WorldWideScience

Sample records for surveillance automatic enforcement

  1. Effective speed management through automatic enforcement.

    NARCIS (Netherlands)

    Oei, H.-l.

    1994-01-01

    This paper analyses several aspects of the Dutch experience of speed enforcement, and presents the results of some speed management experiments in The Netherlands, using automatic warning of speeders and enforcement of speeding. Traditional approaches to manage speed there have not resulted in

  2. Automatic video surveillance of outdoor scenes using track before detect

    DEFF Research Database (Denmark)

    Hansen, Morten; Sørensen, Helge Bjarup Dissing; Birkemark, Christian M.

    2005-01-01

    This paper concerns automatic video surveillance of outdoor scenes using a single camera. The first step in automatic interpretation of the video stream is activity detection based on background subtraction. Usually, this process will generate a large number of false alarms in outdoor scenes due...

  3. The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance

    Science.gov (United States)

    Soghoian, Christopher

    2012-01-01

    Telecommunications carriers and service providers now play an essential role in facilitating modern surveillance by law enforcement agencies. The police merely select the individuals to be monitored, while the actual surveillance is performed by third parties: often the same email providers, search engines and telephone companies to whom consumers…

  4. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, LLC, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance -- Broadcast (ADS-B) into a...

  5. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance Broadcast (ADS-B) into a safe,...

  6. ADVANCED SURVEILLANCE OF ENVIROMENTAL RADIATION IN AUTOMATIC NETWORKS.

    Science.gov (United States)

    Benito, G; Sáez, J C; Blázquez, J B; Quiñones, J

    2018-06-01

    The objective of this study is the verification of the operation of a radiation monitoring network conformed by several sensors. The malfunction of a surveillance network has security and economic consequences, which derive from its maintenance and could be avoided with an early detection. The proposed method is based on a kind of multivariate distance, and the verification for the methodology has been tested at CIEMAT's local radiological early warning network.

  7. Motion Pattern Extraction and Event Detection for Automatic Visual Surveillance

    Directory of Open Access Journals (Sweden)

    Benabbas Yassine

    2011-01-01

    Full Text Available Efficient analysis of human behavior in video surveillance scenes is a very challenging problem. Most traditional approaches fail when applied in real conditions and contexts like amounts of persons, appearance ambiguity, and occlusion. In this work, we propose to deal with this problem by modeling the global motion information obtained from optical flow vectors. The obtained direction and magnitude models learn the dominant motion orientations and magnitudes at each spatial location of the scene and are used to detect the major motion patterns. The applied region-based segmentation algorithm groups local blocks that share the same motion direction and speed and allows a subregion of the scene to appear in different patterns. The second part of the approach consists in the detection of events related to groups of people which are merge, split, walk, run, local dispersion, and evacuation by analyzing the instantaneous optical flow vectors and comparing the learned models. The approach is validated and experimented on standard datasets of the computer vision community. The qualitative and quantitative results are discussed.

  8. New concepts in automatic enforcement. The "Escape" Project, Deliverable 6. Project funded by the European Commission under the Transport RTD Programme of the 4th Framework Programme.

    NARCIS (Netherlands)

    Heidstra, J. Goldenbeld, C. Mäkinen, T. Nilsson, G. & Sagberg, F.

    2010-01-01

    One main reason for automatic enforcement, except of the safety situation, is that the police will not be able to take direct action to each detected violator at normal police enforcement activities in some environments. By using detectors and camera technology the violators can be identified and

  9. Object Occlusion Detection Using Automatic Camera Calibration for a Wide-Area Video Surveillance System

    Directory of Open Access Journals (Sweden)

    Jaehoon Jung

    2016-06-01

    Full Text Available This paper presents an object occlusion detection algorithm using object depth information that is estimated by automatic camera calibration. The object occlusion problem is a major factor to degrade the performance of object tracking and recognition. To detect an object occlusion, the proposed algorithm consists of three steps: (i automatic camera calibration using both moving objects and a background structure; (ii object depth estimation; and (iii detection of occluded regions. The proposed algorithm estimates the depth of the object without extra sensors but with a generic red, green and blue (RGB camera. As a result, the proposed algorithm can be applied to improve the performance of object tracking and object recognition algorithms for video surveillance systems.

  10. Automatic analysis of online image data for law enforcement agencies by concept detection and instance search

    NARCIS (Netherlands)

    Boer, M.H.T. de; Bouma, H.; Kruithof, M.C.; Haar, F.B. ter; Fischer, N.M.; Hagendoorn, L.K.; Joosten, B.; Raaijmakers, S.

    2017-01-01

    The information available on-line and off-line, from open as well as from private sources, is growing at an exponential rate and places an increasing demand on the limited resources of Law Enforcement Agencies (LEAs). The absence of appropriate tools and techniques to collect, process, and analyze

  11. Automatic analysis of online image data for law enforcement agencies by concept detection and instance search

    Science.gov (United States)

    de Boer, Maaike H. T.; Bouma, Henri; Kruithof, Maarten C.; ter Haar, Frank B.; Fischer, Noëlle M.; Hagendoorn, Laurens K.; Joosten, Bart; Raaijmakers, Stephan

    2017-10-01

    The information available on-line and off-line, from open as well as from private sources, is growing at an exponential rate and places an increasing demand on the limited resources of Law Enforcement Agencies (LEAs). The absence of appropriate tools and techniques to collect, process, and analyze the volumes of complex and heterogeneous data has created a severe information overload. If a solution is not found, the impact on law enforcement will be dramatic, e.g. because important evidence is missed or the investigation time is too long. Furthermore, there is an uneven level of capabilities to deal with the large volumes of complex and heterogeneous data that come from multiple open and private sources at national level across the EU, which hinders cooperation and information sharing. Consequently, there is a pertinent need to develop tools, systems and processes which expedite online investigations. In this paper, we describe a suite of analysis tools to identify and localize generic concepts, instances of objects and logos in images, which constitutes a significant portion of everyday law enforcement data. We describe how incremental learning based on only a few examples and large-scale indexing are addressed in both concept detection and instance search. Our search technology allows querying of the database by visual examples and by keywords. Our tools are packaged in a Docker container to guarantee easy deployment on a system and our tools exploit possibilities provided by open source toolboxes, contributing to the technical autonomy of LEAs.

  12. Automatic Detection and Classification of Audio Events for Road Surveillance Applications

    Directory of Open Access Journals (Sweden)

    Noor Almaadeed

    2018-06-01

    Full Text Available This work investigates the problem of detecting hazardous events on roads by designing an audio surveillance system that automatically detects perilous situations such as car crashes and tire skidding. In recent years, research has shown several visual surveillance systems that have been proposed for road monitoring to detect accidents with an aim to improve safety procedures in emergency cases. However, the visual information alone cannot detect certain events such as car crashes and tire skidding, especially under adverse and visually cluttered weather conditions such as snowfall, rain, and fog. Consequently, the incorporation of microphones and audio event detectors based on audio processing can significantly enhance the detection accuracy of such surveillance systems. This paper proposes to combine time-domain, frequency-domain, and joint time-frequency features extracted from a class of quadratic time-frequency distributions (QTFDs to detect events on roads through audio analysis and processing. Experiments were carried out using a publicly available dataset. The experimental results conform the effectiveness of the proposed approach for detecting hazardous events on roads as demonstrated by 7% improvement of accuracy rate when compared against methods that use individual temporal and spectral features.

  13. Automatic helmet-wearing detection for law enforcement using CCTV cameras

    Science.gov (United States)

    Wonghabut, P.; Kumphong, J.; Satiennam, T.; Ung-arunyawee, R.; Leelapatra, W.

    2018-04-01

    The objective of this research is to develop an application for enforcing helmet wearing using CCTV cameras. The developed application aims to help law enforcement by police, and eventually resulting in changing risk behaviours and consequently reducing the number of accidents and its severity. Conceptually, the application software implemented using C++ language and OpenCV library uses two different angle of view CCTV cameras. Video frames recorded by the wide-angle CCTV camera are used to detect motorcyclists. If any motorcyclist without helmet is found, then the zoomed (narrow-angle) CCTV is activated to capture image of the violating motorcyclist and the motorcycle license plate in real time. Captured images are managed by database implemented using MySQL for ticket issuing. The results show that the developed program is able to detect 81% of motorcyclists on various motorcycle types during daytime and night-time. The validation results reveal that the program achieves 74% accuracy in detecting the motorcyclist without helmet.

  14. Automatic inference of geometric camera parameters and inter-camera topology in uncalibrated disjoint surveillance cameras

    Science.gov (United States)

    den Hollander, Richard J. M.; Bouma, Henri; Baan, Jan; Eendebak, Pieter T.; van Rest, Jeroen H. C.

    2015-10-01

    Person tracking across non-overlapping cameras and other types of video analytics benefit from spatial calibration information that allows an estimation of the distance between cameras and a relation between pixel coordinates and world coordinates within a camera. In a large environment with many cameras, or for frequent ad-hoc deployments of cameras, the cost of this calibration is high. This creates a barrier for the use of video analytics. Automating the calibration allows for a short configuration time, and the use of video analytics in a wider range of scenarios, including ad-hoc crisis situations and large scale surveillance systems. We show an autocalibration method entirely based on pedestrian detections in surveillance video in multiple non-overlapping cameras. In this paper, we show the two main components of automatic calibration. The first shows the intra-camera geometry estimation that leads to an estimate of the tilt angle, focal length and camera height, which is important for the conversion from pixels to meters and vice versa. The second component shows the inter-camera topology inference that leads to an estimate of the distance between cameras, which is important for spatio-temporal analysis of multi-camera tracking. This paper describes each of these methods and provides results on realistic video data.

  15. An algorithm for generating data accessibility recommendations for flight deck Automatic Dependent Surveillance-Broadcast (ADS-B) applications

    Science.gov (United States)

    2014-09-09

    Automatic Dependent Surveillance-Broadcast (ADS-B) In technology supports the display of traffic data on Cockpit Displays of Traffic Information (CDTIs). The data are used by flightcrews to perform defined self-separation procedures, such as the in-t...

  16. Through-the-wall surveillance for homeland security and law enforcement

    Science.gov (United States)

    Borek, Stanley E.; Clarke, Bernard J.; Costianes, Peter J.

    2005-05-01

    The Air Force Research Laboratory Information Directorate (AFRL/IF), under sponsorship of the Department of Justice's (DOJ), National Institute of Justice (NIJ) Office of Science and Technology (OS&T), is currently developing and evaluating advanced Through the Wall Surveillance (TWS) technologies. These technologies are partitioned into two categories: inexpensive, handheld systems for locating an individual(s) behind a wall or door; and portable, personal computer (PC) based standoff systems to enable the determination of events during critical incident situations. The technologies utilized are primarily focused on active radars operating in the UHF, L, S (ultra wideband (UWB)), X, and Ku Bands. The data displayed by these systems is indicative of range (1 Dimension), or range and azimuth (2 Dimensions) to the moving individual(s). This paper will highlight the technologies employed in five (5) prototype TWS systems delivered to NIJ and AFRL/IF for test and evaluation. It will discuss the systems backgrounds, applications, current states of evolution, and future plans for enhanced assessment.

  17. Satellite single-axis attitude determination based on Automatic Dependent Surveillance - Broadcast signals

    Science.gov (United States)

    Zhou, Kaixing; Sun, Xiucong; Huang, Hai; Wang, Xinsheng; Ren, Guangwei

    2017-10-01

    The space-based Automatic Dependent Surveillance - Broadcast (ADS-B) is a new technology for air traffic management. The satellite equipped with spaceborne ADS-B system receives the broadcast signals from aircraft and transfers the message to ground stations, so as to extend the coverage area of terrestrial-based ADS-B. In this work, a novel satellite single-axis attitude determination solution based on the ADS-B receiving system is proposed. This solution utilizes the signal-to-noise ratio (SNR) measurement of the broadcast signals from aircraft to determine the boresight orientation of the ADS-B receiving antenna fixed on the satellite. The basic principle of this solution is described. The feasibility study of this new attitude determination solution is implemented, including the link budget and the access analysis. On this basis, the nonlinear least squares estimation based on the Levenberg-Marquardt method is applied to estimate the single-axis orientation. A full digital simulation has been carried out to verify the effectiveness and performance of this solution. Finally, the corresponding results are processed and presented minutely.

  18. Surveillance

    DEFF Research Database (Denmark)

    Albrechtslund, Anders; Coeckelbergh, Mark; Matzner, Tobias

    Studying surveillance involves raising questions about the very nature of concepts such as information, technology, identity, space and power. Besides the maybe all too obvious ethical issues often discussed with regard to surveillance, there are several other angles and approaches that we should...... like to encourage. Therefore, our panel will focus on the philosophical, yet non-ethical issues of surveillance in order to stimulate an intense debate with the audience on the ethical implications of our enquiries. We also hope to provide a broader and deeper understanding of surveillance....

  19. 20 CFR 10.740 - In what situations will OWCP automatically presume that a law enforcement officer is covered by...

    Science.gov (United States)

    2010-04-01

    ... authority to assist a Federal law enforcement authority in the protection of the President of the United... will be extended. (b) Coverage for officers of the U.S. Park Police and those officers of the Uniformed...

  20. Application of an automatic pattern recognition for aleatory signals for the surveillance of nuclear reactor and rotating machinery

    International Nuclear Information System (INIS)

    Nascimento, J.A. do.

    1982-02-01

    An automatic pattern recognition program PSDREC, developed for the surveillance of nuclear reactor and rotating machinery is described and the relevant theory is outlined. Pattern recognition analysis of noise signals is a powerful technique for assessing 'system normality' in dynamic systems. This program, with applies 8 statistical tests to calculated power spectral density (PSD) distribution, was earlier installed in a PDP-11/45 computer at IPEN. To analyse recorded signals from three systems, namely an operational BWR power reactor (neutron signals), a water pump and a diesel engine (vibration signals) this technique was used. Results of the tests are considered satisfactory. (Author) [pt

  1. A low cost automatic detection and ranging system for space surveillance in the medium Earth orbit region and beyond.

    Science.gov (United States)

    Danescu, Radu; Ciurte, Anca; Turcu, Vlad

    2014-02-11

    The space around the Earth is filled with man-made objects, which orbit the planet at altitudes ranging from hundreds to tens of thousands of kilometers. Keeping an eye on all objects in Earth's orbit, useful and not useful, operational or not, is known as Space Surveillance. Due to cost considerations, the space surveillance solutions beyond the Low Earth Orbit region are mainly based on optical instruments. This paper presents a solution for real-time automatic detection and ranging of space objects of altitudes ranging from below the Medium Earth Orbit up to 40,000 km, based on two low cost observation systems built using commercial cameras and marginally professional telescopes, placed 37 km apart, operating as a large baseline stereovision system. The telescopes are pointed towards any visible region of the sky, and the system is able to automatically calibrate the orientation parameters using automatic matching of reference stars from an online catalog, with a very high tolerance for the initial guess of the sky region and camera orientation. The difference between the left and right image of a synchronized stereo pair is used for automatic detection of the satellite pixels, using an original difference computation algorithm that is capable of high sensitivity and a low false positive rate. The use of stereovision provides a strong means of removing false positives, and avoids the need for prior knowledge of the orbits observed, the system being able to detect at the same time all types of objects that fall within the measurement range and are visible on the image.

