a partnership of scientific, university, private sector, and law enforcement personnel. The goal of the CASTLE program is to apply technology at the grassroots working level to both solve crimes, to improve safety to law enforcement personnel, and to improve the overall quality of law enforcement services within the United States.

  19. Hierarchical Model-Based Activity Recognition With Automatic Low-Level State Discovery

    Directory of Open Access Journals (Sweden)

    Justin Muncaster

    2007-09-01

    Full Text Available Activity recognition in video streams is increasingly important for both the computer vision and artificial intelligence communities. Activity recognition has many applications in security and video surveillance. Ultimately in such applications one wishes to recognize complex activities, which can be viewed as combination of simple activities. In this paper, we present a general framework of a Dlevel dynamic Bayesian network to perform complex activity recognition. The levels of the network are constrained to enforce state hierarchy while the Dth level models the duration of simplest event. Moreover, in this paper we propose to use the deterministic annealing clustering method to automatically define the simple activities, which corresponds to the low level states of observable levels in a Dynamic Bayesian Networks. We used real data sets for experiments. The experimental results show the effectiveness of our proposed method.

  20. Certification/enforcement analysis

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    Industry compliance with minimum energy efficiency standards will be assured through a two-part program approach of certification and enforcement activities. The technical support document (TSD) presents the analyses upon which the proposed rule for assuring that consumer product comply with applicable energy efficiency standards is based. Much of the TSD is based upon support provided DOE by Vitro Laboratories. The OAO Corporation provided additional support in the development of the sampling plan incorporated in the proposed rule. Vitro's recommended approach to appliance certification and enforcement, developed after consideration of various program options, benefits, and impacts, establishes the C/E program framework, general criteria, and procedures for assuring a specified level of energy efficiency performance of covered consumer products. The results of the OAO analysis are given in Volume II of the TSD.

  1. Certification/enforcement analysis

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    Industry compliance with minimum energy efficiency standards will be assured through a two-part program approach of certification and enforcement activities. The technical support document (TSD) presents the analyses upon which the proposed rule for assuring that consumer product comply with applicable energy efficiency standards is based. Much of the TSD is based upon support provided DOE by Vitro Laboratories. The OAO Corporation provided additional support in the development of the sampling plan incorporated in the proposed rule. Vitro's recommended approach to appliance certification and enforcement, developed after consideration of various program options, benefits, and impacts, establishes the C/E program framework, general criteria, and procedures for assuring a specified level of energy efficiency performance of covered consumer products. The results of the OAO analysis are given in Volume II of the TSD.

  2. Surveillance of Autism.

    Science.gov (United States)

    Boyle, Coleen A.; Bertrand, Jacquelyn; Yeargin-Allsopp, Marshalyn

    1999-01-01

    This article describes the autism surveillance activities of the Center for Disease Control and Prevention. It considers why surveillance to track prevalence of autistic disorders is needed, how such surveillance is conducted, and the special challenges of autism surveillance. (DB)

  3. Reconsidering Styles of Regulatory Enforcement

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    2000-01-01

    This study addresses enforcement styles of regulatory inspectors, based on an examination of the municipal enforcement of agro-environmental policies in Denmark. Our findings make three contributions to the regulatory literature. One contribution is to add empirical support for theorizing about...... inspectors’ enforcement styles as consisting of multiple components, rather than a single continuum. We show that inspectors’ enforcement styles comprise the degree of formalism and the degree of coercion that they exercise when carrying out inspections. A second contribution is in showing the relationship...... of different types of enforcement styles to the two underlying dimensions of the concept. A third contribution is an examination of the ways in which inspectors’ enforcement styles relate to their enforcement actions. The consistency of our findings with those of other studies suggests that the dimensions...

  4. Surveillance Angels

    NARCIS (Netherlands)

    Rothkrantz, L.J.M.

    2014-01-01

    The use of sensor networks has been proposed for military surveillance and environmental monitoring applications. Those systems are composed of a heterogeneous set of sensors to observe the environment. In centralised systems the observed data will be conveyed to the control room to process the

  5. Surveillance Angels

    NARCIS (Netherlands)

    Rothkrantz, L.J.M.

    2014-01-01

    The use of sensor networks has been proposed for military surveillance and environmental monitoring applications. Those systems are composed of a heterogeneous set of sensors to observe the environment. In centralised systems the observed data will be conveyed to the control room to process the data

  6. Integrated design of intelligent surveillance systems and their user interface

    NARCIS (Netherlands)

    Toet, A.

    2005-01-01

    Modern complex surveillance systems consisting of multiple and heterogeneous sensors, automatic information registration and data analysis techniques, and decision support tools should provide the human operator an integrated, transparent and easily comprehensible view of the surveyed scene. Display

  7. Cyber Surveillance for Flood Disasters

    Directory of Open Access Journals (Sweden)

    Shi-Wei Lo

    2015-01-01

    Full Text Available Regional heavy rainfall is usually caused by the influence of extreme weather conditions. Instant heavy rainfall often results in the flooding of rivers and the neighboring low-lying areas, which is responsible for a large number of casualties and considerable property loss. The existing precipitation forecast systems mostly focus on the analysis and forecast of large-scale areas but do not provide precise instant automatic monitoring and alert feedback for individual river areas and sections. Therefore, in this paper, we propose an easy method to automatically monitor the flood object of a specific area, based on the currently widely used remote cyber surveillance systems and image processing methods, in order to obtain instant flooding and waterlogging event feedback. The intrusion detection mode of these surveillance systems is used in this study, wherein a flood is considered a possible invasion object. Through the detection and verification of flood objects, automatic flood risk-level monitoring of specific individual river segments, as well as the automatic urban inundation detection, has become possible. The proposed method can better meet the practical needs of disaster prevention than the method of large-area forecasting. It also has several other advantages, such as flexibility in location selection, no requirement of a standard water-level ruler, and a relatively large field of view, when compared with the traditional water-level measurements using video screens. The results can offer prompt reference for appropriate disaster warning actions in small areas, making them more accurate and effective.

  8. Smart sensing surveillance video system

    Science.gov (United States)

    Hsu, Charles; Szu, Harold

    2016-05-01

    An intelligent video surveillance system is able to detect and identify abnormal and alarming situations by analyzing object movement. The Smart Sensing Surveillance Video (S3V) System is proposed to minimize video processing and transmission, thus allowing a fixed number of cameras to be connected on the system, and making it suitable for its applications in remote battlefield, tactical, and civilian applications including border surveillance, special force operations, airfield protection, perimeter and building protection, and etc. The S3V System would be more effective if equipped with visual understanding capabilities to detect, analyze, and recognize objects, track motions, and predict intentions. In addition, alarm detection is performed on the basis of parameters of the moving objects and their trajectories, and is performed using semantic reasoning and ontologies. The S3V System capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments. It would be directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.

  9. Air surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Patton, G.W.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the air surveillance and monitoring programs currently in operation at that Hanford Site. Atmospheric releases of pollutants from Hanford to the surrounding region are a potential source of human exposure. For that reason, both radioactive and nonradioactive materials in air are monitored at a number of locations. The influence of Hanford emissions on local radionuclide concentrations was evaluated by comparing concentrations measured at distant locations within the region to concentrations measured at the Site perimeter. This section discusses sample collection, analytical methods, and the results of the Hanford air surveillance program. A complete listing of all analytical results summarized in this section is reported separately by Bisping (1995).

  10. Quota enforcement in resource industries

    DEFF Research Database (Denmark)

    Hansen, Lars Gårn; Jensen, Frank; Nøstbakken, Linda

    cant non-compliance and exogenous constraints on nes and enforcement budget. We propose a new enforcement system based on self-reporting of excess extraction and explicit di erentiation of inspection rates based on compliance history. In particular, we use state-dependent enforcement to induce rms...... to self-report excess extraction. We show that such system increases the e ectiveness of quota management by allowing the regulator to implement a wider range of aggregate extraction targets than under traditional enforcement, while ensuring an ecient allocation of aggregate extraction. In addition...

  11. Immigration Enforcement Actions - Annual Report

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  12. Automatic Age Estimation System for Face Images

    OpenAIRE

    Chin-Teng Lin; Dong-Lin Li; Jian-Hao Lai; Ming-Feng Han; Jyh-Yeong Chang

    2012-01-01

    Humans are the most important tracking objects in surveillance systems. However, human tracking is not enough to provide the required information for personalized recognition. In this paper, we present a novel and reliable framework for automatic age estimation based on computer vision. It exploits global face features based on the combination of Gabor wavelets and orthogonal locality preserving projections. In addition, the proposed system can extract face aging features automatically in rea...

  13. 76 FR 80847 - Enforcement Actions

    Science.gov (United States)

    2011-12-27

    ... into compliance before an enforcement action is taken by the Chair. Voluntary compliance is the goal of... existing compliance issues. The amendment retains the Chair's authority to issue an enforcement action at... compliance. In the Preliminary draft, the second action was called a ``non-compliance notice.''...

  14. Reconsidering Styles of Regulatory Enforcement

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    2000-01-01

    This study addresses enforcement styles of regulatory inspectors, based on an examination of the municipal enforcement of agro-environmental policies in Denmark. Our findings make three contributions to the regulatory literature. One contribution is to add empirical support for theorizing about i...

  15. Reconsidering Styles of Regulatory Enforcement

    DEFF Research Database (Denmark)

    J. May, Peter; Winter, Søren

    2007-01-01

    This study addresses enforcement styles of regulatory inspectors based on an examination of the municipal enforcement of agro-environmental policies in Denmark. Our findings make three contributions to the regulatory literature. One contribution is to add empirical support for theorizing about in...

  16. Surveillance and Critical Theory

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2015-09-01

    Full Text Available In this comment, the author reflects on surveillance from a critical theory approach, his involvement in surveillance research and projects, and the status of the study of surveillance. The comment ascertains a lack of critical thinking about surveillance, questions the existence of something called “surveillance studies” as opposed to a critical theory of society, and reflects on issues such as Edward Snowden’s revelations, and Foucault and Marx in the context of surveillance.

  17. HSIP Law Enforcement Locations in New Mexico

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — Law Enforcement Locations Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law Enforcement agencies "are publicly...

  18. Effects of surveillance on the rule of law, due process and the presumption of innocence

    NARCIS (Netherlands)

    Galetta, Antonella; de Hert, Paul; Wright, D.; Kreissl, R.

    2015-01-01

    This contribution focuses on the impact of surveillance on the rule of law, due process and the presumption of innocence, key values and principles of a democratic order. It illustrates how they are implemented and enforced in contemporary surveillance societies, while referring to European law and

  19. Waste manifesting and tracking: compliance monitoring and enforcement

    Energy Technology Data Exchange (ETDEWEB)

    Bures, M.A. [M.A. Bures Consulting, Calgary, AB (Canada)

    1998-12-31

    An overview of Alberta`s new approach to compliance and enforcement activities for oilfield waste manifesting and tracking was presented. The Energy and Utilities Board`s (EUB`s) current compliance model includes a surveillance process which places a lot of emphasis on improving the performance of problem operators and high risk operators. It also includes an enforcement policy which outlines well defined expectations and escalating consequences. These `enforcement ladders` generally consist of at least four levels. Levels one and two are considered relatively minor offences, but levels three and higher are quite serious and the consequences of non-compliance far more expensive. The priority areas for surveillance and compliance monitoring of oilfield waste include: (1) waste receivers, (2) proper characterization of oilfield waste to ensure appropriate disposal, (3) the verification that oilfield waste is disposed at appropriate facilities, and (4) ensuring that dangerous oilfield wastes go to approved facilities. The new compliance model is an approved EUB policy and is gradually being implemented across the province. 6 refs., 1 fig.

  20. Enhanced Video Surveillance (EVS) with speckle imaging

    Energy Technology Data Exchange (ETDEWEB)

    Carrano, C J

    2004-01-13

    Enhanced Video Surveillance (EVS) with Speckle Imaging is a high-resolution imaging system that substantially improves resolution and contrast in images acquired over long distances. This technology will increase image resolution up to an order of magnitude or greater for video surveillance systems. The system's hardware components are all commercially available and consist of a telescope or large-aperture lens assembly, a high-performance digital camera, and a personal computer. The system's software, developed at LLNL, extends standard speckle-image-processing methods (used in the astronomical community) to solve the atmospheric blurring problem associated with imaging over medium to long distances (hundreds of meters to tens of kilometers) through horizontal or slant-path turbulence. This novel imaging technology will not only enhance national security but also will benefit law enforcement, security contractors, and any private or public entity that uses video surveillance to protect their assets.

  1. 76 FR 48919 - NRC Enforcement Policy

    Science.gov (United States)

    2011-08-09

    ... the Commission for its consideration for possible inclusion in the next Enforcement Policy revision... Enforcement before applying this lower risk significance concept for violations that occur during...

  2. Quota enforcement in resource industries

    DEFF Research Database (Denmark)

    Hansen, Lars Gårn; Jensen, Frank; Nøstbakken, Linda

    2014-01-01

    -compliance and exogenous constraints on fines and enforcement budget. We propose a new enforcement system based on self-reporting of excess extraction and explicit differentiation of inspection rates depending on compliance history. We use differentiated inspections to induce firms to self-report excess extraction....... This system increases the effectiveness of the quota by allowing the regulator to implement a wider range of aggregate extraction targets than under traditional enforcement, while ensuring an efficient allocation of extraction. In addition, inspection costs can be reduced without reductions in welfare....

  3. Practical automatic Arabic license plate recognition system

    Science.gov (United States)

    Mohammad, Khader; Agaian, Sos; Saleh, Hani

    2011-02-01

    Since 1970's, the need of an automatic license plate recognition system, sometimes referred as Automatic License Plate Recognition system, has been increasing. A license plate recognition system is an automatic system that is able to recognize a license plate number, extracted from image sensors. In specific, Automatic License Plate Recognition systems are being used in conjunction with various transportation systems in application areas such as law enforcement (e.g. speed limit enforcement) and commercial usages such as parking enforcement and automatic toll payment private and public entrances, border control, theft and vandalism control. Vehicle license plate recognition has been intensively studied in many countries. Due to the different types of license plates being used, the requirement of an automatic license plate recognition system is different for each country. [License plate detection using cluster run length smoothing algorithm ].Generally, an automatic license plate localization and recognition system is made up of three modules; license plate localization, character segmentation and optical character recognition modules. This paper presents an Arabic license plate recognition system that is insensitive to character size, font, shape and orientation with extremely high accuracy rate. The proposed system is based on a combination of enhancement, license plate localization, morphological processing, and feature vector extraction using the Haar transform. The performance of the system is fast due to classification of alphabet and numerals based on the license plate organization. Experimental results for license plates of two different Arab countries show an average of 99 % successful license plate localization and recognition in a total of more than 20 different images captured from a complex outdoor environment. The results run times takes less time compared to conventional and many states of art methods.

  4. Game animals & hunting : Law enforcement

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This is a summary of hunting activities, game mammal surveys, and law enforcement on Neal Smith National Wildlife Refuge between 1992 and 2009. For each year, a list...

  5. The surveillant assemblage.

    Science.gov (United States)

    Haggerty, K D; Ericson, R V

    2000-12-01

    George Orwell's 'Big Brother' and Michel Foucault's 'panopticon' have dominated discussion of contemporary developments in surveillance. While such metaphors draw our attention to important attributes of surveillance, they also miss some recent dynamics in its operation. The work of Gilles Deleuze and Felix Guattari is used to analyse the convergence of once discrete surveillance systems. The resultant 'surveillant assemblage' operates by abstracting human bodies from their territorial settings, and separating them into a series of discrete flows. These flows are then reassembled in different locations as discrete and virtual 'data doubles'. The surveillant assemblage transforms the purposes of surveillance and the hierarchies of surveillance, as well as the institution of privacy.

  6. Calibration and study of the measurement capabilities of real-time gamma spectrometry equipment, developed for the renewal of the network of automatic stations for environmental radiological surveillance of the Generalitat de Catalunya; Calibracion y estudio de las capacidades de medida de loes equipos de espectrometria gamma en tiempo real desarrollados para la renovacion de la Red de Estaciones Automaticas de vigencia radiologica ambiental de la generalitat de Catalunya

    Energy Technology Data Exchange (ETDEWEB)

    Casanovas, R.; Prieto, E.; Salvado, M.

    2013-07-01

    The renewal of the automatic environmental radiation surveillance network of the Gereralitat of Catalunya has been carried out through the development and implementation of gamma-spectrometry-based equipment. The monitors use scintillation cristals, either NaI(Tl) or LaBr{sub 3}(Ce) and currently, there are 3 types of equipment: water radioactivity monitors, aerosols on a particulate filter monitors and direct measurement monitors. In this paper, we expose the basic features of its operation, the details of their calibration and the minimum detectable activity concentrations for some isotopes.

  7. The approach adopted by police enforcement.

    NARCIS (Netherlands)

    Wittink, R.D.

    1997-01-01

    It is indicated how police enforcement can be effectively implemented. Police enforcement is linked to other measures in order to achieve safe behaviour. Police enforcement represents an important instrument in the stimulation of safe behaviour. Police enforcement has a bearing on how road users eva

  8. 29 CFR 42.6 - Enforcement strategy.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Enforcement strategy. 42.6 Section 42.6 Labor Office of the Secretary of Labor COORDINATED ENFORCEMENT § 42.6 Enforcement strategy. (a) Each Regional Farm Labor... enforcement strategy for each protective statute pursuant to § 42.20(c)(3). The National Committee...

  9. 78 FR 5838 - NRC Enforcement Policy

    Science.gov (United States)

    2013-01-28

    ... COMMISSION NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Policy revision; issuance... to its Enforcement Policy (Enforcement Policy or Policy) to incorporate changes directed by the... February 27, 2013, and will be considered by the NRC before the next Enforcement Policy revision....

  10. 76 FR 4369 - Special Law Enforcement Commissions

    Science.gov (United States)

    2011-01-25

    ... Bureau of Indian Affairs Special Law Enforcement Commissions AGENCY: Bureau of Indian Affairs, Interior... Enforcement Commission Policy, Rules and Procedures, the Interim Special Law Enforcement Commission Protocols... site. DATES: The Interim Special Law Enforcement Commission Policy, Rules and Procedures, the Interim...

  11. Automatic Reading

    Institute of Scientific and Technical Information of China (English)

    胡迪

    2007-01-01

    <正>Reading is the key to school success and,like any skill,it takes practice.A child learns to walk by practising until he no longer has to think about how to put one foot in front of the other.The great athlete practises until he can play quickly,accurately and without thinking.Ed- ucators call it automaticity.

  12. Crisis Management Using Multiple Camera Surveillance Systems

    OpenAIRE

    Rothkrantz , L.J.M.

    2013-01-01

    During recent disasters such as tsunami, flooding, hurricanes, nuclear disaster, earthquake people have to leave their living areas for their own safety. But it proves that some people are not informed about the evacuation, or are not willing or able to leave or don’t know how to leave the hazardous areas. The topic of the paper is how to adapt current video surveillance systems along highway and streets to semi-automatic surveillance systems. When a suspicious event is detected a human opera...

  13. Voting over law enforcement: Mission impossible

    OpenAIRE

    İnal , Hakan

    2015-01-01

    Median voter theorem has been used in many economic environments including law enforcement. Assumptions of the median voter theorem, however, are generally violated in lawenforcement models. Moreover, it is impossible to have agents with "opposite equilibrium preferences" over enforcement levels in law enforcement models. These limitations on the use of preferences over law enforcement raises questions about the robustness and validity of law enforcement models.

  14. Forest commons and local enforcement.

    Science.gov (United States)

    Chhatre, Ashwini; Agrawal, Arun

    2008-09-09

    This article examines the relationship between local enforcement and forests used as commons. It uses a unique multicountry dataset, created over the past 15 years by the International Forestry Resources and Institutions Research Program. Drawing on original enforcement and forest commons data from 9 countries, we find that higher levels of local enforcement have a strong and positive but complex relationship to the probability of forest regeneration. This relationship holds even when the influence of a number of other factors such as user group size, subsistence, and commercial importance of forests, size of forest, and collective action for forest improvement activities is taken into account. Although several of the above factors have a statistically significant relationship to changes in the condition of forest commons, differences in levels of local enforcement strongly moderate their link with forest commons outcomes. The research, using data from diverse political, social, and ecological contexts, shows both the importance of enforcement to forest commons and some of the limits of forest governance through commons arrangements.

  15. A comprehensive review on intelligent surveillance systems

    Directory of Open Access Journals (Sweden)

    Sutrisno Warsono Ibrahim

    2016-05-01

    Full Text Available Intelligent surveillance system (ISS has received growing attention due to the increasing demand on security and safety. ISS is able to automatically analyze image, video, audio or other type of surveillance data without or with limited human intervention. The recent developments in sensor devices, computer vision, and machine learning have an important role in enabling such intelligent system. This paper aims to provide general overview of intelligent surveillance system and discuss some possible sensor modalities and their fusion scenarios such as visible camera (CCTV, infrared camera, thermal camera and radar. This paper also discusses main processing steps in ISS: background-foreground segmentation, object detection and classification, tracking, and behavioral analysis.

  16. Evaluation of multivariate surveillance

    OpenAIRE

    Frisén,Marianne; Andersson, Eva; Schiöler, Linus

    2009-01-01

    Multivariate surveillance is of interest in many areas such as industrial production, bioterrorism detection, spatial surveillance, and financial transaction strategies. Some of the suggested approaches to multivariate surveillance have been multivariate counterparts to the univariate Shewhart, EWMA, and CUSUM methods. Our emphasis is on the special challenges of evaluating multivariate surveillance methods. Some new measures are suggested and the properties of several measures are demonstrat...

  17. Formalizing and Enforcing Purpose Restrictions

    Science.gov (United States)

    2012-05-09

    1991. [JSNS09] Mohammad Jafari, Reihaneh Safavi-Naini, and Nicholas Paul Sheppard . Enforcing purpose of use via workflows. In WPES ’09: Proceedings of...American Medical Informatics Association, October 2011. [ZH01] Rong Zhou and Eric A. Hansen. An improved grid-based approximation algorithm for POMDPs

  18. Distributed Controllers for Norm Enforcement

    NARCIS (Netherlands)

    Testerink, B.J.G.; Dastani, M.M.; Bulling, Nils

    2016-01-01

    This paper focuses on computational mechanisms that control the behavior of autonomous systems at runtime without necessarily restricting their autonomy. We build on existing approaches from runtime verification, control automata, and norm-based systems, and define norm-based controllers that enforc

  19. GEIS Surveillance Network Program

    Science.gov (United States)

    2013-10-01

    resistance surveillance, diarrhea etiology and antimicrobial resistance surveillance, sexually transmitted illness surveillance, and capacity building...vomiting, diarrhea , joint pains, general malaise. Of the samples analyzed, only 53.7% had an associated etiology: Malaria (47.0%, EBV (39.7...immunity to the disease. Many adults in those situations are reservoirs, facilitating continuing disease transmission to those without immunity. In Kenya

  20. SOA-surveillance Nederland

    NARCIS (Netherlands)

    Rijlaarsdam J; Bosman A; Laar MJW van de; CIE

    2000-01-01

    In May 1999 a working group was started to evaluate the current surveillance systems for sexually transmitted diseases (STD) and to make suggestions for a renewed effective and efficient STD surveillance system in the Netherlands. The surveillance system has to provide insight into the prevalence an

  1. SOA-surveillance Nederland

    NARCIS (Netherlands)

    Rijlaarsdam J; Bosman A; Laar MJW van de; CIE

    2000-01-01

    In May 1999 a working group was started to evaluate the current surveillance systems for sexually transmitted diseases (STD) and to make suggestions for a renewed effective and efficient STD surveillance system in the Netherlands. The surveillance system has to provide insight into the prevalence

  2. Law Enforcement Plan : Agassiz National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Agassiz Law Enforcement Plan clarifies Fish and Wildlife enforcement policies as they apply to Agassiz Refuge. It provides information about problems,...

  3. Chautauqua National Wildlife Refuge : Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Chautauqua National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  4. Law Enforcement Plan : Tamarac National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Tamarac NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  5. Law Enforcement Plan : Ottawa National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Ottawa NWR Complex Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about...

  6. Law Enforcement Plan: Horicon National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Horicon NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  7. Law Enforcement Plan: Sherburne National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Sherburne NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  8. Law Enforcement Plan : Necedah National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Necedah NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  9. 78 FR 69133 - Drug Enforcement Administration

    Science.gov (United States)

    2013-11-18

    ... Enforcement Administration Manufacturer of Controlled Substances; Notice of Registration; Lin Zhi... renewal to the Drug Enforcement Administration (DEA) to be registered as a bulk manufacturer of the... Administration. BILLING CODE 4410-09-P...

  10. Sensors for Desert Surveillance

    Directory of Open Access Journals (Sweden)

    B. S. Chauhan

    2005-10-01

    Full Text Available Various types of sensors-visible, passive night vision, infrared, synthetic aperture radar, etc can be used for desert surveillance. The surveillance capability of these sensors depends to a large extent, on various atmospheric effects, viz., absorption, scattering, aerosol, turbulence, and optical mirage. In this paper, effects of various atmospheric phenomena on the transmission of signals, merits and demerits of different means of surveillance under desert environmental conditions are discussed. Advanced surveillance techniques, ie, multisensor fusion, multi and hyperspectral imaging, having special significance for desert surveillance, have also been discussed.

  11. Intelligent nuclear material surveillance system for DUPIC facility

    Energy Technology Data Exchange (ETDEWEB)

    Song, D. Y.; Lee, S. Y.; Ha, J. H.; Go, W. I.; Kim, H. D. [KAERI, Taejon (Korea, Republic of)

    2003-07-01

    DUPIC Fuel Development Facility (DFDF) is the facility to fabricate CANDU-type fuel from spent PWR fuel material without any separation of fissile elements and fission products. Unattended continuous surveillance systems for safeguards of nuclear facility result in large amounts of image and radiation data, which require much time and effort to inspect. Therefore, it is necessary to develop system that automatically pinpoints and diagnoses the anomalies from data. In this regards, this paper presents a novel concept of the continuous surveillance system that integrates visual image and radiation data by the use of neural networks. This surveillance system is operating for safeguards of the DFDF in KAERI.

  12. Nuclear material surveillance system for DUPIC fuel development facility

    Energy Technology Data Exchange (ETDEWEB)

    Song, D. Y.; Lee, S. Y.; Ha, J. H.; Go, W. I.; Kim, H. D. [KAERI, Taejon (Korea, Republic of)

    2004-07-01

    Unattended continuous surveillance systems for safeguards of nuclear facility result in large amounts of image and radiation data, which require much time and effort to inspect. Therefore, it is necessary to develop system that automatically pinpoints and diagnoses the anomalies from data. In this regards, this paper presents a novel concept of the continuous surveillance system that integrates visual image and radiation data by the use of neural networks based on self-organized feature mapping. This surveillance system is stably operating for safeguards of the DUPIC (DFDF) in KAERI.

  13. 20 CFR 655.50 - Enforcement process.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Enforcement process. 655.50 Section 655.50... FOREIGN WORKERS IN THE UNITED STATES Labor Certification Process and Enforcement of Attestations for... Workers) § 655.50 Enforcement process. (a) Authority of the WHD Administrator. The WHD Administrator...

  14. 29 CFR 502.15 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR REGULATIONS ENFORCEMENT OF... AND NATIONALITY ACT (SUSPENDED 6-29-2009) Enforcement of Work Contracts § 502.15 Enforcement. The... work contract provisions as defined in § 501.10(a). The work contract also includes those...

  15. On avoidance activities in fishery enforcement models

    DEFF Research Database (Denmark)

    Jensen, Frank; Kronbak, Lone Grønbæk; Abildtrup, Jens

    2014-01-01

    Compliance and enforcement in fisheries are important issues from an economic point of view since management measures are useless without a certain level of enforcement. These conclusions come from the well-established theoretical literature on compliance and enforcement problems within fisheries...

  16. 16 CFR 1602.1 - Enforcement policy.

    Science.gov (United States)

    2010-01-01

    ... Enforcement Policy” published as a notice in the Federal Register of November 10, 1971 (36 FR 21544), as... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Enforcement policy. 1602.1 Section 1602.1... POLICY OR INTERPRETATION § 1602.1 Enforcement policy. (a) On May 14, 1973, the responsibilities of...

  17. Surveillance of influenza in Iceland during the 2009 pandemic.

    Science.gov (United States)

    Sigmundsdottir, G; Gudnason, T; Ólafsson, Ö; Baldvinsdottir, G E; Atladottir, A; Löve, A; Danon, L; Briem, H

    2010-12-09

    In a pandemic setting, surveillance is essential to monitor the spread of the disease and assess its impact. Appropriate mitigation and healthcare preparedness strategies depend on fast and accurate epidemic surveillance data. During the 2009 influenza A(H1N1) pandemic, rapid improvements in influenza surveillance were made in Iceland. Here, we describe the improvements made in influenza surveillance during the pandemic , which could also be of great value in outbreaks caused by other pathogens. Following the raised level of pandemic influenza alert in April 2009, influenza surveillance was intensified. A comprehensive automatic surveillance system for influenza-like illness was developed, surveillance of influenza-related deaths was established and laboratory surveillance for influenza was strengthened. School absenteeism reports were also collected and compared with results from the automatic surveillance system. The first case of 2009 pandemic influenza A(H1N1) was diagnosed in Iceland in May 2009, but sustained community transmission was not confirmed until mid-August. The pandemic virus circulated during the summer and early autumn before an abrupt increase in the number of cases was observed in October. There were large outbreaks in elementary schools for children aged 6–15 years throughout the country that peaked in late October. School absenteeism reports from all elementary schools in Iceland gave a similar epidemiological curve as that from data from the healthcare system. Estimates of the proportion of the population infected with the pandemic virus ranged from 10% to 22%. This study shows how the sudden need for improved surveillance in the pandemic led to rapid improvements in data collection in Iceland. This reporting system will be improved upon and expanded to include other notifiable diseases, to ensure accurate and timely collection of epidemiological data.

  18. Quality Assessment of Compressed Video for Automatic License Plate Recognition

    DEFF Research Database (Denmark)

    Ukhanova, Ann; Støttrup-Andersen, Jesper; Forchhammer, Søren;

    2014-01-01

    Definition of video quality requirements for video surveillance poses new questions in the area of quality assessment. This paper presents a quality assessment experiment for an automatic license plate recognition scenario. We explore the influence of the compression by H.264/AVC and H.265/HEVC...... recognition in our study has a behavior similar to human recognition, allowing the use of the same mathematical models. We furthermore propose an application of one of the models for video surveillance systems...

  19. Police enforcement and traffic safety.

    OpenAIRE

    Wesemann, P.

    1988-01-01

    Research has clearly shown that police-enforcement can improve road safety, and it can be questioned whether the police organisation is prepared and able to give priority to preventive control in stead of repression. Dutch police officers aim primarily at catching offenders, not deterring them. Further, many policymakers and citizens prefer other solutions for this type of problems. An opponent remark is presented by J. Dilling.

  20. Health environmental risks surveillance systems: toxicological surveillance

    OpenAIRE

    Ana Ferrer Dufol; Santiago Nogué Xarau; Francisco Vargas Marcos; Olivia Castillo Soria; Pilar Gascó Alberich; Ana de la Torre Reoyo; Eduardo de la Peña de Torres

    2004-01-01

    A study of the Clinical Toxicological Section, about the Epidemiological Surveillance in Emergency Services, in relation to chemical products intoxications during the 1999-2003 period, is presented. This work is a result of an agreement between the Spanish Toxicological Association (AETOX) and the Spanish Ministry of Health and Consumption, and was presented in the National Congress of Environment (CONAMA) within the “Health Environmental Risks Surveillance Systems” working group.