  2. Evaluation of a Surveillance Review Software based on Automatic Image Summaries

    International Nuclear Information System (INIS)

    Rocchi, S.; Hadfi, G.; John, M.; Moeslinger, M.; Murray, J.; Juengling, K.; Sequeira, V.; Versino, C.; )

    2015-01-01

    Surveillance streams from safeguards instruments contain thousands of images. Inspectors review them in order to find safeguards-relevant events. Statistically a very small fraction of the images is expected to be safeguards-relevant. For this reason inspectors need a tool which helps them to focus their attention directly to the relevant parts of the surveillance stream. The current approach for surveillance review makes use of scene change detection within areas of interest (AOIs). The data reduction provided can be effective for the review of regular processes, and requires specific knowledge of the process/environment under review for the proper setting of the AOIs. The VideoZoom approach, developed by the European Commission Joint Research Centre-Institute for Transuranium Elements (JRC-ITU), detects scene changes on the whole image plane. Changes are then summarized and rendered at different levels of abstraction in four layers of summaries, each one revealing more information about the image changes. By means of a zooming interface, the reviewer is able to navigate the summary layers and decide which are to be examined with full photographic detail or skipped because they are clearly not safeguards-relevant. In this way reviewers can make best use of their time by investigating what really requires their attention. VideoZoom was evaluated by a group of IAEA inspectors on a benchmark of image reviews, with promising results in terms of identification of safeguards-relevant events, efficiency and usability. Following the positive results collected during the preliminary benchmark, the IAEA initiated a task under the European Commission Support Programme (EC SP), aimed at the research, development, and evaluation of surveillance review software based on VideoZoom and compatible with surveillance streams produced by NGSS cameras, the current safeguards surveillance technology deployed by the IAEA. This paper provides a description of the VideoZoom approach to

  3. Real-Time FPGA-Based Object Tracker with Automatic Pan-Tilt Features for Smart Video Surveillance Systems

    Directory of Open Access Journals (Sweden)

    Sanjay Singh

    2017-05-01

    Full Text Available The design of smart video surveillance systems is an active research field among the computer vision community because of their ability to perform automatic scene analysis by selecting and tracking the objects of interest. In this paper, we present the design and implementation of an FPGA-based standalone working prototype system for real-time tracking of an object of interest in live video streams for such systems. In addition to real-time tracking of the object of interest, the implemented system is also capable of providing purposive automatic camera movement (pan-tilt in the direction determined by movement of the tracked object. The complete system, including camera interface, DDR2 external memory interface controller, designed object tracking VLSI architecture, camera movement controller and display interface, has been implemented on the Xilinx ML510 (Virtex-5 FX130T FPGA Board. Our proposed, designed and implemented system robustly tracks the target object present in the scene in real time for standard PAL (720 × 576 resolution color video and automatically controls camera movement in the direction determined by the movement of the tracked object.

  4. Faraday rotation of Automatic Dependent Surveillance Broadcast (ADS-B) signals as a method of ionospheric characterization

    Science.gov (United States)

    Cushley, A. C.; Kabin, K.; Noel, J. M. A.

    2017-12-01

    Radio waves propagating through plasma in the Earth's ambient magnetic field experience Faraday rotation; the plane of the electric field of a linearly polarized wave changes as a function of the distance travelled through a plasma. Linearly polarized radio waves at 1090 MHz frequency are emitted by Automatic Dependent Surveillance Broadcast (ADS-B) devices which are installed on most commercial aircraft. These radio waves can be detected by satellites in low earth orbits, and the change of the polarization angle caused by propagation through the terrestrial ionosphere can be measured. In this work we discuss how these measurements can be used to characterize the ionospheric conditions. In the present study, we compute the amount of Faraday rotation from a prescribed total electron content value and two of the profile parameters of the NeQuick model.

  5. Faraday Rotation of Automatic Dependent Surveillance-Broadcast (ADS-B) Signals as a Method of Ionospheric Characterization

    Science.gov (United States)

    Cushley, A. C.; Kabin, K.; Noël, J.-M.

    2017-10-01

    Radio waves propagating through plasma in the Earth's ambient magnetic field experience Faraday rotation; the plane of the electric field of a linearly polarized wave changes as a function of the distance travelled through a plasma. Linearly polarized radio waves at 1090 MHz frequency are emitted by Automatic Dependent Surveillance Broadcast (ADS-B) devices that are installed on most commercial aircraft. These radio waves can be detected by satellites in low Earth orbits, and the change of the polarization angle caused by propagation through the terrestrial ionosphere can be measured. In this manuscript we discuss how these measurements can be used to characterize the ionospheric conditions. In the present study, we compute the amount of Faraday rotation from a prescribed total electron content value and two of the profile parameters of the NeQuick ionospheric model.

  6. The SBAS Sentinel-1 Surveillance service for automatic and systematic generation of Earth surface displacement within the GEP platform.

    Science.gov (United States)

    Casu, Francesco; De Luca, Claudio; Lanari, Riccardo; Manunta, Michele; Zinno, Ivana

    2017-04-01

    The Geohazards Exploitation Platform (GEP) is an ESA activity of the Earth Observation (EO) ground segment to demonstrate the benefit of new technologies for large scale processing of EO data. GEP aims at providing both on-demand processing services for scientific users of the geohazards community and an integration platform for new EO data analysis processors dedicated to scientists and other expert users. In the Remote Sensing scenario, a crucial role is played by the recently launched Sentinel-1 (S1) constellation that, with its global acquisition policy, has literally flooded the scientific community with a huge amount of data acquired over large part of the Earth on a regular basis (down to 6-days with both Sentinel-1A and 1B passes). Moreover, the S1 data, as part of the European Copernicus program, are openly and freely accessible, thus fostering their use for the development of tools for Earth surface monitoring. In particular, due to their specific SAR Interferometry (InSAR) design, Sentinel-1 satellites can be exploited to build up operational services for the generation of advanced interferometric products that can be very useful within risk management and natural hazard monitoring scenarios. Accordingly, in this work we present the activities carried out for the development, integration, and deployment of the SBAS Sentinel-1 Surveillance service of CNR-IREA within the GEP platform. This service is based on a parallel implementation of the SBAS approach, referred to as P-SBAS, able to effectively run in large distributed computing infrastructures (grid and cloud) and to allow for an efficient computation of large SAR data sequences with advanced DInSAR approaches. In particular, the Surveillance service developed on GEP platform consists on the systematic and automatic processing of Sentinel-1 data on selected Areas of Interest (AoI) to generate updated surface displacement time series via the SBAS-InSAR algorithm. We built up a system that is

  7. AUTOMATIC FAST VIDEO OBJECT DETECTION AND TRACKING ON VIDEO SURVEILLANCE SYSTEM

    Directory of Open Access Journals (Sweden)

    V. Arunachalam

    2012-08-01

    Full Text Available This paper describes the advance techniques for object detection and tracking in video. Most visual surveillance systems start with motion detection. Motion detection methods attempt to locate connected regions of pixels that represent the moving objects within the scene; different approaches include frame-to-frame difference, background subtraction and motion analysis. The motion detection can be achieved by Principle Component Analysis (PCA and then separate an objects from background using background subtraction. The detected object can be segmented. Segmentation consists of two schemes: one for spatial segmentation and the other for temporal segmentation. Tracking approach can be done in each frame of detected Object. Pixel label problem can be alleviated by the MAP (Maximum a Posteriori technique.

  8. Investigation of neural network paradigms for the development of automatic noise diagnostic/reactor surveillance systems

    International Nuclear Information System (INIS)

    Korsah, K.; Uhrig, R.E.

    1991-01-01

    The use of artificial intelligence (AI) techniques as an aid in the maintenance and operation of nuclear power plant systems has been recognized for the past several years, and several applications using expert systems technology currently exist. The authors investigated the backpropagation paradigm for the recognition of neutron noise power spectral density (PSD) signatures as a possible alternative to current methods based on statistical techniques. The goal is to advance the state of the art in the application of noise analysis techniques to monitor nuclear reactor internals. Continuous surveillance of reactor systems for structural degradation can be quite cost-effective because (1) the loss of mechanical integrity of the reactor internal components can be detected at an early stage before severe damage occurs, (2) unnecessary periodic maintenance can be avoided, (3) plant downtime can be reduced to a minimum, (4) a high level of plant safety can be maintained, and (5) it can be used to help justify the extension of a plant's operating license. The initial objectives were to use neutron noise PSD data from a pressurized water reactor, acquired over a period of ∼2 years by the Oak Ridge National Laboratory (ORNL) Power Spectral Density RECognition (PSDREC) system to develop networks that can (1) differentiate between normal neutron spectral data and anomalous spectral data (e.g., malfunctioning instrumentation); and (2) detect significant shifts in the positions of spectral resonances while reducing the effect of small, random shifts (in neutron noise analysis, shifts in the resonance(s) present in a neutron PSD spectrum are the primary means for diagnosing degradation of reactor internals). 11 refs, 8 figs

  9. Automatic real-time surveillance of eye position and gating for stereotactic radiotherapy of uveal melanoma

    International Nuclear Information System (INIS)

    Petersch, Bernhard; Bogner, Joachim; Dieckmann, Karin; Poetter, Richard; Georg, Dietmar

    2004-01-01

    A new prototype (hardware and software) for monitoring eye movements using a noninvasive technique for gated linac-based stereotactic radiotherapy (SRT) of uveal melanoma was developed. The prototype was tested within the scope of a study for 11 patients. Eye immobilization was achieved by having the patient fixate a light source integrated into the system. The system is used in conjunction with a Head and Neck mask system for immobilization, and uses infrared tracking technology for positioning (both BrainLAB AG Heimstetten/Germany). It was used during CT and MR image acquisition as well as during all of five treatment fractions (6 MeV, 5x12 Gy to 80% isodose) to guarantee identical patient setup and eye rotational state during treatment planning and treatment delivery. Maximum temporal and angular deviations tolerated during treatment delivery can be chosen by the physician, the radiation then being interrupted automatically and instantaneously if those criteria are being exceeded during irradiation. A graphical user interface displays life video images of the treated eye and information about the current and previous rotational deviation of the eye from its reference treatment position. The physician thus has online access to data directly linked to the success of the treatment and possible side effects. Mean angular deviations during CT/MR scans and treatment deliveries ranged from 1.61 deg. to 3.64 deg. (standard deviations 0.87 deg. to 2.09 deg.) which is in accordance with precision requirements for SRT. Typical situations when preset deviation criteria were exceeded are slow drifts (fatigue), sudden large eye movements (irritation), or if patients closed their eyes (fatigue). In these cases radiation was reliably interrupted by the gating system. In our clinical setup the novel system for computer-controlled eye movement gated treatments was well tolerated by all patients. The system yields quantitative real-time information about the eye's rotational state

  10. Standardized rendering from IR surveillance motion imagery

    Science.gov (United States)

    Prokoski, F. J.

    2014-06-01

    Government agencies, including defense and law enforcement, increasingly make use of video from surveillance systems and camera phones owned by non-government entities.Making advanced and standardized motion imaging technology available to private and commercial users at cost-effective prices would benefit all parties. In particular, incorporating thermal infrared into commercial surveillance systems offers substantial benefits beyond night vision capability. Face rendering is a process to facilitate exploitation of thermal infrared surveillance imagery from the general area of a crime scene, to assist investigations with and without cooperating eyewitnesses. Face rendering automatically generates greyscale representations similar to police artist sketches for faces in surveillance imagery collected from proximate locations and times to a crime under investigation. Near-realtime generation of face renderings can provide law enforcement with an investigation tool to assess witness memory and credibility, and integrate reports from multiple eyewitnesses, Renderings can be quickly disseminated through social media to warn of a person who may pose an immediate threat, and to solicit the public's help in identifying possible suspects and witnesses. Renderings are pose-standardized so as to not divulge the presence and location of eyewitnesses and surveillance cameras. Incorporation of thermal infrared imaging into commercial surveillance systems will significantly improve system performance, and reduce manual review times, at an incremental cost that will continue to decrease. Benefits to criminal justice would include improved reliability of eyewitness testimony and improved accuracy of distinguishing among minority groups in eyewitness and surveillance identifications.

  11. Performance of data acceptance criteria over 50 months from an automatic real-time environmental radiation surveillance network

    International Nuclear Information System (INIS)

    Casanovas, R.; Morant, J.J.; Lopez, M.; Hernandez-Giron, I.; Batalla, E.; Salvado, M.

    2011-01-01

    The automatic real-time environmental radiation surveillance network of Catalonia (Spain) comprises two subnetworks; one with 9 aerosol monitors and the other with 8 Geiger monitors together with 2 water monitors located in the Ebre river. Since September 2006, several improvements were implemented in order to get better quality and quantity of data, allowing a more accurate data analysis. However, several causes (natural causes, equipment failure, artificial external causes and incidents in nuclear power plants) may produce radiological measured values mismatched with the own station background, whether spurious without significance or true radiological values. Thus, data analysis for a 50-month period was made and allowed to establish an easily implementable statistical criterion to find those values that require special attention. This criterion proved a very useful tool for creating a properly debugged database and to give a quick response to equipment failures or possible radiological incidents. This paper presents the results obtained from the criterion application, including the figures for the expected, raw and debugged data, percentages of missing data grouped by causes and radiological measurements from the networks. Finally, based on the discussed information, recommendations for the improvement of the network are identified to obtain better radiological information and analysis capabilities. - Highlights: → Causes producing data mismatching with the own stations background are described. → Causes may be natural, equipment failure, external or nuclear plants incidents. → These causes can produce either spurious or true radiological data. → A criterion to find these data was implemented and tested for a 50-month period. → Recommendations for the improvement of the network are identified.

  12. Automatic surveillance systems

    International Nuclear Information System (INIS)

    Bruschi, R.; Pallottelli, R.

    1985-01-01

    In this paper are presented studies and realization of a special tool, for supporting the console-operator, during normal or abnormal conditions of the plant. It has been realized by means of real-time simulation techniques and it is able: a) to diagnose plant-faults in real-time mode and, to allow the operator to detect the locations of the causes of the malfunctions; b) to supply the conditions where the plant is going, whether in normal or accidental evolution

  13. 76 FR 22160 - Fifty-Fourth Meeting: RTCA Special Committee 186: Automatic Dependent Surveillance-Broadcast (ADS-B)

    Science.gov (United States)

    2011-04-20

    ... Rooms, 1828 L Street, NW., Suite 805, Washington, DC 20036. FOR FURTHER INFORMATION CONTACT: RTCA Secretariat, 1828 L Street, NW., Suite 805, Washington, DC, 20036, (202) 833-9339; fax (202) 833-9434; Web.... 035-11/SC186-307 FAA Surveillance and Broadcast Services (SBS) Program Status Traffic Situation...

  14. 75 FR 37712 - Automatic Dependent Surveillance-Broadcast (ADS-B) Out Performance Requirements To Support Air...

    Science.gov (United States)

    2010-06-30

    ... Performance Requirements To Support Air Traffic Control (ATC) Service; Technical Amendment AGENCY: Federal... FAA amended its regulations to add equipage requirements and performance standards for Automatic... Approval for deviation was renumbered as Sec. 21.618, effective April 14, 2010. On May 28, 2010, the FAA...

  15. The Copyright Surveillance Industry

    Directory of Open Access Journals (Sweden)

    Mike Zajko

    2015-09-01

    Full Text Available Creative works are now increasingly distributed as digital “content” through the internet, and copyright law has created powerful incentives to monitor and control these flows. This paper analyzes the surveillance industry that has emerged as a result. Copyright surveillance systems identify copyright infringement online and identify persons to hold responsible for infringing acts. These practices have raised fundamental questions about the nature of identification and attribution on the internet, as well as the increasing use of algorithms to make legal distinctions. New technologies have threatened the profits of some media industries through copyright infringement, but also enabled profitable forms of mass copyright surveillance and enforcement. Rather than a system of perfect control, copyright enforcement continues to be selective and uneven, but its broad reach results in systemic harm and provides opportunities for exploitation. It is only by scrutinizing copyright surveillance practices and copyright enforcement measures that we can evaluate these consequences.

  16. THE NOISE IMMUNITY OF THE DIGITAL DEMODULATOR MFM-AM SIGNAL USED IN DATA COMMUNICATIONS SYSTEMS OF AIR TRAFFIC CONTROL WITH AUTOMATIC DEPENDENT SURVEILLANCE AGAINST A NON-GAUSSIAN NOISE

    Directory of Open Access Journals (Sweden)

    A. L. Senyavskiy

    2015-01-01

    Full Text Available The article analyzes the robustness of the digital demodulator of the signal with the lowest frequency shift keying at a subcarrier frequency with respect to non-Gaussian interference type of atmospheric, industrial noise and interfering frequency -and phase-shift keyed signals. This type of demodulator is used for the transmission of navigation data in the systems of air traffic control with automatic dependent surveillance.