  1. CONSIDERATIONS REGARDING THE SUSPENSION OF THE ENFORCEMENT

    Directory of Open Access Journals (Sweden)

    Nicolae-Horia ŢIŢ

    2016-05-01

    Full Text Available The enforcement procedure is conducted from the time the enforcement body is seized by the enforcement officer, in order to comply with the provisions of the enforcement order, until the completion of the claim, with its accessoriesthereto, and the recovery of the costs of enforcement. The procedure involves a succession of acts, carried mostly by the enforcement officer. The continuity of the procedure may be affected by certain incidents leading to his timing. Among them, the situations ofenforcement suspension are generally determined by reference to their causes, respectively to the provisions of the law (in relation to specific acts or legal facts that occurred during the enforcement, the will of the creditor or the disposal of the court, at the request of the interested party. The analysis of the causes of suspension is important, in order to establish how they operate in concrete, as well for determining the effects that they produce.

  2. Reassembling Surveillance Creep

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    2017-01-01

    We live in societies in which surveillance technologies are constantly introduced, are transformed, and spread to new practices for new purposes. How and why does this happen? In other words, why does surveillance “creep”? This question has received little attention either in theoretical...... development or in empirical analyses. Accordingly, this article contributes to this special issue on the usefulness of Actor-Network Theory (ANT) by suggesting that ANT can advance our understanding of ‘surveillance creep’. Based on ANT’s model of translation and a historical study of the Danish DNA database......, we argue that surveillance creep involves reassembling the relations in surveillance networks between heterogeneous actors such as the watchers, the watched, laws, and technologies. Second, surveillance creeps only when these heterogeneous actors are adequately interested and aligned. However...

  3. Handbook of surveillance technologies

    CERN Document Server

    Petersen, JK

    2012-01-01

    From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry. The Handbook of Surveillance Technologies, Third Edition is the only comprehensive work to chronicle the background and current applications of the full-range of surveillance technologies--offering the latest in surveillance and privacy issues.Cutting-Edge--updates its bestselling predecessor with discussions on social media, GPS circuits in cell phones and PDAs, new GIS s

  4. Redefining syndromic surveillance.

    Science.gov (United States)

    Katz, Rebecca; May, Larissa; Baker, Julia; Test, Elisa

    2011-12-01

    With growing concerns about international spread of disease and expanding use of early disease detection surveillance methods, the field of syndromic surveillance has received increased attention over the last decade. The purpose of this article is to clarify the various meanings that have been assigned to the term syndromic surveillance and to propose a refined categorization of the characteristics of these systems. Existing literature and conference proceedings were examined on syndromic surveillance from 1998 to 2010, focusing on low- and middle-income settings. Based on the 36 unique definitions of syndromic surveillance found in the literature, five commonly accepted principles of syndromic surveillance systems were identified, as well as two fundamental categories: specific and non-specific disease detection. Ultimately, the proposed categorization of syndromic surveillance distinguishes between systems that focus on detecting defined syndromes or outcomes of interest and those that aim to uncover non-specific trends that suggest an outbreak may be occurring. By providing an accurate and comprehensive picture of this field's capabilities, and differentiating among system types, a unified understanding of the syndromic surveillance field can be developed, encouraging the adoption, investment in, and implementation of these systems in settings that need bolstered surveillance capacity, particularly low- and middle-income countries. Copyright © 2011 Ministry of Health, Saudi Arabia. Published by Elsevier Ltd. All rights reserved.

  5. Surveillance of antibiotic resistance

    National Research Council Canada - National Science Library

    Johnson, Alan P

    2015-01-01

    .... Surveillance of antibiotic resistance involves the collection of antibiotic susceptibility test results undertaken by microbiology laboratories on bacteria isolated from clinical samples sent for investigation...

  6. Automatic Age Estimation System for Face Images

    Directory of Open Access Journals (Sweden)

    Chin-Teng Lin

    2012-11-01

    Full Text Available Humans are the most important tracking objects in surveillance systems. However, human tracking is not enough to provide the required information for personalized recognition. In this paper, we present a novel and reliable framework for automatic age estimation based on computer vision. It exploits global face features based on the combination of Gabor wavelets and orthogonal locality preserving projections. In addition, the proposed system can extract face aging features automatically in real‐time. This means that the proposed system has more potential in applications compared to other semi‐automatic systems. The results obtained from this novel approach could provide clearer insight for operators in the field of age estimation to develop real‐world applications.

  7. How to Enforcement European Law

    DEFF Research Database (Denmark)

    Rasmussen, Morten

    2017-01-01

    of the European Commission and the ECJ to strengthen the enforcement of European law. This threatened the deeper balance of competences between the European Community and its member states and consequently led to a sharp response from the national parliaments and courts. The force of these responses and the deep...... crisis that had evolved in the late 1970s between France and the ECJ, led to a change in the EC’s case law that limited the direct effect of directives to the vertical relation between citizens and the respective member state and excluded any horizontal effect. The story is an example of how the activist...

  8. Surveillance and persuasion

    NARCIS (Netherlands)

    Nagenborg, Michael

    2014-01-01

    This paper is as much about surveillance as about persuasive technologies (PTs). With regard to PTs it raises the question about the ethical limits of persuasion. It will be argued that even some forms of self-imposed persuasive soft surveillance technologies may be considered unethical. Therefore,

  9. Soil and vegetation surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Antonio, E.J.

    1995-06-01

    Soil sampling and analysis evaluates long-term contamination trends and monitors environmental radionuclide inventories. This section of the 1994 Hanford Site Environmental Report summarizes the soil and vegetation surveillance programs which were conducted during 1994. Vegetation surveillance is conducted offsite to monitor atmospheric deposition of radioactive materials in areas not under cultivation and onsite at locations adjacent to potential sources of radioactivity.

  10. Environmental enforcement in the UK.

    Science.gov (United States)

    Stott, David

    2009-03-01

    In the UK, the Environment Agency is responsible for enforcement of environmental legislation and offences committed under such laws and regulations. Under the current regime, if deemed serious enough, offenders are taken to court. In the past eight years, there have been approximately 1600 cases (including approximately 800 prosecutions) per year with 61% being for illegal disposal of wastes and a further 26% being for water pollution incidents. The level of fine has been relatively small at around pound sterling 6700 per conviction for water offences and pound sterling 3700 for waste offences. This is possibly due to a lack of awareness of the damage caused in environmental offending by the courts. New legislation in the form of the Regulatory Enforcement and Sanctions Act 2008 is likely to change the way offences are assessed and treated by the Agency and a proportion of cases will be dealt with by the Agency itself, with appeals being handled by a Tribunal and only the most serious cases going to the criminal courts. The efficacy of this approach has yet to be tested in the UK but may speed up the process and lead to more appropriate sanctions being levied.

  11. Criminal Enforcement Case Report Data Dictionary | ECHO ...

    Science.gov (United States)

    ECHO, Enforcement and Compliance History Online, provides compliance and enforcement information for approximately 800,000 EPA-regulated facilities nationwide. ECHO includes permit, inspection, violation, enforcement action, and penalty information about facilities regulated under the Clean Air Act (CAA) Stationary Source Program, Clean Water Act (CWA) National Pollutant Elimination Discharge System (NPDES), and/or Resource Conservation and Recovery Act (RCRA). Information also is provided on surrounding demographics when available.

  12. Immigration Enforcement Actions: Fiscal Year 2004

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  13. Immigration Enforcement Actions: Fiscal Year 2009

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  14. Immigration Enforcement Actions: Fiscal Year 2006

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  15. EPA Enforcement and Compliance History Online

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Environmental Protection Agency's Enforcement and Compliance History Online (ECHO) website provides customizable and downloadable information about environmental...

  16. Immigration Enforcement Actions: Fiscal Year 2005

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  17. Immigration Enforcement Actions: Fiscal Year 2007

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  18. Immigration Enforcement Actions: Fiscal Year 2008

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  19. Immigration Enforcement Actions: Fiscal Year 2012

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  20. 2012 Sexually Transmitted Diseases Surveillance

    Science.gov (United States)

    ... National Summary Chlamydia Gonorrhea Syphilis Chancroid Selected STDs Appendix Appendix Interpreting STD Surveillance Data Appendix Tables A1 - A4 STD Surveillance Case Definitions Contributors ...

  1. Rope Climbing Robot with Surveillance Capability

    Directory of Open Access Journals (Sweden)

    Kanza Zafar

    2013-08-01

    Full Text Available In the past different engineers and researcher developed robots capable of climbing for various purposes. In this paper we have developed a robot capable of rope climbing in both horizontal and vertical direction. Furthermore, the robot has the ability to perform surveillance using a camera mounted on top of the robot. The quality of the transmitted video from the camera to the computer is clear and stable. Hence the developed robot is a good choice for surveillance purposes. In addition, it can be used to traverse floors of a building. It uses an IR sensor to sense strips attached at each floor. Once the strips are sensed, a dropping mechanism is activated in which a specific object is dropped to the targeted floor or location. The robot can work in automatic mode or manual through RF signals from an RF transmitter. Finally the robot is cost effective compared to many other developed robots for rope climbing.

  2. Challenge of emerging technologies: balancing the needs of law enforcement against the duty to protect individual rights

    Science.gov (United States)

    Lingerfelt, James A.

    1997-01-01

    This paper discusses three emerging technologies which will revolutionize the business operations of law enforcement: databases and search engines; biometric identification systems; and electronic surveillance and tracking devices. Unfortunately, these technologies may also lead to a serious ethical conflict for law enforcement. The tools will make it easier than ever to accomplish the core business of policing: crime prevention; investigation; and intelligence gathering. The same tools, used improperly, will also lead to routine intrusions on personal privacy. These technologies have been and are being developed for the private sector, the military and the intelligence community. The vendors are now aggressively marketing them to law enforcement and criminal justice agencies. The law enforcement community has embraced the technology, but without considering the long term impact. In the past, the police have abused wiretaps and other early surveillance technology. As a result, a sinister perception about police surveillance practices persists and a cumbersome bureaucracy has been imposed to control their use. Developing and establishing policies governing the use of emerging technologies can prevent these mistakes from being repeated. This paper recommends that criminal justice practitioners begin a discussion now, in advance of these technologies becoming commercially available, with a view to defining clear guidelines for their proper use.

  3. Distributed Enforcement of Service Choreographies

    Directory of Open Access Journals (Sweden)

    Marco Autili

    2015-02-01

    Full Text Available Modern service-oriented systems are often built by reusing, and composing together, existing services distributed over the Internet. Service choreography is a possible form of service composition whose goal is to specify the interactions among participant services from a global perspective. In this paper, we formalize a method for the distributed and automated enforcement of service choreographies, and prove its correctness with respect to the realization of the specified choreography. The formalized method is implemented as part of a model-based tool chain released to support the development of choreography-based systems within the EU CHOReOS project. We illustrate our method at work on a distributed social proximity network scenario.

  4. 45 CFR 150.203 - Circumstances requiring CMS enforcement.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Circumstances requiring CMS enforcement. 150.203... CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS CMS Enforcement Processes for... requiring CMS enforcement. CMS enforces HIPAA requirements to the extent warranted (as determined by CMS)...

  5. 12 CFR 370.11 - Enforcement mechanisms.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Enforcement mechanisms. 370.11 Section 370.11 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY TEMPORARY LIQUIDITY GUARANTEE PROGRAM § 370.11 Enforcement mechanisms. (a) Termination of Participation....

  6. Volunteer Flying Organizations: Law Enforcements Untapped Resource

    Science.gov (United States)

    2016-12-01

    volunteers took on many of the following duties to help enable CAP functions: clerical work , aircraft maintenance , refueling operations, first aid...Highway Patrol, Monterey County Aero Squadron, Lane County Sheriff’s Office, Civil Air Patrol, volunteer flying organizations, law enforcement...5 3. Civil Air Patrol’s Use in Law Enforcement .................................7 D. POTENTIAL EXPLANATIONS AND HYPOTHESES

  7. 31 CFR 103.56 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Enforcement. 103.56 Section 103.56 Money and Finance: Treasury Regulations Relating to Money and Finance FINANCIAL RECORDKEEPING AND REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS General Provisions § 103.56 Enforcement. (a)...

  8. Police enforcement of drinking driving laws.

    NARCIS (Netherlands)

    Verschuur, W.L.G. & Gundy, C.M.

    1986-01-01

    This survey of Dutch police officers was designed to investigate their opinions, expectations and experiences with the enforcement of drinking driving laws. Although many studies have been done on the subject of drinking driving, and police enforcement is a familiar measure against this problem, les

  9. 19 CFR 12.104i - Enforcement.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Enforcement. 12.104i Section 12.104i Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY SPECIAL CLASSES OF MERCHANDISE Cultural Property § 12.104i Enforcement. In the customs territory of...

  10. 18 CFR 1b.21 - Enforcement hotline.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Enforcement hotline. 1b..., DEPARTMENT OF ENERGY GENERAL RULES RULES RELATING TO INVESTIGATIONS § 1b.21 Enforcement hotline. (a) The Hotline Staff may provide information to the public and give informal staff opinions. The opinions...

  11. 16 CFR 312.9 - Enforcement.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Enforcement. 312.9 Section 312.9 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.9 Enforcement. Subject to sections 6503 and 6505 of the Children's Online...

  12. 33 CFR 109.15 - Enforcement proceedings.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Enforcement proceedings. 109.15... GENERAL § 109.15 Enforcement proceedings. Proceedings against a vessel violating the Anchorage Regulations... of the Port. When the vessel is at a port where there is no Coast Guard officer, proceedings will...

  13. 75 FR 69573 - Export Enforcement Coordination Center

    Science.gov (United States)

    2010-11-15

    ..., employees, or agents, or any other person. (Presidential Sig.) THE WHITE HOUSE, November 9, 2010. [FR Doc... Documents#0;#0; ] Executive Order 13558 of November 9, 2010 Export Enforcement Coordination Center By the... Homeland Security for administrative purposes, an interagency Federal Export Enforcement...

  14. Law Enforcement School Programs. Fact Sheet

    Science.gov (United States)

    Arkansas Safe Schools Initiative Division, 2010

    2010-01-01

    The school shooting incidents during the decade of the 1990's prompted an increase of law enforcement presence in schools. The School Violence Resource Center (SVRC) at the Criminal Justice Institute (CJI) University of Arkansas System undertook a project to determine what programs law enforcement agencies currently provide in their local schools…

  15. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    This document includes the US Nuclear Regulatory Commission`s (NRC`s or Commission`s) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC`s policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees` health and safety, the common defense and security, and the environment.

  16. Children's Mental Health Surveillance

    Science.gov (United States)

    Children’s Mental Health Surveillance What are childhood mental disorders? The term childhood mental disorder means all mental disorders that can ... is the impact of mental disorders in children? Mental health is important to overall health. Mental disorders are ...

  17. Between visibility and surveillance

    DEFF Research Database (Denmark)

    Uldam, Julie

    visible. It thus enables activists to monitor and expose corporate misconduct, but simultaneously renders them vulnerable to surveillance from corporations. In this presentation, I examine these practices and discuss their implications for political participation by drawing on examples of companies...

  18. Autonomous surveillance for biosecurity.

    Science.gov (United States)

    Jurdak, Raja; Elfes, Alberto; Kusy, Branislav; Tews, Ashley; Hu, Wen; Hernandez, Emili; Kottege, Navinda; Sikka, Pavan

    2015-04-01

    The global movement of people and goods has increased the risk of biosecurity threats and their potential to incur large economic, social, and environmental costs. Conventional manual biosecurity surveillance methods are limited by their scalability in space and time. This article focuses on autonomous surveillance systems, comprising sensor networks, robots, and intelligent algorithms, and their applicability to biosecurity threats. We discuss the spatial and temporal attributes of autonomous surveillance technologies and map them to three broad categories of biosecurity threat: (i) vector-borne diseases; (ii) plant pests; and (iii) aquatic pests. Our discussion reveals a broad range of opportunities to serve biosecurity needs through autonomous surveillance. Crown Copyright © 2015. Published by Elsevier Ltd. All rights reserved.

  19. 522 Postmarket Surveillance Studies

    Data.gov (United States)

    U.S. Department of Health & Human Services — The 522 Postmarket Surveillance Studies Program encompasses design, tracking, oversight, and review responsibilities for studies mandated under section 522 of the...

  20. 522 Postmarket Surveillance Studies

    Data.gov (United States)

    U.S. Department of Health & Human Services — The 522 Postmarket Surveillance Studies Program encompasses design, tracking, oversight, and review responsibilities for studies mandated under section 522 of the...

  1. Low-cost inflatable lighter-than-air surveillance system for civilian applications

    Science.gov (United States)

    Kiddy, Jason S.; Chen, Peter C.; Niemczuk, John B.

    2002-08-01

    Today's society places an extremely high price on the value of human life and injury. Whenever possible, police and paramilitary actions are always directed towards saving as many lives as possible, whether it is the officer, perpetrator, or innocent civilians. Recently, the advent of robotic systems has enable law enforcement agencies to perform many of the most dangerous aspects of their jobs from relative safety. This is especially true to bomb disposal units but it is also gaining acceptance in other areas. An area where small, remotely operated machines may prove effective is in local aerial surveillance. Currently, the only aerial surveillance assets generally available to law enforcement agencies are costly helicopters. Unfortunately, most of the recently developed unmanned air vehicles (UAVs) are directed towards military applications and have limited civilian use. Systems Planning and Analysis, Inc. (SPA) has conceived and performed a preliminary analysis of a low-cost, inflatable, lighter- than-air surveillance system that may be used in a number of military and law enforcement surveillance situations. The preliminary analysis includes the concept definition, a detailed trade study to determine the optimal configuration of the surveillance system, high-pressure inflation tests, and a control analysis. This paper will provide the details in these areas of the design and provide an insight into the feasibility of such a system.

  2. A conceptual Model for Highway Speed Monitoring and Enforcement in Zimbabwe

    Directory of Open Access Journals (Sweden)

    Furusa Samuel Simbarashe

    2016-10-01

    Full Text Available Many African countries lack resources and sophisticated technology needed to monitor and enforce traffic speed regulations in highway. These countries rely on highway patrolling which is a manual technique used to oversee and enforce the traffic safety compliance on the roads. The technique seems to be woeful and inadequate, since police officers can be bribed and the equipment they use does not provide enough evidence to empower independent auditors to quiz why certain offenders were not ticketed. Because of the need to have an up-to-date technology to monitor and enforce highway speed regulation, the purpose of this study was to suggest for the adoption of a conceptual model for highway speed monitoring and enforcement that incorporates Automatic Number Plate Recognition (ANPR, GSM and back-end integration. Using various models in traffic monitoring and regulation, a conceptual model was designed in order to reduce corruption and speed related accidents in Zimbabwe. The proposed model is expected to improve highway speed monitoring and enforcement in Zimbabwe and other countries that are still lagging in this regard.

  3. Patterns of Alcohol Policy Enforcement Activities among Local Law Enforcement Agencies: A Latent Class Analysis.

    Science.gov (United States)

    Erickson, Darin J; Rutledge, Patricia C; Lenk, Kathleen M; Nelson, Toben F; Jones-Webb, Rhonda; Toomey, Traci L

    We assessed levels and patterns of alcohol policy enforcement activities among U.S. local law enforcement agencies. We conducted a cross-sectional survey of a representative sample of 1,631 local law enforcement agencies across the 50 states. We assessed 29 alcohol policy enforcement activities within each of five enforcement domains-underage alcohol possession/consumption, underage alcohol provision, underage alcohol sales, impaired driving, and overservice of alcohol-and conducted a series of latent class analyses to identify unique classes or patterns of enforcement activity for each domain. We identified three to four unique enforcement activity classes for each of the enforcement domains. In four of the domains, we identified a Uniformly Low class (i.e., little or no enforcement) and a Uniformly High enforcement activity class (i.e., relatively high levels of enforcement), with one or two middle classes where some but not all activities were conducted. The underage provision domain had a Uniformly Low class but not a Uniformly High class. The Uniformly Low class was the most prevalent class in three domains: underage provision (58%), underage sales (61%), and overservice (79%). In contrast, less than a quarter of agencies were in Uniformly High classes. We identified qualitatively distinct patterns of enforcement activity, with a large proportion of agencies in classes characterized by little or no enforcement and fewer agencies in high enforcement classes. An important next step is to determine if these patterns are associated with rates of alcohol use and alcohol-related injury and mortality.

  4. Low-cost active optical system for fire surveillance

    Science.gov (United States)

    Utkin, A. B.; Lavrov, A. V.; Vilar, R. M.

    2009-06-01

    Detection of smoke plumes using active optical sensors provides many advantages with respect to passive methods of fire surveillance. However, the price of these sensors is often too high as compared to passive fire detection instruments, such as infrared and video cameras. This article describes robust and cost effective diode-laser optical sensor for automatic fire surveillance in industrial environment. Physical aspects of the sensing process allowing to simplify the hardware and software design, eventually leading to significant reduction of manufacturing and maintenance costs, are discussed.

  5. Recent Trends in Antitrust Enforcement

    Directory of Open Access Journals (Sweden)

    Mario Siragusa

    2015-10-01

    Full Text Available This article intends to discuss a selection of the most relevant features of the most recent trends in antitrust enforcement. Firstly, anticompetitive signalling will be addressed: its assessment depends on the kind of information provided. Where such information is of public knowledge or is very well known by the market participants, signalling should not be deemed as anticompetitive. Secondly, the Power Cable case has raised for the first time various problematic issues, such as the possibility to impose parental liability on a purely financial investor, even where the presumed direct infringer would have been able to pay the fine. This appears to be irreconcilable with the objectives for which the case law on parental liability has been elaborated. Thirdly, as to the concept of restriction of competition by object, it is argued that the Intel case does not disavow the principles established in Cartes Bancaires. Indeed, the finding of a violation and the different methodology applied in the first case are only due to its specific factual circumstances. Finally, the nouvelle vague of the case law on the anticompetitive abuse of rights has led to two opposite approaches, one at the EU and the other at the Italian level. The first one, based on the finding of objective circumstances, is perfectly consistent with existing EU case law, while the second, exclusively focused on the exclusionary intent, seems to be in sharp contrast with it. The hope is that the Court of Justice will intervene to resolve this contradiction.

  6. Effective enforcement in a conservation area.

    Science.gov (United States)

    Hilborn, Ray; Arcese, Peter; Borner, Markus; Hando, Justin; Hopcraft, Grant; Loibooki, Martin; Mduma, Simon; Sinclair, Anthony R E

    2006-11-24

    Wildlife within protected areas is under increasing threat from bushmeat and illegal trophy trades, and many argue that enforcement within protected areas is not sufficient to protect wildlife. We examined 50 years of records from Serengeti National Park in Tanzania and calculated the history of illegal harvest and enforcement by park authorities. We show that a precipitous decline in enforcement in 1977 resulted in a large increase in poaching and decline of many species. Conversely, expanded budgets and antipoaching patrols since the mid-1980s have greatly reduced poaching and allowed populations of buffalo, elephants, and rhinoceros to rebuild.

  7. Surveillance Metrics Sensitivity Study

    Energy Technology Data Exchange (ETDEWEB)

    Bierbaum, R; Hamada, M; Robertson, A

    2011-11-01

    In September of 2009, a Tri-Lab team was formed to develop a set of metrics relating to the NNSA nuclear weapon surveillance program. The purpose of the metrics was to develop a more quantitative and/or qualitative metric(s) describing the results of realized or non-realized surveillance activities on our confidence in reporting reliability and assessing the stockpile. As a part of this effort, a statistical sub-team investigated various techniques and developed a complementary set of statistical metrics that could serve as a foundation for characterizing aspects of meeting the surveillance program objectives. The metrics are a combination of tolerance limit calculations and power calculations, intending to answer level-of-confidence type questions with respect to the ability to detect certain undesirable behaviors (catastrophic defects, margin insufficiency defects, and deviations from a model). Note that the metrics are not intended to gauge product performance but instead the adequacy of surveillance. This report gives a short description of four metrics types that were explored and the results of a sensitivity study conducted to investigate their behavior for various inputs. The results of the sensitivity study can be used to set the risk parameters that specify the level of stockpile problem that the surveillance program should be addressing.

  8. Security Event Recognition for Visual Surveillance

    Science.gov (United States)

    Liao, W.; Yang, C.; Yang, M. Ying; Rosenhahn, B.

    2017-05-01

    With rapidly increasing deployment of surveillance cameras, the reliable methods for automatically analyzing the surveillance video and recognizing special events are demanded by different practical applications. This paper proposes a novel effective framework for security event analysis in surveillance videos. First, convolutional neural network (CNN) framework is used to detect objects of interest in the given videos. Second, the owners of the objects are recognized and monitored in real-time as well. If anyone moves any object, this person will be verified whether he/she is its owner. If not, this event will be further analyzed and distinguished between two different scenes: moving the object away or stealing it. To validate the proposed approach, a new video dataset consisting of various scenarios is constructed for more complex tasks. For comparison purpose, the experiments are also carried out on the benchmark databases related to the task on abandoned luggage detection. The experimental results show that the proposed approach outperforms the state-of-the-art methods and effective in recognizing complex security events.

  9. The changing public policy and automatic termination of fixed-term employment contracts in South Africa

    Directory of Open Access Journals (Sweden)

    Judith Geldenhuys

    2017-06-01

    Full Text Available Automatic termination is an accepted means of terminating fixed-term employment relationships. The use of "automatic termination" clauses in employment contracts has become commonplace. Awareness of the potential for abuse of these contractual mechanisms is increasing. Recent case law on the issue indicates that the public policy, which serves as test for validity and/or enforceability of "automatic termination" clauses has changed. The impetus for the protection of "non-standard" or atypical employees is underscored by policy considerations that have been incorporated by the recent legislative amendments. These developments may very well place a heavier burden than before on employers who opt to rely on "automatic termination" clauses to sustain an argument in favour or their validity and/ or enforcement.

  10. Refuge Law Enforcement : Memorandum of Understanding

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This agreement, a reciprocal law enforcement and assistance agreement, is made between the U.S. Fish and Wildlife Service and the County Sheriff's Department. The...

  11. DNR Division of Enforcement Officer Patrol Areas

    Data.gov (United States)

    Minnesota Department of Natural Resources — This theme shows the DNR Division of Enforcement Office Patrol Areas as of January 1, 2003. Patrol areas were defined and verified by Patrol Officers during the fall...

  12. Humanizing Law Enforcement: A New Paradigm.

    Science.gov (United States)

    Woolpert, Stephen

    1980-01-01

    Discusses the recent literature on the humanization of law enforcement policy. Crisis intervention training programs, human relations training for police recruits, neighborhood team policing, and organization development approaches to management exemplify the humanistic perspective on police policy. (Author)

  13. Child Support Enforcement and Welfare Caseloads

    Science.gov (United States)

    Chein-Chung Huang; Garfinkel, Irwin; Waldfogel, Jane

    2004-01-01

    Annual state panel data from 1980 to 1999 was examined to understand the effects of child support enforcement (CSE). However, in recent years, it has been found that the CSE among current and former welfare families are dramatically improved.

  14. Enforcement and Compliance History Online (ECHO) Facilities

    Data.gov (United States)

    U.S. Environmental Protection Agency — ECHO provides integrated compliance and enforcement information for about 800,000 regulated facilities nationwide. Its features range from simple to advanced,...

  15. Law Enforcement : St. Vincent National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The purpose of the Law Enforcement Management Plan is to provide a ready reference to Service, Regional, and Station policies, procedures, and programs concerning...

  16. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  17. Automatic Fiscal Stabilizers

    Directory of Open Access Journals (Sweden)

    Narcis Eduard Mitu

    2013-11-01

    Full Text Available Policies or institutions (built into an economic system that automatically tend to dampen economic cycle fluctuations in income, employment, etc., without direct government intervention. For example, in boom times, progressive income tax automatically reduces money supply as incomes and spendings rise. Similarly, in recessionary times, payment of unemployment benefits injects more money in the system and stimulates demand. Also called automatic stabilizers or built-in stabilizers.

  18. Automatic differentiation bibliography

    Energy Technology Data Exchange (ETDEWEB)

    Corliss, G.F. (comp.)

    1992-07-01

    This is a bibliography of work related to automatic differentiation. Automatic differentiation is a technique for the fast, accurate propagation of derivative values using the chain rule. It is neither symbolic nor numeric. Automatic differentiation is a fundamental tool for scientific computation, with applications in optimization, nonlinear equations, nonlinear least squares approximation, stiff ordinary differential equation, partial differential equations, continuation methods, and sensitivity analysis. This report is an updated version of the bibliography which originally appeared in Automatic Differentiation of Algorithms: Theory, Implementation, and Application.

  19. Strengthened enforcement enhances marine sanctuary performance

    Directory of Open Access Journals (Sweden)

    Brendan P. Kelaher

    2015-01-01

    Full Text Available Marine sanctuaries are areas where the extraction of biota is not permitted. Although most marine sanctuaries have a positive influence on biotic communities, not all sanctuaries are meeting their conservation objectives. Amidst possible explanations (e.g., size, age and isolation, insufficient enforcement is often speculated to be a key driver of marine sanctuary underperformance. Despite this, there are few studies directly linking quantitative enforcement data to changes in biotic communities within marine sanctuaries. Here, we used an asymmetrical-BACI experimental design from 2006–2012 to test whether new enforcement initiatives enhanced abundances of target fishes and threatened species in an existing large sub-tropical marine sanctuary relative to areas open to fishing. Implementation of the new enforcement initiatives in 2010 was associated with a 201% increase in annual fine rate and a significant increase in target fish and elasmobranch abundance, as well as sightings of a critically-endangered shark, in the marine sanctuary relative to areas open to fishing. Overall, these results demonstrate that strengthening enforcement can have a rapid positive influence on target fish and perhaps threatened species in a subtropical marine sanctuary. From this, we contend that increased enforcement guided by risk-based compliance planning and operations may be a useful first step for improving underperforming marine sanctuaries.

  20. Organizational safety climate and supervisor safety enforcement: Multilevel explorations of the causes of accident underreporting.

    Science.gov (United States)

    Probst, Tahira M

    2015-11-01

    According to national surveillance statistics, over 3 million employees are injured each year; yet, research indicates that these may be substantial underestimates of the true prevalence. The purpose of the current project was to empirically test the hypothesis that organizational safety climate and transactional supervisor safety leadership would predict the extent to which accidents go unreported by employees. Using hierarchical linear modeling and survey data collected from 1,238 employees in 33 organizations, employee-level supervisor safety enforcement behaviors (and to a less consistent extent, organizational-level safety climate) predicted employee accident underreporting. There was also a significant cross-level interaction, such that the effect of supervisor enforcement on underreporting was attenuated in organizations with a positive safety climate. These results may benefit human resources and safety professionals by pinpointing methods of increasing the accuracy of accident reporting, reducing actual safety incidents, and reducing the costs to individuals and organizations that result from underreporting.

  1. Towards Generic Detection of Unusual Events in Video Surveillance

    OpenAIRE

    Ivanov, Ivan; Dufaux, Frederic; Ha, Thien M.; Ebrahimi, Touradj

    2009-01-01

    In this paper, we consider the challenging problem of unusual event detection in video surveillance systems. The proposed approach makes a step toward generic and automatic detection of unusual events in terms of velocity and acceleration. At first, the moving objects in the scene are detected and tracked. A better representation of moving objects trajectories is then achieved by means of appropriate pre-processing techniques. A supervised Support Vector Machine method is then used to train t...

  2. The plays and arts of surveillance: studying surveillance as entertainment

    NARCIS (Netherlands)

    Albrechtslund, Anders; Dubbeld, L.

    2006-01-01

    This paper suggests a direction in the development of Surveillance Studies that goes beyond current attention for the caring, productive and enabling aspects of surveillance practices. That is, surveillance could be considered not just as positively protective, but even as a comical, playful,

  3. Air Traffic Control Capabilities: Opportunity to Utilize Automated Dependent Surveillance-Broadcast (ADS-B) Equipment on Aircraft for Military Air Traffic Control and Command and Control in Combat and Humanitarian Operations

    Science.gov (United States)

    2011-01-21

    1 Emma, Australian in World First For Nationwide ADS-B Coverage, 1. 2 Babbitt , Automatic Dependent...Operational Use of ADS-B, 1. 10 Babbitt , Automatic Dependent Surveillance-Broadcast, 54. 11 HQ FAA/ATO, ADS-B Frequently Asked Questions, 1. 12...HQ FAA/ATO, Surveillance and Broadcast Services, 1. 13 NATO NATMC CNS Group, Draft NATO Position on ADS-B, 1-2. 14 Babbitt , Automatic Dependent

  4. 49 CFR 1542.217 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1542.217 Section 1542... Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used... section must— (1) Meet the training standard for law enforcement officers prescribed by either the State...

  5. 46 CFR 4.03-55 - Law enforcement officer.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Law enforcement officer. 4.03-55 Section 4.03-55... AND INVESTIGATIONS Definitions § 4.03-55 Law enforcement officer. Law enforcement officer means a Coast Guard commissioned, warrant or petty officer; or any other law enforcement officer authorized to...

  6. 43 CFR 422.3 - Reclamation law enforcement policy.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Reclamation law enforcement policy. 422.3..., DEPARTMENT OF THE INTERIOR LAW ENFORCEMENT AUTHORITY AT BUREAU OF RECLAMATION PROJECTS § 422.3 Reclamation law enforcement policy. The law enforcement policy of Reclamation is: (a) To maintain an accountable...

  7. 33 CFR 88.11 - Law enforcement vessels.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Law enforcement vessels. 88.11... NAVIGATION RULES ANNEX V: PILOT RULES § 88.11 Law enforcement vessels. (a) Law enforcement vessels may display a flashing blue light when engaged in direct law enforcement or public safety activities. This...

  8. 36 CFR 1270.50 - Consultation with law enforcement agencies.

    Science.gov (United States)

    2010-07-01

    ... Enforcement Purposes § 1270.50 Consultation with law enforcement agencies. (a) For the processing of Presidential records compiled for law enforcement purposes that may be subject to 5 U.S.C. 552(b)(7), the... for law enforcement purposes and may be subject to the exemption provided by 5 U.S.C. 552(b)(7) for...

  9. 25 CFR 11.909 - Law enforcement records.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Law enforcement records. 11.909 Section 11.909 Indians... ORDER CODE Children's Court § 11.909 Law enforcement records. (a) Law enforcement records and files concerning a minor shall be kept separate from the records and files of adults. (b) All law enforcement...

  10. 29 CFR 553.211 - Law enforcement activities.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Law enforcement activities. 553.211 Section 553.211 Labor... Enforcement Employees of Public Agencies Exemption Requirements § 553.211 Law enforcement activities. (a) As used in sections 7(k) and 13(b)(20) of the Act, the term “any employee . . . in law enforcement...

  11. 7 CFR 501.14 - Non-Federal law enforcement.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Non-Federal law enforcement. 501.14 Section 501.14...-Federal law enforcement. Research Center special policemen may be deputized by State or local law... State or local law enforcement agency, the facilities or services of such State or local law enforcement...

  12. Will smart surveillance systems listen, understand and speak Slovene?

    Directory of Open Access Journals (Sweden)

    Simon Dobrišek

    2013-12-01

    Full Text Available The paper deals with the spoken language technologies that could enable the so-called smart (intelligent surveillance systems to listen, understand and speak Slovenian in the near future. Advanced computational methods of artificial perception and pattern recognition enable such systems to be at least to some extent aware of the environment, the presence of people and other phenomena that could be subject to surveillance. Speech is one such phenomenon that has the potential to be a key source of information in certain security situations. Technologies that enable automatic speech and speaker recognition as well as their psychophysical state by computer analysis of acoustic speech signals provide an entirely new dimension to the development of smart surveillance systems. Automatic recognition of spoken threats, screaming and crying for help, as well as a suspicious psycho-physical state of a speaker provide such systems to some extent with intelligent behaviour. The paper investigates the current state of development of these technologies and the requirements and possibilities of these systems to be used for the Slovenian spoken language, as well as different possible security application scenarios. It also addresses the broader legal and ethical issues raised by the development and use of such technologies, especially as audio surveillance is one of the most sensitive issues of privacy protection.

  13. Diagnostics and surveillance methods

    Science.gov (United States)

    Detection and diagnosis of influenza A virus (IAV) infection in animals requires a laboratory test since disease from IAV presents no pathognomonic signs. Diagnosis and surveillance of animal influenza focuses on the detection of virus or type specific antibodies. Whether one targets the virus or ...

  14. Active surveillance: Oncologic outcome

    NARCIS (Netherlands)

    L.D.F. Venderbos (Lionne); L.P. Bokhorst (Leonard); C.H. Bangma (Chris); M.J. Roobol-Bouts (Monique)

    2013-01-01

    textabstractPURPOSE OF REVIEW: To give insight into recent literature (during the past 12-18 months) reporting on oncologic outcomes of men on active surveillance. RECENT FINDINGS: From recent published trials comparing radical prostatectomy vs. watchful waiting, we learn that radical treatment only

  15. Pregnancy nutrition surveillance system.

    Science.gov (United States)

    2003-01-01

    The Pregnancy Nutrition Surveillance System is a useful tool in monitoring Healthy People 2010 objectives and is intended to provide a framework for analyzing data on the nutritional status and behavioral risk factors of pregnant women and the association to birth outcome. The data are useful to health professionals in providing prenatal care and developing programs to reduce pregnancy-related health risks.

  16. Mediation and Automatization.

    Science.gov (United States)

    Hutchins, Edwin

    This paper discusses the relationship between the mediation of task performance by some structure that is not inherent in the task domain itself and the phenomenon of automatization, in which skilled performance becomes effortless or phenomenologically "automatic" after extensive practice. The use of a common simple explicit mediating…

  17. Automatic Differentiation Package

    Energy Technology Data Exchange (ETDEWEB)

    2007-03-01

    Sacado is an automatic differentiation package for C++ codes using operator overloading and C++ templating. Sacado provide forward, reverse, and Taylor polynomial automatic differentiation classes and utilities for incorporating these classes into C++ codes. Users can compute derivatives of computations arising in engineering and scientific applications, including nonlinear equation solving, time integration, sensitivity analysis, stability analysis, optimization and uncertainity quantification.

  18. Digital automatic gain control

    Science.gov (United States)

    Uzdy, Z.

    1980-01-01

    Performance analysis, used to evaluated fitness of several circuits to digital automatic gain control (AGC), indicates that digital integrator employing coherent amplitude detector (CAD) is best device suited for application. Circuit reduces gain error to half that of conventional analog AGC while making it possible to automatically modify response of receiver to match incoming signal conditions.

  19. Focusing Automatic Code Inspections

    NARCIS (Netherlands)

    Boogerd, C.J.

    2010-01-01

    Automatic Code Inspection tools help developers in early detection of defects in software. A well-known drawback of many automatic inspection approaches is that they yield too many warnings and require a clearer focus. In this thesis, we provide such focus by proposing two methods to prioritize

  20. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L.E.

    1996-02-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest National Laboratory (PNNL) for the US Department of Energy (DOE). This document contains the planned 1996 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP), Drinking Water Project, and Ground-Water Surveillance Project.

  1. Quality Assessment of Compressed Video for Automatic License Plate Recognition

    DEFF Research Database (Denmark)

    Ukhanova, Ann; Støttrup-Andersen, Jesper; Forchhammer, Søren

    2014-01-01

    Definition of video quality requirements for video surveillance poses new questions in the area of quality assessment. This paper presents a quality assessment experiment for an automatic license plate recognition scenario. We explore the influence of the compression by H.264/AVC and H.265/HEVC...... standards on the recognition performance. We compare logarithmic and logistic functions for quality modeling. Our results show that a logistic function can better describe the dependence of recognition performance on the quality for both compression standards. We observe that automatic license plate...

  2. Evaluation of ADS-B Surveillance Data to Identify Flight Operations with Reduced Safety Margin in the National Airspace System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — As part of the FAA's plans for modernization of the Air Traffic Control (ATC) system, Automatic Dependent Surveillance - Broadcast (ADS-B) will be the basis of the...

  3. Enforcement Matters : Enforcement and Compliance of European Directives in Four Member States

    NARCIS (Netherlands)

    Versluis, E.

    2003-01-01

    The dissertation 'Enforcement Matters' is a comparative analysis of the transposition and enforcement of, and compliance with, two directives regulating dangerous chemical substances (the Seveso II and Safety Data Sheets directives) in four member states (the Netherlands, Germany, United Kingdom and

  4. Human Trafficking in Indonesia: Law Enforcement Problems

    Directory of Open Access Journals (Sweden)

    Nathalina Naibaho

    2011-01-01

    Full Text Available Human trafficking is considered as a crime against humanity. To conduct the due process of law towards cases related with human trafficking, the law enforcement officers cannot work by themselves. They really need assistance from many parties – such as active report from the society – as a valuable information to disclose such cases. Law enforcement conducted towards woman and child trafficking is still ineffective. It is proven by many existing cases, that low number of processed cases before the court and minimum sanction convicted to the perpetrators is clearly evident. Factors which are deemed to have correlation with low attempt of law enforcement towards legal case on this case, among others are: Lack of the Government’s commitment to fight against the crime of human trafficking, in the event that the ineffectiveness in utilization of prevailing laws and regulation; Lack of capacity of professionalism of law enforcement agency (and relevant parties in handling women and child trafficking at the field. This may be caused by lack of knowledge on infringed regulation. For that matter, those law enforcement agency shall be given socialization and an SOP (standardized operational procedure, so that there will be no inconsistency in handling the existing cases.

  5. Psychiatric Disability in Law Enforcement Officers.

    Science.gov (United States)

    Price, Marilyn

    2017-03-01

    Law enforcement officers all across the world are exposed to violence, confrontation, and traumatic incidents. They regularly witness death and suffering and are at risk of personal injury. Psychiatric sequelae include an increased risk for trauma-related symptoms, depression, alcohol-use disorders, and stress-related medical conditions. Law enforcement officers have been applying for early disability retirement pensions at an increased rate for stress-related psychiatric and medical conditions. As a result, law enforcement agencies are prematurely losing valuable resources, officers with training and experience. Departments have become proactive in trying to address mental health issues to prevent psychiatric disability by implementing employee wellness plans and stress reduction interventions. Programs have been developed to mitigate the effects of stress on law enforcement personnel. Many law enforcement agencies have developed strategies to encourage early confidential referral for psychiatric treatment. They utilize peer support groups and employee assistance programs and develop alliances with mental health professionals. When these approaches fail, a fitness for duty process can be used to identify impairment in work functioning due to psychiatric factors with the prospect of later returning the officer to full duty. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  6. Hunting, law enforcement, and African primate conservation.

    Science.gov (United States)

    N'Goran, Paul K; Boesch, Christophe; Mundry, Roger; N'Goran, Eliezer K; Herbinger, Ilka; Yapi, Fabrice A; Kühl, Hjalmar S

    2012-06-01

    Primates are regularly hunted for bushmeat in tropical forests, and systematic ecological monitoring can help determine the effect hunting has on these and other hunted species. Monitoring can also be used to inform law enforcement and managers of where hunting is concentrated. We evaluated the effects of law enforcement informed by monitoring data on density and spatial distribution of 8 monkey species in Taï National Park, Côte d'Ivoire. We conducted intensive surveys of monkeys and looked for signs of human activity throughout the park. We also gathered information on the activities of law-enforcement personnel related to hunting and evaluated the relative effects of hunting, forest cover and proximity to rivers, and conservation effort on primate distribution and density. The effects of hunting on monkeys varied among species. Red colobus monkeys (Procolobus badius) were most affected and Campbell's monkeys (Cercopithecus campbelli) were least affected by hunting. Density of monkeys irrespective of species was up to 100 times higher near a research station and tourism site in the southwestern section of the park, where there is little hunting, than in the southeastern part of the park. The results of our monitoring guided law-enforcement patrols toward zones with the most hunting activity. Such systematic coordination of ecological monitoring and law enforcement may be applicable at other sites. ©2012 Society for Conservation Biology.

  7. Profiling School Shooters: Automatic Text-Based Analysis

    Directory of Open Access Journals (Sweden)

    Yair eNeuman

    2015-06-01

    Full Text Available School shooters present a challenge to both forensic psychiatry and law enforcement agencies. The relatively small number of school shooters, their various charateristics, and the lack of in-depth analysis of all of the shooters prior to the shooting add complexity to our understanding of this problem. In this short paper, we introduce a new methodology for automatically profiling school shooters. The methodology involves automatic analysis of texts and the production of several measures relevant for the identification of the shooters. Comparing texts written by six school shooters to 6056 texts written by a comparison group of male subjects, we found that the shooters' texts scored significantly higher on the Narcissistic Personality dimension as well as on the Humilated and Revengeful dimensions. Using a ranking/priorization procedure, similar to the one used for the automatic identification of sexual predators, we provide support for the validity and relevance of the proposed methodology.

  8. Postmarketing surveillance for drug abuse.

    Science.gov (United States)

    Arfken, Cynthia L; Cicero, Theodore J

    2003-06-05

    Assessing actual abuse of prescribed medications requires postmarketing surveillance. In this article we discuss general systems of postmarketing surveillance that exist as of the end of 2002 in the United States and two medication-specific surveillance systems that were devised and tested. The two specific surveillance systems are compared with limitations highlighted. Postmarketing surveillance is in its infancy and requires more research on ways to improve its validity without inducing illicit experimentation. Information on comparator medications is highly recommended both to validate the system and to place the results in context.

  9. Flow enforcement algorithms for ATM networks

    DEFF Research Database (Denmark)

    Dittmann, Lars; Jacobsen, Søren B.; Moth, Klaus

    1991-01-01

    theory and partly on signal processing theory, is carried out. It is seen that the time constant involved increases with the increasing burstiness of the connection. It is suggested that the RMS measurement bandwidth be used to dimension linear algorithms for equal flow enforcement characteristics....... Implementations are proposed on the block diagram level, and dimensioning examples are carried out when flow enforcing a renewal-type connection using the four algorithms. The corresponding hardware demands are estimated aid compared......Four measurement algorithms for flow enforcement in asynchronous transfer mode (ATM) networks are presented. The algorithms are the leaky bucket, the rectangular sliding window, the triangular sliding window, and the exponentially weighted moving average. A comparison, based partly on teletraffic...

  10. University Researcher and Law Enforcement Collaboration.

    Science.gov (United States)

    Burkhardt, Brett C; Akins, Scott; Sassaman, Jon; Jackson, Scott; Elwer, Ken; Lanfear, Charles; Amorim, Mariana; Stevens, Katelyn

    2017-04-01

    In 2012, heads of local law enforcement agencies in Benton County, Oregon, contacted researchers at Oregon State University to discuss a problem: a sharp rise in the number of contacts between police and suspects displaying symptoms of mental illness. This initial inquiry led to an ongoing collaborative examination of the nature, causes, and consequences of the rise in police contacts. In this article, the authors describe this collaboration between researchers and law enforcement officials from the perspective of both parties, situating it within the context of mental illness in the U.S. criminal justice system. The collaborators draw on firsthand experiences and prior collaborations to discuss the benefits of, challenges in, and recommendations for university-police research collaborations. Although such collaborations may pose challenges (related to relationship definition, data collection and analysis, outputs, and relationship maintenance), the potential benefits-for researchers and law enforcement agencies-are substantial.

  11. Milking hygiene: new issues and opportunities from automatic milking

    OpenAIRE

    Lotte Bach Larsen; Morten Dam Rasmussen

    2010-01-01

    Automatic milking offers the opportunity of in-line measurements of milk components, check of milking and cleaning procedures,and surveillance through the management program. These advantages may directly benefit the milk quality.Diversion of abnormal milk at time of milking is critical to the milk quality. It is proposed to define abnormal milk as milkbeing visibly changed in homogeneity or colour from that of normal milk. Several enzymes and other milk componentsmay be involved in the forma...

  12. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  13. Surface-water surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Saldi, K.A.; Dirkes, R.L.; Blanton, M.L.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the Surface water on and near the Hanford Site is monitored to determine the potential effects of Hanford operations. Surface water at Hanford includes the Columbia River, riverbank springs, ponds located on the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site. Columbia River sediments are also included in this discussion. Tables 5.3.1 and 5.3.2 summarize the sampling locations, sample types, sampling frequencies, and sample analyses included in surface-water surveillance activities during 1994. Sample locations are also identified in Figure 5.3.1. This section describes the surveillance effort and summarizes the results for these aquatic environments. Detailed analytical results are reported by Bisping (1995).

  14. Surveillance for gastrointestinal malignancies

    Institute of Scientific and Technical Information of China (English)

    Ashish K Tiwari; Heather S Laird-Fick; Ramesh K Wali; Hemant K Roy

    2012-01-01

    Gastrointestinal (GI) malignancies are notorious for frequently progressing to advanced stages even in the absence of serious symptoms,thus leading to delayed diagnoses and dismal prognoses.Secondary prevention of GI malignancies through early detection and treatment of cancer-precursor/premalignant lesions,therefore,is recognized as an effective cancer prevention strategy.In order to efficiently detect these lesions,systemic application of screening tests (surveillance) is needed.However,most of the currently used non-invasive screening tests for GI malignancies (for example,serum markers such as alpha-fetoprotein for hepatocellular carcinoma,and fecal occult blood test,for colon cancer) are only modestly effective necessitating the use of highly invasive endoscopy-based procedures,such as esophagogastroduodenoscopy and colonoscopy for screening purposes.Even for hepatocellular carcinoma where non-invasive imaging (ultrasonography) has become a standard screening tool,the need for repeated liver biopsies of suspicious liver nodules for histopathological confirmation can't be avoided.The invasive nature and high-cost associated with these screening tools hinders implementation of GI cancer screening programs.Moreover,only a small fraction of general population is truly predisposed to developing GI malignancies,and indeed needs surveillance.To spare the average-risk individuals from superfluous invasive procedures and achieve an economically viable model of cancer prevention,it's important to identify cohorts in general population that are at substantially high risk of developing GI malignancies (riskstratification),and select suitable screening tests for surveillance in these cohorts.We herein provide a brief overview of such high-risk cohorts for different GI malignancies,and the screening strategies that have commonly been employed for surveillance purpose in them.

  15. Real-time Prescription Surveillance and its Application to Monitoring Seasonal Influenza Activity in Japan

    Science.gov (United States)

    Ohkusa, Yasushi; Ibuka, Yoko; Kawanohara, Hirokazu; Taniguchi, Kiyosu; Okabe, Nobuhiko

    2012-01-01

    Background Real-time surveillance is fundamental for effective control of disease outbreaks, but the official sentinel surveillance in Japan collects information related to disease activity only weekly and updates it with a 1-week time lag. Objective To report on a prescription surveillance system using electronic records related to prescription drugs that was started in 2008 in Japan, and to evaluate the surveillance system for monitoring influenza activity during the 2009–2010 and 2010–2011 influenza seasons. Methods We developed an automatic surveillance system using electronic records of prescription drug purchases collected from 5275 pharmacies through the application service provider’s medical claims service. We then applied the system to monitoring influenza activity during the 2009–2010 and 2010–2011 influenza seasons. The surveillance system collected information related to drugs and patients directly and automatically from the electronic prescription record system, and estimated the number of influenza cases based on the number of prescriptions of anti-influenza virus medication. Then it shared the information related to influenza activity through the Internet with the public on a daily basis. Results During the 2009–2010 influenza season, the number of influenza patients estimated by the prescription surveillance system between the 28th week of 2009 and the 12th week of 2010 was 9,234,289. In the 2010–2011 influenza season, the number of influenza patients between the 36th week of 2010 and the 12th week of 2011 was 7,153,437. The estimated number of influenza cases was highly correlated with that predicted by the official sentinel surveillance (r = .992, P prescription surveillance system produced a good approximation of activity patterns. Conclusions Our prescription surveillance system presents great potential for monitoring influenza activity and for providing early detection of infectious disease outbreaks. PMID:22249906

  16. Ocean surveillance satellites

    Science.gov (United States)

    Laurent, D.

    Soviet and U.S. programs involving satellites for surveillance of ships and submarines are discussed, considering differences in approaches. The Soviet program began with the Cosmos 198 in 1967 and the latest, the Cosmos 1400 series, 15 m long and weighing 5 tons, carry radar for monitoring ships and a nuclear reactor for a power supply. Other Soviet spacecraft carrying passive microwave sensors and ion drives powered by solar panels have recently been detonated in orbit for unknown reasons. It has also been observed that the Soviet satellites are controlled in pairs, with sequential orbital changes for one following the other, and both satellites then overflying the same points. In contrast, U.S. surveillance satellites have been placed in higher orbits, thus placing greater demands on the capabilities of the on-board radar and camera systems. Project White Cloud and the Clipper Bow program are described, noting the continued operation of the White Cloud spacecraft, which are equipped to intercept radio signals from surface ships. Currently, the integrated tactical surveillance system program has completed its study and a decision is expected soon.

  17. History of trichinellosis surveillance

    Directory of Open Access Journals (Sweden)

    Blancou J.

    2001-06-01

    Full Text Available The origin of trichinellosis, which existed in ancient times as testified by the discovery of parasite larvae on an Egyptian mummy, unfolded in several stages: discovery of encapsulated larvae (in the 1820s, identification and scientific description of these larvae (Paget Owen, 1835, followed by experimental infestations of animals (dogs, pigs, rabbits, mice or of humans as from 1850.The main occurrences of trichinellosis were followed with particular attention in Europe (Germany, Denmark, France, etc. and in the United States of America at the end of the XIXth century. They affected numerous domestic animal species (pigs, horses, etc. or wildlife and humans. Germany paid the heaviest toll with regard to the disease in humans, between 1860 and 1880, with several thousands of patients and more than 500 deaths.Different trichinellosis surveillance systems were set up in the relevant countries in the 1860s. In humans, this surveillance was carried out on affected living patients by a biopsy of the biceps muscles and subsequently by an analysis of eosinophilia (1895. In animals, surveillance was for a long time solely based on postmortem examination of the muscles of the affected animals. This method was used for the first time in 863 in Germany, and from the 1 890s, on several hundreds of thousands of pigs in Europe or in the United States of America.

  18. Word Automaticity of Tree Automatic Scattered Linear Orderings Is Decidable

    CERN Document Server

    Huschenbett, Martin

    2012-01-01

    A tree automatic structure is a structure whose domain can be encoded by a regular tree language such that each relation is recognisable by a finite automaton processing tuples of trees synchronously. Words can be regarded as specific simple trees and a structure is word automatic if it is encodable using only these trees. The question naturally arises whether a given tree automatic structure is already word automatic. We prove that this problem is decidable for tree automatic scattered linear orderings. Moreover, we show that in case of a positive answer a word automatic presentation is computable from the tree automatic presentation.

  19. Performance-Driven Interface Contract Enforcement for Scientific Components

    Energy Technology Data Exchange (ETDEWEB)

    Dahlgren, T

    2007-02-22

    Several performance-driven approaches to selectively enforce interface contracts for scientific components are investigated. The goal is to facilitate debugging deployed applications built from plug-and-play components while keeping the cost of enforcement within acceptable overhead limits. This paper describes a study of global enforcement using a priori execution cost estimates obtained from traces. Thirteen trials are formed from five, single-component programs. Enforcement experiments conducted using twenty-three enforcement policies are used to determine the nature of exercised contracts and the impact of a variety of sampling strategies. Performance-driven enforcement appears to be best suited to programs that exercise moderately expensive contracts.

  20. Price-Anderson Nuclear Safety Enforcement Program. 1996 Annual report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-01-01

    This first annual report on DOE`s Price Anderson Amendments Act enforcement program covers the activities, accomplishments, and planning for calendar year 1996. It also includes the infrastructure development activities of 1995. It encompasses the activities of the headquarters` Office of Enforcement in the Office of Environment, Safety and Health (EH) and Investigation and the coordinators and technical advisors in DOE`s Field and Program Offices and other EH Offices. This report includes an overview of the enforcement program; noncompliances, investigations, and enforcement actions; summary of significant enforcement actions; examples where enforcement action was deferred; and changes and improvements to the program.

  1. Forensic economics in competition law enforcement

    NARCIS (Netherlands)

    Schinkel, M.P.

    2008-01-01

    This paper delineates the specialty field of forensic industrial organization (IO) as the application of theoretical and empirical industrial organization economics in the legal process of competition law enforcement. Four stages of that process that can benefit from forensic IO techniques are disti

  2. 45 CFR 2543.62 - Enforcement.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Enforcement. 2543.62 Section 2543.62 Public Welfare Regulations Relating to Public Welfare (Continued) CORPORATION FOR NATIONAL AND COMMUNITY SERVICE GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, AND OTHER NON-PROFIT...

  3. Excess Asset Returns and Limited Enforcement

    OpenAIRE

    Lambertini, Luisa; Azariadis, Costas

    2002-01-01

    This paper investigates the effect of limited enforcement of contracts on asset returns in a three-period pure- exchange overlapping generations economy. We consider a life-cycle setting with a safe and a risky asset and find that lack of commitment can significantly affect the rate of returns of these assets and possibly generate large equity premia.

  4. 14 CFR 243.17 - Enforcement.

    Science.gov (United States)

    2010-01-01

    ... REGULATIONS PASSENGER MANIFEST INFORMATION § 243.17 Enforcement. The U.S. Department of Transportation may at any time require a covered airline to produce a passenger manifest including emergency contacts and... system. In addition, it may require from any covered airline further information about collection...

  5. 12 CFR 711.8 - Enforcement.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Enforcement. 711.8 Section 711.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS MANAGEMENT OFFICIAL... Interlocks Act with respect to federally insured credit unions, and may refer any case of a...

  6. Influencing speeding behaviour through preventative police enforcement.

    NARCIS (Netherlands)

    Wesemann, P.

    1997-01-01

    This paper considers the effect of speed on road safety and how to influence speeding behaviour. The results that can be achieved through police enforcement combined with information campaigns are discussed with reference to projects carried out in the Netherlands. The cost implications are

  7. 40 CFR 35.970 - Contract enforcement.

    Science.gov (United States)

    2010-07-01

    ... STATE AND LOCAL ASSISTANCE Grants for Construction of Treatment Works-Clean Water Act § 35.970 Contract... the enforcement of such contracts, including contract disputes which are the subject of either... technical or legal involvement in any contract dispute will not make EPA a party to any contract entered...

  8. 40 CFR 35.2350 - Subagreement enforcement.

    Science.gov (United States)

    2010-07-01

    ... ASSISTANCE STATE AND LOCAL ASSISTANCE Grants for Construction of Treatment Works § 35.2350 Subagreement... enforcement of such subagreements, including subagreement disputes which are the subject of either arbitration... involvement in any subagreement dispute will not make EPA a party to any subagreement entered into by the...

  9. 24 CFR 3500.19 - Enforcement.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Enforcement. 3500.19 Section 3500.19 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued) OFFICE OF ASSISTANT SECRETARY FOR HOUSING-FEDERAL HOUSING COMMISSIONER, DEPARTMENT OF HOUSING AND...

  10. Intimate Partner Violence within Law Enforcement Families

    Science.gov (United States)

    Anderson, Anita S.; Lo, Celia C.

    2011-01-01

    Using data from the Baltimore Police Stress and Domestic Violence study, the authors examined how exposure to stressful events on the job affects law enforcement employees' physical aggression toward domestic partners, evaluating the role of negative emotions and authoritarian spillover in mediating the impact of such task-related stress. The…

  11. Integrating Remote Sensing and Disease Surveillance to Forecast Malaria Epidemics

    Science.gov (United States)

    Wimberly, M. C.; Beyane, B.; DeVos, M.; Liu, Y.; Merkord, C. L.; Mihretie, A.

    2015-12-01

    Advance information about the timing and locations of malaria epidemics can facilitate the targeting of resources for prevention and emergency response. Early detection methods can detect incipient outbreaks by identifying deviations from expected seasonal patterns, whereas early warning approaches typically forecast future malaria risk based on lagged responses to meteorological factors. A critical limiting factor for implementing either of these approaches is the need for timely and consistent acquisition, processing and analysis of both environmental and epidemiological data. To address this need, we have developed EPIDEMIA - an integrated system for surveillance and forecasting of malaria epidemics. The EPIDEMIA system includes a public health interface for uploading and querying weekly surveillance reports as well as algorithms for automatically validating incoming data and updating the epidemiological surveillance database. The newly released EASTWeb 2.0 software application automatically downloads, processes, and summaries remotely-sensed environmental data from multiple earth science data archives. EASTWeb was implemented as a component of the EPIDEMIA system, which combines the environmental monitoring data and epidemiological surveillance data into a unified database that supports both early detection and early warning models. Dynamic linear models implemented with Kalman filtering were used to carry out forecasting and model updating. Preliminary forecasts have been disseminated to public health partners in the Amhara Region of Ethiopia and will be validated and refined as the EPIDEMIA system ingests new data. In addition to continued model development and testing, future work will involve updating the public health interface to provide a broader suite of outbreak alerts and data visualization tools that are useful to our public health partners. The EPIDEMIA system demonstrates a feasible approach to synthesizing the information from epidemiological

  12. Bringing together emerging and endemic zoonoses surveillance: shared challenges and a common solution.

    Science.gov (United States)

    Halliday, Jo; Daborn, Chris; Auty, Harriet; Mtema, Zacharia; Lembo, Tiziana; Bronsvoort, Barend M Dec; Handel, Ian; Knobel, Darryn; Hampson, Katie; Cleaveland, Sarah

    2012-10-19

    Early detection of disease outbreaks in human and animal populations is crucial to the effective surveillance of emerging infectious diseases. However, there are marked geographical disparities in capacity for early detection of outbreaks, which limit the effectiveness of global surveillance strategies. Linking surveillance approaches for emerging and neglected endemic zoonoses, with a renewed focus on existing disease problems in developing countries, has the potential to overcome several limitations and to achieve additional health benefits. Poor reporting is a major constraint to the surveillance of both emerging and endemic zoonoses, and several important barriers to reporting can be identified: (i) a lack of tangible benefits when reports are made; (ii) a lack of capacity to enforce regulations; (iii) poor communication among communities, institutions and sectors; and (iv) complexities of the international regulatory environment. Redirecting surveillance efforts to focus on endemic zoonoses in developing countries offers a pragmatic approach that overcomes some of these barriers and provides support in regions where surveillance capacity is currently weakest. In addition, this approach addresses immediate health and development problems, and provides an equitable and sustainable mechanism for building the culture of surveillance and the core capacities that are needed for all zoonotic pathogens, including emerging disease threats.