  17. A Reinforcement Learning Model Equipped with Sensors for Generating Perception Patterns: Implementation of a Simulated Air Navigation System Using ADS-B (Automatic Dependent Surveillance-Broadcast) Technology.

    Science.gov (United States)

    Álvarez de Toledo, Santiago; Anguera, Aurea; Barreiro, José M; Lara, Juan A; Lizcano, David

    2017-01-19

    Over the last few decades, a number of reinforcement learning techniques have emerged, and different reinforcement learning-based applications have proliferated. However, such techniques tend to specialize in a particular field. This is an obstacle to their generalization and extrapolation to other areas. Besides, neither the reward-punishment (r-p) learning process nor the convergence of results is fast and efficient enough. To address these obstacles, this research proposes a general reinforcement learning model. This model is independent of input and output types and based on general bioinspired principles that help to speed up the learning process. The model is composed of a perception module based on sensors whose specific perceptions are mapped as perception patterns. In this manner, similar perceptions (even if perceived at different positions in the environment) are accounted for by the same perception pattern. Additionally, the model includes a procedure that statistically associates perception-action pattern pairs depending on the positive or negative results output by executing the respective action in response to a particular perception during the learning process. To do this, the model is fitted with a mechanism that reacts positively or negatively to particular sensory stimuli in order to rate results. The model is supplemented by an action module that can be configured depending on the maneuverability of each specific agent. The model has been applied in the air navigation domain, a field with strong safety restrictions, which led us to implement a simulated system equipped with the proposed model. Accordingly, the perception sensors were based on Automatic Dependent Surveillance-Broadcast (ADS-B) technology, which is described in this paper. The results were quite satisfactory, and it outperformed traditional methods existing in the literature with respect to learning reliability and efficiency.

  18. Calibration and study of the measurement capabilities of real-time gamma spectrometry equipment, developed for the renewal of the network of automatic stations for environmental radiological surveillance of the Generalitat de Catalunya

    International Nuclear Information System (INIS)

    Casanovas, R.; Prieto, E.; Salvado, M.

    2013-01-01

    The renewal of the automatic environmental radiation surveillance network of the Gereralitat of Catalunya has been carried out through the development and implementation of gamma-spectrometry-based equipment. The monitors use scintillation cristals, either NaI(Tl) or LaBr 3 (Ce) and currently, there are 3 types of equipment: water radioactivity monitors, aerosols on a particulate filter monitors and direct measurement monitors. In this paper, we expose the basic features of its operation, the details of their calibration and the minimum detectable activity concentrations for some isotopes

  19. New Network of Automatic Stations integrated in the CSNs Environmental Radiological Surveillance Network; Nueva Red de Estaciones Automaticas integrada en la Red de Vigilancia Radiologica Ambiental del CSN

    Energy Technology Data Exchange (ETDEWEB)

    Parages Perez del Yerro, C.; Garcia Cadierno, J. P.; Calvin Cuartero, M.

    2016-05-01

    In 1992, the Council put into operation a network comprising 25 automatic stations for continuous monitoring of the radiological quality of the air and the detection of anomalous situations. It has now decided to undertake the renewal and modernisation of these installations, incorporating sensors and automatic connection and communication systems based on the best technology currently available. (Author)

  20. Law Enforcement Locations

    Data.gov (United States)

    Kansas Data Access and Support Center — Law Enforcement Locations in Kansas Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law enforcement agencies "are...

  1. Drug Enforcement Administration

    Science.gov (United States)

    ... de informacin confidencial --> DEA NEWS The Drug Enforcement Administration and Discovery Education name grand winner of Operation ... JUN 15 (Washington) The United States Drug Enforcement Administration, DEA Educational Foundation and Discovery Education awarded Porter ...

  2. Regulatory Enforcement and Compliance

    DEFF Research Database (Denmark)

    May, Peter J.; Winter, Søren

    1999-01-01

    This study of municipal enforcement of agro-environmental regulations in Denmark provides an empirical understanding of how enforcement affects compliance. A key contribution is sorting out the relative influence of inspectors' different styles of enforcement and choices made by enforcement...... agencies. The latter are shown to be more important in bringing about compliance than are inspectors' enforcement styles. Municipal agencies are shown to increase compliance through the use of third parties, more frequent inspection, and setting priorities for inspection of major items. The findings about...

  3. Speed enforcement in Norway

    DEFF Research Database (Denmark)

    Elvik, Rune

    2015-01-01

    and the police. This model makes predictions both about how drivers will adapt to changes in the amount of enforcement (the more enforcement, the less violations) as well as how the police will adapt to changes in the rate of violations (the less violations, the less enforcement). The paper attempts to test...... in the amount of enforcement. The predictions of the game-theoretic model were supported, although the results were not statistically significant in the model of how the police adapt enforcement to changes in the rate of violations....

  4. Law enforcement suicide: a national analysis.

    Science.gov (United States)

    Violanti, John M; Robinson, Cynthia F; Shen, Rui

    2013-01-01

    Previous research suggests that there is an elevated risk of suicide among workers within law enforcement occupations. The present study examined the proportionate mortality for suicide in law enforcement in comparison to the US working population during 1999, 2003-2004, and 2007, based on Centers for Disease Control and Prevention's National Institute for Occupational Safety and Health National Occupational Mortality Surveillance data. We analyzed data for all law enforcement occupations and focused on two specific law enforcement occupational categories-detectives/criminal investigators/ police and corrections officers. Suicides were also explored by race, gender and ethnicity. The results of the study showed proportionate mortality ratios (PMRs) for suicide were significantly high for all races and sexes combined (all law enforcement--PMR = 169, 95% CI = 150-191, p law enforcement combined category, and a similarly high PMR was found among Hispanic detectives/criminal investigators/police (PMR = 388, p < 0.01, 95% CI = 168-765). There were small numbers of deaths among female and African American officers. The results included significantly increased risk for suicide among detectives/criminal investigators/police and corrections officers, which suggests that additional study could provide better data to inform us for preventive action.

  5. Enforcement and judicial review

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    The 1990 Amendments to the enforcement provisions of the Clean Air Act generally give the Administrator and the courts broader powers to enforce the substantive provisions of the Act. The changes include wider applicability of civil sanctions, increased criminal penalties, broader emergency powers, broader inspection powers, and increased citizen involvement in enforcement and administrative decisionmaking. Another significant change is the addition of an administrative penalty scheme that would allow EPA to use streamlined procedures to assess administrative penalties of up to $200,000 (or more, in some cases). Furthermore, the Amendments extend the prohibition against entering into government contracts with violators to other facilities owned or operated by the convicted person. This chapter summarizes the statutory enforcement provisions of the Clean Air Act. It covers the new civil and criminal enforcement provisions, the new administrative penalty scheme, and the new provisions allowing broader public involvement in enforcement proceedings

  6. Environmental Enforcement Districts

    Data.gov (United States)

    Vermont Center for Geographic Information — Current statewide map of the geographic territories of Environmental Enforcement Officers. Part of a dataset that contains administrative boundaries for Vermont's...

  7. Significant NRC Enforcement Actions

    Data.gov (United States)

    Nuclear Regulatory Commission — This dataset provides a list of Nuclear Regulartory Commission (NRC) issued significant enforcement actions. These actions, referred to as "escalated", are issued by...

  8. EPA Administrative Enforcement Dockets

    Data.gov (United States)

    U.S. Environmental Protection Agency — The EPA Administrative Enforcement Dockets database contains the electronic dockets for administrative penalty cases filed by EPA Regions and Headquarters. Visitors...

  9. Financial Reporting Enforcement

    DEFF Research Database (Denmark)

    Olsen, Carsten

    the auditors’ auditing efforts, which are made in conjunction with the impact of the enforcement of auditors and limitations on the auditors’ liability. However, research indicates that strict enforcement is a prerequisite for ensuring compliance with accounting regulations (Hail and Leuz 2006, Daske et al...

  10. Disaster prevention surveillance system

    International Nuclear Information System (INIS)

    Nara, Satoru; Kamiya, Eisei

    2001-01-01

    Fuji Electric Co., Ltd. has supplied many management systems to nuclear reactor institution. 'The nuclear countermeasures-against-calamities special-measures' was enforced. A nuclear entrepreneur has devised the measure about expansion prevention and restoration of a calamity while it endeavors after prevention of generating of a nuclear calamity. Our company have supplied the 'disaster prevention surveillance system' to the Japan Atomic Energy Research Institute Tokai Research Establishment aiming at strengthening of the monitoring function at the time (after the accident) of the accident used as one of the above-mentioned measures. A 'disaster prevention surveillance system' can share the information on the accident spot in an on-site command place, an activity headquarters, and support organizations, when the serious accident happens. This system is composed of various sensors (temperature, pressure and radiation), cameras, computers and network. (author)

  11. Constitutionality of enforcement of claims by private enforcement agents

    Directory of Open Access Journals (Sweden)

    Bodiroga Nikola

    2014-01-01

    Full Text Available The main focus of this paper is legal status of private enforcement agents in Serbia. The 2011 Serbian Law on Enforcement and Security has introduced private enforcement agents as legal professionals in charge mainly for carrying out of the enforcement. Special enforcement procedure for collection of utilities and similar claims has become exclusive competence of private enforcement agents. Since enforcement procedure has always been regarded as a set of coercive measures against enforcement debtor, it became questionable whether this coercion could be exercised by private enforcement agents. It has been argued by legal scholars that enforcement of civil judgments and other enforcement deeds belongs only to the state authority. The author tackles this issue from the standpoint of decisions of constitutional courts and jurisprudence of European Court of Human Rights.

  12. Compliance and Enforcement Actions (CEA) -

    Data.gov (United States)

    Department of Transportation — Compliance and Enforcement Actions application provides process assistance / improvements for conducting investigation and enforcement activities. The Compliance and...

  13. Enforcement Information System

    Data.gov (United States)

    Department of Transportation — EIS is an automated management information system that tracks the FAA’s enforcement actions on a nationwide basis. EIS is the FAA’s primary database for tracking...

  14. Introduction to surveillance studies

    CERN Document Server

    Petersen, JK

    2012-01-01

    Introduction & OverviewIntroduction Brief History of Surveillance Technologies & TechniquesOptical SurveillanceAerial Surveillance Audio Surveillance Radio-Wave SurveillanceGlobal Positioning Systems Sensors Computers & the Internet Data Cards Biochemical Surveillance Animal Surveillance Biometrics Genetics Practical ConsiderationsPrevalence of Surveillance Effectiveness of Surveillance Freedom & Privacy IssuesConstitutional Freedoms Privacy Safeguards & Intrusions ResourcesReferences Glossary Index

  15. ADS-B- Automatic Dependent Surveillance- Broadcast

    Directory of Open Access Journals (Sweden)

    Borivoj Galović

    2002-01-01

    Full Text Available The CU/Tent system of air traffic is facing many drawbacksand problems that restrict its further development and makes itdifficult to follow the trends of increase in the traffic volume.By means of their technology, the systems such as ADS-8create rhe basis for further building, upgrading, improving anddeveloping of a completely new concept of the air traffic system.Through their functions they fully fit into and support the basicfunctions of communication, navigation and swveillancewhich form the basis of the new concept that needs to be implementedas soon as possible.

  16. Automatic Imitation

    Science.gov (United States)

    Heyes, Cecilia

    2011-01-01

    "Automatic imitation" is a type of stimulus-response compatibility effect in which the topographical features of task-irrelevant action stimuli facilitate similar, and interfere with dissimilar, responses. This article reviews behavioral, neurophysiological, and neuroimaging research on automatic imitation, asking in what sense it is "automatic"…

  17. Surveillance Culture

    DEFF Research Database (Denmark)

    2017-01-01

    What does it mean to live in a world full of surveillance? In this documentary film, we take a look at everyday life in Denmark and how surveillance technologies and practices influence our norms and social behaviour. Researched and directed by Btihaj Ajana and Anders Albrechtslund....

  18. Why Border Enforcement Backfired.

    Science.gov (United States)

    Massey, Douglas S; Durand, Jorge; Pren, Karen A

    2016-03-01

    In this article we undertake a systematic analysis of why border enforcement backfired as a strategy of immigration control in the United States. We argue theoretically that border enforcement emerged as a policy response to a moral panic about the perceived threat of Latino immigration to the United States propounded by self-interested bureaucrats, politicians, and pundits who sought to mobilize political and material resources for their own benefit. The end result was a self-perpetuating cycle of rising enforcement and increased apprehensions that resulted in the militarization of the border in a way that was disconnected from the actual size of the undocumented flow. Using an instrumental variable approach, we show how border militarization affected the behavior of unauthorized migrants and border outcomes to transform undocumented Mexican migration from a circular flow of male workers going to three states into an eleven-million person population of settled families living in 50 states.

  19. State surveillance of radioactive material transportation. Final report

    International Nuclear Information System (INIS)

    Salomon, S.N.

    1984-02-01

    The main objective of this final report on the state surveillance of the transportation of radioactive material (RAM) is to suggest the most cost-effective inspection areas where enforcement actions might be taken by the states during their participation in the State Hazardous Materials Enforcement Development (SHMED) Program. On the basis of the lessons learned from the surveillance program, these actions are enforcement at low-level radioactive burial sites by means of civil penalties and site use suspension; enforcement at airports and at terminals that forward freight; and enforcement of courier companies. More effective and efficient enforcement can be achieved through instrumented police patrol cars and remote surveillance because they require the least amount of time of enforcement personnel. In addition, there is a strong relationship between effective emergency response and enforcement because the appropriate shipping papers, placarding and knowledge of appropriate emergency response procedures lead to improved emergency response. These lessons originate from a ten-state surveillance program from 1977 through 1981 jointly sponsored by the US Nuclear Regulatory Commission (NRC) and DOT. The states give recommendations in the categories of education, training, expanded surveillance, coordination and enforcement. The topics of special interest covered include low-level radioactive waste disposal sites, airports, cargo terminals, highways, ports, and accidents and incidents. The three most common problems in compliance with RAM transportation regulations reported by the states are incorrect package labeling; improper shipping papers; and incorrect or missing placards. Other common problems reported by the states are summarized. The relationship to other studies, the status of the SHMED Program, a synopsis of state RAM surveillance reports, and NRC/DOT expenditures are given

  20. 32 CFR 637.20 - Security surveillance systems.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Security surveillance systems. 637.20 Section 637... ENFORCEMENT AND CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.20 Security surveillance systems. Closed circuit video recording systems, to include those with an audio capability, may be...

  1. Drug Enforcement Administration.

    Science.gov (United States)

    Department of Justice, Washington, DC.

    This fact sheet contains information relating to drug abuse and abusers; drug traffic legislation; law enforcement; and descriptions of commonly used narcotics, stimulants, depressants, and hallucinogens. Also included is a short but explicit listing of audiovisual aids, an annotated bibliography, and drug identification pictures. The booklet…

  2. Surveillance Pleasures

    DEFF Research Database (Denmark)

    Albrechtslund, Anders

    The notorious intensification and digitalization of surveillance technologies and practices in today’s society has brought about numerous changes. These changes have been widely noticed, described and discussed across many academic disciplines. However, the contexts of entertainment, play...

  3. Performance-Driven Interface Contract Enforcement for Scientific Components

    Energy Technology Data Exchange (ETDEWEB)

    Dahlgren, Tamara Lynn [Univ. of California, Davis, CA (United States)

    2008-01-01

    Performance-driven interface contract enforcement research aims to improve the quality of programs built from plug-and-play scientific components. Interface contracts make the obligations on the caller and all implementations of the specified methods explicit. Runtime contract enforcement is a well-known technique for enhancing testing and debugging. However, checking all of the associated constraints during deployment is generally considered too costly from a performance stand point. Previous solutions enforced subsets of constraints without explicit consideration of their performance implications. Hence, this research measures the impacts of different interface contract sampling strategies and compares results with new techniques driven by execution time estimates. Results from three studies indicate automatically adjusting the level of checking based on performance constraints improves the likelihood of detecting contract violations under certain circumstances. Specifically, performance-driven enforcement is better suited to programs exercising constraints whose costs are at most moderately expensive relative to normal program execution.