  13. Informed consent: Enforcing pharmaceutical companies' obligations abroad.

    Science.gov (United States)

    Lee, Stacey B

    2010-06-15

    The past several years have seen an evolution in the obligations of pharmaceutical companies conducting clinical trials abroad. Key players, such as international human rights organizations, multinational pharmaceutical companies, the United States government and courts, and the media, have played a significant role in defining these obligations. This article examines how such obligations have developed through the lens of past, present, and future recommendations for informed consent protections. In doing so, this article suggests that, no matter how robust obligations appear, they will continue to fall short of providing meaningful protection until they are accompanied by a substantive enforcement mechanism that holds multinational pharmaceutical companies accountable for their conduct. Issues of national sovereignty, particularly in the United States, will continue to prevent meaningful enforcement by an international tribunal or through one universally adopted code of ethics. This article argues that, rather than continuing to pursue an untenable international approach, the Alien Torts Statute (ATS) offers a viable enforcement mechanism, at least for US-based pharmaceutical companies. Recent federal appellate court precedent interpreting the ATS provides the mechanism for granting victims redress and enforcing accountability of sponsors (usually pharmaceutical companies and research and academic institutions) for informed consent misconduct. Substantive human rights protections are vital in order to ensure that every person can realize the "right to health." This article concludes that by building on the federal appellate court's ATS analysis, which grants foreign trial participants the right to pursue claims of human rights violations in US courts, a mechanism can be created for enforcing not only substantive informed consent, but also human rights protections.

  14. EPA Enforcement and Compliance History Online: EPA Enforcement Action Data Set

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Enforcement and Compliance History Online (ECHO) data sets have been compiled for access to larger sets of national data to ensure that ECHO meets your data...

  15. The installation and performance test of the surveillance system for DUPIC facility

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dong Young; Kim, Ho Dong; Cha, Hong Ryul

    2000-07-01

    We have developed the real time surveillance system, named by DSSS, for DUPIC test facility. The system acquires data from He-3 neutron monitors(DSNM) and CCD cameras to automatically diagnose the transportation status of nuclear material. This technical report shortly illustrates important features of hardware and software of the system.

  16. AIDS-case surveillance.

    Science.gov (United States)

    Lal, S; Khodakevich, L; Sengupta, D

    1994-01-01

    In 1991 in India, the Ministry of Health realized that the diagnostic and reporting network for AIDS cases was inadequate as AIDS cases grew and that the establishment of specialized AIDS units in hospitals was not the best strategy. It decided to integrate AIDS diagnostic and management facilities into primary health services. It would arrange training for 1 physician from each district and peripheral hospital, private hospital, and inpatient service of other medical institutions in AIDS diagnosis and management. These physicians would then train others in the clinical diagnosis and management of AIDS cases. The physicians would use the World Health Organization [WHO] case definition of AIDS supported by HIV serological test results. All AIDS cases would be transferred to the Medical College Hospitals of the States and Union Territories (UTs), regional hospitals, and perhaps some private hospitals. Between May 1986 and October 1993, India had 459 AIDS cases reported from 19 States and UTs, especially the States of Tamil Nadul and Maharashtra. This AIDS case surveillance system should motivate political will, describe the underlying and preceding HIV epidemic, and contribute to the understanding of current and future course of the epidemic. Thus, it will guide decision makers to develop sound preventive strategies, to plan health care, and to evaluate interventions. The surveillance system's target population is all outpatients and inpatients at medical institutions. During 1993-1994, 1000 hospitals should make up the network of referral institutions. AIDS case surveillance coordinators (ASCs) at each institution form the basis of the network. The individual case record of each suspected AIDS case will have details on his/her life and medical history. Records of confirmed cases will be sent to State ASCs who will compile them for the National AIDS Control Organisation. After 3-4 year of training and practice in AIDS diagnosis and reporting, AIDS reporting will be

  17. GSFC Supplier Surveillance

    Science.gov (United States)

    Kelly, Michael P.

    2011-01-01

    Topics covered include: Develop Program/Project Quality Assurance Surveillance Plans The work activities performed by the developer and/or his suppliers are subject to evaluation and audit by government-designated representatives. CSO supports project by selecting on-site supplier representative s by one of several methods: (1) a Defense Contract Management Agency (DCMA) person via a Letter Of Delegation (LOD), (2) an independent assurance contractor (IAC) via a contract Audits, Assessments, and Assurance (A3) Contract Code 300 Mission Assurance Support Contract (MASC)

  18. Bodygraphic Injury Surveillance System

    Science.gov (United States)

    Tsuboi, Toshiki; Kitamura, Koji; Nishida, Yoshihumi; Motomura, Yoichi; Takano, Tachio; Yamanaka, Tatsuhiro; Mizoguchi, Hiroshi

    This paper proposes a new technology,``a bodygraphic injury surveillance system (BISS)'' that not only accumulates accident situation data but also represents injury data based on a human body coordinate system in a standardized and multilayered way. Standardized and multilayered representation of injury enables accumulation, retrieval, sharing, statistical analysis, and modeling causalities of injury across different fields such as medicine, engineering, and industry. To confirm the effectiveness of the developed system, the authors collected 3,685 children's injury data in cooperation with a hospital. As new analyses based on the developed BISS, this paper shows bodygraphically statistical analysis and childhood injury modeling using the developed BISS and Bayesian network technology.

  19. Bombay Hook National Wildlife Refuge Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Bombay Hook Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  20. Child Support Enforcement Annual Data Reports Form 157 - YR 2013

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  1. Child Support Enforcement Annual Data Report Form 157

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  2. Mark Twain National Wildlife Refuge: Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Mark Twain NWR (including Clarence Cannon, Louisa, and Calhoun NWRs) Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to...

  3. Law Enforcement Plan Swan Lake National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Swan Lake National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  4. Law Enforcement Plan: Minnesota Valley National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Minnesota Valley NWR Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about...

  5. 77 FR 32901 - State Enforcement of Household Goods Consumer Protection

    Science.gov (United States)

    2012-06-04

    ... regulatory authorities and State attorneys general the right to enforce certain consumer protection... Household Goods Consumer Protection AGENCY: Federal Motor Carrier Safety Administration (FMCSA), DOT. ACTION... goods regulatory authorities and State attorneys general may enforce certain consumer protection...

  6. Crab Orchard National Wildlife Refuge : Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Crab Orchard National Wildlife Refuge Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides...

  7. Bombay Hook National Wildlife Refuge Law Enforcement Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Bombay Hook Law Enforcement Plan clarifies U.S. Fish and Wildlife enforcement policies as they apply to the Refuge. It provides information about problems,...

  8. Projectbeschrijving Surveillance Ziekenhuisinfecties 1996-1999

    NARCIS (Netherlands)

    Berg JMJ van den; Boer AS de; Mintjes-de Groot AJ; Sprenger MJW; Cucic S; Pelt W van; Centraal Begeleidingsorgaan; CIE

    1996-01-01

    In the Project Surveillance Hospital Acquired Infections a surveillance system in a national network of hospitals is being developed and implemented. In the project surveillance of hospital acquired infections is implemented in components: surveillance of surgical wound infections, surveillance of i

  9. Enforcing ‘Self-Enforcing’ International Environmental Agreements

    OpenAIRE

    McEvoy, David M.; John K. Stranlund

    2006-01-01

    Theoretical analyses of international environmental agreements (IEAs) have typically employed the concept of self-enforcing agreements to predict the number of parties to such an agreement. The term self-enforcing, however, is a bit misleading. The concept refers to the stability of cooperative agreements, not to enforcing these agreements once they are in place. Most analyses of IEAs simply ignore the issue of enforcing compliance by parties to the terms of an agreement. In this paper we ana...

  10. Sonoma Persistent Surveillance System

    Energy Technology Data Exchange (ETDEWEB)

    Pennington, D M

    2006-03-24

    Sonoma offers the first cost-effective, broad-area, high-resolution, real-time motion imagery system for surveillance applications. Sonoma is unique in its ability to provide continuous, real-time video imagery of an area the size of a small city with resolutions sufficient to track 8,000 moving objects in the field of view. At higher resolutions and over smaller areas, Sonoma can even track the movement of individual people. The visual impact of the data available from Sonoma is already causing a paradigm shift in the architecture and operation of other surveillance systems. Sonoma is expected to cost just one-tenth the price of comparably sized sensor systems. Cameras mounted on an airborne platform constantly monitor an area, feeding data to the ground for real-time analysis. Sonoma was designed to provide real-time data for actionable intelligence in situations such as monitoring traffic, special events, border security, and harbors. If a Sonoma system had been available in the aftermath of the Katrina and Rita hurricanes, emergency responders would have had real-time information on roads, water levels, and traffic conditions, perhaps saving many lives.

  11. Hybrid static-runtime information flow and declassification enforcement

    NARCIS (Netherlands)

    Rocha, Bruno P.S.; Conti, Mauro; Etalle, Sandro; Crispo, Bruno

    There are different paradigms for enforcing information flow and declassification policies. These approaches can be divided into static analyzers and runtime enforcers. Each class has its own strengths and weaknesses, each being able to enforce a different set of policies. In this paper, we

  12. 49 CFR 107.301 - Delegated authority for enforcement.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Delegated authority for enforcement. 107.301... HAZARDOUS MATERIALS PROGRAM PROCEDURES Enforcement § 107.301 Delegated authority for enforcement. Under... Administrator for Hazardous Materials Safety and the Office of the Chief Counsel exercise their authority for...

  13. 10 CFR 431.383 - Enforcement process for electric motors.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Enforcement process for electric motors. 431.383 Section... COMMERCIAL AND INDUSTRIAL EQUIPMENT Enforcement § 431.383 Enforcement process for electric motors. (a) Test... motor sold by a particular manufacturer or private labeler, which indicates that the electric motor...

  14. Hybrid static-runtime information flow and declassification enforcement

    NARCIS (Netherlands)

    Rocha, Bruno P.S.; Conti, Mauro; Etalle, Sandro; Crispo, Bruno

    2013-01-01

    There are different paradigms for enforcing information flow and declassification policies. These approaches can be divided into static analyzers and runtime enforcers. Each class has its own strengths and weaknesses, each being able to enforce a different set of policies. In this paper, we introduc

  15. 28 CFR 0.102 - Drug enforcement policy coordination.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Drug enforcement policy coordination. 0.102 Section 0.102 Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE Drug Enforcement Administration § 0.102 Drug enforcement policy coordination. The Administrator of...

  16. 40 CFR 158.355 - Enforcement analytical method.

    Science.gov (United States)

    2010-07-01

    ... DATA REQUIREMENTS FOR PESTICIDES Product Chemistry § 158.355 Enforcement analytical method. An analytical method suitable for enforcement purposes must be provided for each active ingredient in the... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Enforcement analytical method....

  17. 32 CFR 634.26 - Traffic law enforcement principles.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Traffic law enforcement principles. 634.26 Section 634.26 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW... law enforcement principles. (a) Traffic law enforcement should motivate drivers to operate vehicles...

  18. An empirical investigation of compliance and enforcement problems

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Jensen, Frank

    2011-01-01

    Compliance and enforcement are important issues from an economic point of view because management measures are useless without a certain level of enforcement. These conclusions come from the well-established theoretical literature on compliance and enforcement problems within fisheries. This pape...

  19. 40 CFR 161.180 - Enforcement analytical method.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Enforcement analytical method. 161.180 Section 161.180 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS... § 161.180 Enforcement analytical method. An analytical method suitable for enforcement purposes must...

  20. An empirical investigation of compliance and enforcement problems

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Jensen, Frank

    2011-01-01

    Compliance and enforcement are important issues from an economic point of view because management measures are useless without a certain level of enforcement. These conclusions come from the well-established theoretical literature on compliance and enforcement problems within fisheries. This pape...

  1. 47 CFR 68.414 - Hearing aid-compatibility: Enforcement.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Hearing aid-compatibility: Enforcement. 68.414... (CONTINUED) CONNECTION OF TERMINAL EQUIPMENT TO THE TELEPHONE NETWORK Complaint Procedures § 68.414 Hearing aid-compatibility: Enforcement. Enforcement of §§ 68.4 and 68.112 is hereby delegated to those...

  2. 50 CFR 404.8 - Emergencies and law enforcement activities.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Emergencies and law enforcement activities... HAWAIIAN ISLANDS MARINE NATIONAL MONUMENT § 404.8 Emergencies and law enforcement activities. The..., property, or the environment, or to activities necessary for law enforcement purposes. ...

  3. 49 CFR 1546.211 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1546.211 Section 1546... § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...) When using a screening system required by § 1546.101(a), (b), or (c), provide for law enforcement...

  4. 50 CFR 10.22 - Law enforcement offices.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 1 2010-10-01 2010-10-01 false Law enforcement offices. 10.22 Section 10... GENERAL PROVISIONS Addresses § 10.22 Law enforcement offices. Service law enforcement offices and their areas of responsibility follow. Mail should be addressed: “Assistant Regional Director, Division of Law...

  5. 49 CFR 1542.219 - Supplementing law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Supplementing law enforcement personnel. 1542.219... Operations § 1542.219 Supplementing law enforcement personnel. (a) When TSA decides, after being notified by... private law enforcement personnel are available to carry out the requirements of § 1542.215, TSA may...

  6. 49 CFR 1544.217 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1544.217 Section 1544... AND COMMERCIAL OPERATORS Operations § 1544.217 Law enforcement personnel. (a) The following applies to... for law enforcement personnel meeting the qualifications and standards specified in §§ 1542.215 and...

  7. 32 CFR 634.33 - Training of law enforcement personnel.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Training of law enforcement personnel. 634.33 Section 634.33 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW... Training of law enforcement personnel. (a) As a minimum, installation law enforcement personnel will be...

  8. 32 CFR 806b.8 - Obtaining law enforcement records.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Obtaining law enforcement records. 806b.8... ADMINISTRATION PRIVACY ACT PROGRAM Obtaining Law Enforcement Records and Confidentiality Promises § 806b.8 Obtaining law enforcement records. The Commander, Air Force Office of Special Investigation; the Commander...

  9. 21 CFR 1309.26 - Exemption of law enforcement officials.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Exemption of law enforcement officials. 1309.26... Exemption of law enforcement officials. (a) The requirement of registration is waived for the following... Administration, any other Federal officer who is lawfully engaged in the enforcement of any Federal law relating...

  10. 75 FR 81547 - Defense Support of Civilian Law Enforcement Agencies

    Science.gov (United States)

    2010-12-28

    ... of the Secretary 32 CFR Part 182 Defense Support of Civilian Law Enforcement Agencies AGENCY... civilian law enforcement efforts, including responses to civil disturbances. DATES: Comments must be... for assisting civilian law enforcement agencies, therefore, it is not expected that small entities...

  11. 24 CFR 291.520 - Eligible law enforcement officers.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Eligible law enforcement officers... Neighbor Next Door Sales Program § 291.520 Eligible law enforcement officers. A person qualifies as a law... law enforcement agency of the federal government, a state, a unit of general local government, or an...

  12. 28 CFR 29.5 - Notification of law enforcement officials.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Notification of law enforcement officials... REGULATIONS § 29.5 Notification of law enforcement officials. In addition to the actions enumerated in § 29.4... reasonable steps to ensure that law enforcement officials under its jurisdiction are familiar with the...

  13. 20 CFR 401.155 - Law enforcement purposes.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Law enforcement purposes. 401.155 Section 401... INFORMATION Disclosure of Official Records and Information § 401.155 Law enforcement purposes. (a) General. The Privacy Act allows us to disclose information for law enforcement purposes under certain...

  14. 49 CFR 1542.215 - Law enforcement support.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement support. 1542.215 Section 1542.215... program under § 1542.103(a) or (b) must provide: (1) Law enforcement personnel in the number and manner adequate to support its security program. (2) Uniformed law enforcement personnel in the number and manner...

  15. 49 CFR 1542.221 - Records of law enforcement response.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Records of law enforcement response. 1542.221... Operations § 1542.221 Records of law enforcement response. (a) Each airport operator must ensure that— (1) A record is made of each law enforcement action taken in furtherance of this part; and (2) The record is...

  16. 21 CFR 1301.24 - Exemption of law enforcement officials.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Exemption of law enforcement officials. 1301.24....24 Exemption of law enforcement officials. (a) The requirement of registration is waived for the... course of his/her official duties. (c) In order to enable law enforcement agency laboratories, including...

  17. 45 CFR 164.412 - Law enforcement delay.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Law enforcement delay. 164.412 Section 164.412 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED... § 164.412 Law enforcement delay. If a law enforcement official states to a covered entity or business...

  18. 45 CFR 5.68 - Exemption seven: Law enforcement.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Exemption seven: Law enforcement. 5.68 Section 5... INFORMATION REGULATIONS Reasons for Withholding Some Records § 5.68 Exemption seven: Law enforcement. We are not required to disclose information or records that the government has compiled for law enforcement...

  19. 20 CFR 638.805 - Security and law enforcement.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Security and law enforcement. 638.805 Section... and law enforcement. (a) The Job Corps Director shall provide guidelines to protect the security of... jurisdiction with the appropriate State and locality with respect to criminal law enforcement as long as a...

  20. 10 CFR 431.198 - Enforcement testing for distribution transformers.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Enforcement testing for distribution transformers. 431.198... COMMERCIAL AND INDUSTRIAL EQUIPMENT Distribution Transformers Compliance and Enforcement § 431.198 Enforcement testing for distribution transformers. (a) Test notice. Upon receiving information in...

  1. Automatic Program Development

    DEFF Research Database (Denmark)

    by members of the IFIP Working Group 2.1 of which Bob was an active member. All papers are related to some of the research interests of Bob and, in particular, to the transformational development of programs and their algorithmic derivation from formal specifications. Automatic Program Development offers......Automatic Program Development is a tribute to Robert Paige (1947-1999), our accomplished and respected colleague, and moreover our good friend, whose untimely passing was a loss to our academic and research community. We have collected the revised, updated versions of the papers published in his...... honor in the Higher-Order and Symbolic Computation Journal in the years 2003 and 2005. Among them there are two papers by Bob: (i) a retrospective view of his research lines, and (ii) a proposal for future studies in the area of the automatic program derivation. The book also includes some papers...

  2. Automatic text summarization

    CERN Document Server

    Torres Moreno, Juan Manuel

    2014-01-01

    This new textbook examines the motivations and the different algorithms for automatic document summarization (ADS). We performed a recent state of the art. The book shows the main problems of ADS, difficulties and the solutions provided by the community. It presents recent advances in ADS, as well as current applications and trends. The approaches are statistical, linguistic and symbolic. Several exemples are included in order to clarify the theoretical concepts.  The books currently available in the area of Automatic Document Summarization are not recent. Powerful algorithms have been develop

  3. Automatic Camera Control

    DEFF Research Database (Denmark)

    Burelli, Paolo; Preuss, Mike

    2014-01-01

    Automatically generating computer animations is a challenging and complex problem with applications in games and film production. In this paper, we investigate howto translate a shot list for a virtual scene into a series of virtual camera configurations — i.e automatically controlling the virtual...... camera. We approach this problem by modelling it as a dynamic multi-objective optimisation problem and show how this metaphor allows a much richer expressiveness than a classical single objective approach. Finally, we showcase the application of a multi-objective evolutionary algorithm to generate a shot...

  4. Forensic imaging tools for law enforcement

    Energy Technology Data Exchange (ETDEWEB)

    SMITHPETER,COLIN L.; SANDISON,DAVID R.; VARGO,TIMOTHY D.

    2000-01-01

    Conventional methods of gathering forensic evidence at crime scenes are encumbered by difficulties that limit local law enforcement efforts to apprehend offenders and bring them to justice. Working with a local law-enforcement agency, Sandia National Laboratories has developed a prototype multispectral imaging system that can speed up the investigative search task and provide additional and more accurate evidence. The system, called the Criminalistics Light-imaging Unit (CLU), has demonstrated the capabilities of locating fluorescing evidence at crime scenes under normal lighting conditions and of imaging other types of evidence, such as untreated fingerprints, by direct white-light reflectance. CLU employs state of the art technology that provides for viewing and recording of the entire search process on videotape. This report describes the work performed by Sandia to design, build, evaluate, and commercialize CLU.

  5. Surveillance theory and its implications for law

    NARCIS (Netherlands)

    Timan, Tjerk; Galic, Masa; Koops, Bert-Jaap; Yeung, Karen; Brownsword, Roger; Scotford, Eloise

    2016-01-01

    This chapter provides an overview of key surveillance theories and their implications for law and regulation. It presents three stages of theories that characterise changes in thinking about surveillance in society and the disciplining, controlling, and entertaining functions of surveillance.

  6. PACE: Proactively Secure Accumulo with Cryptographic Enforcement

    Science.gov (United States)

    2017-05-27

    modify data using digital signatures . The contributions of our work include: • Cryptographic enforcement of access control. The PACE library allows...the impact of encryption and signatures on operation throughput. I. INTRODUCTION Over the last several years, many companies have moved their...second). This evaluation demonstrates that while encryp- tion and signatures have an impact on throughput, the impact is small enough to be

  7. 25 CFR 12.33 - Are Indian country law enforcement officers paid less than other law enforcement officers?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Are Indian country law enforcement officers paid less than other law enforcement officers? 12.33 Section 12.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER INDIAN COUNTRY LAW ENFORCEMENT Qualifications and Training Requirements...

  8. EUB Directive 019 : EUB compliance assurance : enforcement

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-27

    The Alberta Energy and Utilities Board (EUB) ensures that the discovery, development and delivery of Alberta's resources takes place in a fair and responsible manner by enforcing EUB requirements that are written on behalf of Albertans. Compliance ensures that resource activities are conducted in a manner that protects public safety, minimizes environmental impact, preserves equity and ensures effective resource conservation. This directive addresses the enforcement aspect of compliance assurance. It applies to all EUB requirements and processes except matters dealing with utility rates. It explains what licensees must do when a noncompliance is identified by the EUB; the enforcement process and the consequences for low and high risk noncompliance; the EUB appeal process; the EUB voluntary self-disclosure policy, including the rules and benefits of voluntary self-disclosure; and, the availability of compliance information. The risk assessment matrix used by the EUB to predetermine whether the level of noncompliance risk is low or high for each EUB requirement, is based on health and safety, environmental impact, conservation, and stakeholder confidence in the regulatory process. 2 tabs.

  9. 78 FR 41125 - Interim Enforcement Policy for Permanent Implant Brachytherapy Medical Event Reporting

    Science.gov (United States)

    2013-07-09

    ... COMMISSION Interim Enforcement Policy for Permanent Implant Brachytherapy Medical Event Reporting AGENCY... Commission (NRC) is issuing an interim Enforcement Policy that allows the staff to exercise enforcement...'s permanent implant brachytherapy program. This interim policy affects NRC licensees that...

  10. 76 FR 70470 - Extension of Agency Information Collection Activity Under OMB Review: Law Enforcement Officer...

    Science.gov (United States)

    2011-11-14

    ... OMB Review: Law Enforcement Officer Flying Armed Training AGENCY: Transportation Security..., state, and authorized railroad law enforcement agencies who have requested the Law Enforcement Officer... other forms of information technology. Information Collection Requirement Title: Law Enforcement Officer...

  11. Defining 'surveillance' in drug safety.

    Science.gov (United States)

    Aronson, Jeffrey K; Hauben, Manfred; Bate, Andrew

    2012-05-01

    The concept of surveillance in pharmacovigilance and pharmacoepidemiology has evolved from the concept of surveillance in epidemiology, particularly of infectious diseases. We have surveyed the etymology, usages, and previous definitions of 'surveillance' and its modifiers, such as 'active' and 'passive'. The following essential definitional features of surveillance emerge: (i) surveillance and monitoring are different--surveillance involves populations, while monitoring involves individuals; (ii) surveillance can be performed repeatedly and at any time during the lifetime of a medicinal product or device; (iii) although itself non-interventional, it can adduce any types of evidence (interventional, observational, or anecdotal, potentially at different times); (iv) it encompasses data collection, management, analysis, and interpretation; (v) it includes actions to be taken after signal detection, including initial evaluation and communication; and (vi) it should contribute to the classification of adverse reactions and their prevention or mitigation and/or to the harnessing of beneficial effects. We conclude that qualifiers add ambiguity and uncertainty without enhancing the idea of surveillance. We propose the following definition of surveillance of health-care products, which embraces all the surveyed ideas and reflects real-world pharmacovigilance processes: 'a form of non-interventional public health research, consisting of a set of processes for the continued systematic collection, compilation, interrogation, analysis, and interpretation of data on benefits and harms (including relevant spontaneous reports, electronic medical records, and experimental data).' As a codicil, we note that the purposes of surveillance are to identify, evaluate, understand, and communicate previously unknown effects of health-care products, or new aspects of known effects, in order to harness such effects (if beneficial) or prevent or mitigate them (if harmful).

  12. Fully Automated Surveillance of Healthcare-Associated Infections with MONI-ICU: A Breakthrough in Clinical Infection Surveillance.

    Science.gov (United States)

    Blacky, A; Mandl, H; Adlassnig, K-P; Koller, W

    2011-01-01

    Expert surveillance of healthcare-associated infections (HCAIs) is a key parameter for good clinical practice, especially in intensive care medicine. Assessment of clinical entities such as HCAIs is a time-consuming task for highly trained experts. Such are neither available nor affordable in sufficient numbers for continuous surveillance services. Intelligent information technology (IT) tools are in urgent demand. MONI-ICU (monitoring of nosocomial infections in intensive care units (ICUs)) has been developed methodologically and practically in a stepwise manner and is a reliable surveillance IT tool for clinical experts. It uses information from the patient data management systems in the ICUs, the laboratory information system, and the administrative hospital information system of the Vienna General Hospital as well as medical expert knowledge on infection criteria applied in a multilevel approach which includes fuzzy logic rules. We describe the use of this system in clinical routine and compare the results generated automatically by MONI-ICU with those generated in parallel by trained surveillance staff using patient chart reviews and other available information ("gold standard"). A total of 99 ICU patient admissions representing 1007 patient days were analyzed. MONI-ICU identified correctly the presence of an HCAI condition in 28/31 cases (sensitivity, 90.3%) and their absence in 68/68 of the non-HCAI cases (specificity, 100%), the latter meaning that MONI-ICU produced no "false alarms". The 3 missed cases were due to correctable technical errors. The time taken for conventional surveillance at the 52 ward visits was 82.5 hours. MONI-ICU analysis of the same patient cases, including careful review of the generated results, required only 12.5 hours (15.2%). Provided structured and sufficient information on clinical findings is online available, MONI-ICU provides an almost real-time view of clinical indicators for HCAI - at the cost of almost no additional time

  13. [Surveillance reports on pathogens and their antibiotic resistance patterns - a recommendation for standardization].

    Science.gov (United States)

    Warnke, P; Aepfelbacher, M; Fickenscher, H; Solbach, W; Steinmetz, I; Podbielski, A

    2014-06-01

    Surveillance reports on infectious agents and their antibiotic resistance patterns as well as on the usage of antibiotics are now enforced by law for many medical institutions in Germany. However, specific practice-oriented recommendations concerning the appropriate extent and informative mode of presentation are lacking. This consensus statement resulted from the experience from five German university hospitals in handling data from infection epidemiology and in the various possibilities for the presentation of surveillance reports. The consensus statement provides recommendations for the preparation of the legally demanded surveillance reports, extending the existing regulations. The relevance of statements on frequency and quality of microbiological tests is included. Furthermore, modes for the standardization of the data analysis are suggested in order to achieve a regional and national comparability of the results on a high quality level, similarly to the established standardized surveillance of nosocomial infections. This consensus statement describes the form in which the legally enforced reports can be presented in an informative and standardized way in order to facilitate the deduction and realization of preventive measurements.

  14. CHOIS: enabling grid technologies for obesity surveillance and control.

    Science.gov (United States)

    Datta, Arun K; Jackson, Victoria; Nandkumar, Radha; Sproat, Jill; Zhu, Weimo; Krahling, Heidi

    2010-01-01

    CHOIS, the Child Health and Obesity Informatics System, is developed using open source portal technology with three-tiered Open Grid Services Architecture, an accepted standard for accessing Grid Computing and other services under Open Grid Collaborating Environments (OGCE). Its web application provides web based forms with 112 different fields to enter data ranging from demographic, height & weight for BMI, to genomic information. Automatic computation of BMI, BMI percentile and the risk of obesity alert are embedded into this system. After successful testing of the prototype, CHOIS is now ready to be used by the Illinois Department of Human Services (DHS) for obesity surveillance. This HIPAA & FERPA compliant secure system, integrating large databases in a high performance grid computing environment, enables school-nurse to collect data on school children and report statistical and surveillance information on BMI to identify those at-risk and obese for obesity prevention and intervention programs.

  15. Efficient Approach for Face Detection in Video Surveillance

    Institute of Scientific and Technical Information of China (English)

    宋红; 石峰

    2003-01-01

    Security access control systems and automatic video surveillance systems are becoming increasingly important recently,and detecting human faces is one of the indispensable processes.In this paper,an approach is presented to detect faces in video surveillance.Firstly,both the skin-color and motion components are applied to extract skin-like regions.The skin-color segmentation algorithm is based on the BPNN (back-error-propagation neural network) and the motion component is obtained with frame difference algorithm.Secondly,the image is clustered into separated face candidates by using the region growing technique.Finally,the face candidates are further verified by the rule-based algorithm.Experiment results demonstrate that both the accuracy and processing speed are very promising and the approach can be applied for the practical use.

  16. Exploring Automatization Processes.

    Science.gov (United States)

    DeKeyser, Robert M.

    1996-01-01

    Presents the rationale for and the results of a pilot study attempting to document in detail how automatization takes place as the result of different kinds of intensive practice. Results show that reaction times and error rates gradually decline with practice, and the practice effect is skill-specific. (36 references) (CK)

  17. Automatic Complexity Analysis

    DEFF Research Database (Denmark)

    Rosendahl, Mads

    1989-01-01

    One way to analyse programs is to to derive expressions for their computational behaviour. A time bound function (or worst-case complexity) gives an upper bound for the computation time as a function of the size of input. We describe a system to derive such time bounds automatically using abstrac...

  18. Brut: Automatic bubble classifier

    Science.gov (United States)

    Beaumont, Christopher; Goodman, Alyssa; Williams, Jonathan; Kendrew, Sarah; Simpson, Robert

    2014-07-01

    Brut, written in Python, identifies bubbles in infrared images of the Galactic midplane; it uses a database of known bubbles from the Milky Way Project and Spitzer images to build an automatic bubble classifier. The classifier is based on the Random Forest algorithm, and uses the WiseRF implementation of this algorithm.