  4. Certification/enforcement analysis

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    Industry compliance with minimum energy efficiency standards will be assured through a two-part program approach of certification and enforcement activities. The technical support document (TSD) presents the analyses upon which the proposed rule for assuring that consumer product comply with applicable energy efficiency standards is based. Much of the TSD is based upon support provided DOE by Vitro Laboratories. The OAO Corporation provided additional support in the development of the sampling plan incorporated in the proposed rule. Vitro's recommended approach to appliance certification and enforcement, developed after consideration of various program options, benefits, and impacts, establishes the C/E program framework, general criteria, and procedures for assuring a specified level of energy efficiency performance of covered consumer products. The results of the OAO analysis are given in Volume II of the TSD.

  5. Nonfatal Injuries to Law Enforcement Officers: A Rise in Assaults.

    Science.gov (United States)

    Tiesman, Hope M; Gwilliam, Melody; Konda, Srinivas; Rojek, Jeff; Marsh, Suzanne

    2018-04-01

    Limited studies exist that describe nonfatal work-related injuries to law enforcement officers. The aim of this study is to provide national estimates and trends of nonfatal injuries to law enforcement officers from 2003 through 2014. Nonfatal injuries were obtained from the National Electronic Injury Surveillance System-Occupational Supplement. Data were obtained for injuries treated in U.S. emergency departments from 2003 to 2014. Nonfatal injury rates were calculated using denominators from the Current Population Survey. Negative binomial regression was used to analyze temporal trends. Data were analyzed in 2016-2017. Between 2003 and 2014, an estimated 669,100 law enforcement officers were treated in U.S. emergency departments for nonfatal injuries. The overall rate of 635 per 10,000 full-time equivalents was three times higher than all other U.S. workers rate (213 per 10,000 full-time equivalents). The three leading injury events were assaults and violent acts (35%), bodily reactions and exertion (15%), and transportation incidents (14%). Injury rates were highest for the youngest officers, aged 21-24 years. Male and female law enforcement officers had similar nonfatal injury rates. Rates for most injuries remained stable; however, rates for assault-related injuries grew among law enforcement officers between 2003 and 2011. National Electronic Injury Surveillance System-Occupational Supplement data demonstrate a significant upward trend in assault injuries among U.S. law enforcement officers and this warrants further investigation. Police-citizen interactions are dynamic social encounters and evidence-based policing is vital to the health and safety of both police and civilians. The law enforcement community should energize efforts toward the study of how policing tactics impact both officer and citizen injuries. Published by Elsevier Inc.

  6. Enforcement handbook: Enforcement of DOE nuclear safety requirements

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    This Handbook provides detailed guidance and procedures to implement the General Statement of DOE Enforcement Policy (Enforcement Policy or Policy). A copy of this Enforcement Policy is included for ready reference in Appendix D. The guidance provided in this Handbook is qualified, however, by the admonishment to exercise discretion in determining the proper disposition of each potential enforcement action. As discussed in subsequent chapters, the Enforcement and Investigation Staff will apply a number of factors in assessing each potential enforcement situation. Enforcement sanctions are imposed in accordance with the Enforcement Policy for the purpose of promoting public and worker health and safety in the performance of activities at DOE facilities by DOE contractors (and their subcontractors and suppliers) who are indemnified under the Price-Anderson Amendments Act. These indemnified contractors, and their suppliers and subcontractors, will be referred to in this Handbook collectively as DOE contractors. It should be remembered that the purpose of the Department`s enforcement policy is to improve nuclear safety for the workers and the public, and this goal should be the prime consideration in exercising enforcement discretion.

  7. Enforcement handbook: Enforcement of DOE nuclear safety requirements

    International Nuclear Information System (INIS)

    1995-06-01

    This Handbook provides detailed guidance and procedures to implement the General Statement of DOE Enforcement Policy (Enforcement Policy or Policy). A copy of this Enforcement Policy is included for ready reference in Appendix D. The guidance provided in this Handbook is qualified, however, by the admonishment to exercise discretion in determining the proper disposition of each potential enforcement action. As discussed in subsequent chapters, the Enforcement and Investigation Staff will apply a number of factors in assessing each potential enforcement situation. Enforcement sanctions are imposed in accordance with the Enforcement Policy for the purpose of promoting public and worker health and safety in the performance of activities at DOE facilities by DOE contractors (and their subcontractors and suppliers) who are indemnified under the Price-Anderson Amendments Act. These indemnified contractors, and their suppliers and subcontractors, will be referred to in this Handbook collectively as DOE contractors. It should be remembered that the purpose of the Department's enforcement policy is to improve nuclear safety for the workers and the public, and this goal should be the prime consideration in exercising enforcement discretion

  8. Influenza surveillance

    Directory of Open Access Journals (Sweden)

    Karolina Bednarska

    2016-04-01

    Full Text Available Influenza surveillance was established in 1947. From this moment WHO (World Health Organization has been coordinating international cooperation, with a goal of monitoring influenza virus activity, effective diagnostic of the circulating viruses and informing society about epidemics or pandemics, as well as about emergence of new subtypes of influenza virus type A. Influenza surveillance is an important task, because it enables people to prepare themselves for battle with the virus that is constantly mutating, what leads to circulation of new and often more virulent strains of influenza in human population. As vaccination is the most effective method of fighting the virus, one of the major tasks of GISRS is developing an optimal antigenic composition of the vaccine for the current epidemic season. European Influenza Surveillance Network (EISN has also developed over the years. EISN is running integrated epidemiological and virological influenza surveillance, to provide appropriate data to public health experts in member countries, to enable them undertaking relevant activities based on the current information about influenza activity. In close cooperation with GISRS and EISN are National Influenza Centres - national institutions designated by the Ministry of Health in each country.

  9. Surveillance Angels

    NARCIS (Netherlands)

    Rothkrantz, L.J.M.

    2014-01-01

    The use of sensor networks has been proposed for military surveillance and environmental monitoring applications. Those systems are composed of a heterogeneous set of sensors to observe the environment. In centralised systems the observed data will be conveyed to the control room to process the

  10. ENFORCEMENT OF MORTGAGE CONTRACT

    Directory of Open Access Journals (Sweden)

    Alisa A. BELU

    2016-07-01

    Full Text Available A chattel mortgage contract is the expression of a real guarantee that gives the creditor precedence over other creditors, in addition to the general pledge upon the belongings of the debtor. It refers to the sale of mortgaged movable assets, exclusively or prioritized in favor of the mortgaging creditor, in case the debtor does not comply with his / her commitments, under the signed mortgage contract. Beginning from this purpose, shared by both sides (as the chattel mortgage contract is synallagmatic, in case the debtor is unable to fulfill his / her commitments, the sides reach a situation of enforcement of the signed chattel mortgage contract. Given the legal status of the chattel mortgage contract [Art. 2387-2477 Noul Cod Civil , Universul Juridic, Bucureşti, 2016, ISBN 978-606-673-792-0], the principle of binding force of the contract and the principle according to which signed legal conventions will entail legal effects, the Romanian law maker developed the proper legal framework for the enforcement of the chattel mortgage contract. [art. 622 si urm. Noul Cod de Procedură Civilă, ed. Hamangiu, Bucureşti, 2016, ISBN 978-606-27-0459-9].

  11. Integrated design of intelligent surveillance systems and their user interface

    NARCIS (Netherlands)

    Toet, A.

    2005-01-01

    Modern complex surveillance systems consisting of multiple and heterogeneous sensors, automatic information registration and data analysis techniques, and decision support tools should provide the human operator an integrated, transparent and easily comprehensible view of the surveyed scene.

  12. Cyber Surveillance for Flood Disasters

    Directory of Open Access Journals (Sweden)

    Shi-Wei Lo

    2015-01-01

    Full Text Available Regional heavy rainfall is usually caused by the influence of extreme weather conditions. Instant heavy rainfall often results in the flooding of rivers and the neighboring low-lying areas, which is responsible for a large number of casualties and considerable property loss. The existing precipitation forecast systems mostly focus on the analysis and forecast of large-scale areas but do not provide precise instant automatic monitoring and alert feedback for individual river areas and sections. Therefore, in this paper, we propose an easy method to automatically monitor the flood object of a specific area, based on the currently widely used remote cyber surveillance systems and image processing methods, in order to obtain instant flooding and waterlogging event feedback. The intrusion detection mode of these surveillance systems is used in this study, wherein a flood is considered a possible invasion object. Through the detection and verification of flood objects, automatic flood risk-level monitoring of specific individual river segments, as well as the automatic urban inundation detection, has become possible. The proposed method can better meet the practical needs of disaster prevention than the method of large-area forecasting. It also has several other advantages, such as flexibility in location selection, no requirement of a standard water-level ruler, and a relatively large field of view, when compared with the traditional water-level measurements using video screens. The results can offer prompt reference for appropriate disaster warning actions in small areas, making them more accurate and effective.

  13. Immigration Enforcement Actions - Annual Report

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  14. Air surveillance

    International Nuclear Information System (INIS)

    Patton, G.W.

    1995-01-01

    This section of the 1994 Hanford Site Environmental Report summarizes the air surveillance and monitoring programs currently in operation at that Hanford Site. Atmospheric releases of pollutants from Hanford to the surrounding region are a potential source of human exposure. For that reason, both radioactive and nonradioactive materials in air are monitored at a number of locations. The influence of Hanford emissions on local radionuclide concentrations was evaluated by comparing concentrations measured at distant locations within the region to concentrations measured at the Site perimeter. This section discusses sample collection, analytical methods, and the results of the Hanford air surveillance program. A complete listing of all analytical results summarized in this section is reported separately by Bisping (1995)

  15. Air surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Patton, G.W.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the air surveillance and monitoring programs currently in operation at that Hanford Site. Atmospheric releases of pollutants from Hanford to the surrounding region are a potential source of human exposure. For that reason, both radioactive and nonradioactive materials in air are monitored at a number of locations. The influence of Hanford emissions on local radionuclide concentrations was evaluated by comparing concentrations measured at distant locations within the region to concentrations measured at the Site perimeter. This section discusses sample collection, analytical methods, and the results of the Hanford air surveillance program. A complete listing of all analytical results summarized in this section is reported separately by Bisping (1995).

  16. Intelligent agents for adaptive security market surveillance

    Science.gov (United States)

    Chen, Kun; Li, Xin; Xu, Baoxun; Yan, Jiaqi; Wang, Huaiqing

    2017-05-01

    Market surveillance systems have increasingly gained in usage for monitoring trading activities in stock markets to maintain market integrity. Existing systems primarily focus on the numerical analysis of market activity data and generally ignore textual information. To fulfil the requirements of information-based surveillance, a multi-agent-based architecture that uses agent intercommunication and incremental learning mechanisms is proposed to provide a flexible and adaptive inspection process. A prototype system is implemented using the techniques of text mining and rule-based reasoning, among others. Based on experiments in the scalping surveillance scenario, the system can identify target information evidence up to 87.50% of the time and automatically identify 70.59% of cases depending on the constraints on the available information sources. The results of this study indicate that the proposed information surveillance system is effective. This study thus contributes to the market surveillance literature and has significant practical implications.

  17. Rinderpest surveillance

    International Nuclear Information System (INIS)

    2003-01-01

    Rinderpest is probably the most lethal virus disease of cattle and buffalo and can destroy whole populations; damaging economies; undermining food security and ruining the livelihood of farmers and pastoralists. The disease can be eradicated by vaccination and control of livestock movement. The Department of Technical Co-operation is sponsoring a programme, with technical support from the Joint FAO/IAEA Division to provide advice, training and materials to thirteen states through the 'Support for Rinderpest Surveillance in West Asia' project. (IAEA)

  18. Health surveillance

    International Nuclear Information System (INIS)

    1981-01-01

    The Code includes a number of requirements for the health surveillance of employees associated with the mining and milling of radioactive ores. This guideline is particularly directed at determining the level of fitness of employees and prospective employees, detecting any symptom which might contraindicate exposure to the environment encountered in mine/mill situations, examination of any employee who may have been exposed to radiation in excess of defined limits and the accumulation and provision of data on the health of employees

  19. Stable and Enforceable

    DEFF Research Database (Denmark)

    Hallett, Andrew Hughes; Hougaard Jensen, Svend E.

    2011-01-01

    Since the great financial crash, the need for new fiscal rules to prevent unsustainable fiscal policies is universally recognised. In practice such rules, including those in the Stability and Growth Pact, have proved to be impossible to enforce. Thus, to avoid unsustainable fiscal policies...... reappearing, and to prevent monetary policy from being undermined by undisciplined governments, there is a need for a framework capable of imposing fiscal discipline. This paper considers an intertemporal assignment, where fiscal policy focuses on long-term objectives and monetary policy on short...... which the debt targeting regime should operate. Making these factors explicit would both improve the credibility of planned fiscal policies and reduce risk premia on borrowing costs. We finally show how Europe’s competitiveness pact, and debt restructuring operations, can be used to maximise...

  20. Oversight and enforcement at DOE

    International Nuclear Information System (INIS)

    Fergus, I.E., Christopher, R.K.

    1996-01-01

    This paper addresses recent changes to the independent oversight and enforcement programs within the U.S. Department of Energy (DOE) and applications to criticality safety. DOE's Office of Oversight (Oversight hereafter), in the Office of Environment, Safety, and Health (EH), independently evaluates whether management systems ensure adequate protection of the worker, public, and environment. Oversight has adopted a new approach to performing evaluations based on the guiding principles for safety management identified by the Secretary of Energy. The principles Oversight evaluates are line management responsibility for safety and health, comprehensive requirements, and competence commensurate with responsibilities. Recently, the DOE codified the implementation of integrated safety management, further expounding on these basic guiding principles and Oversight's role. The Office of Enforcement and Investigations in EH (Enforcement hereafter) is responsible for enforcement, and relevant documents describe its role. This paper briefly discusses criticality safety aspects of the twin initiatives of Oversight and Enforcement

  1. Quota enforcement in resource industries

    DEFF Research Database (Denmark)

    Hansen, Lars Gårn; Jensen, Frank; Nøstbakken, Linda

    cant non-compliance and exogenous constraints on nes and enforcement budget. We propose a new enforcement system based on self-reporting of excess extraction and explicit di erentiation of inspection rates based on compliance history. In particular, we use state-dependent enforcement to induce rms...... to self-report excess extraction. We show that such system increases the e ectiveness of quota management by allowing the regulator to implement a wider range of aggregate extraction targets than under traditional enforcement, while ensuring an ecient allocation of aggregate extraction. In addition......Quotas or permits are frequently used in the management of renewable resources and emissions. However, in many industries there is concern about the basic e ectiveness of quotas due to non-compliance. We develop an enforcement model of a quota-regulated resource and focus on a situation with signi...

  2. Nutritional surveillance.

    Science.gov (United States)

    Mason, J B; Mitchell, J T

    1983-01-01

    The concept of nutritional surveillance is derived from disease surveillance, and means "to watch over nutrition, in order to make decisions that lead to improvements in nutrition in populations". Three distinct objectives have been defined for surveillance systems, primarily in relation to problems of malnutrition in developing countries: to aid long-term planning in health and development; to provide input for programme management and evaluation; and to give timely warning of the need for intervention to prevent critical deteriorations in food consumption. Decisions affecting nutrition are made at various administrative levels, and the uses of different types of nutritional surveillance information can be related to national policies, development programmes, public health and nutrition programmes, and timely warning and intervention programmes. The information should answer specific questions, for example concerning the nutritional status and trends of particular population groups.Defining the uses and users of the information is the first essential step in designing a system; this is illustrated with reference to agricultural and rural development planning, the health sector, and nutrition and social welfare programmes. The most usual data outputs are nutritional outcome indicators (e.g., prevalence of malnutrition among preschool children), disaggregated by descriptive or classifying variables, of which the commonest is simply administrative area. Often, additional "status" indicators, such as quality of housing or water supply, are presented at the same time. On the other hand, timely warning requires earlier indicators of the possibility of nutritional deterioration, and agricultural indicators are often the most appropriate.DATA COME FROM TWO MAIN TYPES OF SOURCE: administrative (e.g., clinics and schools) and household sample surveys. Each source has its own advantages and disadvantages: for example, administrative data often already exist, and can be

  3. HSIP Law Enforcement Locations in New Mexico

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — Law Enforcement Locations Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law Enforcement agencies "are publicly...