  19. Automatic Dance Lesson Generation

    Science.gov (United States)

    Yang, Yang; Leung, H.; Yue, Lihua; Deng, LiQun

    2012-01-01

    In this paper, an automatic lesson generation system is presented which is suitable in a learning-by-mimicking scenario where the learning objects can be represented as multiattribute time series data. The dance is used as an example in this paper to illustrate the idea. Given a dance motion sequence as the input, the proposed lesson generation…

  20. Self-surveillance

    DEFF Research Database (Denmark)

    Albrechtslund, Anders

    coupled with social interaction and sometimes framed as entertainment or games. Facilitated by online community and social networking sites, the possibility of collecting and sharing data is a significant feature of these self-monitoring technologies. They all include sharing features where weight, blood...... pressure, fitness activities, sleep cycles, etc. can be broadcasted, e.g. as tweets on Twitter or status updates on Facebook. Such quantification practices with monitoring technologies become co-producing when individuals constitute themselves as subjects engaging in self-tracking, self-care, and self......, and gamification modulate the enactment of selfhood? How does self-surveillance contribute to corresponding notions of self-optimization and self-cultivation such as “the good life”, “sustainable lifestyle”, “healthy living”, “good learning” and “work productivity”?...

  1. Drug approval and surveillance.

    Science.gov (United States)

    Potts, M

    1980-01-01

    This article argues that current regulations governing the licensing of drugs, particularly in the U.S., need to be changed and replaced by a system of provisional or conditional licensing and increased postmarketing surveillance of drug use. In terms of research and development of new forms of contraception, this proposal would have great impact. It is believed that the U.S./Food and Drug Administration (FDA) requirements--animal experiments and Phase 1 and 2 clinical trials--not only put an unacceptable financial burden on any institution attempting to develop new contraceptives, but do not demonstrably contribute to the reduction of risks. The author questions whether even if oral contraceptives introduced prior to new U.S./FDA regulations had been subject to these current regulations that convincing evidence would have been found to alert anyone to the now-known rare adverse effects, such as risk of thromboembolism. It is pointed out that these sorts of rare risks were uncovered by continuous screening processes which are not now a part of the FDA drug regulation requirements. The author also questions the politics of "conpulsory safety," such as might be legislated for regulated car safety belt use. Citing a partnership already established between government and private industry in high-risk/low cost ventures in the aerospace industry, the author sees no reason why such a relationship could not evolve in the pharmaceutical industry. In Britain, proposals have been made to establish a fund to compensate patients adversely affected by drugs which pharmaceutical companies would reimburse if proved negligent; such a fund may work in the U.S. under new regulations which stress postmarketing surveillance.

  2. Secure surveillance videotapes

    Energy Technology Data Exchange (ETDEWEB)

    Resnik, W.M.; Kadner, S.P. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Olsen, R.; Chitumbo, K. [International Atomic Energy Agency, Vienna (Austria); Pepper, S. [International Safeguards Project Office, Vienna (Austria)

    1995-12-31

    With assistance from the US Program for Technical Assistance to IAEA Safeguards (POTAS), Aquila Technologies Group developed the Tamper-Resistant Analog Media (TRAM-1000) system to provide standard VHS surveillance video tapes with an enhanced tamper-indicating capability. This project represents further implementation of the partnership approach in facilities including light water reactors with MOX facilities. These facilities use Uniplex Digiquad system video tapes. The partnership approach ensures that one organization can exchange the tapes in a machine without the presence of the other, without losing continuity of information. The TRAM-1000 system development project was accomplished in two stages. In the first stage of the project, the original system delivered to the IAEA, consists of three parts: (1) the tamper detection unit, (2) a specially augmented VHS video tape, and (3) an HP-95 reader. The tamper detection unit houses a VACOSS active fiber-optic seal and an electronic identification tag (E-TAG) reader. In the second stage of the project, the original TRAM-1000 was modified to its current design based on agency input. After delivery of the original TRAM-1000 system to the IAEA, it was reviewed by inspectors. The inspectors felt that the initial system`s tape storage/transport method could be simplified. Rather than threading the fiber through the tape spindles, the inspectors suggested that the tape be placed in a bag capable of being sealed. Also, a more flexible fiber-optic cable was recommended. As a result of these suggestions, Aquila developed a tamper-proof bag specifically for holding a surveillance video tape and sealable with a VACOSS fiber optical seal.

  3. A REVIEW OF HUMAN ACTIVITY RECONGNITION AND BEHAVIOR UNDERSTANDING IN VIDEO SURVEILLANCE

    Directory of Open Access Journals (Sweden)

    A.R.Revathi

    2012-07-01

    Full Text Available This paper presents a survey of activity recognition and understanding the behaviour of human activity in video sequence. The major goal of this paper is to provide a general review on the overall process of a surveillance system used in the current trend. Visual surveillance system is directed on automatic identification of events of interest, especially on tracking and classification of moving objects. The processing step of the video surveillance system includes the following stages: Surrounding model, object representation, object tracking, activity recognition and behaviour understanding. It describes techniques that use to define a general set of activities that are applicable to a wide range of scenes and environments in video sequence. The review methods used for real-time surveillance through a set of events for further analysis triggering, including virtual fencing, speed profiling, behaviour classification, anomaly detection, and object interaction.

  4. Automaticity and Reading: Perspectives from the Instance Theory of Automatization.

    Science.gov (United States)

    Logan, Gordon D.

    1997-01-01

    Reviews recent literature on automaticity, defining the criteria that distinguish automatic processing from non-automatic processing, and describing modern theories of the underlying mechanisms. Focuses on evidence from studies of reading and draws implications from theory and data for practical issues in teaching reading. Suggests that…

  5. Review of Australia's polio surveillance.

    Science.gov (United States)

    Paterson, Beverley J; Durrheim, David N

    2013-06-30

    With eradication almost within reach, the importance of detecting every poliomyelitis case has taken on additional significance. The selected surveillance strategy must be effective and efficient. A review of polio surveillance in Australia was conducted to consider whether current strategies were optimal. Document review and semi-structured key informant interviews were used to conduct the review. Interviews were recorded, transcribed and thematically analysed. The review was an iterative process with feedback on the findings sought from interviewees. Since Western Pacific Regional polio-elimination status was certified, one imported adult case was detected in 2007 in Australia, with no evidence of further transmission, and no Australian paediatric cases identified. Respondents reported that: it was not possible to prevent importations; paediatric cases were more likely to be identified than adult cases; and there may be a low level of suspicion among clinicians. Case detection and outbreak mitigation were considered key reasons to undertake polio surveillance. While Australia has not achieved one of the key World Health Organization (WHO) surveillance targets, this did not compromise Australias polio-free status. Identified issues with polio surveillance were the potential for an importation with high attendant investigation and containment costs, low stool sample collection rates, and the opportunity to improve safeguards around the importation and laboratory storage of biological samples containing poliovirus. The review found strong support for ongoing polio surveillance, particularly to detect imported cases and to demonstrate commitment to maintaining a polio-free region. Existing polio surveillance strategies were considered appropriate for Australia.

  6. Automatic Ultrasound Scanning

    DEFF Research Database (Denmark)

    Moshavegh, Ramin

    Medical ultrasound has been a widely used imaging modality in healthcare platforms for examination, diagnostic purposes, and for real-time guidance during surgery. However, despite the recent advances, medical ultrasound remains the most operator-dependent imaging modality, as it heavily relies...... on the user adjustments on the scanner interface to optimize the scan settings. This explains the huge interest in the subject of this PhD project entitled “AUTOMATIC ULTRASOUND SCANNING”. The key goals of the project have been to develop automated techniques to minimize the unnecessary settings...... on the scanners, and to improve the computer-aided diagnosis (CAD) in ultrasound by introducing new quantitative measures. Thus, four major issues concerning automation of the medical ultrasound are addressed in this PhD project. They touch upon gain adjustments in ultrasound, automatic synthetic aperture image...

  7. Automatic trend estimation

    CERN Document Server

    Vamos¸, C˘alin

    2013-01-01

    Our book introduces a method to evaluate the accuracy of trend estimation algorithms under conditions similar to those encountered in real time series processing. This method is based on Monte Carlo experiments with artificial time series numerically generated by an original algorithm. The second part of the book contains several automatic algorithms for trend estimation and time series partitioning. The source codes of the computer programs implementing these original automatic algorithms are given in the appendix and will be freely available on the web. The book contains clear statement of the conditions and the approximations under which the algorithms work, as well as the proper interpretation of their results. We illustrate the functioning of the analyzed algorithms by processing time series from astrophysics, finance, biophysics, and paleoclimatology. The numerical experiment method extensively used in our book is already in common use in computational and statistical physics.

  8. Automated computer software development standards enforcement

    Energy Technology Data Exchange (ETDEWEB)

    Yule, H.P.; Formento, J.W.

    1991-01-01

    The Uniform Development Environment (UDE) is being investigated as a means of enforcing software engineering standards. For the programmer, it provides an environment containing the tools and utilities necessary for orderly and controlled development and maintenance of code according to requirements. In addition, it provides DoD management and developer management the tools needed for all phases of software life cycle management and control, from project planning and management, to code development, configuration management, version control, and change control. This paper reports the status of UDE development and field testing. 5 refs.

  9. Computational infrastructure for law enforcement. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Lades, M.; Kunz, C.; Strikos, I.

    1997-02-01

    This project planned to demonstrate the leverage of enhanced computational infrastructure for law enforcement by demonstrating the face recognition capability at LLNL. The project implemented a face finder module extending the segmentation capabilities of the current face recognition so it was capable of processing different image formats and sizes and create the pilot of a network-accessible image database for the demonstration of face recognition capabilities. The project was funded at $40k (2 man-months) for a feasibility study. It investigated several essential components of a networked face recognition system which could help identify, apprehend, and convict criminals.

  10. Intergroup Bias in Parliamentary Rule Enforcement

    DEFF Research Database (Denmark)

    Hjorth, Frederik Georg

    2016-01-01

    Parliament chairmen drawn from parliamentary parties enforce speaking time. Analyzing 5,756 speeches scraped from online transcripts, I provide evidence that speech lengths are biased in favor of the presiding chairman’s party. On average, speakers of the same party as the presiding chairman give 5 percent...... longer speeches and are 5 percent more likely to exceed the speaking time limit. The paper contributes to the extant literature by demonstrating political intergroup bias in a natural setting, suggesting that group loyalties can supersede institutional obligations even in a “least likely” context...

  11. Enforcement of pollution regulation in China

    OpenAIRE

    2009-01-01

    Consultable des del TDX Títol obtingut de la portada digilatlitzada Títol de la versió en paper: Enforcement of enviromental regulation in China La tesis estudia como las firmas cumplen con la regulación de impuestos de contaminación en China y como las agencias ambientales de China imponen la regulación ambiental eficaz a firmas. Nuestro estudio proporciona pruebas claras que las firmas considerablemente underreport su contaminación y acciones de imposición por agencias ambientales ...

  12. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  13. Automatic food decisions

    DEFF Research Database (Denmark)

    Mueller Loose, Simone

    Consumers' food decisions are to a large extent shaped by automatic processes, which are either internally directed through learned habits and routines or externally influenced by context factors and visual information triggers. Innovative research methods such as eye tracking, choice experiments...... and food diaries allow us to better understand the impact of unconscious processes on consumers' food choices. Simone Mueller Loose will provide an overview of recent research insights into the effects of habit and context on consumers' food choices....

  14. Automatic food decisions

    DEFF Research Database (Denmark)

    Mueller Loose, Simone

    Consumers' food decisions are to a large extent shaped by automatic processes, which are either internally directed through learned habits and routines or externally influenced by context factors and visual information triggers. Innovative research methods such as eye tracking, choice experiments...... and food diaries allow us to better understand the impact of unconscious processes on consumers' food choices. Simone Mueller Loose will provide an overview of recent research insights into the effects of habit and context on consumers' food choices....

  15. Automatization of lexicographic work

    Directory of Open Access Journals (Sweden)

    Iztok Kosem

    2013-12-01

    Full Text Available A new approach to lexicographic work, in which the lexicographer is seen more as a validator of the choices made by computer, was recently envisaged by Rundell and Kilgarriff (2011. In this paper, we describe an experiment using such an approach during the creation of Slovene Lexical Database (Gantar, Krek, 2011. The corpus data, i.e. grammatical relations, collocations, examples, and grammatical labels, were automatically extracted from 1,18-billion-word Gigafida corpus of Slovene. The evaluation of the extracted data consisted of making a comparison between the time spent writing a manual entry and a (semi-automatic entry, and identifying potential improvements in the extraction algorithm and in the presentation of data. An important finding was that the automatic approach was far more effective than the manual approach, without any significant loss of information. Based on our experience, we would propose a slightly revised version of the approach envisaged by Rundell and Kilgarriff in which the validation of data is left to lower-level linguists or crowd-sourcing, whereas high-level tasks such as meaning description remain the domain of lexicographers. Such an approach indeed reduces the scope of lexicographer’s work, however it also results in the ability of bringing the content to the users more quickly.

  16. Youth Risk Behavior Surveillance System

    Science.gov (United States)

    ... Evaluation FAQs Additional Evaluation Resources Health & Academics Anti-Bullying Policies and Enumeration: An Infobrief for Local Education ... Youth Risk Behavior Surveillance System (YRBSS) monitors six types of health-risk behaviors that contribute to the ...

  17. Radioisotopic Thermoelectric Generator (RTG) Surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Mulford, Roberta Nancy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-29

    This lecture discusses stockpile stewardship efforts and the role surveillance plays in the process. Performance of the RTGs is described, and the question of the absence of anticipated He is addressed.

  18. Airport Surveillance Radar : Model 8 -

    Data.gov (United States)

    Department of Transportation — The Airport Surveillance Radar Model 8 (ASR-8) is a short-range (60 nautical mile (nmi)), analog radar system used to detect and report the presence and location of...

  19. Airport Surveillance Radar : Model 7 -

    Data.gov (United States)

    Department of Transportation — The Airport Surveillance Radar Model 7 (ASR-7) is a short-range (60 nautical miles (nmi)) analog radar system used to detect and report the presence and location of...

  20. Surveillance of rotavirus diarrhea

    Directory of Open Access Journals (Sweden)

    Titis Widowati

    2012-01-01

    Full Text Available Background Rotavirus is a major cause of severe diarrhea and dehydration in children worldwide. Data on the burden of disease in Indonesia is limited. Objective To provide an epidemiological profile of rotavirus infection among children hospitalized for diarrhea in Mohammad Hoesin Hospital, Palembang. Methods In January - December 2006, a prospective, hospital-based surveillance was carried out in children aged less than five years, presenting with diarrhea. Stool samples were examined for rotavirus using enzyme immunoassay (EIA. G- and P-typing were performed on specimens confirmed to be positive by EIA. Results A total of 513 fecal specimens from 534 children were tested for rotavirus. Rotavirus was detected in 64% of the specimens, mostly of the G9 type (62.5%. Incidence of rotavirus diarrhea was highest in the 6 month to 2 years age group (60.4%. Children with rotavirus diarrhea were more likely to present with dehydration, compared to those with non-rotavirus diarrhea (94% vs 70%, respectively, P=0.03. Conclusion Rotavirus was the most common pathogen found in children with diarrhea. Rotavirus was detected in 64% of pediatric diarrheal specimens tested in our study. This finding warrants the use of a large-scale program to prevent disease, such as vaccination against rotavirus. [Paediatr Indones. 2012;52:22-7].

  1. Public Health Disease Surveillance Networks.

    Science.gov (United States)

    Morse, Stephen S

    2014-02-01

    Zoonotic infections are important sources of human disease; most known emerging infections are zoonotic (e.g., HIV, Ebola virus, severe acute respiratory syndrome, Nipah virus, and enteropathogenic Escherichia coli) and originated as natural infections of other species that acquired opportunities to come in contact with humans. There are also serious infectious diseases classically considered zoonotic, such as influenza, rabies, bubonic plague, brucellosis, and leptospirosis. More recently, it has been recognized that wildlife constitutes a particularly important source of novel zoonoses. With all this microbial movement, surveillance is considered the first line of public health defense. The zoonotic origin of many human and livestock infections argues strongly for the synergistic value of a One Health approach, which provides the capability to identify pathogens crossing into new species and could provide earlier warning of potential epidemics. This article discusses public health surveillance and major recent surveillance initiatives and reviews progress toward implementing a One Health surveillance framework. Networks discussed include global intergovernmental organizations and recent combined efforts of these organizations; Web-based nongovernmental systems (e.g., ProMED, the Program for Monitoring Emerging Diseases); and networks of bilateral or multilateral government programs (e.g., the CDC's Global Disease Detection [GDD] platform; the U.S. Department of Defense's Global Emerging Infections Surveillance and Response System [GEIS]; regional and subregional networks; and the U.S. Agency for International Development's Emerging Pandemic Threats [EPT] program and its surveillance component, PREDICT). Syndromic surveillance also has potential to complement existing systems. New technologies are enabling revolutionary capabilities for global surveillance, but in addition to serious technical needs, both sustainability and data-sharing mechanisms remain

  2. Development of the Observational Surveillance

    OpenAIRE

    Rieutort, Delphine

    2015-01-01

    Impact of population on the environment, and conversely, is obvious and represents a real challenge for Public Health since 2000. It has been shown an increase in cancer prevalence, respiratory disease or even reproductive disorders, for which multifactorial origins are strongly suspected. In this context, surveillance has become an essential tool to decision making in public health, and surveillance networks of health events are multiplying, giving rise to numerous databases (sometimes consi...

  3. Syndromic surveillance: A local perspective

    OpenAIRE

    2003-01-01

    The promise of syndromic surveillance extends beyond early warning for bioterrorist attacks. Even if bioterrorism is first detected by an astute clinician, syndromic surveillance can help delineate the size, location, and tempo of the epidemic or provide reassurance that a large outbreak is not occurring when a single case or a small, localized cluster of an unusual illness is detected. More broadly, however, as public health and medicine proceed in our information age, the use of existing el...

  4. Occupational Surveillance for Spaceflight Exposures

    Science.gov (United States)

    Tarver, William J.

    2010-01-01

    This slide presentation reviews the importance of longterm occupational health surveillance of astronauts after exposure to the possible hazards of spaceflight. Because there is not much information about long term effects of spaceflight on human health, it is important to identify some of the possible results of exposure to the many possible factors that can influence longterm health impacts. This surveillance also allows for NASA to meet the obligation to care for the astronauts for their lifetime.

  5. Surface Environmental Surveillance Procedures Manual

    Energy Technology Data Exchange (ETDEWEB)

    RW Hanf; TM Poston

    2000-09-20

    Environmental surveillance data are used in assessing the impact of current and past site operations on human health and the environment, demonstrating compliance with applicable local, state, and federal environmental regulations, and verifying the adequacy of containment and effluent controls. SESP sampling schedules are reviewed, revised, and published each calendar year in the Hanford Site Environmental Surveillance Master Sampling Schedule. Environmental samples are collected by SESP staff in accordance with the approved sample collection procedures documented in this manual.

  6. Sex Trafficking, Law Enforcement and Perpetrator Accountability

    Directory of Open Access Journals (Sweden)

    Holly Burkhalter

    2012-06-01

    Full Text Available In theory, everyone – except for criminals involved in their exploitation - agrees that children must not be in the sex industry and further, that those who prey on them must be prosecuted and punished. Virtually every country in the world has adopted national laws prohibiting the commercial sexual exploitation of children. International law is clear on this point, as well. Yet, when governments – and NGOs working with them – take action to extract children from commercial sex venues, common ground on protecting children from abuse can quickly erode with concerns about the efficacy of police intervention, the possibility of collateral harm to consenting adult sex workers or a decrease in access to HIV-prevention and related health services. The author argues that healing this divide must come through the reform of local police – and that, without the participation of law enforcement, there can be no long-term protection for children vulnerable to trafficking and related exploitation. In this article, human rights practitioner Holly Burkhalter argues that healing this divide must be accomplished through the reform of local police – and that human rights advocates, local governments and others seeking to combat trafficking cannot achieve long-term, sustainable protection for children without the involvement of law enforcement.

  7. REGULATION AND ENFORCEMENT OF COMPETITION POLICY

    Directory of Open Access Journals (Sweden)

    Liviana Andreea Niminet

    2014-12-01

    Full Text Available Competition policy starts by shaping a legislative framework. This is aimed to establish boundaries for conducting competition and also sets limits of licit and illicit demarcation, for competitive and anticompetitive practices. The Romanian Competition Law has a divalent approach and it aims to provide specific behavioral conditions in order to stimulate and protect free-market competition, with the ultimate goal of developing a balanced, efficient and competitive economy. Our country’s Competition policy is based on punishing the behavior. There are three such types of anti-competitive behavior, namely: agreements between undertakings, abuse of dominant position and mergers and other concentrations between undertakings. Recent Practice proved that this “enforcement-conduct-punishment” structure is not necessary the best way to address competition and it is high time for authorities to switch both regulation and enforcement of competition from the “classical perspective” towards concepts like “competition advocacy” and “soft power” and give competition policy a new, reshaped face.

  8. Automatically generating procedure code and database maintenance scripts

    Energy Technology Data Exchange (ETDEWEB)

    Hatley, J.W. [Sandia National Labs., Albuquerque, NM (United States). Information Technologies and Methodologies Dept.

    1994-10-01

    Over the past couple of years the Information Technology Department at Sandia Laboratories has developed software to automatically generate database/4gl procedure code and database maintenance scripts based on database table information. With this software developers simply enter table and referential integrity information and the software generates code and scripts as required. The generated procedure code includes simple insert/delete/update procedures, transaction logging procedures as well as referential integrity procedures. The generated database maintenance scripts include scripts to modify structures, update remote databases, create views, and create indexes. Additionally, the software can generate EPSI representations of Binder diagrams for the tables. This paper will discuss the software application and use of it in real world applications. The automated generation of procedure code and maintenance scripts allows the developers to concentrate on the development of user interface code. The technique involves generating database/4 gl procedure code and maintenance scripts automatically from the database table information. The database/4gl procedure code provides standard insert/update/delete interfaces for upper level code as well as enforces the data constraints defined in the information model. The maintenance scripts provide maintenance scripts and migration scripts. This has resulted in fully updated database applications with complete rules enforcement and database maintenance scripts within days of a database modification.

  9. NRC Enforcement Policy Review, July 1995-July 1997

    Energy Technology Data Exchange (ETDEWEB)

    Lieberman, J.; Pedersen, R.M.

    1998-04-01

    On June 30, 1995, the Nuclear Regulatory Commission (NRC) issued a complete revision of its General Statement of Policy and Procedure for Enforcement Action (Enforcement Policy) (60 FR 34381). In approving the 1995 revision to the Enforcement Policy, the Commission directed the staff to perform a review of its implementation of the Policy after approximately 2 years of experience and to consider public comments. This report represents the results of that review.

  10. Immigration Enforcement and Childhood Poverty in the United States

    OpenAIRE

    Amuedo-Dorantes, Catalina; Arenas-Arroyo, Esther; Sevilla, Almudena

    2016-01-01

    Over the past two decades immigration enforcement has grown exponentially in the United States. We exploit the geographical and temporal variation in a novel index of the intensity of immigration enforcement between 2005 and 2011 to show how the average yearly increase in interior immigration enforcement over that time period raised the likelihood of living in poverty of households with U.S. citizen children by 4 percent. The effect is robust to a number of identification tests accounting for...

  11. Automatic System for Serving and Deploying Products into Advertising Space

    OpenAIRE

    Lepen, Nejc

    2014-01-01

    The purpose of the thesis is to present the problems of deploying and serving products into advertising space,encountered daily by online marketers,planners and leaseholders of advertising spaces.The aim of the thesis is to solve the problem in question with the help of a novel web application.Therefore,we have designed an automatic system,which consists of three key components:an online store,a surveillance system and websites accommodating advertising space.In the course of this thesis,we h...

  12. Implementation of surveillance scheme in Health System by endemic levels or ranges in emergency department. Implementación de un sistema de vigilancia en salud por corredores endémicos en el departamento de urgencia

    Directory of Open Access Journals (Sweden)

    Maira Valladares Vilches

    Full Text Available Background: Surveillance in health system is the follow up, data systematic collection, analysis and interpretation of health events to be used in planning, implementation and assessment of programs. Emergency department is a core place within an institution´s system and requires clear and timely information, statistical analysis and a constant and computerized surveillance system for appropriate decision making. Objective: To enforce a health surveillance system in emergency department through endemic levels or ranges. Methods: Descriptive research of chronological series developed in the emergency department of the University Paediatric Hospital in Cienfuegos. Data from chronological series from 2002 to 2006 was collected for 4 events. An automatic program was used to make the endemic levels or ranges. Conclusions: In this research, a surveillance system was presented with the elaboration of endemic levels or ranges of 4 events. This constitutes a useful, strong and accessible tool for the decision making process of the Directive Board.Fundamento: La vigilancia en salud es el seguimiento, la recolección sistemática, el análisis y la interpretación de datos sobre eventos de salud para ser utilizados en la planificación, implementación y evaluación de programas. El departamento de urgencia es un lugar clave dentro del sistema de una institución por lo que son necesarias informaciones y análisis estadísticos claros y oportunos, así como un sistema de vigilancia continua e informatizada para una adecuada toma de decisiones. Objetivo: Implementar un sistema de vigilancia de salud en el departamento de urgencia a través de corredores endémicos. Métodos: Investigación descriptiva de series cronológicas realizada en el departamento de urgencia del Hospital Pediátrico Universitario de Cienfuegos. Se tomaron los datos

  13. Automaticity or active control

    DEFF Research Database (Denmark)

    Tudoran, Ana Alina; Olsen, Svein Ottar

    This study addresses the quasi-moderating role of habit strength in explaining action loyalty. A model of loyalty behaviour is proposed that extends the traditional satisfaction–intention–action loyalty network. Habit strength is conceptualised as a cognitive construct to refer to the psychological...... aspects of the construct, such as routine, inertia, automaticity, or very little conscious deliberation. The data consist of 2962 consumers participating in a large European survey. The results show that habit strength significantly moderates the association between satisfaction and action loyalty, and...

  14. Automatic Configuration in NTP

    Institute of Scientific and Technical Information of China (English)

    Jiang Zongli(蒋宗礼); Xu Binbin

    2003-01-01

    NTP is nowadays the most widely used distributed network time protocol, which aims at synchronizing the clocks of computers in a network and keeping the accuracy and validation of the time information which is transmitted in the network. Without automatic configuration mechanism, the stability and flexibility of the synchronization network built upon NTP protocol are not satisfying. P2P's resource discovery mechanism is used to look for time sources in a synchronization network, and according to the network environment and node's quality, the synchronization network is constructed dynamically.

  15. Automatic Complexity Analysis

    DEFF Research Database (Denmark)

    Rosendahl, Mads

    1989-01-01

    One way to analyse programs is to to derive expressions for their computational behaviour. A time bound function (or worst-case complexity) gives an upper bound for the computation time as a function of the size of input. We describe a system to derive such time bounds automatically using abstrac...... interpretation. The semantics-based setting makes it possible to prove the correctness of the time bound function. The system can analyse programs in a first-order subset of Lisp and we show how the system also can be used to analyse programs in other languages....

  16. Automatic road traffic safety management system in urban areas

    Directory of Open Access Journals (Sweden)

    Oskarbski Jacek

    2017-01-01

    Full Text Available Traffic incidents and accidents contribute to decreasing levels of transport system reliability and safety. Traffic management and emergency systems on the road, using, among others, automatic detection, video surveillance, communication technologies and institutional solutions improve the organization of the work of various departments involved in traffic and safety management. Automation of incident management helps to reduce the time of a rescue operation as well as of the normalization of the flow of traffic after completion of a rescue operation, which also affects the reduction of the risk of secondary accidents and contributes to reducing their severity. The paper presents the possibility of including city traffic departments in the process of incident management. The results of research on the automatic incident detection in cities are also presented.

  17. Automatic adverse drug events detection using letters to the editor.

    Science.gov (United States)

    Yang, Chao; Srinivasan, Padmini; Polgreen, Philip M

    2012-01-01

    We present and test the intuition that letters to the editor in journals carry early signals of adverse drug events (ADEs). Surprisingly these letters have not yet been exploited for automatic ADE detection unlike for example, clinical records and PubMed. Part of the challenge is that it is not easy to access the full-text of letters (for the most part these do not appear in PubMed). Also letters are likely underrated in comparison with full articles. Besides demonstrating that this intuition holds we contribute techniques for post market drug surveillance. Specifically, we test an automatic approach for ADE detection from letters using off-the-shelf machine learning tools. We also involve natural language processing for feature definitions. Overall we achieve high accuracy in our experiments and our method also works well on a second new test set. Our results encourage us to further pursue this line of research.

  18. Video Analytics Algorithm for Automatic Vehicle Classification (Intelligent Transport System

    Directory of Open Access Journals (Sweden)

    ArtaIftikhar

    2013-04-01

    Full Text Available Automated Vehicle detection and classification is an important component of intelligent transport system. Due to significant importance in various fields such as traffic accidents avoidance, toll collection, congestion avoidance, terrorist activities monitoring, security and surveillance systems, intelligent transport system has become important field of study. Various technologies have been used for detecting and classifying vehicles automatically. Automated vehicle detection is broadly divided into two types- Hardware based and software based detection. Various algorithms have been implemented to classify different vehicles from videos. In this paper an efficient and economical solution for automatic vehicle detection and classification is proposed. The proposed system first isolates the object through background subtraction followed by vehicle detection using ontology. Vehicle detection is based on low level features such as shape, size, and spatial location. Finally system classifies vehicles into one of the known classes of vehicle based on size.

  19. [Assessment of psychological conditions for the use of firearms in law enforcement].

    Science.gov (United States)

    Vilardell Molas, Jordi; Martí Agustí, Gabriel; Solé i Sanosa, M Angels

    2014-03-01

    To handle firearms safely, an individual needs to be in sound psychological conditions. This point is especially relevant in law enforcement, given that this group is likely to experience situations where there is a reasonably severe risk to life, physical integrity and that of third parties. These conditions cause high levels of stress and become a significant source of psychological strain. The assessment of these psychological conditions in law enforcement must stay ahead of this strain and should act preventively, establishing surveillance that is the product of a consensus between the needs of professionals and organizations. This evaluation should be conducted by technical specialists who understand and know the occupational reality of these professionals. A good assessment methodology starts with the need to discover the basic areas that need exploring, the ideal procedure for assessing these issues and the criteria that determine the aptitude (or lack thereof) for handling firearms. Once these goals have been established, we can be assured that the assessment will follow a set of principles that will give it homogeneity, effectiveness and efficiency. This type of assessment will help accomplish the mission that these security professionals are entrusted to by law, which is to protect the free exercise of rights and freedoms and ensure citizen safety. Copyright © 2014 Elsevier España, S.L. All rights reserved.

  20. Cost and Benefit of Control Strategies - Estimation of Benefit functions, enforcement-probability function and enforcement-cost function

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Jensen, Frank

      Within the EU Sixth Framework Programme an ongoing research project, COBECOS, has developed a theory of enforcement and a software code for computer modeling of different fisheries with fisheries enforcement cases. The case of the Danish fishery for Nephrops faces problems with landings...... on fishery enforcement from the COBECOS project to a specific case. It is done by estimations of functional relationships' for describing 1) the fisheries benefit function 2) the shadow value of biomass 3) the connection between the probability of being detected and apprehended for different enforcement...

  1. Explaining the enforcement gap in China: local government support and internal agency obstacles as predictors of enforcement actions in Guangzhou.