  4. 75 FR 60485 - NRC Enforcement Policy Revision

    Science.gov (United States)

    2010-09-30

    ... NUCLEAR REGULATORY COMMISSION [NRC-2008-0497] NRC Enforcement Policy Revision AGENCY: Nuclear Regulatory Commission. ACTION: Policy statement. SUMMARY: The Nuclear Regulatory Commission (NRC or Commission) is publishing a major revision to its Enforcement Policy (Enforcement Policy or Policy) to...

  5. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1990-05-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1990) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. Also included are a number of enforcement actions that had been previously resolved but not published in this NUREG. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  6. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1989-06-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. Also included are a number of enforcement actions that had been previously resolved but not published in this NUREG. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  7. Smart sensing surveillance system

    Science.gov (United States)

    Hsu, Charles; Chu, Kai-Dee; O'Looney, James; Blake, Michael; Rutar, Colleen

    2010-04-01

    network and use the specific presentation methods. In addition, the S4 is compliant with Open Geospatial Consortium - Sensor Web Enablement (OGC-SWE) standards to efficiently discover, access, use, and control heterogeneous sensors and their metadata. These S4 capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments. The S4 system is directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.

  8. Smart sensing surveillance system

    Science.gov (United States)

    Hsu, Charles; Chu, Kai-Dee; O'Looney, James; Blake, Michael; Rutar, Colleen

    2010-04-01

    Unattended ground sensor (UGS) networks have been widely used in remote battlefield and other tactical applications over the last few decades due to the advances of the digital signal processing. The UGS network can be applied in a variety of areas including border surveillance, special force operations, perimeter and building protection, target acquisition, situational awareness, and force protection. In this paper, a highly-distributed, fault-tolerant, and energyefficient Smart Sensing Surveillance System (S4) is presented to efficiently provide 24/7 and all weather security operation in a situation management environment. The S4 is composed of a number of distributed nodes to collect, process, and disseminate heterogeneous sensor data. Nearly all S4 nodes have passive sensors to provide rapid omnidirectional detection. In addition, Pan- Tilt- Zoom- (PTZ) Electro-Optics EO/IR cameras are integrated to selected nodes to track the objects and capture associated imagery. These S4 camera-connected nodes will provide applicable advanced on-board digital image processing capabilities to detect and track the specific objects. The imaging detection operations include unattended object detection, human feature and behavior detection, and configurable alert triggers, etc. In the S4, all the nodes are connected with a robust, reconfigurable, LPI/LPD (Low Probability of Intercept/ Low Probability of Detect) wireless mesh network using Ultra-wide band (UWB) RF technology, which can provide an ad-hoc, secure mesh network and capability to relay network information, communicate and pass situational awareness and messages. The S4 utilizes a Service Oriented Architecture such that remote applications can interact with the S4 network and use the specific presentation methods. The S4 capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded

  9. Surveillance and Critical Theory

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2015-09-01

    Full Text Available In this comment, the author reflects on surveillance from a critical theory approach, his involvement in surveillance research and projects, and the status of the study of surveillance. The comment ascertains a lack of critical thinking about surveillance, questions the existence of something called “surveillance studies” as opposed to a critical theory of society, and reflects on issues such as Edward Snowden’s revelations, and Foucault and Marx in the context of surveillance.

  10. Antitrust Enforcement and Marginal Deterrence

    NARCIS (Netherlands)

    Houba, H.E.D.; Motchenkova, E.; Wen, Q.

    2011-01-01

    Abstract: We study antitrust enforcement in which the fine must obey four legal principles: punishments should fit the crime, proportionality, bankruptcy considerations, and minimum fines. We integrate these legal principles into an infinitely-repeated oligopoly model. Bankruptcy considerations

  11. Conservation Law Enforcement Program Standardization

    National Research Council Canada - National Science Library

    Rogers, Stan

    2004-01-01

    The ultimate goal of standardization is to develop a safe and effective program that is recognized within the USAF, DoD, and by other Federal and state law enforcement agencies, and the general public...

  12. Quota enforcement in resource industries

    DEFF Research Database (Denmark)

    Hansen, Lars Gårn; Jensen, Frank; Nøstbakken, Linda

    2014-01-01

    -compliance and exogenous constraints on fines and enforcement budget. We propose a new enforcement system based on self-reporting of excess extraction and explicit differentiation of inspection rates depending on compliance history. We use differentiated inspections to induce firms to self-report excess extraction....... This system increases the effectiveness of the quota by allowing the regulator to implement a wider range of aggregate extraction targets than under traditional enforcement, while ensuring an efficient allocation of extraction. In addition, inspection costs can be reduced without reductions in welfare.......Quotas are frequently used in the management of renewable resources and emissions. However, in many industries there is concern about their basic effectiveness due to non-compliance. We develop an enforcement model of a quota-regulated resource and focus on a situation with significant non...

  13. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1994-03-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October - December 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  14. Financial Private Regulation and Enforcement

    OpenAIRE

    MILLER, Geoffrey

    2011-01-01

    This paper has been delivered within the context of the research project "Transnational Private Regulatory Regimes: Constitutional foundations and governance design". This paper considers the topic of private regulation and enforcement for internationally active financial services firms. The paper documents the following types of regulation and enforcement that involve significant private input: house rules, contracts, internal compliance, management-based regulation, private standard-sett...

  15. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1992-11-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July - September 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  16. Effects of surveillance on the rule of law, due process and the presumption of innocence

    NARCIS (Netherlands)

    Galetta, Antonella; de Hert, Paul; Wright, D.; Kreissl, R.

    2015-01-01

    This contribution focuses on the impact of surveillance on the rule of law, due process and the presumption of innocence, key values and principles of a democratic order. It illustrates how they are implemented and enforced in contemporary surveillance societies, while referring to European law and

  17. Calibration and study of the measurement capabilities of real-time gamma spectrometry equipment, developed for the renewal of the network of automatic stations for environmental radiological surveillance of the Generalitat de Catalunya; Calibracion y estudio de las capacidades de medida de loes equipos de espectrometria gamma en tiempo real desarrollados para la renovacion de la Red de Estaciones Automaticas de vigencia radiologica ambiental de la generalitat de Catalunya

    Energy Technology Data Exchange (ETDEWEB)

    Casanovas, R.; Prieto, E.; Salvado, M.

    2013-07-01

    The renewal of the automatic environmental radiation surveillance network of the Gereralitat of Catalunya has been carried out through the development and implementation of gamma-spectrometry-based equipment. The monitors use scintillation cristals, either NaI(Tl) or LaBr{sub 3}(Ce) and currently, there are 3 types of equipment: water radioactivity monitors, aerosols on a particulate filter monitors and direct measurement monitors. In this paper, we expose the basic features of its operation, the details of their calibration and the minimum detectable activity concentrations for some isotopes.

  18. 29 CFR 42.6 - Enforcement strategy.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Enforcement strategy. 42.6 Section 42.6 Labor Office of the Secretary of Labor COORDINATED ENFORCEMENT § 42.6 Enforcement strategy. (a) Each Regional Farm Labor... enforcement strategy for each protective statute pursuant to § 42.20(c)(3). The National Committee shall...

  19. Who is Surveilling Whom?

    DEFF Research Database (Denmark)

    Mortensen, Mette

    2014-01-01

    This article concerns the particular form of counter-surveillance termed “sousveillance”, which aims to turn surveillance at the institutions responsible for surveillance. Drawing on the theoretical perspectives “mediatization” and “aerial surveillance,” the article studies WikiLeaks’ publication...

  20. European human rights, criminal surveillance, and intelligence surveillance : Towards “good enough” oversight, preferably but not necessarily by judges

    NARCIS (Netherlands)

    Malgieri, G.; de Hert, Paul; Gray, David C.; Henderson, Stephen

    2017-01-01

    The two European Courts (the European Court of Human Rights, ECtHR and, to a lesser degree, the European Union Court of Justice, EUCJ) have contributed greatly to the development of a legal framework for surveillance by either law enforcement agencies in the criminal law area or by secret services.

  1. Voting over law enforcement: Mission impossible

    OpenAIRE

    İnal , Hakan

    2015-01-01

    Median voter theorem has been used in many economic environments including law enforcement. Assumptions of the median voter theorem, however, are generally violated in lawenforcement models. Moreover, it is impossible to have agents with "opposite equilibrium preferences" over enforcement levels in law enforcement models. These limitations on the use of preferences over law enforcement raises questions about the robustness and validity of law enforcement models.

  2. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1993-09-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  3. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1991-05-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  4. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1991-02-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1990) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  5. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1990-03-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  6. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1990-11-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1990) and includes copies of letters, notices, and orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  7. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1992-08-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  8. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1990-09-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April--June 1990) and includes copies of letters, notices, and orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  9. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1993-06-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  10. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1992-05-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (January--March 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  11. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1993-12-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1993) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  12. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1993-03-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1992) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  13. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1991-07-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (April-June 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  14. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1991-11-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  15. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1992-03-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (October--December 1991) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  16. Enforcement actions: Significant actions resolved

    International Nuclear Information System (INIS)

    1989-12-01

    This compilation summarizes significant enforcement actions that have been resolved during one quarterly period (July--September 1989) and includes copies of letters, Notices, and Orders sent by the Nuclear Regulatory Commission to licensees with respect to these enforcement actions. It is anticipated that the information in this publication will be widely disseminated to managers and employees engaged in activities licensed by the NRC, so that actions can be taken to improve safety by avoiding future violations similar to those described in this publication

  17. Tamper Detection for Active Surveillance Systems

    DEFF Research Database (Denmark)

    Theodore, Tsesmelis; Christensen, Lars; Fihl, Preben

    2013-01-01

    If surveillance data are corrupted they are of no use to neither manually post-investigation nor automatic video analysis. It is therefore critical to automatically be able to detect tampering events such as defocusing, occlusion and displacement. In this work we for the first time ad- dress...... of different tampering events. In order to assess the developed methods we have collected a large data set, which contains sequences from different active cameras at different scenarios. We evaluate our sys- tem on these data and the results are encouraging with a very high detecting rate and relatively few...

  18. Ideology, Critique and Surveillance

    Directory of Open Access Journals (Sweden)

    Heidi Herzogenrath-Amelung

    2013-11-01

    Full Text Available The 2013 revelations concerning global surveillance programmes demonstrate in unprecedented clarity the need for Critical Theory of information and communication technologies (ICTs to address the mechanisms and implications of increasingly global, ubiquitous surveillance. This is all the more urgent because of the dominance of the “surveillance ideology” (the promise of security through surveillance that supports the political economy of surveillance. This paper asks which theoretical arguments and concepts can be useful for philosophically grounding a critique of this surveillance ideology. It begins by examining how the surveillance ideology works through language and introduces the concept of the ‘ideological packaging’ of ICTs to show how rhetoric surrounding the implementation of surveillance technologies reinforces the surveillance ideology. It then raises the problem of how ideology-critique can work if it relies on language itself and argues that Martin Heidegger’s philosophy can make a useful contribution to existing critical approaches to language.

  19. Optimal enforcement of competition law

    NARCIS (Netherlands)

    Motchenkova, E.

    2005-01-01

    Despite the recent theoretical developments in the field of antitrust law enforcement, much still needs to be done in order to prevent collusion and price-fixing in the major indiustries. Although penalties were recently increased considerably and new instruments of cartel deterrence such as

  20. A comprehensive review on intelligent surveillance systems

    Directory of Open Access Journals (Sweden)

    Sutrisno Warsono Ibrahim

    2016-05-01

    Full Text Available Intelligent surveillance system (ISS has received growing attention due to the increasing demand on security and safety. ISS is able to automatically analyze image, video, audio or other type of surveillance data without or with limited human intervention. The recent developments in sensor devices, computer vision, and machine learning have an important role in enabling such intelligent system. This paper aims to provide general overview of intelligent surveillance system and discuss some possible sensor modalities and their fusion scenarios such as visible camera (CCTV, infrared camera, thermal camera and radar. This paper also discusses main processing steps in ISS: background-foreground segmentation, object detection and classification, tracking, and behavioral analysis.

  1. Public education and enforcement research study (PEERS).

    Science.gov (United States)

    2013-08-01

    In 2001, the Federal Railroad Administration (FRA) and the Illinois Commerce Commission (ICC) established the Public Education and Enforcement Research Study (PEERS) to test the effectiveness of various education and enforcement (E&E) techniques to i...

  2. GAMING LAW ENFORCEMENT AND CRIMINAL JUSTICE PROBLEMS,

    Science.gov (United States)

    and techniques of gaming as they apply to the study of law enforcement problems in general, and to show how gaming may assist in identifying and overcoming some of the major pitfalls in law enforcement planning. (Author)

  3. SOA-surveillance Nederland

    NARCIS (Netherlands)

    Rijlaarsdam J; Bosman A; Laar MJW van de; CIE

    2000-01-01

    In May 1999 a working group was started to evaluate the current surveillance systems for sexually transmitted diseases (STD) and to make suggestions for a renewed effective and efficient STD surveillance system in the Netherlands. The surveillance system has to provide insight into the prevalence

  4. Containment and surveillance devices

    International Nuclear Information System (INIS)

    Campbell, J.W.; Johnson, C.S.; Stieff, L.R.

    The growing acceptance of containment and surveillance as a means to increase safeguards effectiveness has provided impetus to the development of improved surveillance and containment devices. Five recently developed devices are described. The devices include one photographic and two television surveillance systems and two high security seals that can be verified while installed

  5. 20 CFR 655.50 - Enforcement process.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Enforcement process. 655.50 Section 655.50... FOREIGN WORKERS IN THE UNITED STATES Labor Certification Process and Enforcement of Attestations for... Workers) § 655.50 Enforcement process. (a) Authority of the WHD Administrator. The WHD Administrator shall...

  6. 78 FR 69133 - Drug Enforcement Administration

    Science.gov (United States)

    2013-11-18

    ... DEPARTMENT OF JUSTICE Drug Enforcement Administration Manufacturer of Controlled Substances..., California 94085, made application by renewal to the Drug Enforcement Administration (DEA) to be registered... Diversion Control, Drug Enforcement Administration. [FR Doc. 2013-27486 Filed 11-15-13; 8:45 am] BILLING...

  7. 76 FR 76192 - NRC Enforcement Policy

    Science.gov (United States)

    2011-12-06

    ... NUCLEAR REGULATORY COMMISSION [NRC-2011-0273] NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Proposed enforcement policy revision; request for comment. SUMMARY: The U.S. Nuclear... licensees, vendors, and contractors), on proposed revisions to the NRC's Enforcement Policy (the Policy) and...

  8. Employee perceptions of protected area law enforcement

    Science.gov (United States)

    Christopher J. Wynveen; Robert D. Bixler; William E. Hammitt

    2006-01-01

    It is widely accepted that criminal activity negatively impacts visitors? recreation experiences in the nation?s parks and forests (Fletcher 1983). To further understand how law enforcement can effectively manage criminal activity in protected areas, this study was designed to describe law enforcement and non-law enforcement rangers? perceptions of a range of law...

  9. 50 CFR 600.740 - Enforcement policy.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Enforcement policy. 600.740 Section 600... § 600.740 Enforcement policy. (a) The Magnuson-Stevens Act provides four basic enforcement remedies for... and its catch. (4) Criminal prosecution of the owner or operator for some offenses. It shall be the...

  10. 12 CFR 411.410 - Enforcement.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Enforcement. 411.410 Section 411.410 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Penalties and Enforcement § 411.410 Enforcement. The head of each agency shall take such actions as are necessary to ensure that...

  11. 75 FR 69573 - Export Enforcement Coordination Center

    Science.gov (United States)

    2010-11-15

    ... Export Enforcement Coordination Center By the authority vested in me as President by the Constitution and... enforcement of United States export control laws and enhanced intelligence exchange in support of such enforcement efforts, it is hereby ordered as follows: Section 1. Policy. Export controls are critical to...

  12. Real-Time Surveillance of Infectious Diseases: Taiwan's Experience.

    Science.gov (United States)

    Jian, Shu-Wan; Chen, Chiu-Mei; Lee, Cheng-Yi; Liu, Ding-Ping

    Integration of multiple surveillance systems advances early warning and supports better decision making during infectious disease events. Taiwan has a comprehensive network of laboratory, epidemiologic, and early warning surveillance systems with nationwide representation. Hospitals and clinical laboratories have deployed automatic reporting mechanisms since 2014 and have effectively improved timeliness of infectious disease and laboratory data reporting. In June 2016, the capacity of real-time surveillance in Taiwan was externally assessed and was found to have a demonstrated and sustainable capability. We describe Taiwan's disease surveillance system and use surveillance efforts for influenza and Zika virus as examples of surveillance capability. Timely and integrated influenza information showed a higher level and extended pattern of influenza activity during the 2015-16 season, which ensured prompt information dissemination and the coordination of response operations. Taiwan also has well-developed disease detection systems and was the first country to report imported cases of Zika virus from Miami Beach and Singapore. This illustrates a high level of awareness and willingness among health workers to report emerging infectious diseases, and highlights the robust and sensitive nature of Taiwan's surveillance system. These 2 examples demonstrate the flexibility of the surveillance systems in Taiwan to adapt to emerging infectious diseases and major communicable diseases. Through participation in the GHSA, Taiwan can more actively collaborate with national counterparts and use its expertise to strengthen global and regional surveillance capacity in the Asia Pacific and in Southeast Asia, in order to advance a world safe and secure from infectious disease.

  13. A Survey of Colonoscopic Surveillance After Polypectomy

    Science.gov (United States)

    2014-01-01

    Purpose Several guidelines have been proposed for surveillance colonoscopy after polypectomy. However, some discrepancies still exist between the guidelines and clinical practice. This study was conducted to identify Korean doctors' recommendations for the colonoscopic surveillance interval after polypectomy. Methods A survey of the attendees at the symposium of the 64th Annual Congress of the Korean Surgical Society was conducted. When the prepared clinical scenarios were given, attendees answered using a wireless radio-frequency audience response system. All responders' results were automatically counted immediately. Frequencies of different answers to each question were calculated, and our results were compared with those of previous surveys performed using the same questionnaire in the United States or Japan. Results The number of responder varied from 38 to 41. About 50% of valid responders selected 'follow-up in 3 years' for low-risk lesions, such as a 6-mm hyperplastic polyp, a 6-mm tubular adenoma, or two 6-mm tubular adenomas. Responders most-commonly selected 'follow-up in 1 year' for high-risk lesions, such as a 12-mm tubular adenoma with high grade dysplasia or a 12-mm tubulovillous adenoma. The majority of Korean doctors recommend postpolypectomy colonoscopic surveillance more frequently than American physicians did. Conclusion A discrepancy between the guidelines and clinical practice for the surveillance after polypectomy still exists in Korea. A surveillance program that can be easily and widely applied in clinical practice needs to be established. PMID:24851219

  14. Antitrust Enforcement in the Electricity and Gas Industries: Problems and Solutions for the EU

    International Nuclear Information System (INIS)

    Leveque, Francois

    2006-01-01

    Antitrust enforcement in the electricity and gas industries raises specific problems that call for specific solutions. Among the issues: How can the anticompetitive effects of mergers be assessed in a changing regulatory environment? Should long-term agreements in energy purchasing be prohibited? What are the benefits of preventive action such as competition advocacy and market surveillance committees? Should Article 82 (a) of the EC Treaty be used to curb excessive pricing?. (author)

  15. Video surveillance using distance maps

    Science.gov (United States)

    Schouten, Theo E.; Kuppens, Harco C.; van den Broek, Egon L.

    2006-02-01

    Human vigilance is limited; hence, automatic motion and distance detection is one of the central issues in video surveillance. Hereby, many aspects are of importance, this paper specially addresses: efficiency, achieving real-time performance, accuracy, and robustness against various noise factors. To obtain fully controlled test environments, an artificial development center for robot navigation is introduced in which several parameters can be set (e.g., number of objects, trajectories and type and amount of noise). In the videos, for each following frame, movement of stationary objects is detected and pixels of moving objects are located from which moving objects are identified in a robust way. An Exact Euclidean Distance Map (E2DM) is utilized to determine accurately the distances between moving and stationary objects. Together with the determined distances between moving objects and the detected movement of stationary objects, this provides the input for detecting unwanted situations in the scene. Further, each intelligent object (e.g., a robot), is provided with its E2DM, allowing the object to plan its course of action. Timing results are specified for each program block of the processing chain for 20 different setups. So, the current paper presents extensive, experimentally controlled research on real-time, accurate, and robust motion detection for video surveillance, using E2DMs, which makes it a unique approach.

  16. Redefining syndromic surveillance

    Directory of Open Access Journals (Sweden)

    Rebecca Katz

    2011-12-01

    Full Text Available With growing concerns about international spread of disease and expanding use of early disease detection surveillance methods, the field of syndromic surveillance has received increased attention over the last decade. The purpose of this article is to clarify the various meanings that have been assigned to the term syndromic surveillance and to propose a refined categorization of the characteristics of these systems. Existing literature and conference proceedings were examined on syndromic surveillance from 1998 to 2010, focusing on low- and middle-income settings. Based on the 36 unique definitions of syndromic surveillance found in the literature, five commonly accepted principles of syndromic surveillance systems were identified, as well as two fundamental categories: specific and non-specific disease detection. Ultimately, the proposed categorization of syndromic surveillance distinguishes between systems that focus on detecting defined syndromes or outcomes of interest and those that aim to uncover non-specific trends that suggest an outbreak may be occurring. By providing an accurate and comprehensive picture of this field’s capabilities, and differentiating among system types, a unified understanding of the syndromic surveillance field can be developed, encouraging the adoption, investment in, and implementation of these systems in settings that need bolstered surveillance capacity, particularly low- and middle-income countries.

  17. Airborne Video Surveillance

    National Research Council Canada - National Science Library

    Blask, Steven

    2002-01-01

    The DARPA Airborne Video Surveillance (AVS) program was established to develop and promote technologies to make airborne video more useful, providing capabilities that achieve a UAV force multiplier...

  18. Handbook of surveillance technologies

    CERN Document Server

    Petersen, JK

    2012-01-01

    From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry. The Handbook of Surveillance Technologies, Third Edition is the only comprehensive work to chronicle the background and current applications of the full-range of surveillance technologies--offering the latest in surveillance and privacy issues.Cutting-Edge--updates its bestselling predecessor with discussions on social media, GPS circuits in cell phones and PDAs, new GIS s

  19. Enforcement and Compliance History Online | US EPA

    Science.gov (United States)

    ECHO, Enforcement and Compliance History Online, provides compliance and enforcement information for approximately 800,000 EPA-regulated facilities nationwide. ECHO includes permit, inspection, violation, enforcement action, and penalty information about facilities regulated under the Clean Air Act (CAA) Stationary Source Program, Clean Water Act (CWA) National Pollutant Elimination Discharge System (NPDES), and/or Resource Conservation and Recovery Act (RCRA). Information also is provided on surrounding demographics when available.

  20. OSHA Enforcement, Industrial Compliance and Workplace Injuries

    OpenAIRE

    Ann P. Bartel; Lacy Glenn Thomas

    1982-01-01

    This paper develops and tests a three-equation simultaneous model of OSHA enforcement behavior, industrial compliance and workplace injuries. The enforcement equation is based on the assumption that OSHA acts as a political institution that gains support through the transfer of wealth from firms to employees; the empirical results are largely consistent with this notion. Contrary to previous work, we find that OSHA enforcement efforts have, indeed, had a statistically significant impact on in...

  1. Immigration Enforcement Actions: Fiscal Year 2012

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  2. Public healthcare interests require strict competition enforcement.

    Science.gov (United States)

    Loozen, Edith M H

    2015-07-01

    Several countries have introduced competition in their health systems in order to maintain the supply of high quality health care in a cost-effective manner. The introduction of competition triggers competition enforcement. Since healthcare is characterized by specific market failures, many favor healthcare-specific competition enforcement in order not only to account for the competition interest, but also for the healthcare interests. The question is whether healthcare systems based on competition can succeed when competition enforcement deviates from standard practice. This paper analyzes whether healthcare-specific competition enforcement is theoretically sound and practically effective. This is exemplified by the Dutch system that is based on regulated competition and thus crucially depends on getting competition enforcement right. Governments are responsible for correcting market failures. Markets are responsible for maximizing the public healthcare interests. By securing sufficient competitive pressure, competition enforcement makes sure they do. When interpreted according to welfare-economics, competition law takes into account both costs and benefits specific market behavior may have for healthcare. Competition agencies and judiciary are not legitimized to deviate from standard evidentiary requirements. Dutch case law shows that healthcare-specific enforcement favors the healthcare undertakings concerned, but to the detriment of public health care. Healthcare-specific competition enforcement is conceptually flawed and counterproductive. In order for healthcare systems based on competition to succeed, competition enforcement should be strict. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  3. Immigration Enforcement Actions: Fiscal Year 2004

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  4. Immigration Enforcement Actions: Fiscal Year 2007

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  5. EPA Enforcement and Compliance History Online

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Environmental Protection Agency's Enforcement and Compliance History Online (ECHO) website provides customizable and downloadable information about environmental...

  6. 50 CFR 17.107 - Facilitating enforcement.

    Science.gov (United States)

    2010-10-01

    ... WILDLIFE AND PLANTS (CONTINUED) ENDANGERED AND THREATENED WILDLIFE AND PLANTS (CONTINUED) Manatee Protection Areas § 17.107 Facilitating enforcement. Water vehicles operating in manatee sanctuary or refuge...

  7. Immigration Enforcement Actions: Fiscal Year 2008

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  8. Immigration Enforcement Actions: Fiscal Year 2010

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  9. Immigration Enforcement Actions: Fiscal Year 2011

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  10. Immigration Enforcement Actions: Fiscal Year 2006

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  11. Immigration Enforcement Actions: Fiscal Year 2009

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  12. Immigration Enforcement Actions: Fiscal Year 2005

    Data.gov (United States)

    Department of Homeland Security — Each year, the Department of Homeland Security (DHS) undertakes immigration enforcement actions involving hundreds of thousands of foreign nationals. These actions...

  13. 76 FR 71430 - Automatic Dependent Surveillance Broadcast (ADS-B)

    Science.gov (United States)

    2011-11-17

    ... Committee (ARC) to provide a forum for the U.S. and international aviation community to define a strategy for incorporating ADS-B In technologies into the National Airspace System. The ARC specifically was.../portfolio/trans_support_progs/adsb/ Issued in Washington, DC on November 9, 2011. James Eck, Director, Air...

  14. Finding weak points automatically

    International Nuclear Information System (INIS)

    Archinger, P.; Wassenberg, M.

    1999-01-01

    Operators of nuclear power stations have to carry out material tests at selected components by regular intervalls. Therefore a full automaticated test, which achieves a clearly higher reproducibility, compared to part automaticated variations, would provide a solution. In addition the full automaticated test reduces the dose of radiation for the test person. (orig.) [de

  15. Demonstrator for Automatic Target Classification in SAR Imagery

    NARCIS (Netherlands)

    Wit, J.J.M. de; Broek, A.C. van den; Dekker, R.J.

    2006-01-01

    Due to the increasing use of unmanned aerial vehicles (UAV) for reconnaissance, surveillance, and target acquisition applications, the interest in synthetic aperture radar (SAR) systems is growing. In order to facilitate the processing of the enormous amount of SAR data on the ground, automatic

  16. Notification: Audit of EPA's Office of Criminal Enforcement, Forensics and Training's Law Enforcement Availability Pay Reporting

    Science.gov (United States)

    Project #OA-FY18-0075, November 30, 2017. The EPA OIG plans to begin preliminary research on the EPA Office of Criminal Enforcement, Forensics and Training's (OCEFT's) law enforcement availability pay (LEAP) reporting.

  17. How to Enforce European Law

    DEFF Research Database (Denmark)

    Rasmussen, Morten

    2017-01-01

    This article explores the well known saga of the European Court of Justice’s introduction of direct effect of Council directives on basis of new comprehensive archival research. The expansion of the doctrine of direct effect to include directives was part of a drive of the Legal Service of the Eu......This article explores the well known saga of the European Court of Justice’s introduction of direct effect of Council directives on basis of new comprehensive archival research. The expansion of the doctrine of direct effect to include directives was part of a drive of the Legal Service...... of the European Commission and the ECJ to strengthen the enforcement of European law. This threatened the deeper balance of competences between the European Community and its member states and consequently led to a sharp response from the national parliaments and courts. The force of these responses and the deep...

  18. Distributed Enforcement of Service Choreographies

    Directory of Open Access Journals (Sweden)

    Marco Autili

    2015-02-01

    Full Text Available Modern service-oriented systems are often built by reusing, and composing together, existing services distributed over the Internet. Service choreography is a possible form of service composition whose goal is to specify the interactions among participant services from a global perspective. In this paper, we formalize a method for the distributed and automated enforcement of service choreographies, and prove its correctness with respect to the realization of the specified choreography. The formalized method is implemented as part of a model-based tool chain released to support the development of choreography-based systems within the EU CHOReOS project. We illustrate our method at work on a distributed social proximity network scenario.

  19. Soil and vegetation surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Antonio, E.J.

    1995-06-01

    Soil sampling and analysis evaluates long-term contamination trends and monitors environmental radionuclide inventories. This section of the 1994 Hanford Site Environmental Report summarizes the soil and vegetation surveillance programs which were conducted during 1994. Vegetation surveillance is conducted offsite to monitor atmospheric deposition of radioactive materials in areas not under cultivation and onsite at locations adjacent to potential sources of radioactivity.

  20. Between visibility and surveillance

    DEFF Research Database (Denmark)

    Uldam, Julie

    As activists move from alternative media platforms to commercial social media platforms they face increasing challenges in protecting their online security and privacy. While government surveillance of activists is well-documented in both scholarly research and the media, corporate surveillance...

  1. Reassembling Surveillance Creep

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    2017-01-01

    We live in societies in which surveillance technologies are constantly introduced, are transformed, and spread to new practices for new purposes. How and why does this happen? In other words, why does surveillance “creep”? This question has received little attention either in theoretical developm......We live in societies in which surveillance technologies are constantly introduced, are transformed, and spread to new practices for new purposes. How and why does this happen? In other words, why does surveillance “creep”? This question has received little attention either in theoretical...... development or in empirical analyses. Accordingly, this article contributes to this special issue on the usefulness of Actor-Network Theory (ANT) by suggesting that ANT can advance our understanding of ‘surveillance creep’. Based on ANT’s model of translation and a historical study of the Danish DNA database......, we argue that surveillance creep involves reassembling the relations in surveillance networks between heterogeneous actors such as the watchers, the watched, laws, and technologies. Second, surveillance creeps only when these heterogeneous actors are adequately interested and aligned. However...

  2. Semantic-based surveillance video retrieval.

    Science.gov (United States)

    Hu, Weiming; Xie, Dan; Fu, Zhouyu; Zeng, Wenrong; Maybank, Steve

    2007-04-01

    Visual surveillance produces large amounts of video data. Effective indexing and retrieval from surveillance video databases are very important. Although there are many ways to represent the content of video clips in current video retrieval algorithms, there still exists a semantic gap between users and retrieval systems. Visual surveillance systems supply a platform for investigating semantic-based video retrieval. In this paper, a semantic-based video retrieval framework for visual surveillance is proposed. A cluster-based tracking algorithm is developed to acquire motion trajectories. The trajectories are then clustered hierarchically using the spatial and temporal information, to learn activity models. A hierarchical structure of semantic indexing and retrieval of object activities, where each individual activity automatically inherits all the semantic descriptions of the activity model to which it belongs, is proposed for accessing video clips and individual objects at the semantic level. The proposed retrieval framework supports various queries including queries by keywords, multiple object queries, and queries by sketch. For multiple object queries, succession and simultaneity restrictions, together with depth and breadth first orders, are considered. For sketch-based queries, a method for matching trajectories drawn by users to spatial trajectories is proposed. The effectiveness and efficiency of our framework are tested in a crowded traffic scene.