    Science.gov (United States)

    Lo, Carlos Wing-Hung; Fryxell, Gerald E; van Rooij, Benjamin; Wang, Wei; Honying Li, Pansy

    2012-11-30

    This study investigates how local government support for enforcement and internal agency obstacles explain the enforcement gap in Guangzhou, China. It was found that agency obstacles associated with insufficient resources and job ambiguity, in particular, affect enforcement officials' perceptions of enforcement difficulty. Somewhat more surprisingly, however, local government support was not found to be a significant predictor of these perceptions. In addition, this study identified four significant relationships associated with specific enforcement actions. First and second, perceptions of enforcement difficulty appear to lead to fewer inspections, but also have a weak positive effect on the frequency of fines levied. Third, poor coordination within the bureau was found to be associated with fewer violations being processed. Fourth, and contrary to expectations, local government support was found to suppress the frequency of inspections while having no significant effect on violations or fines. Overall, these findings suggest that increased local government support for the enforcement of environmental regulation in China may not necessarily lead to more rigorous enforcement, at least if enforcement rigor is measured in terms of inspections, citations and fines.

  2. Sparsity-enforcing regularisation and ISTA revisited

    Science.gov (United States)

    Daubechies, Ingrid; Defrise, Michel; De Mol, Christine

    2016-10-01

    About two decades ago, the concept of sparsity emerged in different disciplines such as statistics, imaging, signal processing and inverse problems, and proved to be useful for several applications. Sparsity-enforcing constraints or penalties were then shown to provide a viable alternative to the usual quadratic ones for the regularisation of ill-posed problems. To compute the corresponding regularised solutions, a simple, iterative and provably convergent algorithm was proposed and later on referred to as the iterative soft-thresholding algorithm. This paper provides a brief review of these early results as well as that of the subsequent literature, albeit from the authors’ limited perspective. It also presents the previously unpublished proof of an extension of the original framework.

  3. Dynamic Enforcement of the Strict Integrity Policy

    Institute of Scientific and Technical Information of China (English)

    ZHANGXiangfeng; LIANGHongliang; SUNYufang

    2005-01-01

    The Strict integrity policy (SIP) in Biba's integrity model is widely used in protecting information integrity, but the static integrity labels of both subjects and objects increase compatibility cost of applications and might prevent some operations that are indeed harmless.In order to improve compatibility, Dynamic enforcement of the Strict integrity policy (DESIP) is put forward. The current integrity label attribute of a subject in SIP is replaced with two attributes in DESIP, which are used to confine dynamically the range of objects a subject could be allowed to access. The new rules of access control in DESIP are given for each kind of access mode (observe,modify and invoke) together with the proofs of their valid-ity. Comparison between SIP and DESIP shows that after a sequence of operations, a subject controlled by DESIP tends to behave in a similar way as it is controlled by SIP and DESIP is more compatible than SIP.

  4. Security Policy Enforcement Through Refinement Process

    CERN Document Server

    Stouls, Nicolas

    2010-01-01

    In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process. We argue that it is possible to build a formal link between concrete and abstract terms, which can be dynamically computed from the environment data. In order to progressively introduce configuration data and then simplify the proof obligations, we use the B refinement process. We present a case study modeling a network monitor. This program, described by refinement following the layers of the TCP/IP suite protocol, has to warn for all observed events which do not respect the security policy. To design this model, we use the event-B method because it is suitable for modeling network concepts. This work has been done within the framework of the POTESTAT project, based on the research of network testing methods from a high-level security policy.

  5. OzBot and haptics: remote surveillance to physical presence

    Science.gov (United States)

    Mullins, James; Fielding, Mick; Nahavandi, Saeid

    2009-05-01

    This paper reports on robotic and haptic technologies and capabilities developed for the law enforcement and defence community within Australia by the Centre for Intelligent Systems Research (CISR). The OzBot series of small and medium surveillance robots have been designed in Australia and evaluated by law enforcement and defence personnel to determine suitability and ruggedness in a variety of environments. Using custom developed digital electronics and featuring expandable data busses including RS485, I2C, RS232, video and Ethernet, the robots can be directly connected to many off the shelf payloads such as gas sensors, x-ray sources and camera systems including thermal and night vision. Differentiating the OzBot platform from its peers is its ability to be integrated directly with haptic technology or the 'haptic bubble' developed by CISR. Haptic interfaces allow an operator to physically 'feel' remote environments through position-force control and experience realistic force feedback. By adding the capability to remotely grasp an object, feel its weight, texture and other physical properties in real-time from the remote ground control unit, an operator's situational awareness is greatly improved through Haptic augmentation in an environment where remote-system feedback is often limited.

  6. Congenital syphilis surveillance

    Directory of Open Access Journals (Sweden)

    Antonella Marangoni

    2011-06-01

    Full Text Available Congenital syphilis (CS is mainly a consequence of the lack of antenatal care and control of sexually transmitted infections.The bedrock of the prevention of CS is syphilis diagnosis by serological screening during pregnancy.Current Italian guidelines suggest that all the pregnant women should be tested in the first trimester. Due to the frequently absence of specific signs of infection at birth, laboratory tests are often the only method for a correct CS diagnosis. The aim of this study was to evaluate the usefulness of Treponema pallidum IgM Western Blot (WB and Polymerase Chain Reaction (PCR on cerebrospinal fluid (CSF as an aid in the diagnosis of CS during a prospective surveillance study carried out at St. Orsola Hospital in Bologna, Italy, from November 2000 through June 2010. All pregnant women during pregnancy and at delivery were screened for syphilis by ARCHITECT® Syphilis TP, Abbott. Positive samples were further analysed by Treponema Pallidum Hemagglutination Test (TPHA and Rapid Plasma Reagin (RPR tests, Radim.An in-house Western Blot (WB was also performed. Infants born to syphilis seropositive mothers were enrolled in a prospective follow up. At birth, tests were performed (including IgM WB. Infants with positive RPR tests at birth born to mothers not adequately treated received also a long bone radiograph as well as a complete CSF analysis, including Veneral Disease Research Laboratori (VDRL (Siemens Healthcare Diagnostics and PCR testing. All seroreactive infants received careful follow up examinations and serological testing at 0, 3, 6, 9, 12 months or until the tests became negative. In this study, positive syphilis serology was noted in 151 pregnant women delivering in our hospital. Fifteen women had never been adequately treated, and 9 out 15 gave birth to infected newborns.All these 9 infants had positive IgM WB results on serum samples. Two babies had characteristic long bone lesions at X-ray examination and 3 were born

  7. A new computerized program for surveillance of prosthetic arteriovenous fistulas

    Directory of Open Access Journals (Sweden)

    Matteo Tozzi

    2015-05-01

    Full Text Available Stenosis and thrombosis are common causes of prosthetic vascular access (pVA failure. The role of arteriovenous fistula (AVF surveillance is widely debated. The aim of this paper is to present a new real-time application designed for AVF surveillance called SPIDER. Surgical staff and hemodialysis nurses are responsible for data entry. SPIDER automatically analyses data and generates alerts in case of abnormal trends. Surgical evaluation and duplex Doppler ultrasonography are then immediately performed to confirm presence of stenosis or other possible pVA defects. Surgery can be performed if required. A preliminary analysis of results will be completed at 12 months after the program begins and subsequently after 24 months. Primary assisted patency will be compared with historical using multivariate analysis. Expected results are an improvement in primary assisted pVA patency and reduction of hospitalizations. Simultaneous management of a high number of patients can become difficult due to the large amount of data required for surveillance. We want to demonstrate whether a real-time automated system could help to prevent thrombosis and graft loss.

  8. Automaticity or active control

    DEFF Research Database (Denmark)

    Tudoran, Ana Alina; Olsen, Svein Ottar

    This study addresses the quasi-moderating role of habit strength in explaining action loyalty. A model of loyalty behaviour is proposed that extends the traditional satisfaction–intention–action loyalty network. Habit strength is conceptualised as a cognitive construct to refer to the psychologic......, respectively, between intended loyalty and action loyalty. At high levels of habit strength, consumers are more likely to free up cognitive resources and incline the balance from controlled to routine and automatic-like responses.......This study addresses the quasi-moderating role of habit strength in explaining action loyalty. A model of loyalty behaviour is proposed that extends the traditional satisfaction–intention–action loyalty network. Habit strength is conceptualised as a cognitive construct to refer to the psychological...... aspects of the construct, such as routine, inertia, automaticity, or very little conscious deliberation. The data consist of 2962 consumers participating in a large European survey. The results show that habit strength significantly moderates the association between satisfaction and action loyalty, and...

  9. Mass Processing of Sentinel-1 Images for Maritime Surveillance

    Directory of Open Access Journals (Sweden)

    Carlos Santamaria

    2017-07-01

    Full Text Available The free, full and open data policy of the EU’s Copernicus programme has vastly increased the amount of remotely sensed data available to both operational and research activities. However, this huge amount of data calls for new ways of accessing and processing such “big data”. This paper focuses on the use of Copernicus’s Sentinel-1 radar satellite for maritime surveillance. It presents a study in which ship positions have been automatically extracted from more than 11,500 Sentinel-1A images collected over the Mediterranean Sea, and compared with ship position reports from the Automatic Identification System (AIS. These images account for almost all the Sentinel-1A acquisitions taken over the area during the two-year period from the start of the operational phase in October 2014 until September 2016. A number of tools and platforms developed at the European Commission’s Joint Research Centre (JRC that have been used in the study are described in the paper. They are: (1 Search for Unidentified Maritime Objects (SUMO, a tool for ship detection in Synthetic Aperture Radar (SAR images; (2 the JRC Earth Observation Data and Processing Platform (JEODPP, a platform for efficient storage and processing of large amounts of satellite images; and (3 Blue Hub, a maritime surveillance GIS and data fusion platform. The paper presents the methodology and results of the study, giving insights into the new maritime surveillance knowledge that can be gained by analysing such a large dataset, and the lessons learnt in terms of handling and processing the big dataset.

  10. Comparison of automatic control systems

    Science.gov (United States)

    Oppelt, W

    1941-01-01

    This report deals with a reciprocal comparison of an automatic pressure control, an automatic rpm control, an automatic temperature control, and an automatic directional control. It shows the difference between the "faultproof" regulator and the actual regulator which is subject to faults, and develops this difference as far as possible in a parallel manner with regard to the control systems under consideration. Such as analysis affords, particularly in its extension to the faults of the actual regulator, a deep insight into the mechanism of the regulator process.

  11. 40 CFR 8.11 - Prohibited acts, enforcement and penalties.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Prohibited acts, enforcement and penalties. 8.11 Section 8.11 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL ENVIRONMENTAL IMPACT ASSESSMENT OF NONGOVERNMENTAL ACTIVITIES IN ANTARCTICA § 8.11 Prohibited acts, enforcement and...

  12. Task force on compliance and enforcement. Final report. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    1978-03-01

    Recommendations for measures to strengthen the FEA enforcement program in the area of petroleum price regulation are presented. Results of task force efforts are presented in report and recommendations sections concerned with pending cases, compliance program organization, enforcement powers, compliance strategy, and audit staffing and techniques. (JRD)

  13. 28 CFR 55.23 - Enforcement by the Attorney General.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Enforcement by the Attorney General. 55.23 Section 55.23 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) IMPLEMENTATION OF THE PROVISIONS OF THE VOTING RIGHTS ACT REGARDING LANGUAGE MINORITY GROUPS Sanctions § 55.23 Enforcement by...

  14. The Role of Information Deficiencies in Contract Enforcement

    NARCIS (Netherlands)

    A.M.I.B. Vandenberghe (Ann-Sophie)

    2010-01-01

    textabstractInformation deficiencies play an important role in contract enforcement. Courts frequently refuse to enforce contractual terms when one of the parties lacks information. The difficult question is where the line is drawn (or should be drawn) between information deficiencies of which the

  15. 34 CFR 300.537 - State enforcement mechanisms.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false State enforcement mechanisms. 300.537 Section 300.537... Procedures § 300.537 State enforcement mechanisms. Notwithstanding §§ 300.506(b)(7) and 300.510(d)(2), which... meeting, there is nothing in this part that would prevent the SEA from using other mechanisms to...

  16. Role of Enforcement in Prevention. Issues in Prevention

    Science.gov (United States)

    Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2012

    2012-01-01

    This issue of "Issues in Prevention" focuses on the role of enforcement in prevention. This issue contains the following articles: (1) What the Evidence Tells Us about the Role of Enforcement in Prevention; (2) Campus Briefs; (3) Q&A with Charles Cychosz; and (4) Higher Education Center Resources.

  17. The Cost of Enforcing Building Energy Codes: Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Alison [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Vine, Ed [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Price, Sarah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Sturges, Andrew [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Rosenquist, Greg [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-04-01

    The purpose of this literature review is to summarize key findings regarding the costs associated with enforcing building energy code compliance—primarily focusing on costs borne by local government. The review takes into consideration over 150 documents that discuss, to some extent, code enforcement. This review emphasizes those documents that specifically focus on costs associated with energy code enforcement. Given the low rates of building energy code compliance that have been reported in existing studies, as well as the many barriers to both energy code compliance and enforcement, this study seeks to identify the costs of initiatives to improve compliance and enforcement. Costs are reported primarily as presented in the original source. Some costs are given on a per home or per building basis, and others are provided for jurisdictions of a certain size. This literature review gives an overview of state-based compliance rates, barriers to code enforcement, and U.S. Department of Energy (DOE) and key stakeholder involvement in improving compliance with building energy codes. In addition, the processes and costs associated with compliance and enforcement of building energy codes are presented. The second phase of this study, which will be presented in a different report, will consist of surveying 34 experts in the building industry at the national and state or local levels in order to obtain additional cost information, building on the findings from the first phase, as well as recommendations for where to most effectively spend money on compliance and enforcement.

  18. 31 CFR 103.76 - Enforcement of summons.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Enforcement of summons. 103.76 Section 103.76 Money and Finance: Treasury Regulations Relating to Money and Finance FINANCIAL RECORDKEEPING AND REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS Summons § 103.76 Enforcement of summons. In...

  19. The collective security system and the enforcement of international law

    NARCIS (Netherlands)

    d' Aspremont, J.; Weller, M.

    2015-01-01

    After a few brief terminological remarks on the concepts of enforcement, coercion and sanction, this chapter will briefly recall the theoretical debates about the role of enforcement in our understanding of international law. A few observations will then be formulated as to how the creation of a col

  20. Practical Run-Time Norm Enforcement with Bounded Lookahead

    NARCIS (Netherlands)

    Alechina, Natasha; Bulling, Nils; Dastani, Mehdi; Logan, Brian

    2015-01-01

    Norms have been widely proposed as a means of coordinating and controlling the behaviour of agents in a multi-agent system. A key challenge in normative MAS is norm enforcement: how and when to restrict the agents’ behaviour in order to obtain a desirable outcome? Even if a norm can be enforced

  1. Community How To Guide On Underage Drinking Prevention: Enforcement.

    Science.gov (United States)

    National Association of Governors' Highway Safety Representatives.

    This guide details what coalitions and organizations need to do to insure the enforcement and judicial communities are active partners in the effort to reduce underage drinking. One of the first tasks discussed is the necessity for groups to understand the needs and concerns of law enforcement and to recognize that underage drinking enforcement…

  2. Enforcing fire safety in the catering industry : an economic analysis.

    NARCIS (Netherlands)

    Suurmond, Guido

    2008-01-01

    What is an effective and efficient enforcement policy for fire safety in the catering industry? When and why is an informal, cooperative enforcement style through warnings, persuasion and advice (a so called compliance strategy) effective in inducing compliance with the fire safety regulation? The s

  3. 78 FR 4081 - Request for Comment on Enforcement Process

    Science.gov (United States)

    2013-01-18

    ... & Bradstreet; Newspaper Articles; FEC Press Office; Martindale Hubbell; State Corporate Divisions; State Ethics... determination at pre-RTB stage); see also Enforcement Procedure 1992-10 (Subject: News Articles), Enforcement..., for the purpose of ascertaining specific types of information; and (4) news articles and...

  4. The effect of enforcement on speed behaviour : a literature review.

    NARCIS (Netherlands)

    Oei, H.-l.

    1998-01-01

    The objective of this literature study is to give an overview of research on speed enforcement and its effect on speed behaviour and safety. This study will be used to find new strategies and tactics to enhance the efficiency and effectiveness of speed enforcement by the police in terms of behaviour

  5. Decentralized enforcement, sequential bargaining, and the clean development mechanism

    Energy Technology Data Exchange (ETDEWEB)

    Hovi, Jon

    2001-07-01

    While there is a vast literature both on international bargaining and on how international agreements can be enforced, very little work has been done on how bargaining and enforcement interact. An important exception is Fearon (1998), who models international cooperation as a two-stage process in which the bargaining process is constrained by a need for decentralized enforcement (meaning that the agreement must be enforced by the parties themselves rather than a third party, such as a court). Using the Clean Development Mechanism as an example, the present paper proposes a different model of this kind of interaction. The model follows Fearon's in so far as we both use the infinitely repeated Prisoners' Dilemma to capture the enforcement phase of the game. However, while Fearon depicts the bargaining stage as a War of Attrition, the present model sees that stage as a sequential bargaining game of the Staahl-Rubinstein type. The implications of the present model are compared both to those of the Staahl-Rubinstein model and to those of the Fearon model. A surprising conclusion is that a need for decentralized enforcement tends to make the bargaining outcome more symmetrical than otherwise. Thus, the impact of bargaining power is actually smaller when the resulting agreement must be enforced by the parties themselves than it is if enforcement is taken care of by a third party. (author)

  6. The Role of Information Deficiencies in Contract Enforcement

    NARCIS (Netherlands)

    A.M.I.B. Vandenberghe (Ann-Sophie)

    2010-01-01

    textabstractInformation deficiencies play an important role in contract enforcement. Courts frequently refuse to enforce contractual terms when one of the parties lacks information. The difficult question is where the line is drawn (or should be drawn) between information deficiencies of which the l

  7. 36 CFR 905.737-102 - Enforcement proceedings.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Enforcement proceedings. 905... Enforcement proceedings. (a) Delegation. The Chairman of the Corporation may delegate his or her authority... proceedings, unless the Department of Justice communicates to the Corporation that it does not intend...

  8. 25 CFR 11.1003 - Law enforcement officer's duties.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Law enforcement officer's duties. 11.1003 Section 11.1003 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Juvenile Offender Procedure § 11.1003 Law enforcement officer's duties. A law...

  9. 25 CFR 11.1103 - Law enforcement officer's duties.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Law enforcement officer's duties. 11.1103 Section 11.1103 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Minor-in-Need-of-Care Procedure § 11.1103 Law enforcement officer's duties. Upon...

  10. Randomized Trial of Law Enforcement Training on Autism Spectrum Disorders

    Science.gov (United States)

    Teagardin, Jill; Dixon, Dennis R.; Smith, Marlena N.; Granpeesheh, Doreen

    2012-01-01

    The core symptoms of autism spectrum disorders (ASD) are likely to affect interactions between law enforcement officers and persons with ASD. If law enforcement officers are not trained to identify and appropriately respond to persons with ASD, it is possible that officers may exacerbate a situation, resulting in unnecessary trauma, injury, or…

  11. 28 CFR 0.29j - Law enforcement authority.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Law enforcement authority. 0.29j Section...-Office of the Inspector General § 0.29j Law enforcement authority. Subject to guidelines promulgated by...) Detect and assist in the prosecution of crimes in violation of the laws of the United States and to...

  12. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... by analyzing a location-based system for airport passengers developed for a Copenhagen Airport, and the dimensions are used to explain user reactions to different services offered by the system....... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach...

  13. Informatics enables public health surveillance

    Directory of Open Access Journals (Sweden)

    Scott J. N McNabb

    2017-01-01

    Full Text Available Over the past decade, the world has radically changed. New advances in information and communication technologies (ICT connect the world in ways never imagined. Public health informatics (PHI leveraged for public health surveillance (PHS, can enable, enhance, and empower essential PHS functions (i.e., detection, reporting, confirmation, analyses, feedback, response. However, the tail doesn't wag the dog; as such, ICT cannot (should not drive public health surveillance strengthening. Rather, ICT can serve PHS to more effectively empower core functions. In this review, we explore promising ICT trends for prevention, detection, and response, laboratory reporting, push notification, analytics, predictive surveillance, and using new data sources, while recognizing that it is the people, politics, and policies that most challenge progress for implementation of solutions.

  14. Visual Sensor Technology for Advanced Surveillance Systems: Historical View, Technological Aspects and Research Activities in Italy

    Directory of Open Access Journals (Sweden)

    Lauro Snidaro

    2009-03-01

    Full Text Available The paper is a survey of the main technological aspects of advanced visual-based surveillance systems. A brief historical view of such systems from the origins to nowadays is given together with a short description of the main research projects in Italy on surveillance applications in the last twenty years. The paper then describes the main characteristics of an advanced visual sensor network that (a directly processes locally acquired digital data, (b automatically modifies intrinsic (focus, iris and extrinsic (pan, tilt, zoom parameters to increase the quality of acquired data and (c automatically selects the best subset of sensors in order to monitor a given moving object in the observed environment.

  15. Law Enforcement Proxies Matter for the Law and Finance Nexus

    Directory of Open Access Journals (Sweden)

    Valentin Toci

    2013-07-01

    Full Text Available The paper employs various measures of law enforcement to provide new evidence on the importance of legal institutions for different dimensions of financial development in transition economies. It offers a critical assessment of law enforcement measures employed in recent studies by showing that some proxies for law enforcement in the credit market may not be appropriate. Hence, care should be taken in how the quality of institutions is measured and the context which it represents. An original approach to measuring law enforcement in the credit market is developed by embodying the legal theory of dispute resolution and assessing this approach by collecting primary data for Kosovo. The findings suggest that Kosovo compares well with countries in the region and other transition economies in terms of the enforcement of creditor rights.

  16. A Health Surveillance Software Framework to deliver information on preventive healthcare strategies.

    Science.gov (United States)

    Macedo, Alessandra Alaniz; Pollettini, Juliana Tarossi; Baranauskas, José Augusto; Chaves, Julia Carmona Almeida

    2016-08-01

    A software framework can reduce costs related to the development of an application because it allows developers to reuse both design and code. Recently, companies and research groups have announced that they have been employing health software frameworks. This paper presents the design, proof-of-concept implementations and experimentation of the Health Surveillance Software Framework (HSSF). The HSSF is a framework that tackles the demand for the recommendation of surveillance information aiming at supporting preventive healthcare strategies. Examples of such strategies are the automatic recommendation of surveillance levels to patients in need of healthcare and the automatic recommendation of scientific literature that elucidates epigenetic problems related to patients. HSSF was created from two systems we developed in our previous work on health surveillance systems: the Automatic-SL and CISS systems. The Automatic-SL system aims to assist healthcare professionals in making decisions and in identifying children with developmental problems. The CISS service associates genetic and epigenetic risk factors related to chronic diseases with patient's clinical records. Towards evaluating the HSSF framework, two new systems, CISS+ and CISS-SW, were created by means of abstractions and instantiations of the framework (design and code). We show that HSSF supported the development of the two new systems given that they both recommend scientific papers using medical records as queries even though they exploit different computational technologies. In an experiment using simulated patients' medical records, we show that CISS, CISS+, and CISS-SW systems recommended more closely related and somewhat related documents than Google, Google Scholar and PubMed. Considering recall and precision measures, CISS+ surpasses CISS-SW in terms of precision.

  17. Automatic Fixture Planning

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    Fixture planning is a crucial problem in the field of fixture design. In this paper, the research scope and research methods of the computer-aided fixture planning are presented. Based on positioning principles of typical workparts, an ANN algorithm, namely Hopfield algorithm, is adopted for the automatic fixture planning. Also, this paper leads a deep research into the selection of positioning and clamping surfaces (or points) on workparts using positioning-clamping-surface-selecting rules and matrix evaluation of deterministic workpart positioning. In the end of this paper, the methods to select positioning and clamping elements from database and the layout algorithm to assemble the selected fixture elements into a tangible fixture are developed.

  18. Enforcement of Mask Rule Compliance in Model-Based OPC'ed Layouts during Data Preparation

    Science.gov (United States)

    Meyer, Dirk H.; Vuletic, Radovan; Seidl, Alexander

    2002-12-01

    Currently available commercial model-based OPC tools do not always generate layouts which are mask rule compliant. Additional processing is required to remove mask rule violations, which are often too numerous for manual patching. Although physical verification tools can be used to remove simple mask rule violations, the results are often unsatisfactory for more complicated geometrical configurations. The subject of this paper is the development and application of a geometrical processing engine that automatically enforces mask rule compliance of the OPC'ed layout. It is designed as an add-on to a physical verification tool. The engine constructs patches, which remove mask rule violations such as notches or width violations. By employing a Mixed Integer Programming (MIP) optimization method, the edges of each patch are placed in a way that avoids secondary violations while modifying the OPC'ed layout as little as possible. A sequence of enforcement steps is applied to the layout to remove all types of mask rule violations. This approach of locally confined minimal layout modifications retains OPC corrections to a maximum amount. This method has been used successfully in production on a variety of DRAM designs for the non-array regions.

  19. INTERPOL survey of the use of speaker identification by law enforcement agencies.

    Science.gov (United States)

    Morrison, Geoffrey Stewart; Sahito, Farhan Hyder; Jardine, Gaëlle; Djokic, Djordje; Clavet, Sophie; Berghs, Sabine; Goemans Dorny, Caroline

    2016-06-01

    A survey was conducted of the use of speaker identification by law enforcement agencies around the world. A questionnaire was circulated to law enforcement agencies in the 190 member countries of INTERPOL. 91 responses were received from 69 countries. 44 respondents reported that they had speaker identification capabilities in house or via external laboratories. Half of these came from Europe. 28 respondents reported that they had databases of audio recordings of speakers. The clearest pattern in the responses was that of diversity. A variety of different approaches to speaker identification were used: The human-supervised-automatic approach was the most popular in North America, the auditory-acoustic-phonetic approach was the most popular in Europe, and the spectrographic/auditory-spectrographic approach was the most popular in Africa, Asia, the Middle East, and South and Central America. Globally, and in Europe, the most popular framework for reporting conclusions was identification/exclusion/inconclusive. In Europe, the second most popular framework was the use of verbal likelihood ratio scales.

  20. FPGA-Based Real-Time Motion Detection for Automated Video Surveillance Systems

    Directory of Open Access Journals (Sweden)

    Sanjay Singh

    2016-03-01

    Full Text Available Design of automated video surveillance systems is one of the exigent missions in computer vision community because of their ability to automatically select frames of interest in incoming video streams based on motion detection. This research paper focuses on the real-time hardware implementation of a motion detection algorithm for such vision based automated surveillance systems. A dedicated VLSI architecture has been proposed and designed for clustering-based motion detection scheme. The working prototype of a complete standalone automated video surveillance system, including input camera interface, designed motion detection VLSI architecture, and output display interface, with real-time relevant motion detection capabilities, has been implemented on Xilinx ML510 (Virtex-5 FX130T FPGA platform. The prototyped system robustly detects the relevant motion in real-time in live PAL (720 × 576 resolution video streams directly coming from the camera.

  1. National Cardiac Device Surveillance Program Database

    Data.gov (United States)

    Department of Veterans Affairs — The National Cardiac Device Surveillance Program Database supports the Eastern Pacemaker Surveillance Center (EPSC) staff in its function of monitoring some 11,000...

  2. Inappropriate colonoscopic surveillance of hyperplastic polyps.

    LENUS (Irish Health Repository)

    Keane, R A

    2011-11-15

    Colonoscopic surveillance of hyperplastic polyps alone is controversial and may be inappropriate. The colonoscopy surveillance register at a university teaching hospital was audited to determine the extent of such hyperplastic polyp surveillance. The surveillance endoscopy records were reviewed, those patients with hyperplastic polyps were identified, their clinical records were examined and contact was made with each patient. Of the 483 patients undergoing surveillance for colonic polyps 113 (23%) had hyperplastic polyps alone on last colonoscopy. 104 patients remained after exclusion of those under appropriate surveillance. 87 of the 104 patients (84%) were successfully contacted. 37 patients (8%) were under appropriate colonoscopic surveillance for a significant family history of colorectal carcinoma. 50 (10%) patients with hyperplastic polyps alone and no other clinical indication for colonoscopic surveillance were booked for follow up colonoscopy. This represents not only a budgetary but more importantly a clinical opportunity cost the removal of which could liberate valuable colonoscopy time for more appropriate indications.

  3. Regional Disease Surveillance Meeting - Final Paper

    Energy Technology Data Exchange (ETDEWEB)

    Lesperance, Ann M.; Mahy, Heidi A.

    2006-08-08

    On June 1, 2006, public health officials working in surveillance, epidemiological modeling, and information technology communities from the Seattle/Tacoma area and State of Washington met with members of the Pacific Northwest National Laboratory (PNNL) to discuss the current state of disease surveillance and gaps and needs to improve the current systems. The meeting also included a discussion of PNNL initiatives that might be appropriate to enhance disease surveillance and the current tools being used for disease surveillance. Participants broke out into two groups to identify critical gaps and needs for improving a surveillance system, and discuss the requirements for developing improved surveillance. Each group developed a list of key priorities summarizing the requirements for improved surveillance. The objective of this meeting was to work towards the development of an improved disease surveillance system.

  4. The temporal relationship between drug supply indicators: an audit of international government surveillance systems.

    Science.gov (United States)

    Werb, Dan; Kerr, Thomas; Nosyk, Bohdan; Strathdee, Steffanie; Montaner, Julio; Wood, Evan

    2013-09-30

    Illegal drug use continues to be a major threat to community health and safety. We used international drug surveillance databases to assess the relationship between multiple long-term estimates of illegal drug price and purity. We systematically searched for longitudinal measures of illegal drug supply indicators to assess the long-term impact of enforcement-based supply reduction interventions. Data from identified illegal drug surveillance systems were analysed using an a priori defined protocol in which we sought to present annual estimates beginning in 1990. Data were then subjected to trend analyses. Data were obtained from government surveillance systems assessing price, purity and/or seizure quantities of illegal drugs; systems with at least 10 years of longitudinal data assessing price, purity/potency or seizures were included. We identified seven regional/international metasurveillance systems with longitudinal measures of price or purity/potency that met eligibility criteria. In the USA, the average inflation-adjusted and purity-adjusted prices of heroin, cocaine and cannabis decreased by 81%, 80% and 86%, respectively, between 1990 and 2007, whereas average purity increased by 60%, 11% and 161%, respectively. Similar trends were observed in Europe, where during the same period the average inflation-adjusted price of opiates and cocaine decreased by 74% and 51%, respectively. In Australia, the average inflation-adjusted price of cocaine decreased 14%, while the inflation-adjusted price of heroin and cannabis both decreased 49% between 2000 and 2010. During this time, seizures of these drugs in major production regions and major domestic markets generally increased. With few exceptions and despite increasing investments in enforcement-based supply reduction efforts aimed at disrupting global drug supply, illegal drug prices have generally decreased while drug purity has generally increased since 1990. These findings suggest that expanding efforts at

  5. National Enforcement Initiative: Preventing Animal Waste from Contaminating Surface and Ground Water

    Science.gov (United States)

    This page describes EPA's goal in preventing animal waste from contaminating surface and ground Water. It is an EPA National Enforcement Initiative. Both enforcement cases, and a map of enforcement actions are provided.

  6. 76 FR 27355 - Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection and Application...

    Science.gov (United States)

    2011-05-11

    ... of Justice Programs Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection... public, the ``Law Enforcement Vehicular Digital Multimedia Evidence Recording System Selection and... representatives, law enforcement agencies and organizations, research, development and scientific communities, and...