  3. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  4. 17 CFR 39.6 - Enforceability.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Enforceability. 39.6 Section 39.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES CLEARING ORGANIZATIONS § 39.6 Enforceability. An agreement, contract or transaction submitted to a derivatives clearing...

  5. 12 CFR 564.7 - Enforcement.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Enforcement. 564.7 Section 564.7 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY APPRAISALS § 564.7 Enforcement. Institutions and institution-affiliated parties, including staff appraisers and fee appraisers, who violate...

  6. 76 FR 4369 - Special Law Enforcement Commissions

    Science.gov (United States)

    2011-01-25

    ...This notice announces the online publication of the Interim Special Law Enforcement Commission Policy, Rules and Procedures, the Interim Special Law Enforcement Commission Protocols and the Interim Domestic Violence Waiver that will be used by the Office of Justice Services following passage of the Tribal Law and Order Act of 2010. The documents are published on the Indian Affairs Web site.

  7. 76 FR 54986 - NRC Enforcement Policy

    Science.gov (United States)

    2011-09-06

    ... NUCLEAR REGULATORY COMMISSION 10 CFR Chapter I [NRC-2011-0209] NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Proposed enforcement policy revision; request for comment. SUMMARY: The U.S. Nuclear Regulatory Commission (NRC or the Commission) is soliciting comments from interested...

  8. 78 FR 5838 - NRC Enforcement Policy

    Science.gov (United States)

    2013-01-28

    ... NUCLEAR REGULATORY COMMISSION [NRC-2013-0014] NRC Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Policy revision; issuance and request for comments. SUMMARY: The U.S. Nuclear Regulatory... Nuclear Regulatory Commission Enforcement Policy,'' December 30, 2009 (ADAMS Accession No. ML093200520);(2...

  9. 17 CFR 8.05 - Enforcement staff.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Enforcement staff. 8.05... staff. (a) Each exchange shall establish an adequate enforcement staff which shall be authorized by the... staff shall consist of employees of the exchange and/or persons hired on a contract basis. It may not...

  10. Law Enforcement School Programs. Fact Sheet

    Science.gov (United States)

    Arkansas Safe Schools Initiative Division, 2010

    2010-01-01

    The school shooting incidents during the decade of the 1990's prompted an increase of law enforcement presence in schools. The School Violence Resource Center (SVRC) at the Criminal Justice Institute (CJI) University of Arkansas System undertook a project to determine what programs law enforcement agencies currently provide in their local schools…

  11. Immigration Enforcement Within the United States

    Science.gov (United States)

    2006-04-06

    Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Policy Issues...Remained in the United States, (Washington: Center for Immigration Studies, May 2002). Immigration Enforcement Within the United States Introduction ...interior enforcement lack a border component. For example, fugitive taskforces, investigations of alien slavery and sweatshops , and employer sanctions do

  12. 5 CFR 1201.85 - Enforcing subpoenas.

    Science.gov (United States)

    2010-01-01

    ....85 Administrative Personnel MERIT SYSTEMS PROTECTION BOARD ORGANIZATION AND PROCEDURES PRACTICES AND... in the foreign country. (b) Upon application by the Special Counsel, the Board may seek court enforcement of a subpoena issued by the Special Counsel in the same manner in which it seeks enforcement of...

  13. 29 CFR 502.15 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Enforcement. 502.15 Section 502.15 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR REGULATIONS ENFORCEMENT OF CONTRACTUAL OBLIGATIONS FOR TEMPORARY ALIEN AGRICULTURAL WORKERS ADMITTED UNDER SECTION 218 OF THE IMMIGRATION...

  14. 29 CFR 501.15 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Enforcement. 501.15 Section 501.15 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR REGULATIONS ENFORCEMENT OF CONTRACTUAL OBLIGATIONS FOR TEMPORARY ALIEN AGRICULTURAL WORKERS ADMITTED UNDER SECTION 218 OF THE IMMIGRATION...

  15. 77 FR 12865 - Enforcement Actions Summary

    Science.gov (United States)

    2012-03-02

    ...] Enforcement Actions Summary AGENCY: Transportation Security Administration, DHS. ACTION: Notice of availability. SUMMARY: The Transportation Security Administration (TSA) is providing notice that it has issued an annual summary of all enforcement actions taken by TSA under the authority granted in the...

  16. 78 FR 11216 - Enforcement Actions Summary

    Science.gov (United States)

    2013-02-15

    ...] Enforcement Actions Summary AGENCY: Transportation Security Administration, DHS. ACTION: Notice of availability. SUMMARY: The Transportation Security Administration (TSA) is providing notice that it has issued an annual summary of all enforcement actions taken by TSA under the authority granted in the...

  17. 76 FR 9357 - Enforcement Actions Summary

    Science.gov (United States)

    2011-02-17

    ...] Enforcement Actions Summary AGENCY: Transportation Security Administration, DHS. ACTION: Notice of Availability. SUMMARY: The Transportation Security Administration (TSA) is providing notice that it has issued an annual summary of all enforcement actions taken by TSA under the authority granted in the...

  18. Assessment of the NRC Enforcement Program

    International Nuclear Information System (INIS)

    Lieberman, J.; Coblentz, L.

    1995-04-01

    On May 12, 1994, the Executive Director for Operations (EDO) established a Review Team composed of senior NRC managers to re-examine the NRC enforcement program. A copy of the Review Team's charter is enclosed as Appendix A. This report presents the Team's assessment. The purpose of this review effort are: (1) to perform an assessment of the NRC's enforcement program to determine whether the defined purposes of the enforcement program are appropriate; (2) to determine whether the NRC's enforcement practices and procedures for issuing enforcement actions are consistent with those purposes; and (3) to provide recommendations on any changes the Review Team believes advisable. In accordance with its charter, the Review Team considered the following principal issues in conducting its assessment of the enforcement program: the balance between providing deterrence and incentives (both positive and negative) for the identification and correction of violations; the appropriateness of NRC sanctions; whether the commission should seek statutory authority to increase the amount of civil penalties; whether the NRC should use different enforcement policies and practices for different licensees (e.g., materials licensees in contrast to power reactors or large fuel facilities); and whether the commission should establish open enforcement conferences as the normal practice

  19. Challenge of emerging technologies: balancing the needs of law enforcement against the duty to protect individual rights

    Science.gov (United States)

    Lingerfelt, James A.

    1997-01-01

    This paper discusses three emerging technologies which will revolutionize the business operations of law enforcement: databases and search engines; biometric identification systems; and electronic surveillance and tracking devices. Unfortunately, these technologies may also lead to a serious ethical conflict for law enforcement. The tools will make it easier than ever to accomplish the core business of policing: crime prevention; investigation; and intelligence gathering. The same tools, used improperly, will also lead to routine intrusions on personal privacy. These technologies have been and are being developed for the private sector, the military and the intelligence community. The vendors are now aggressively marketing them to law enforcement and criminal justice agencies. The law enforcement community has embraced the technology, but without considering the long term impact. In the past, the police have abused wiretaps and other early surveillance technology. As a result, a sinister perception about police surveillance practices persists and a cumbersome bureaucracy has been imposed to control their use. Developing and establishing policies governing the use of emerging technologies can prevent these mistakes from being repeated. This paper recommends that criminal justice practitioners begin a discussion now, in advance of these technologies becoming commercially available, with a view to defining clear guidelines for their proper use.

  20. 45 CFR 150.203 - Circumstances requiring CMS enforcement.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Circumstances requiring CMS enforcement. 150.203... CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS CMS Enforcement Processes for... requiring CMS enforcement. CMS enforces HIPAA requirements to the extent warranted (as determined by CMS) in...

  1. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    This document includes the US Nuclear Regulatory Commission`s (NRC`s or Commission`s) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC`s policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees` health and safety, the common defense and security, and the environment.

  2. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    International Nuclear Information System (INIS)

    1998-05-01

    This document includes the US Nuclear Regulatory Commission's (NRC's or Commission's) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC's policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees' health and safety, the common defense and security, and the environment

  3. Video auto stitching in multicamera surveillance system

    Science.gov (United States)

    He, Bin; Zhao, Gang; Liu, Qifang; Li, Yangyang

    2012-01-01

    This paper concerns the problem of video stitching automatically in a multi-camera surveillance system. Previous approaches have used multiple calibrated cameras for video mosaic in large scale monitoring application. In this work, we formulate video stitching as a multi-image registration and blending problem, and not all cameras are needed to be calibrated except a few selected master cameras. SURF is used to find matched pairs of image key points from different cameras, and then camera pose is estimated and refined. Homography matrix is employed to calculate overlapping pixels and finally implement boundary resample algorithm to blend images. The result of simulation demonstrates the efficiency of our method.

  4. Recent Trends in Antitrust Enforcement

    Directory of Open Access Journals (Sweden)

    Mario Siragusa

    2015-10-01

    Full Text Available This article intends to discuss a selection of the most relevant features of the most recent trends in antitrust enforcement. Firstly, anticompetitive signalling will be addressed: its assessment depends on the kind of information provided. Where such information is of public knowledge or is very well known by the market participants, signalling should not be deemed as anticompetitive. Secondly, the Power Cable case has raised for the first time various problematic issues, such as the possibility to impose parental liability on a purely financial investor, even where the presumed direct infringer would have been able to pay the fine. This appears to be irreconcilable with the objectives for which the case law on parental liability has been elaborated. Thirdly, as to the concept of restriction of competition by object, it is argued that the Intel case does not disavow the principles established in Cartes Bancaires. Indeed, the finding of a violation and the different methodology applied in the first case are only due to its specific factual circumstances. Finally, the nouvelle vague of the case law on the anticompetitive abuse of rights has led to two opposite approaches, one at the EU and the other at the Italian level. The first one, based on the finding of objective circumstances, is perfectly consistent with existing EU case law, while the second, exclusively focused on the exclusionary intent, seems to be in sharp contrast with it. The hope is that the Court of Justice will intervene to resolve this contradiction.

  5. Automatic Photoelectric Telescope Service

    International Nuclear Information System (INIS)

    Genet, R.M.; Boyd, L.J.; Kissell, K.E.; Crawford, D.L.; Hall, D.S.; BDM Corp., McLean, VA; Kitt Peak National Observatory, Tucson, AZ; Dyer Observatory, Nashville, TN)

    1987-01-01

    Automatic observatories have the potential of gathering sizable amounts of high-quality astronomical data at low cost. The Automatic Photoelectric Telescope Service (APT Service) has realized this potential and is routinely making photometric observations of a large number of variable stars. However, without observers to provide on-site monitoring, it was necessary to incorporate special quality checks into the operation of the APT Service at its multiple automatic telescope installation on Mount Hopkins. 18 references

  6. Automatic Fiscal Stabilizers

    Directory of Open Access Journals (Sweden)

    Narcis Eduard Mitu

    2013-11-01

    Full Text Available Policies or institutions (built into an economic system that automatically tend to dampen economic cycle fluctuations in income, employment, etc., without direct government intervention. For example, in boom times, progressive income tax automatically reduces money supply as incomes and spendings rise. Similarly, in recessionary times, payment of unemployment benefits injects more money in the system and stimulates demand. Also called automatic stabilizers or built-in stabilizers.

  7. Deployment Health Surveillance

    National Research Council Canada - National Science Library

    DeNicola, Anthony D

    2004-01-01

    ... of stress in causing chronic illness. The lack of comprehensive deployment health surveillance has made it difficult to determine possible causes of adverse health effects reported by Gulf War veterans...

  8. 522 Postmarket Surveillance Studies

    Data.gov (United States)

    U.S. Department of Health & Human Services — The 522 Postmarket Surveillance Studies Program encompasses design, tracking, oversight, and review responsibilities for studies mandated under section 522 of the...

  9. Sanitary surveillance and bioethics

    Directory of Open Access Journals (Sweden)

    Volnei Garrafa

    2017-08-01

    Full Text Available Regulatory practices in the field of health surveillance are indispensable. The aim of this study is to show ‒ taking the Brazilian National Surveillance Agency, governing body of sanitary surveillance in Brazil as a reference ‒ that bioethics provides public bodies a series of theoretical tools from the field of applied ethics for the proper exercise and control of these practices. To that end, the work uses two references of bioethics for the development of a comparative and supportive analysis to regulatory activities in the field of health surveillance: the Universal Declaration on Bioethics and Human Rights of Unesco and the theory of intervention bioethics. We conclude that organizations and staff working with regulatory activities can take advantage of the principles and frameworks proposed by bioethics, especially those related to the Declaration and the theory of intervention bioethics, the latter being set by the observation and use of the principles of prudence, precaution, protection and prevention.

  10. Automatic differentiation bibliography

    Energy Technology Data Exchange (ETDEWEB)

    Corliss, G.F. [comp.

    1992-07-01

    This is a bibliography of work related to automatic differentiation. Automatic differentiation is a technique for the fast, accurate propagation of derivative values using the chain rule. It is neither symbolic nor numeric. Automatic differentiation is a fundamental tool for scientific computation, with applications in optimization, nonlinear equations, nonlinear least squares approximation, stiff ordinary differential equation, partial differential equations, continuation methods, and sensitivity analysis. This report is an updated version of the bibliography which originally appeared in Automatic Differentiation of Algorithms: Theory, Implementation, and Application.

  11. A law enforcement perspective of electricity deregulation

    International Nuclear Information System (INIS)

    Horowitz, Ira

    2006-01-01

    In April 2004, the California Attorney General's (AG) office issued a white paper that provided a 'law enforcement perspective of the California energy crisis.' To complete this special issue's coverage, I summarize three aspects of that paper: notably, the deficiencies in market oversight and enforcement that left the deregulated market prone to potential abuse, the principal modus operandi that some market agents used to exploit those deficiencies without fear of retribution, and the AG's 'recommendations for improving enforcement and protecting consumers in deregulated energy markets.'. (author)

  12. A law enforcement perspective of electricity deregulation

    Energy Technology Data Exchange (ETDEWEB)

    Horowitz, Ira [Warrington College of Business, University of Florida, Gainesville, FL 32611-7169 (United States)

    2006-05-15

    In April 2004, the California Attorney General's (AG) office issued a white paper that provided a 'law enforcement perspective of the California energy crisis.' To complete this special issue's coverage, I summarize three aspects of that paper: notably, the deficiencies in market oversight and enforcement that left the deregulated market prone to potential abuse, the principal modus operandi that some market agents used to exploit those deficiencies without fear of retribution, and the AG's 'recommendations for improving enforcement and protecting consumers in deregulated energy markets.'. (author)

  13. Effective enforcement of the forest practices code

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-31

    The British Columbia Forest Practices Code establishes a scheme to guide and direct forest harvesting and other forest uses in concert with other related acts. The Code is made up of the Forest Practices Code of British Columbia Act, regulations, standards, and guidebooks. This document provides information on Code enforcement. It reviews the roles of the three provincial resource ministries and the Attorney General in enforcing the code, the various activities undertaken to ensure compliance (including inspections, investigations, and responses to noncompliance), and the role of the public in helping to enforce the Code. The appendix contains a list of Ministry of Forests office locations and telephone numbers.

  14. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2006-01-01

    .... but provides the strong security guarantees of modern languages such as Java. A second avenue of language-based work explored a general class of policy enforcement mechanism based on in-line reference monitors (IRM...

  15. Flow enforcement algorithms for ATM networks

    DEFF Research Database (Denmark)

    Dittmann, Lars; Jacobsen, Søren B.; Moth, Klaus

    1991-01-01

    Four measurement algorithms for flow enforcement in asynchronous transfer mode (ATM) networks are presented. The algorithms are the leaky bucket, the rectangular sliding window, the triangular sliding window, and the exponentially weighted moving average. A comparison, based partly on teletraffic...