  7. Surveillance intervals for small abdominal aortic aneurysms

    DEFF Research Database (Denmark)

    Bown, Matthew J; Sweeting, Michael J; Brown, Louise C

    2013-01-01

    Small abdominal aortic aneurysms (AAAs [3.0 cm-5.4 cm in diameter]) are monitored by ultrasound surveillance. The intervals between surveillance scans should be chosen to detect an expanding aneurysm prior to rupture.......Small abdominal aortic aneurysms (AAAs [3.0 cm-5.4 cm in diameter]) are monitored by ultrasound surveillance. The intervals between surveillance scans should be chosen to detect an expanding aneurysm prior to rupture....

  8. Anomaly detection for internet surveillance

    NARCIS (Netherlands)

    Bouma, H.; Raaijmakers, S.A.; Halma, A.H.R.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming

  9. Video surveillance with speckle imaging

    Science.gov (United States)

    Carrano, Carmen J.; Brase, James M.

    2007-07-17

    A surveillance system looks through the atmosphere along a horizontal or slant path. Turbulence along the path causes blurring. The blurring is corrected by speckle processing short exposure images recorded with a camera. The exposures are short enough to effectively freeze the atmospheric turbulence. Speckle processing is used to recover a better quality image of the scene.

  10. Anomaly detection for internet surveillance

    NARCIS (Netherlands)

    Bouma, H.; Raaijmakers, S.A.; Halma, A.H.R.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming

  11. Video Surveillance: Privacy Issues and Legal Compliance

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2015-01-01

    . There is a need to balance the usage of video surveillance against its negative impact on privacy. This chapter aims to highlight the privacy issues in video surveillance and provides a model to help identify the privacy requirements in a video surveillance system. The authors make a step in the direction...

  12. Prospects of development of the court decrees enforcement system

    Directory of Open Access Journals (Sweden)

    Kristina Sergeyevna Morkovskaya

    2015-06-01

    Full Text Available Objective the relevance of the topic the insufficient level of its scientific elaboration predetermined the research objectives which consist in the analysis of the institution of enforcement proceedings the identification of key challenges trends and ways to improve the current system of court decrees enforcement. Methods the methodological basis of the undertaken research is scientific method of cognition in conjunction with certain specific scientific methods the laws of formal logic historical method comparative legal method and systematic analysis of theoretical works studied in this work. Results the emerging trends in the enforcement proceedings reform in the country cannot be considered to be satisfactory in general although some initiatives seem quite appropriate in case of the proper performance. If you the situation cannot be rectified with the execution of judicial decrees basing on own experience only it is necessary to pay attention to foreign practices and to provide citizens with the right to an effective judicial protection. Of all approaches to reforming of the enforcement institution analyzed in the article the preferred for the Russian legal reality is modernization of the existing nonjudicial system of enforcement through civil procedural means. Scientific novelty at present neither the civil procedure nor the general theory of law has not developed a unified understanding of the civil procedural tools for improving the efficiency of enforcement proceedings. Practical value the main provisions and conclusions of the article can be used in research and teaching when viewing the issues of the effectiveness of enforcement proceedings. nbsp

  13. Decoding Nonverbal Communication in Law Enforcement

    Directory of Open Access Journals (Sweden)

    Noel Otu

    2015-06-01

    Full Text Available This analytical study examined the importance of nonverbal communication in law enforcement work. In many encounters between police and citizens, the primary focus is always on suspects’/citizens’ verbal statements, rather than on how and what their body is conveying while telling the story. This study argues for an integrated approach in which the police officers need to realise that they, too, are communicating nonverbally with suspects. This study reveals that nonverbal communication, also known as body language, proxemic, and kinesics behavior, in many cases tends to constitute a much larger fraction of the police communication model than verbal communication, which should help officers to establish authority and dominance and ensure their safety. Nonverbal communication is not something added onto criminal justice, but rather it is the essence of criminal justice. This results suggest that nonverbal communication is the foundation of a successful relationship/encounter between criminal justice personnel and suspects or criminals, as well as being a powerful method that cannot be feigned.

  14. Timeline analysis tools for law enforcement

    Science.gov (United States)

    Mucks, John

    1997-02-01

    The timeline analysis system (TAS) was developed by Rome Laboratory to assist intelligence analysts with the comprehension of large amounts of information. Under the TAS program data visualization, manipulation and reasoning tools were developed in close coordination with end users. The initial TAS prototype was developed for foreign command and control analysts at Space Command in Colorado Springs and was fielded there in 1989. The TAS prototype replaced manual paper timeline maintenance and analysis techniques and has become an integral part of Space Command's information infrastructure. TAS was designed to be domain independent and has been tailored and proliferated to a number of other users. The TAS program continues to evolve because of strong user support. User funded enhancements and Rome Lab funded technology upgrades have significantly enhanced TAS over the years and will continue to do so for the foreseeable future. TAS was recently provided to the New York State Police (NYSP) for evaluation using actual case data. Timeline analysis it turns out is a popular methodology used in law enforcement. The evaluation has led to a more comprehensive application and evaluation project sponsored by the National Institute of Justice (NIJ). This paper describes the capabilities of TAS, results of the initial NYSP evaluation and the plan for a more comprehensive NYSP evaluation.

  15. Self-enforcing regional vaccination agreements.

    Science.gov (United States)

    Klepac, Petra; Megiddo, Itamar; Grenfell, Bryan T; Laxminarayan, Ramanan

    2016-01-01

    In a highly interconnected world, immunizing infections are a transboundary problem, and their control and elimination require international cooperation and coordination. In the absence of a global or regional body that can impose a universal vaccination strategy, each individual country sets its own strategy. Mobility of populations across borders can promote free-riding, because a country can benefit from the vaccination efforts of its neighbours, which can result in vaccination coverage lower than the global optimum. Here we explore whether voluntary coalitions that reward countries that join by cooperatively increasing vaccination coverage can solve this problem. We use dynamic epidemiological models embedded in a game-theoretic framework in order to identify conditions in which coalitions are self-enforcing and therefore stable, and thus successful at promoting a cooperative vaccination strategy. We find that countries can achieve significantly greater vaccination coverage at a lower cost by forming coalitions than when acting independently, provided a coalition has the tools to deter free-riding. Furthermore, when economically or epidemiologically asymmetric countries form coalitions, realized coverage is regionally more consistent than in the absence of coalitions.

  16. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L.E.

    1995-02-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest Laboratory (PNL) for the U.S. Department of Energy (DOE). This document contains the planned 1994 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP), Drinking Water Project, and Ground-Water Surveillance Project. Samples are routinely collected for the SESP and analyzed to determine the quality of air, surface water, soil, sediment, wildlife, vegetation, foodstuffs, and farm products at Hanford Site and surrounding communities. The responsibility for monitoring onsite drinking water falls outside the scope of the SESP. PNL conducts the drinking water monitoring project concurrent with the SESP to promote efficiency and consistency, utilize expertise developed over the years, and reduce costs associated with management, procedure development, data management, quality control, and reporting. The ground-water sampling schedule identifies ground-water sampling .events used by PNL for environmental surveillance of the Hanford Site. Sampling is indicated as annual, semi-annual, quarterly, or monthly in the sampling schedule. Some samples are collected and analyzed as part of ground-water monitoring and characterization programs at Hanford (e.g. Resources Conservation and Recovery Act (RCRA), Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA), or Operational). The number of samples planned by other programs are identified in the sampling schedule by a number in the analysis column and a project designation in the Cosample column. Well sampling events may be merged to avoid redundancy in cases where sampling is planned by both-environmental surveillance and another program.

  17. Image simulation for automatic license plate recognition

    Science.gov (United States)

    Bala, Raja; Zhao, Yonghui; Burry, Aaron; Kozitsky, Vladimir; Fillion, Claude; Saunders, Craig; Rodríguez-Serrano, José

    2012-01-01

    Automatic license plate recognition (ALPR) is an important capability for traffic surveillance applications, including toll monitoring and detection of different types of traffic violations. ALPR is a multi-stage process comprising plate localization, character segmentation, optical character recognition (OCR), and identification of originating jurisdiction (i.e. state or province). Training of an ALPR system for a new jurisdiction typically involves gathering vast amounts of license plate images and associated ground truth data, followed by iterative tuning and optimization of the ALPR algorithms. The substantial time and effort required to train and optimize the ALPR system can result in excessive operational cost and overhead. In this paper we propose a framework to create an artificial set of license plate images for accelerated training and optimization of ALPR algorithms. The framework comprises two steps: the synthesis of license plate images according to the design and layout for a jurisdiction of interest; and the modeling of imaging transformations and distortions typically encountered in the image capture process. Distortion parameters are estimated by measurements of real plate images. The simulation methodology is successfully demonstrated for training of OCR.

  18. A new approach to obtain metric data from video surveillance: Preliminary evaluation of a low-cost stereo-photogrammetric system.

    Science.gov (United States)

    Russo, Paolo; Gualdi-Russo, Emanuela; Pellegrinelli, Alberto; Balboni, Juri; Furini, Alessio

    2017-02-01

    Using an interdisciplinary approach the authors demonstrate the possibility to obtain reliable anthropometric data of a subject by means of a new video surveillance system. In general the use of current video surveillance systems provides law enforcement with useful data to solve many crimes. Unfortunately the quality of the images and the way in which they are taken often makes it very difficult to judge the compatibility between suspect and perpetrator. In this paper, the authors present the results obtained with a low-cost photogrammetric video surveillance system based on a pair of common surveillance cameras synchronized with each other. The innovative aspect of the system is that it allows estimation with considerable accuracy not only of body height (error 0.1-3.1cm, SD 1.8-4.5cm) but also of other anthropometric characters of the subject, consequently with better determination of the biological profile and greatly increased effectiveness of the judgment of compatibility.

  19. Automatic Kurdish Dialects Identification

    Directory of Open Access Journals (Sweden)

    Hossein Hassani

    2016-02-01

    Full Text Available Automatic dialect identification is a necessary Lan guage Technology for processing multi- dialect languages in which the dialects are linguis tically far from each other. Particularly, this becomes crucial where the dialects are mutually uni ntelligible. Therefore, to perform computational activities on these languages, the sy stem needs to identify the dialect that is the subject of the process. Kurdish language encompasse s various dialects. It is written using several different scripts. The language lacks of a standard orthography. This situation makes the Kurdish dialectal identification more interesti ng and required, both form the research and from the application perspectives. In this research , we have applied a classification method, based on supervised machine learning, to identify t he dialects of the Kurdish texts. The research has focused on two widely spoken and most dominant Kurdish dialects, namely, Kurmanji and Sorani. The approach could be applied to the other Kurdish dialects as well. The method is also applicable to the languages which are similar to Ku rdish in their dialectal diversity and differences.

  20. Automatic aircraft recognition

    Science.gov (United States)

    Hmam, Hatem; Kim, Jijoong

    2002-08-01

    Automatic aircraft recognition is very complex because of clutter, shadows, clouds, self-occlusion and degraded imaging conditions. This paper presents an aircraft recognition system, which assumes from the start that the image is possibly degraded, and implements a number of strategies to overcome edge fragmentation and distortion. The current vision system employs a bottom up approach, where recognition begins by locating image primitives (e.g., lines and corners), which are then combined in an incremental fashion into larger sets of line groupings using knowledge about aircraft, as viewed from a generic viewpoint. Knowledge about aircraft is represented in the form of whole/part shape description and the connectedness property, and is embedded in production rules, which primarily aim at finding instances of the aircraft parts in the image and checking the connectedness property between the parts. Once a match is found, a confidence score is assigned and as evidence in support of an aircraft interpretation is accumulated, the score is increased proportionally. Finally a selection of the resulting image interpretations with the highest scores, is subjected to competition tests, and only non-ambiguous interpretations are allowed to survive. Experimental results demonstrating the effectiveness of the current recognition system are given.

  1. New Method for Real Time Influenza Surveillance in Primary Care: A Wisconsin Research and Education Network (WREN) Supported Study.

    Science.gov (United States)

    Temte, Jonathan L; Barlow, Shari; Schemmel, Amber; Temte, Emily; Hahn, David L; Reisdorf, Erik; Shult, Peter; Tamerius, John

    2017-01-01

    The goal of public health infectious disease surveillance systems is to provide accurate laboratory results in near-real time. When it comes to influenza surveillance, most current systems are encumbered with inherent delays encountered in the real-life chaos of medical practice. To combat this, we implemented and tested near-real-time surveillance using a rapid influenza detection test (RIDT) coupled with immediate, wireless transmission of results to public health entities. A network of 19 primary care clinics across Wisconsin were recruited, including 4 sites already involved in ongoing influenza surveillance and 15 sites that were new to surveillance activities. Each site was provided with a Quidel Sofia Influenza A+B RIDT analyzer attached to a wireless router. Influenza test results, along with patient age, were transmitted immediately to a cloud-based server, automatically compiled, and forwarded to the surveillance team daily. Weekly counts of positive influenza A and B cases were compared with positive polymerase chain reaction (PCR) detections from an independent surveillance system within the state. Following Institutional Review Board (IRB) and institutional approvals, we recruited 19 surveillance sites, installed equipment, and trained staff within 4 months. Of the 1119 cases tested between September 15, 2013 and June 28, 2014, 316 were positive for influenza. The system provided early detection of the influenza outbreak in Wisconsin. The influenza peak between January 12 and 25, 2014, as well as the epidemic curve, closely matched that derived from the established PCR laboratory network (r = 0.927; P surveillance. Results from the initial year strongly support this approach to highly accurate and timely influenza surveillance. © Copyright 2017 by the American Board of Family Medicine.

  2. Incidents of potential public health significance identified using national surveillance of US poison center data (2008–2012)

    Science.gov (United States)

    LAW, R. K.; SHEIKH, S.; BRONSTEIN, A.; THOMAS, R.; SPILLER, H. A.; SCHIER, J. G.

    2015-01-01

    Background The Centers for Disease Control and Prevention (CDC) and the American Association of Poison Control Centers conduct national surveillance on data collected by US poison centers to identify incidents of potential public health significance (IPHS). The overarching goals of this collaboration are to improve CDC’s national surveillance capacity for public health threats, identify early markers of public health incidents and enhance situational awareness. The National Poison Data System (NPDS) is used as a surveillance system to automatically identify data anomalies. Purpose To characterize data anomalies and IPHS captured by national surveillance of poison center data over 5 years. Methods Data anomalies are identified through three surveillance methodologies: call-volume, clinical effect, and case-based. Anomalies are reviewed by a team of epidemiologists and clinical toxicologists to determine IPHS using standardized criteria. The authors reviewed IPHS identified by these surveillance activities from 2008 through 2012. Results Call-volume surveillance identified 384 IPHS; most were related to gas and fume exposures (n=229; 59.6%) with the most commonly implicated substance being carbon monoxide (CO) (n=92; 22.8%). Clinical-effect surveillance identified 138 IPHS; the majority were related to gas and fume exposures (n=58; 42.0%) and gastrointestinal complaints (n=84; 16.2%), and the most commonly implicated substance was CO (n=20; 14.4%). Among the 11 case-based surveillance definitions, the botulism case definition yielded the highest percentage of identified agent-specific illness. Conclusions A small proportion of data anomalies were designated as IPHS. Of these, CO releases were the most frequently reported IPHS and gastrointestinal syndromes were the most commonly reported illness manifestations. poison center data surveillance may be used as an approach to identify exposures, illnesses, and incidents of importance at the national and state level

  3. Electronic amplifiers for automatic compensators

    CERN Document Server

    Polonnikov, D Ye

    1965-01-01

    Electronic Amplifiers for Automatic Compensators presents the design and operation of electronic amplifiers for use in automatic control and measuring systems. This book is composed of eight chapters that consider the problems of constructing input and output circuits of amplifiers, suppression of interference and ensuring high sensitivity.This work begins with a survey of the operating principles of electronic amplifiers in automatic compensator systems. The succeeding chapters deal with circuit selection and the calculation and determination of the principal characteristics of amplifiers, as

  4. The Automatic Telescope Network (ATN)

    CERN Document Server

    Mattox, J R

    1999-01-01

    Because of the scheduled GLAST mission by NASA, there is strong scientific justification for preparation for very extensive blazar monitoring in the optical bands to exploit the opportunity to learn about blazars through the correlation of variability of the gamma-ray flux with flux at lower frequencies. Current optical facilities do not provide the required capability.Developments in technology have enabled astronomers to readily deploy automatic telescopes. The effort to create an Automatic Telescope Network (ATN) for blazar monitoring in the GLAST era is described. Other scientific applications of the networks of automatic telescopes are discussed. The potential of the ATN for science education is also discussed.

  5. Reactor Vessel Surveillance Program for Advanced Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Kyeong-Hoon; Kim, Tae-Wan; Lee, Gyu-Mahn; Kim, Jong-Wook; Park, Keun-Bae; Kim, Keung-Koo

    2008-10-15

    This report provides the design requirements of an integral type reactor vessel surveillance program for an integral type reactor in accordance with the requirements of Korean MEST (Ministry of Education, Science and Technology Development) Notice 2008-18. This report covers the requirements for the design of surveillance capsule assemblies including their test specimens, test block materials, handling tools, and monitors of the surveillance capsule neutron fluence and temperature. In addition, this report provides design requirements for the program for irradiation surveillance of reactor vessel materials, a layout of specimens and monitors in the surveillance capsule, procedures of installation and retrieval of the surveillance capsule assemblies, and the layout of the surveillance capsule assemblies in the reactor.

  6. Security surveillance challenges and proven thermal imaging capabilities in real-world applications

    Science.gov (United States)

    Francisco, Glen L.; Roberts, Sharon

    2004-09-01

    Uncooled thermal imaging was first introduced to the public in early 1980's by Raytheon (legacy Texas Instruments Defense Segment Electronics Group) as a solution for military applications. Since the introduction of this technology, Raytheon has remained the leader in this market as well as introduced commercial versions of thermal imaging products specifically designed for security, law enforcement, fire fighting, automotive and industrial uses. Today, low cost thermal imaging for commercial use in security applications is a reality. Organizations of all types have begun to understand the advantages of using thermal imaging as a means to solve common surveillance problems where other popular technologies fall short. Thermal imaging has proven to be a successful solution for common security needs such as: ¸ vision at night where lighting is undesired and 24x7 surveillance is needed ¸ surveillance over waterways, lakes and ports where water and lighting options are impractical ¸ surveillance through challenging weather conditions where other technologies will be challenged by atmospheric particulates ¸ low maintenance requirements due to remote or difficult locations ¸ low cost over life of product Thermal imaging is now a common addition to the integrated security package. Companies are relying on thermal imaging for specific applications where no other technology can perform.

  7. Child Support Enforcement Annual Data Report Form 34A - 2006

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  8. Spatial service delivery system for smart licensing & enforcement management

    Science.gov (United States)

    Wahap, N. A.; Ismail, N. M.; Nor, N. M.; Ahmad, N.; Omar, M. F.; Termizi, A. A. A.; Zainal, D.; Noordin, N. M.; Mansor, S.

    2016-06-01

    Spatial information has introduced a new sense of urgency for a better understanding of the public needs in term of what, when and where they need services and through which devices, platform or physical locations they need them. The objective of this project is to value- add existing license management process for business premises which comes under the responsibility of Local Authority (PBT). Manipulation of geospatial and tracing technology via mobile platform allows enforcement officers to work in real-time, use a standardized system, improve service delivery, and optimize operation management. This paper will augment the scope and capabilities of proposed concept namely, Smart Licensing/Enforcement Management (SLEm). It will review the current licensing and enforcement practice of selected PBT in comparison to the enhanced method. As a result, the new enhanced system is expected to offer a total solution for licensing/enforcement management whilst increasing efficiency and transparency for smart city management and governance.

  9. Privacy Impact Assessment for the Enforcement Action Response System

    Science.gov (United States)

    The Enforcement Action Response System collects waste transaction information, and liability determination information. Learn how this data is collected, how it will be used, access to the data, the purpose of data collection, and record retention policies

  10. 47 CFR 3.72 - Grounds for further enforcement action.

    Science.gov (United States)

    2010-10-01

    ... OF ACCOUNTING AUTHORITIES IN MARITIME AND MARITIME MOBILE-SATELLITE RADIO SERVICES Enforcement § 3.72... any subsequent six month period; (2) Illegal activity or fraud; (3) Non-payment or late payment to...

  11. Impediments to enforcement of environmental treaties against oil ...

    African Journals Online (AJOL)

    Impediments to enforcement of environmental treaties against oil pollution. ... condition of the global environment vis-à-vis the linkage of environmental degradation with growth ... 'Safe water is increasingly limited, hindering economic activity.

  12. recognition and enforcement of foreign arbitral awards in civil and ...

    African Journals Online (AJOL)

    eliasn

    trade. The ease of enforceability of arbitral awards across borders should have, inter alia .... following a regular arbitration agreement or other legal act in [sic][in ...... There may be bilateral, plurilateral and multilateral conventions dealing with.

  13. The 1033 Program, Department of Defense Support to Law Enforcement

    Science.gov (United States)

    2014-08-28

    activities. General categories of equipment offered for transfer include office furniture, household goods (e.g., kitchen equipment), exercise equipment... portable electric generators, tents, and general law enforcement supplies (e.g., handcuffs, riot shields, holsters, binoculars, and digital cameras

  14. Child Support Enforcement Annual Data Report Form 157 - YR 2006

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  15. Child Support Enforcement Annual Data Report Form 34A - 2003

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  16. Child Support Enforcement Annual Data Report Form 157 - YR 2003

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  17. Child Support Enforcement Annual Data Report Form 157 - YR 2005

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  18. 24 CFR 982.406 - Enforcement of HQS.

    Science.gov (United States)

    2010-04-01

    ... SECTION 8 TENANT BASED ASSISTANCE: HOUSING CHOICE VOUCHER PROGRAM Dwelling Unit: Housing Quality Standards, Subsidy Standards, Inspection and Maintenance § 982.406 Enforcement of HQS. Part 982 does not create...

  19. Child Support Enforcement Annual Data Report Form 157 - YR 2007

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  20. Child Support Enforcement Annual Data Report Form 157 - YR 2004

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  1. Child Support Enforcement Annual Data Report Form 157 - YR 2008

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials use the OCSE-157 to report annual statistical and financial information on their Child Support Enforcement (CSE) program to the Department of Health...

  2. 77 FR 41120 - Rules of General Application, Adjudication, and Enforcement

    Science.gov (United States)

    2012-07-12

    ... covered by a valid and enforceable patent, copyright, trademark, mask work, or boat hull design related to... copyright, trademark, mask work, or vessel hull design, under section 337(a)(1)(B), (C), (D), or (E) of the...

  3. Child Support Enforcement Annual Data Report Form 34A - 2004

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  4. Child Support Enforcement Annual Data Report Form 34A - 2005

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  5. Child Support Enforcement Annual Data Report Form 34A - 2009

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  6. Pesticides and Asbestos Programs and Enforcement Branch Case Tracking System

    Science.gov (United States)

    Tracks the entire life cycle of a regulated site from initial inspection through site response to enforcement actions. Separate site action history is maintained for each statute under which the site is regulated.

  7. Child Support Enforcement Annual Data Report Form 34A - 2008

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  8. Pesticides and Asbestos Programs and Enforcement Branch Case Tracking System

    Data.gov (United States)

    U.S. Environmental Protection Agency — Tracks the entire life cycle of a regulated site from initial inspection through site response to enforcement actions. Separate site action history is maintained for...

  9. Child Support Enforcement Annual Data Report Form 34A - 2007

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  10. Child Support Enforcement Annual Data Report Form 34A - 2006

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains information about collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D...

  11. Child Support Enforcement Annual Data Report Form 157 - YR 2004

    Data.gov (United States)

    U.S. Department of Health & Human Services — State officials will use the OCSE-157 to report statistical and some financial information on their Child Support Enforcement (CSE) program to the Department of...

  12. The Enforcement Role Of The Companies Commission Of Malaysia

    OpenAIRE

    Mohd-Haswadi Hassan; Glen D. Moyes; Zuraidah Mohd-Sanusi; Takiah Mohd Iskandar

    2010-01-01

    This paper explores the role of the enforcement efforts undertaken by the Companies Commission of Malaysia (CCM) as a regulator of the Companies Act of 1965, which is entrusted to uphold and ensure good practices of corporate governance among Malaysian companies.  The paper attempts to provide an understanding on various enforcement actions in terms of the effectiveness and adequacy of the measures adopted by the CCM in promoting and improving the level of corporate governance practices in Ma...

  13. Collective redress : broadening EU enforcement through state liability?

    OpenAIRE

    Marson, James; Ferris, Katy

    2016-01-01

    This article advances an argument that private enforcement of European Union (EU) rights has largely been stunted due to a series of blocking tactics by Member States, enabled through a form of tacitic subservience of the Court of Justice of the European Union to these States. Currently, State Liability is neither an effective system of redress under tortious liability, nor a genuine enforcement mechanism in domestic law. By enabling collective redress in State Liability, we present an argume...

  14. Overview of the recognition and enforcement of international commercial arbitration

    Directory of Open Access Journals (Sweden)

    Sergey Kravtsov

    2017-01-01

    Full Text Available The subject. This informational article is devoted to the peculiarities of recognition and enforcement of international commercial arbitration awards according to different countries’ legislation and international legal regulation.The purpose of the article is to identify legal patterns of recognition and enforcement of international commercial arbitration awards in different countries.Methodology. The study is based on comparative law and formal law methods, analysis and synthesis.Results, scope of application. Enforcement of arbitral awards in foreign countries is ensured and guaranteed by multilateral conventions, bilateral treaties and national legislation. The New York Convention 1958 in a certain way limits the scope of legal protection of arbitral awards and leaves the procedure for recognition and enforcement of arbitral awards for consideration of the state court. The author analyses of differentiation of the recognition and enforcement regime of so-called "domestic" and "foreign" solutions of international commercial arbitration in terms of doctrinal approaches and practice of foreign countries. Special attention is given to the analysis of foreign arbitral awards of recognition and enforcement procedures is given to a denial of recognition and enforcement of foreign arbitral awards and their reasons. In spite of the explicit grounds for refusal of recognition and enforcement of foreign arbitral awards in New York Convention 1958, some countries try to establish certain exceptions to the rule in the national legislation. Results may be applicable in improvement of international legal regulation.Conclusions. The courts of the countries – participants of the New York Convention 1958 cannot cancel the foreign arbitral award or revise it substantially. The refutation of this award is possible only in the court of the state in whose territory the relevant arbitral award was made, and such court is not formally bound by the rules of the

  15. Enforcing Building Energy Codes in China: Progress and Comparative Lessons

    Energy Technology Data Exchange (ETDEWEB)

    Evans, Meredydd; Shui, Bin; Halverson, Mark A.; Delgado, Alison

    2010-08-15

    From 1995 to 2005, building energy use in China increased more rapidly than the world average. China has been adding 0.4 to 1.6 billion square meters of floor space annually , making it the world’s largest market for new construction. In fact, by 2020, China is expected to comprise half of all new construction. In response to this, China has begun to make important steps towards achieving building energy efficiency, including the implementation of building energy standards that requires new buildings to be 65% more efficient than buildings from the early 1980s. Making progress on reducing building energy use requires both a comprehensive code and a robust enforcement system. The latter – the enforcement system – is a particularly critical component for assuring that a building code has an effect. China has dramatically enhanced its enforcement system in the past two years, with more detailed requirements for ensuring enforcement and new penalties for non-compliance. We believe that the U.S. and other developed countries could benefit from learning about the multiple checks and the documentation required in China. Similarly, some of the more user-friendly enforcement approaches developed in the U.S. and elsewhere may be useful for China as it strives to improve enforcement in rural and smaller communities. In this article, we provide context to China’s building codes enforcement system by comparing it to the U.S. Among some of the enforcement mechanisms we look at are testing and rating procedures, compliance software, and training and public information.

  16. The Role of Information Deficiencies in Contract Enforcement

    OpenAIRE

    Vandenberghe, Ann-Sophie

    2010-01-01

    textabstractInformation deficiencies play an important role in contract enforcement. Courts frequently refuse to enforce contractual terms when one of the parties lacks information. The difficult question is where the line is drawn (or should be drawn) between information deficiencies of which the law will take account and those which it will disregard. This article sets out the economic framework for determining when it is appropriate to shift responsibility for information deficiencies from...

  17. The Sharper Image for Surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Hazi, A

    2006-01-13

    A technique adapted by Livermore scientists to take the twinkle out of stars is now being used to improve the resolution of long-range surveillance systems trained on earthbound objects. The speckle-imaging technique involves taking tens to hundreds of pictures with short-exposure times and reconstructing a single, sharp image using image-processing software. The technique drew the interest of Livermore engineer Carmen Carrano. She developed a prototype remote-surveillance system that can produce a detailed image of a face from a couple of kilometers away. The system also helps identify vehicles tens of kilometers away and improves the viewing of large structures more than 60 kilometers away.

  18. Congenital anomalies surveillance in Canada.

    Science.gov (United States)

    Lowry, R Brian

    2008-01-01

    Congenital anomalies (CA) are present in approximately 3% of all newborn babies and account for about 12% of paediatric hospital admissions. They represent an important public health problem. Surveillance is especially important so that preventive measures such as folic acid fortification can be properly assessed without resorting to a series of ad hoc studies. Canada's surveillance of CAs is weak, with only Alberta and British Columbia having established sytems. Most provinces have perinatal systems but their CA data are incomplete and they do not capture terminations of pregnancy. The same is true of the Public Health Agency of Canada's system. A new system, the Fetal Alert Network, has been proposed for Ontario, which represents a start but will require additional sources of ascertainment if it is to be a truly population-based system for Ontario.

  19. Surveillance of Space in Australia

    Science.gov (United States)

    Newsam, G.

    Australia's geography and technology base got it off to a flying start in the early days of surveillance of space, starting with CSIRO's first radio telescope in the 1940's and climaxing in NASA's establishment of station 43 in the Deep Space Network at Tidbinbilla in 1965. But Britain's exit from space and the subsequent closure of the Woomera launch range and associated space tracking facilities in the early 1970's saw the start of a long draw-down of capability. Programs such as CSIRO's radio astronomy telescopes, Electro-Optic Systems' adoption of laser technology for satellite laser ranging and tracking system, and the exploration of the use of technology developed in Australia's over-the-horizon-radar program for surveillance of space, kept some interest in the problem alive, but there has been no serious national investment in the area for the last thirty years. Recently, however, increased awareness of the vulnerability of space systems and the need to include potential opponents' space capabilities in operations planning has led to a revival of interest in space situational awareness within the Australian Defence Organisation. While firm commitments to new systems must wait on the next Defence White Paper due out at the end of 2007 and the policy directions it formally endorses, discussions have already started with the US on participating in the Space Surveillance Network (SSN) and developing a comprehensive space situational awareness capability. In support of these initiatives the Defence Science and Technology Organisation (DSTO) is drawing up an inventory of relevant Australian capabilities, technologies and activities: the paper will describe the findings of this inventory, and in particular local technologies and systems that might be deployed in Australia to contribute to the SSN. In the optical regime the available options are rather limited; they centre primarily on the satellite laser ranging technology developed by Electro-Optic Systems and

  20. Mining Surveillance and Maintenance Dollars

    Energy Technology Data Exchange (ETDEWEB)

    MARTINEZ, R.

    2000-02-01

    Accelerating site cleanup to reduce facility risks to the workers, the public and the environment during a time of declining federal budgets represents a significant technical and economic challenge to U.S. Department of Energy (DOE) Operations Offices and their respective contractors. A significant portion of a facility's recurring annual expenses are associated with routine, long-term surveillance and maintenance (S&M) activities. However, ongoing S&M activities do nothing to reduce risks and basically spend money that could be reallocated towards facility deactivation. This paper discusses the background around DOE efforts to reduce surveillance and maintenance costs, one approach used to perform cost reviews, lessons learned from field implementation and what assistance is available to assist DOE sites in performing these evaluations.

  1. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L.E.

    1997-01-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest National Laboratory (PNNL)(a) for the US Department of Energy (DOE). This document contains the planned 1997 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP) and Drinking Water Monitoring Project. In addition, Section 3.0, Biota, also reflects a rotating collection schedule identifying the year a specific sample is scheduled for collection. The purpose of these monitoring projects is to evaluate levels of radioactive and nonradioactive pollutants in the Hanford environs, as required in DOE Order 5400.1, General Environmental Protection Program, and DOE Order 5400.5, Radiation Protection of the Public and the Environment. The sampling methods will be the same as those described in the Environmental Monitoring Plan, US Department of Energy, Richland Operations Office, DOE/RL91-50, Rev. 1, US Department of Energy, Richland, Washington.

  2. Independent component analysis for automatic note extraction from musical trills

    Science.gov (United States)

    Brown, Judith C.; Smaragdis, Paris

    2004-05-01

    The method of principal component analysis, which is based on second-order statistics (or linear independence), has long been used for redundancy reduction of audio data. The more recent technique of independent component analysis, enforcing much stricter statistical criteria based on higher-order statistical independence, is introduced and shown to be far superior in separating independent musical sources. This theory has been applied to piano trills and a database of trill rates was assembled from experiments with a computer-driven piano, recordings of a professional pianist, and commercially available compact disks. The method of independent component analysis has thus been shown to be an outstanding, effective means of automatically extracting interesting musical information from a sea of redundant data.

  3. Automatic Constraint Detection for 2D Layout Regularization

    KAUST Repository

    Jiang, Haiyong

    2015-09-18

    In this paper, we address the problem of constraint detection for layout regularization. As layout we consider a set of two-dimensional elements where each element is represented by its bounding box. Layout regularization is important for digitizing plans or images, such as floor plans and facade images, and for the improvement of user created contents, such as architectural drawings and slide layouts. To regularize a layout, we aim to improve the input by detecting and subsequently enforcing alignment, size, and distance constraints between layout elements. Similar to previous work, we formulate the layout regularization as a quadratic programming problem. In addition, we propose a novel optimization algorithm to automatically detect constraints. In our results, we evaluate the proposed framework on a variety of input layouts from different applications, which demonstrates our method has superior performance to the state of the art.

  4. Automatic Constraint Detection for 2D Layout Regularization.

    Science.gov (United States)

    Jiang, Haiyong; Nan, Liangliang; Yan, Dong-Ming; Dong, Weiming; Zhang, Xiaopeng; Wonka, Peter

    2016-08-01

    In this paper, we address the problem of constraint detection for layout regularization. The layout we consider is a set of two-dimensional elements where each element is represented by its bounding box. Layout regularization is important in digitizing plans or images, such as floor plans and facade images, and in the improvement of user-created contents, such as architectural drawings and slide layouts. To regularize a layout, we aim to improve the input by detecting and subsequently enforcing alignment, size, and distance constraints between layout elements. Similar to previous work, we formulate layout regularization as a quadratic programming problem. In addition, we propose a novel optimization algorithm that automatically detects constraints. We evaluate the proposed framework using a variety of input layouts from different applications. Our results demonstrate that our method has superior performance to the state of the art.

  5. Clothes Dryer Automatic Termination Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    TeGrotenhuis, Ward E.

    2014-10-01

    Volume 2: Improved Sensor and Control Designs Many residential clothes dryers on the market today provide automatic cycles that are intended to stop when the clothes are dry, as determined by the final remaining moisture content (RMC). However, testing of automatic termination cycles has shown that many dryers are susceptible to over-drying of loads, leading to excess energy consumption. In particular, tests performed using the DOE Test Procedure in Appendix D2 of 10 CFR 430 subpart B have shown that as much as 62% of the energy used in a cycle may be from over-drying. Volume 1 of this report shows an average of 20% excess energy from over-drying when running automatic cycles with various load compositions and dryer settings. Consequently, improving automatic termination sensors and algorithms has the potential for substantial energy savings in the U.S.

  6. Attaching Hollywood to a Surveillant Assemblage: Normalizing Discourses of Video Surveillance

    Directory of Open Access Journals (Sweden)

    Randy K Lippert

    2015-10-01

    Full Text Available This article examines video surveillance images in Hollywood film. It moves beyond previous accounts of video surveillance in relation to film by theoretically situating the use of these surveillance images in a broader “surveillant assemblage”. To this end, scenes from a sample of thirty-five (35 films of several genres are examined to discern dominant discourses and how they lend themselves to normalization of video surveillance. Four discourses are discovered and elaborated by providing examples from Hollywood films. While the films provide video surveillance with a positive associative association it is not without nuance and limitations. Thus, it is found that some forms of resistance to video surveillance are shown while its deterrent effect is not. It is ultimately argued that Hollywood film is becoming attached to a video surveillant assemblage discursively through these normalizing discourses as well as structurally to the extent actual video surveillance technology to produce the images is used.

  7. Prospects for de-automatization.

    Science.gov (United States)

    Kihlstrom, John F

    2011-06-01

    Research by Raz and his associates has repeatedly found that suggestions for hypnotic agnosia, administered to highly hypnotizable subjects, reduce or even eliminate Stroop interference. The present paper sought unsuccessfully to extend these findings to negative priming in the Stroop task. Nevertheless, the reduction of Stroop interference has broad theoretical implications, both for our understanding of automaticity and for the prospect of de-automatizing cognition in meditation and other altered states of consciousness.

  8. Process automatization in system administration

    OpenAIRE

    Petauer, Janja

    2013-01-01

    The aim of the thesis is to present automatization of user management in company Studio Moderna. The company has grown exponentially in recent years, that is why we needed to find faster, easier and cheaper way of man- aging user accounts. We automatized processes of creating, changing and removing user accounts within Active Directory. We prepared user interface inside of existing application, used Java Script for drop down menus, wrote script in scripting programming langu...

  9. Automatic Sarcasm Detection: A Survey

    OpenAIRE

    Joshi, Aditya; Bhattacharyya, Pushpak; Carman, Mark James

    2016-01-01

    Automatic sarcasm detection is the task of predicting sarcasm in text. This is a crucial step to sentiment analysis, considering prevalence and challenges of sarcasm in sentiment-bearing text. Beginning with an approach that used speech-based features, sarcasm detection has witnessed great interest from the sentiment analysis community. This paper is the first known compilation of past work in automatic sarcasm detection. We observe three milestones in the research so far: semi-supervised pat...

  10. Automatic Coarse Graining of Polymers

    OpenAIRE

    Faller, Roland

    2003-01-01

    Several recently proposed semi--automatic and fully--automatic coarse--graining schemes for polymer simulations are discussed. All these techniques derive effective potentials for multi--atom units or super--atoms from atomistic simulations. These include techniques relying on single chain simulations in vacuum and self--consistent optimizations from the melt like the simplex method and the inverted Boltzmann method. The focus is on matching the polymer structure on different scales. Several ...

  11. The automatization of journalistic narrative

    Directory of Open Access Journals (Sweden)

    Naara Normande

    2013-06-01

    Full Text Available This paper proposes an initial discussion about the production of automatized journalistic narratives. Despite being a topic discussed in specialized sites and international conferences in communication area, the concepts are still deficient in academic research. For this article, we studied the concepts of narrative, databases and algorithms, indicating a theoretical trend that explains this automatized journalistic narratives. As characterization, we use the cases of Los Angeles Times, Narrative Science and Automated Insights.

  12. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L.E.

    1994-02-01

    This document contains the planned 1994 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP), Drinking Water Project, and Ground-Water Surveillance Project. Samples are routinely collected for the SESP and analyzed to determine the quality of air, surface water, soil, sediment, wildlife, vegetation, foodstuffs, and farm products at Hanford Site and surrounding communities. The responsibility for monitoring the onsite drinking water falls outside the scope of the SESP. The Hanford Environmental Health Foundation is responsible for monitoring the nonradiological parameters as defined in the National Drinking Water Standards while PNL conducts the radiological monitoring of the onsite drinking water. PNL conducts the drinking water monitoring project concurrent with the SESP to promote efficiency and consistency, utilize the expertise developed over the years, and reduce costs associated with management, procedure development, data management, quality control and reporting. The ground-water sampling schedule identifies ground-water sampling events used by PNL for environmental surveillance of the Hanford Site.

  13. Mobile Surveillance and Monitoring Robots

    Energy Technology Data Exchange (ETDEWEB)

    Kimberly, Howard R.; Shipers, Larry R.

    1999-07-14

    Long-term nuclear material storage will require in-vault data verification, sensor testing, error and alarm response, inventory, and maintenance operations. System concept development efforts for a comprehensive nuclear material management system have identified the use of a small flexible mobile automation platform to perform these surveillance and maintenance operations. In order to have near-term wide-range application in the Complex, a mobile surveillance system must be small, flexible, and adaptable enough to allow retrofit into existing special nuclear material facilities. The objective of the Mobile Surveillance and Monitoring Robot project is to satisfy these needs by development of a human scale mobile robot to monitor the state of health, physical security and safety of items in storage and process; recognize and respond to alarms, threats, and off-normal operating conditions; and perform material handling and maintenance operations. The system will integrate a tool kit of onboard sensors and monitors, maintenance equipment and capability, and SNL developed non-lethal threat response technology with the intelligence to identify threats and develop and implement first response strategies for abnormal signals and alarm conditions. System versatility will be enhanced by incorporating a robot arm, vision and force sensing, robust obstacle avoidance, and appropriate monitoring and sensing equipment.

  14. Towards photometry pipeline of the Indonesian space surveillance system

    CERN Document Server

    Priyatikanto, R; Rachman, A; Dani, T

    2015-01-01

    Optical observation through sub-meter telescope equipped with CCD camera becomes alternative method for increasing orbital debris detection and surveillance. This observational mode is expected to eye medium-sized objects in higher orbits (e.g. MEO, GTO, GSO \\& GEO), beyond the reach of usual radar system. However, such observation of fast-moving objects demands special treatment and analysis technique. In this study, we performed photometric analysis of the satellite track images photographed using rehabilitated Schmidt Bima Sakti telescope in Bosscha Observatory. The Hough transformation was implemented to automatically detect linear streak from the images. From this analysis and comparison to USSPACECOM catalog, two satellites were identified and associated with inactive Thuraya-3 satellite and Satcom-3 debris which are located at geostationary orbit. Further aperture photometry analysis revealed the periodicity of tumbling Satcom-3 debris. In the near future, it is not impossible to apply similar sche...

  15. Detection and Removal of Chromatic Moving Shadows in Surveillance Scenarios

    DEFF Research Database (Denmark)

    Casado, Ivan Huerta; Holte, Michael Boelstoft; Moeslund, Thomas B.

    2009-01-01

      Segmentation in the surveillance domain has to deal with shadows to avoid distortions when detecting moving objects. Most segmentation approaches dealing with shadow detection are typically restricted to penumbra shadows. Therefore, such techniques cannot cope well with umbra shadows....... Consequently, umbra shadows are usually detected as part of moving objects. In this paper we present a novel technique based on gradient and colour models for separating chromatic moving cast shadows from detected moving objects. Firstly, both a chromatic invariant colour cone model and an invariant gradient...... model are built to perform automatic segmentation while detecting potential shadows. In a second step, regions corresponding to potential shadows are grouped by considering "a bluish effect" and an edge partitioning. Lastly, (i) temporal similarities between textures and (ii) spatial similarities...

  16. U.S. Environmental Protection Agency Office of Enforcement and Compliance Assurance New Mapping Tool for Enforcement Cases

    Data.gov (United States)

    U.S. Environmental Protection Agency — The new mapping tool shows facilities in the United States where the EPA concluded formal environmental enforcement actions between October 1, 2008 and September...

  17. U.S. Environmental Protection Agency Office of Enforcement and Compliance Assurance New Mapping Tool for Enforcement Cases

    Data.gov (United States)

    U.S. Environmental Protection Agency — The new mapping tool shows facilities in the United States where the EPA concluded formal environmental enforcement actions between October 1, 2008 and September 30,...

  18. Advancements in web-database applications for rabies surveillance

    Directory of Open Access Journals (Sweden)

    Bélanger Denise

    2011-08-01

    Full Text Available Abstract Background Protection of public health from rabies is informed by the analysis of surveillance data from human and animal populations. In Canada, public health, agricultural and wildlife agencies at the provincial and federal level are responsible for rabies disease control, and this has led to multiple agency-specific data repositories. Aggregation of agency-specific data into one database application would enable more comprehensive data analyses and effective communication among participating agencies. In Québec, RageDB was developed to house surveillance data for the raccoon rabies variant, representing the next generation in web-based database applications that provide a key resource for the protection of public health. Results RageDB incorporates data from, and grants access to, all agencies responsible for the surveillance of raccoon rabies in Québec. Technological advancements of RageDB to rabies surveillance databases include 1 automatic integration of multi-agency data and diagnostic results on a daily basis; 2 a web-based data editing interface that enables authorized users to add, edit and extract data; and 3 an interactive dashboard to help visualize data simply and efficiently, in table, chart, and cartographic formats. Furthermore, RageDB stores data from citizens who voluntarily report sightings of rabies suspect animals. We also discuss how sightings data can indicate public perception to the risk of racoon rabies and thus aid in directing the allocation of disease control resources for protecting public health. Conclusions RageDB provides an example in the evolution of spatio-temporal database applications for the storage, analysis and communication of disease surveillance data. The database was fast and inexpensive to develop by using open-source technologies, simple and efficient design strategies, and shared web hosting. The database increases communication among agencies collaborating to protect human health from

  19. HIV surveillance in complex emergencies.

    Science.gov (United States)

    Salama, P; Dondero, T J

    2001-04-01

    Many studies have shown a positive association between both migration and temporary expatriation and HIV risk. This association is likely to be similar or even more pronounced for forced migrants. In general, HIV transmission in host-migrant or host-forced-migrant interactions depends on the maturity of the HIV epidemic in both the host and the migrant population, the relative seroprevalence of HIV in the host and the migrant population, the prevalence of other sexually transmitted infections (STIs) that may facilitate transmission, and the level of sexual interaction between the two communities. Complex emergencies are the major cause of mass population movement today. In complex emergencies, additional factors such as sexual interaction between forced-migrant populations and the military; sexual violence; increasing commercial sex work; psychological trauma; and disruption of preventive and curative health services may increase the risk for HIV transmission. Despite recent success in preventing HIV infection in stable populations in selected developing countries, internally displaced persons and refugees (or forced migrants) have not been systematically included in HIV surveillance systems, nor consequently in prevention activities. Standard surveillance systems that rely on functioning health services may not provide useful data in many complex emergency settings. Secondary sources can provide some information in these settings. Little attempt has been made, however, to develop innovative HIV surveillance systems in countries affected by complex emergencies. Consequently, data on the HIV epidemic in these countries are scarce and HIV prevention programs are either not implemented or interventions are not effectively targeted. Second generation surveillance methods such as cross-sectional, population-based surveys can provide rapid information on HIV, STIs, and sexual behavior. The risks for stigmatization and breaches of confidentiality must be recognized

  20. Sub-Federal Enforcement of Immigration Law: An Introduction to the Problem of Pretextual Enforcement and Inadequate Remedies

    Directory of Open Access Journals (Sweden)

    Carrie Rosenbaum

    2014-01-01

    Full Text Available Sub-federal enforcement of immigration law has expanded significantly in the last decade raising questions concerning policing, rights violations, and remedies. While the Fourth Amendment has historically provided an avenue for potentially suppressing evidence obtained in violation of a criminal defendant’s civil rights, its applicability in the immigration removal context has been circumscribed. Thus, the avenues to protect the rights of unauthorized noncitizens in immigration removal proceedings are less clear where sub-federal agents act outside of their authorization, particularly in the context of Secure Communities, and enforce immigration law. In the context of immigration exceptionalism, racial profiling has historically played a unique role in immigration law. The lack of adequate measures to deter rights violations where sub-federal agents enforce immigration law raises questions concerning the relationship between criminal and immigration law, and the importance of deterring civil rights violations such as racial profiling, in immigration enforcement. This article will examine the problem of sub-federal law enforcement agents’ use of criminal law violations as a pretext to enforce immigration law and the lack of adequate deterrence of civil rights violations.

  1. 36 CFR 902.57 - Investigatory files compiled for law enforcement purposes.

    Science.gov (United States)

    2010-07-01

    ... for law enforcement purposes. 902.57 Section 902.57 Parks, Forests, and Public Property PENNSYLVANIA... Records § 902.57 Investigatory files compiled for law enforcement purposes. (a) Files compiled by the Corporation for law enforcement purposes, including the enforcement of the regulations of the Corporation, are...

  2. 27 CFR 478.134 - Sale of firearms to law enforcement officers.

    Science.gov (United States)

    2010-04-01

    ... AMMUNITION Records § 478.134 Sale of firearms to law enforcement officers. (a) Law enforcement officers... complete Form 4473 or Form 5300.35. The law enforcement officer purchasing the firearm may purchase a...) In Federal law enforcement offices, the supervisor in charge of the office to which the Federal...

  3. 25 CFR 12.36 - Does other law enforcement training count?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Does other law enforcement training count? 12.36 Section... ENFORCEMENT Qualifications and Training Requirements § 12.36 Does other law enforcement training count? All... complete basic training requirements will result in removal from a law enforcement position. ...

  4. 21 CFR 20.64 - Records or information compiled for law enforcement purposes.

    Science.gov (United States)

    2010-04-01

    ... law enforcement purposes. (a) Records or information compiled for law enforcement purposes may be... any other criminal law enforcement authority in the course of a criminal investigation or by an agency... procedures for law enforcement investigations or prosecutions or would disclose guidelines for law...

  5. The untapped potential of horizontal private enforcement within EC environmental law

    NARCIS (Netherlands)

    van Zeben, J.A.W.

    2008-01-01

    The premise of the article is that horizontal private enforcement could improve the deterrent effect of public enforcement in cases where there is a low likelihood of public enforcement due to information dissymmetry or funding problems on the side of the public enforcer. In order to illustrate

  6. 43 CFR 422.5 - Responsibilities of the Law Enforcement Administrator.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Responsibilities of the Law Enforcement... RECLAMATION, DEPARTMENT OF THE INTERIOR LAW ENFORCEMENT AUTHORITY AT BUREAU OF RECLAMATION PROJECTS Responsibilities § 422.5 Responsibilities of the Law Enforcement Administrator. (a) The Law Enforcement...

  7. 43 CFR 422.6 - Responsibilities of the Chief Law Enforcement Officer.

    Science.gov (United States)

    2010-10-01

    ... RECLAMATION, DEPARTMENT OF THE INTERIOR LAW ENFORCEMENT AUTHORITY AT BUREAU OF RECLAMATION PROJECTS Responsibilities § 422.6 Responsibilities of the Chief Law Enforcement Officer. The Chief Law Enforcement Officer's (CLEO) responsibilities are to ensure that: (a) Law enforcement officers working at Reclamation...

  8. 32 CFR 635.15 - Release of law enforcement information furnished by foreign governments or international...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Release of law enforcement information furnished... Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Release of Information § 635.15 Release of law enforcement information...

  9. The untapped potential of horizontal private enforcement within EC environmental law

    NARCIS (Netherlands)

    van Zeben, J.A.W.

    2010-01-01

    The premise of the article is that horizontal private enforcement could improve the deterrent effect of public enforcement in cases where there is a low likelihood of public enforcement due to information dissymmetry or funding problems on the side of the public enforcer. In order to illustrate

  10. Long Baseline Stereovision for Automatic Detection and Ranging of Moving Objects in the Night Sky

    Directory of Open Access Journals (Sweden)

    Vlad Turcu

    2012-09-01

    Full Text Available As the number of objects in Earth’s atmosphere and in low Earth orbit is continuously increasing; accurate surveillance of these objects has become important. This paper presents a generic, low cost sky surveillance system based on stereovision. Two cameras are placed 37 km apart and synchronized by a GPS-controlled external signal. The intrinsic camera parameters are calibrated before setup in the observation position, the translation vectors are determined from the GPS coordinates and the rotation matrices are continuously estimated using an original automatic calibration methodology based on following known stars. The moving objects in the sky are recognized as line segments in the long exposure images, using an automatic detection and classification algorithm based on image processing. The stereo correspondence is based on the epipolar geometry and is performed automatically using the image detection results. The resulting experimental system is able to automatically detect moving objects such as planes, meteors and Low Earth Orbit satellites, and measure their 3D position in an Earth-bound coordinate system.

  11. Harbour surveillance with cameras calibrated with AIS data

    Science.gov (United States)

    Palmieri, F. A. N.; Castaldo, F.; Marino, G.

    The inexpensive availability of surveillance cameras, easily connected in network configurations, suggests the deployment of this additional sensor modality in port surveillance. Vessels appearing within cameras fields of view can be recognized and localized providing to fusion centers information that can be added to data coming from Radar, Lidar, AIS, etc. Camera systems, that are used as localizers however, must be properly calibrated in changing scenarios where often there is limited choice on the position on which they are deployed. Automatic Identification System (AIS) data, that includes position, course and vessel's identity, freely available through inexpensive receivers, for some of the vessels appearing within the field of view, provide the opportunity to achieve proper camera calibration to be used for the localization of vessels not equipped with AIS transponders. In this paper we assume a pinhole model for camera geometry and propose perspective matrices computation using AIS positional data. Images obtained from calibrated cameras are then matched and pixel association is utilized for other vessel's localization. We report preliminary experimental results of calibration and localization using two cameras deployed on the Gulf of Naples coastline. The two cameras overlook a section of the harbour and record short video sequences that are synchronized offline with AIS positional information of easily-identified passenger ships. Other small vessels, not equipped with AIS transponders, are localized using camera matrices and pixel matching. Localization accuracy is experimentally evaluated as a function of target distance from the sensors.

  12. A Probabilistic Approach for Real-Time Volcano Surveillance

    Science.gov (United States)

    Cannavo, F.; Cannata, A.; Cassisi, C.; Di Grazia, G.; Maronno, P.; Montalto, P.; Prestifilippo, M.; Privitera, E.; Gambino, S.; Coltelli, M.

    2016-12-01

    Continuous evaluation of the state of potentially dangerous volcanos plays a key role for civil protection purposes. Presently, real-time surveillance of most volcanoes worldwide is essentially delegated to one or more human experts in volcanology, who interpret data coming from different kind of monitoring networks. Unfavorably, the coupling of highly non-linear and complex volcanic dynamic processes leads to measurable effects that can show a large variety of different behaviors. Moreover, due to intrinsic uncertainties and possible failures in some recorded data, the volcano state needs to be expressed in probabilistic terms, thus making the fast volcano state assessment sometimes impracticable for the personnel on duty at the control rooms. With the aim of aiding the personnel on duty in volcano surveillance, we present a probabilistic graphical model to estimate automatically the ongoing volcano state from all the available different kind of measurements. The model consists of a Bayesian network able to represent a set of variables and their conditional dependencies via a directed acyclic graph. The model variables are both the measurements and the possible states of the volcano through the time. The model output is an estimation of the probability distribution of the feasible volcano states. We tested the model on the Mt. Etna (Italy) case study by considering a long record of multivariate data from 2011 to 2015 and cross-validated it. Results indicate that the proposed model is effective and of great power for decision making purposes.

  13. Law enforcement attitudes toward overdose prevention and response.

    Science.gov (United States)

    Green, Traci C; Zaller, Nickolas; Palacios, Wilson R; Bowman, Sarah E; Ray, Madeline; Heimer, Robert; Case, Patricia

    2013-12-01

    Law enforcement is often the first to respond to medical emergencies in the community, including overdose. Due to the nature of their job, officers have also witnessed first-hand the changing demographic of drug users and devastating effects on their community associated with the epidemic of nonmedical prescription opioid use in the United States. Despite this seminal role, little data exist on law enforcement attitudes toward overdose prevention and response. We conducted key informant interviews as part of a 12-week Rapid Assessment and Response (RAR) process that aimed to better understand and prevent nonmedical prescription opioid use and overdose deaths in locations in Connecticut and Rhode Island experiencing overdose "outbreaks." Interviews with 13 law enforcement officials across three study sites were analyzed to uncover themes on overdose prevention and naloxone. Findings indicated support for law enforcement involvement in overdose prevention. Hesitancy around naloxone administration by laypersons was evident. Interview themes highlighted officers' feelings of futility and frustration with their current overdose response options, the lack of accessible local drug treatment, the cycle of addiction, and the pervasiveness of easily accessible prescription opioid medications in their communities. Overdose prevention and response, which for some officers included law enforcement-administered naloxone, were viewed as components of community policing and good police-community relations. Emerging trends, such as existing law enforcement medical interventions and Good Samaritan Laws, suggest the need for broader law enforcement engagement around this pressing public health crisis, even in suburban and small town locations, to promote public safety. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  14. EU Law and Mass Internet Metadata Surveillance in the Post-Snowden Era

    Directory of Open Access Journals (Sweden)

    Nora Ni Loideain

    2015-09-01

    Full Text Available Legal frameworks exist within democracies to prevent the misuse and abuse of personal data that law enforcement authorities obtain from private communication service providers. The fundamental rights to respect for private life and the protection of personal data underpin this framework within the European Union. Accordingly, the protection of the principles and safeguards required by these rights is key to ensuring that the oversight of State surveillance powers is robust and transparent. Furthermore, without the robust scrutiny of independent judicial review, the principles and safeguards guaranteed by these rights may become more illusory than real. Following the Edward Snowden revelations, major concerns have been raised worldwide regarding the legality, necessity and proportionality standards governing these laws. In 2014, the highest court in the EU struck down the legal framework that imposed a mandatory duty on communication service providers to undertake the mass retention of metadata for secret intelligence and law enforcement authorities across the EU. This article considers the influence of the Snowden revelations on this landmark judgment. Subsequently, the analysis explores the significance of this ruling for the future reform of EU law governing metadata surveillance and its contribution to the worldwide debate on indiscriminate and covert monitoring in the post-Snowden era.

  15. Activity Surveillance and Hawthorne Effect to Prevent Programming Plagiarism

    Directory of Open Access Journals (Sweden)

    Sufian Sufian

    2010-01-01

    Full Text Available Problem statement: Course instructors are facing serious problems in dealing with students who plagiarize programs especially when the number of students in the course is high. Among the proposed approach to handle this problem is by using automatic detection of plagiarism in programming projects. Preventive action is required rather than curing the problem so that programming students get the right message from the beginning. Approach: To address this problem, a surveillance system was proposed to record every programming activity. It is developed in an integrated development environment so that programming activity profile in Java format is created when students are developing their Java program. A non-intrusive and non-experimental setting approach was applied in which hidden data collection is conducted to observe students’ behavior in natural programming setting. Experimental study effect i.e., Hawthorne effect and effect of expectation on subject behavior was exploited as prevention on plagiarism. Surveillance system produces two file types: Activity log to keep programming activity log information and Backup file to save the program writing record. Results: The proposed programming activity surveillance system, DwiCoder presented a programming activity report at the end of each programming session. Students can assess their own progress in developing a program in these three activities: Compilation, execution and modification. The report was presented in a simple and meaningful way to encourage student spend their own time in programming activity. Conclusion: By using DwiCoder, student’s programming activity is continuously monitored and their behavior is under control. This system provides an effective prevention method in tackling plagiarism.

  16. Next Generation Space Surveillance System-of-Systems

    Science.gov (United States)

    McShane, B.

    2014-09-01

    International economic and military dependence on space assets is pervasive and ever-growing in an environment that is now congested, contested, and competitive. There are a number of natural and man-made risks that need to be monitored and characterized to protect and preserve the space environment and the assets within it. Unfortunately, today's space surveillance network (SSN) has gaps in coverage, is not resilient, and has a growing number of objects that get lost. Risks can be efficiently and effectively mitigated, gaps closed, resiliency improved, and performance increased within a next generation space surveillance network implemented as a system-of-systems with modern information architectures and analytic techniques. This also includes consideration for the newest SSN sensors (e.g. Space Fence) which are born Net-Centric out-of-the-box and able to seamlessly interface with the JSpOC Mission System, global information grid, and future unanticipated users. Significant opportunity exists to integrate legacy, traditional, and non-traditional sensors into a larger space system-of-systems (including command and control centers) for multiple clients through low cost sustainment, modification, and modernization efforts. Clients include operations centers (e.g. JSpOC, USSTRATCOM, CANSPOC), Intelligence centers (e.g. NASIC), space surveillance sensor sites (e.g. AMOS, GEODSS), international governments (e.g. Germany, UK), space agencies (e.g. NASA), and academic institutions. Each has differing priorities, networks, data needs, timeliness, security, accuracy requirements and formats. Enabling processes and technologies include: Standardized and type accredited methods for secure connections to multiple networks, machine-to-machine interfaces for near real-time data sharing and tip-and-queue activities, common data models for analytical processing across multiple radar and optical sensor types, an efficient way to automatically translate between differing client and

  17. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  18. Private law enforcement in post-communist Southeastern Europe: An economic analysis of arbitration and execution

    OpenAIRE

    Schoenfelder Bruno

    2004-01-01

    The very idea of private law enforcement is alien in Southeastern Europe and appears there to be perceived as somewhat extravagant. A thoroughgoing search for the reasons of an extremely limited scope of the private law enforcement is undertaken in the paper. Private law enforcement is seen as taking three basic forms: self-enforcement, enforcement through other agents and illegal means and through specialized agents and with reliance on legal means. Particularly extensive is the analysis of ...

  19. Platforms for Persistent Communications, Surveillance and Reconnaissance

    Science.gov (United States)

    2008-09-01

    Membership Study Manager Ms. Anorme Anim – ASB Communications (Comms) Team Dr. Allen Adler Dr. Pete Swan BG(Ret) Bob Wynn Ms. Madhu Beriwal Surveillance...Pete Swan BG(Ret) Bob Wynn Dr. Madhu Beriwal Surveillance & Reconnaissance (SR) Team Dr. Darrell Collier Mr. Herb Gallagher Mr. Gary Glaser Mr. Steve...ASB Communications (Comms) Team Dr. Allen Adler Dr. Pete Swan BG(Ret) Bob Wynn Ms. Madhu Beriwal Surveillance & Reconnaissance (SR) Team Dr

  20. Priorities for antibiotic resistance surveillance in Europe

    DEFF Research Database (Denmark)

    Fluit, A. C.; van der Bruggen, J. T.; Aarestrup, Frank Møller

    2006-01-01

    Antibiotic resistance is an increasing global problem. Surveillance studies are needed to monitor resistance development, to guide local empirical therapy, and to implement timely and adequate countermeasures. To achieve this, surveillance studies must have standardised methodologies...... to the various reservoirs of antibiotic-resistant bacteria, such as hospitalised patients, nursing homes, the community, animals and food. Two studies that could serve as examples of tailored programmes are the European Antimicrobial Resistance Surveillance System (EARSS), which collects resistance data during...... of antibiotic resistance....