  16. Anticorruption expertise of law-enforcement acts

    Directory of Open Access Journals (Sweden)

    Sergey B. Polyakov

    2015-12-01

    Full Text Available Objective to substantiate public necessity to define the subject methodological and organizational capabilities of anticorruption expertise of law enforcement acts. Methods universal dialecticmaterialistic method was used to study the needs in anticorruption expertise of law enforcement acts in the mechanism of legal regulation based on it general scientific and special formal legal and comparative legal methods of research used for the definition of subjectmatter of the proposed expertise. Results the value of anticorruption expertise of law enforcement was shown corruption factors and corruption indicators enabling legislation were identified ways of conducting such examinations were proposed. Scientific novelty the article examines the need and the subject proposes methods of a new type of anticorruption expertise. Practical significance the conditions of corruption are defined which are created in law enforcement activities and methods for their detection are proposed. nbsp

  17. Risk sharing relations and enforcement mechanisms

    NARCIS (Netherlands)

    Barr, A.; Dekker, M.; Fafchamps, M.

    2008-01-01

    We investigate whether the set of available enforcement mechanisms affects the formation of risk sharing relations by applying dyadic regression analysis to data from a specifically designed behavioural experiment, two surveys and a genealogical mapping exercise. During the experiment participants

  18. 49 CFR 212.115 - Enforcement actions.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF TRANSPORTATION STATE SAFETY PARTICIPATION REGULATIONS State/Federal Roles § 212.115 Enforcement... assess and compromise penalties, to issue emergency orders and compliance orders, institute or cause to...

  19. Enforcement and Compliance History Online (ECHO) Facilities

    Data.gov (United States)

    U.S. Environmental Protection Agency — ECHO provides integrated compliance and enforcement information for about 800,000 regulated facilities nationwide. Its features range from simple to advanced,...

  20. DNR Division of Enforcement Officer Patrol Areas

    Data.gov (United States)

    Minnesota Department of Natural Resources — This theme shows the DNR Division of Enforcement Office Patrol Areas as of January 1, 2003. Patrol areas were defined and verified by Patrol Officers during the fall...

  1. System analysis of automated speed enforcement implementation.

    Science.gov (United States)

    2016-04-01

    Speeding is a major factor in a large proportion of traffic crashes, injuries, and fatalities in the United States. Automated Speed Enforcement (ASE) is one of many approaches shown to be effective in reducing speeding violations and crashes. However...

  2. Neural Bases of Automaticity

    Science.gov (United States)

    Servant, Mathieu; Cassey, Peter; Woodman, Geoffrey F.; Logan, Gordon D.

    2018-01-01

    Automaticity allows us to perform tasks in a fast, efficient, and effortless manner after sufficient practice. Theories of automaticity propose that across practice processing transitions from being controlled by working memory to being controlled by long-term memory retrieval. Recent event-related potential (ERP) studies have sought to test this…

  3. Automatic control systems engineering

    International Nuclear Information System (INIS)

    Shin, Yun Gi

    2004-01-01

    This book gives descriptions of automatic control for electrical electronics, which indicates history of automatic control, Laplace transform, block diagram and signal flow diagram, electrometer, linearization of system, space of situation, state space analysis of electric system, sensor, hydro controlling system, stability, time response of linear dynamic system, conception of root locus, procedure to draw root locus, frequency response, and design of control system.

  4. Automatic Camera Control

    DEFF Research Database (Denmark)

    Burelli, Paolo; Preuss, Mike

    2014-01-01

    Automatically generating computer animations is a challenging and complex problem with applications in games and film production. In this paper, we investigate howto translate a shot list for a virtual scene into a series of virtual camera configurations — i.e automatically controlling the virtual...

  5. Automatic differentiation of functions

    International Nuclear Information System (INIS)

    Douglas, S.R.

    1990-06-01

    Automatic differentiation is a method of computing derivatives of functions to any order in any number of variables. The functions must be expressible as combinations of elementary functions. When evaluated at specific numerical points, the derivatives have no truncation error and are automatically found. The method is illustrated by simple examples. Source code in FORTRAN is provided

  6. 39 CFR 7.7 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Enforcement. 7.7 Section 7.7 Postal Service UNITED STATES POSTAL SERVICE THE BOARD OF GOVERNORS OF THE U.S. POSTAL SERVICE PUBLIC OBSERVATION (ARTICLE VII) § 7.7 Enforcement. (a) Under 5 U.S.C. 552b(g), any person may bring a proceeding in the United States...

  7. The Legality and Validity of Administrative Enforcement

    Directory of Open Access Journals (Sweden)

    Sergei V. Iarkovoi

    2018-01-01

    Full Text Available The article discusses the concept and content of the validity of adopted by the executive authorities and other bodies of public administration legal acts and committed by them legal actions as an important characteristic of law enforcement by these bodies. The Author concludes that the validity of the administrative law enforcement is not an independent requirement for it, and acts as an integral part of its legal requirements.

  8. Citizen enforcement and the smoking gun

    International Nuclear Information System (INIS)

    Unterberger, G.L.

    1991-01-01

    This article addresses the provisions for private citizens to bring lawsuits in federal court against regulated parties violating federal air pollution-control laws and the steps that operators of facilities subject to air pollution-control laws need to take to help avoid significant enforcement liabilities. The topics of the article include a look at citizen enforcement since 1970, the 1990 amendments to the Clean Air Act, construction and management with these regulations

  9. Satellite Surveillance: Domestic Issues

    National Research Council Canada - National Science Library

    Best, Jr., Richard A; Elsea, Jennifer K

    2008-01-01

    ... and law enforcement purposes, in addition to the civil applications that have been supported for years. In 2007, it moved to transfer responsibility for coordinating civilian use of satellites to the Department of Homeland Security. The transfer occurred, however, apparently without notification of key congressional oversight committees.

  10. Strengthened enforcement enhances marine sanctuary performance

    Directory of Open Access Journals (Sweden)

    Brendan P. Kelaher

    2015-01-01

    Full Text Available Marine sanctuaries are areas where the extraction of biota is not permitted. Although most marine sanctuaries have a positive influence on biotic communities, not all sanctuaries are meeting their conservation objectives. Amidst possible explanations (e.g., size, age and isolation, insufficient enforcement is often speculated to be a key driver of marine sanctuary underperformance. Despite this, there are few studies directly linking quantitative enforcement data to changes in biotic communities within marine sanctuaries. Here, we used an asymmetrical-BACI experimental design from 2006–2012 to test whether new enforcement initiatives enhanced abundances of target fishes and threatened species in an existing large sub-tropical marine sanctuary relative to areas open to fishing. Implementation of the new enforcement initiatives in 2010 was associated with a 201% increase in annual fine rate and a significant increase in target fish and elasmobranch abundance, as well as sightings of a critically-endangered shark, in the marine sanctuary relative to areas open to fishing. Overall, these results demonstrate that strengthening enforcement can have a rapid positive influence on target fish and perhaps threatened species in a subtropical marine sanctuary. From this, we contend that increased enforcement guided by risk-based compliance planning and operations may be a useful first step for improving underperforming marine sanctuaries.

  11. Surveillance of antibiotic resistance

    Science.gov (United States)

    Johnson, Alan P.

    2015-01-01

    Surveillance involves the collection and analysis of data for the detection and monitoring of threats to public health. Surveillance should also inform as to the epidemiology of the threat and its burden in the population. A further key component of surveillance is the timely feedback of data to stakeholders with a view to generating action aimed at reducing or preventing the public health threat being monitored. Surveillance of antibiotic resistance involves the collection of antibiotic susceptibility test results undertaken by microbiology laboratories on bacteria isolated from clinical samples sent for investigation. Correlation of these data with demographic and clinical data for the patient populations from whom the pathogens were isolated gives insight into the underlying epidemiology and facilitates the formulation of rational interventions aimed at reducing the burden of resistance. This article describes a range of surveillance activities that have been undertaken in the UK over a number of years, together with current interventions being implemented. These activities are not only of national importance but form part of the international response to the global threat posed by antibiotic resistance. PMID:25918439

  12. 7 CFR 501.14 - Non-Federal law enforcement.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Non-Federal law enforcement. 501.14 Section 501.14...-Federal law enforcement. Research Center special policemen may be deputized by State or local law... State or local law enforcement agency, the facilities or services of such State or local law enforcement...

  13. 43 CFR 422.3 - Reclamation law enforcement policy.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Reclamation law enforcement policy. 422.3 Section 422.3 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION, DEPARTMENT OF THE INTERIOR LAW ENFORCEMENT AUTHORITY AT BUREAU OF RECLAMATION PROJECTS § 422.3 Reclamation law enforcement policy. The law enforcement...

  14. 33 CFR 88.11 - Law enforcement vessels.

    Science.gov (United States)

    2010-07-01

    ... NAVIGATION RULES ANNEX V: PILOT RULES § 88.11 Law enforcement vessels. (a) Law enforcement vessels may display a flashing blue light when engaged in direct law enforcement or public safety activities. This... lights. (b) The blue light described in this section may be displayed by law enforcement vessels of the...

  15. Powerful subjects of tax law enforcement

    Directory of Open Access Journals (Sweden)

    Igor Dementyev

    2017-01-01

    Full Text Available УДК 342.6The subject. Competence of government bodies and their officials in the sphere of application of the tax law is considered in the article.The purpose of research is to determine the ratio of tax enforcement and application of the tax law, as well as the relationship between the concepts “party of tax enforcement” and “participant of tax legal relations”.Main results and scope of their application. The circle of participants of tax legal relations is broader than the circle of parties of tax law enforcement. The participants of tax legal relations are simultaneously the subjects of tax law, because they realize their tax status when enter into the tax relationships. The tax and customs authorities are the undoubted parties of the tax law enforcement.Although the financial authorities at all levels of government are not mentioned by article 9 of the Tax Code of the Russian Federation as participants of tax relations, they are parties of tax enforcement, because they make the agreement for deferment or installment payment of regional and local taxes.Scope of application. Clarification of participants of tax legal relations and determination of their mutual responsibility is essential to effective law enforcement.Conclusion. It was concluded that the scope tax law enforcement is tax proceedings, not administrative proceedings, civil (arbitration proceedings or enforcement proceedings.The application of the tax law is carried out not only in the form of tax relations, but also in relations of other branches of law.

  16. GPU-Accelerated Real-Time Surveillance De-Weathering

    OpenAIRE

    Pettersson, Niklas

    2013-01-01

    A fully automatic de-weathering system to increase the visibility/stability in surveillance applications during bad weather has been developed. Rain, snow and haze during daylight are handled in real-time performance with acceleration from CUDA implemented algorithms. Video from fixed cameras is processed on a PC with no need of special hardware except an NVidia GPU. The system does not use any background model and does not require any precalibration. Increase in contrast is obtained in all h...

  17. Profiling School Shooters: Automatic Text-Based Analysis

    Directory of Open Access Journals (Sweden)

    Yair eNeuman

    2015-06-01

    Full Text Available School shooters present a challenge to both forensic psychiatry and law enforcement agencies. The relatively small number of school shooters, their various charateristics, and the lack of in-depth analysis of all of the shooters prior to the shooting add complexity to our understanding of this problem. In this short paper, we introduce a new methodology for automatically profiling school shooters. The methodology involves automatic analysis of texts and the production of several measures relevant for the identification of the shooters. Comparing texts written by six school shooters to 6056 texts written by a comparison group of male subjects, we found that the shooters' texts scored significantly higher on the Narcissistic Personality dimension as well as on the Humilated and Revengeful dimensions. Using a ranking/priorization procedure, similar to the one used for the automatic identification of sexual predators, we provide support for the validity and relevance of the proposed methodology.

  18. The plays and arts of surveillance: studying surveillance as entertainment

    NARCIS (Netherlands)

    Albrechtslund, Anders; Dubbeld, L.

    2006-01-01

    This paper suggests a direction in the development of Surveillance Studies that goes beyond current attention for the caring, productive and enabling aspects of surveillance practices. That is, surveillance could be considered not just as positively protective, but even as a comical, playful,

  19. Thai Automatic Speech Recognition

    National Research Council Canada - National Science Library

    Suebvisai, Sinaporn; Charoenpornsawat, Paisarn; Black, Alan; Woszczyna, Monika; Schultz, Tanja

    2005-01-01

    .... We focus on the discussion of the rapid deployment of ASR for Thai under limited time and data resources, including rapid data collection issues, acoustic model bootstrap, and automatic generation of pronunciations...

  20. Automatic Payroll Deposit System.

    Science.gov (United States)

    Davidson, D. B.

    1979-01-01

    The Automatic Payroll Deposit System in Yakima, Washington's Public School District No. 7, directly transmits each employee's salary amount for each pay period to a bank or other financial institution. (Author/MLF)

  1. Automatic Test Systems Aquisition

    National Research Council Canada - National Science Library

    1994-01-01

    We are providing this final memorandum report for your information and use. This report discusses the efforts to achieve commonality in standards among the Military Departments as part of the DoD policy for automatic test systems (ATS...

  2. Hunting, law enforcement, and African primate conservation.

    Science.gov (United States)

    N'Goran, Paul K; Boesch, Christophe; Mundry, Roger; N'Goran, Eliezer K; Herbinger, Ilka; Yapi, Fabrice A; Kühl, Hjalmar S

    2012-06-01

    Primates are regularly hunted for bushmeat in tropical forests, and systematic ecological monitoring can help determine the effect hunting has on these and other hunted species. Monitoring can also be used to inform law enforcement and managers of where hunting is concentrated. We evaluated the effects of law enforcement informed by monitoring data on density and spatial distribution of 8 monkey species in Taï National Park, Côte d'Ivoire. We conducted intensive surveys of monkeys and looked for signs of human activity throughout the park. We also gathered information on the activities of law-enforcement personnel related to hunting and evaluated the relative effects of hunting, forest cover and proximity to rivers, and conservation effort on primate distribution and density. The effects of hunting on monkeys varied among species. Red colobus monkeys (Procolobus badius) were most affected and Campbell's monkeys (Cercopithecus campbelli) were least affected by hunting. Density of monkeys irrespective of species was up to 100 times higher near a research station and tourism site in the southwestern section of the park, where there is little hunting, than in the southeastern part of the park. The results of our monitoring guided law-enforcement patrols toward zones with the most hunting activity. Such systematic coordination of ecological monitoring and law enforcement may be applicable at other sites. ©2012 Society for Conservation Biology.

  3. 25 CFR 12.33 - Are Indian country law enforcement officers paid less than other law enforcement officers?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Are Indian country law enforcement officers paid less than other law enforcement officers? 12.33 Section 12.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER INDIAN COUNTRY LAW ENFORCEMENT Qualifications and Training Requirements § 12.33 Are Indian country law enforcement...

  4. Brand and automaticity

    OpenAIRE

    Liu, J.

    2008-01-01

    A presumption of most consumer research is that consumers endeavor to maximize the utility of their choices and are in complete control of their purchasing and consumption behavior. However, everyday life experience suggests that many of our choices are not all that reasoned or conscious. Indeed, automaticity, one facet of behavior, is indispensable to complete the portrait of consumers. Despite its importance, little attention is paid to how the automatic side of behavior can be captured and...

  5. Position automatic determination technology

    International Nuclear Information System (INIS)

    1985-10-01

    This book tells of method of position determination and characteristic, control method of position determination and point of design, point of sensor choice for position detector, position determination of digital control system, application of clutch break in high frequency position determination, automation technique of position determination, position determination by electromagnetic clutch and break, air cylinder, cam and solenoid, stop position control of automatic guide vehicle, stacker crane and automatic transfer control.

  6. Automatic intelligent cruise control

    OpenAIRE

    Stanton, NA; Young, MS

    2006-01-01

    This paper reports a study on the evaluation of automatic intelligent cruise control (AICC) from a psychological perspective. It was anticipated that AICC would have an effect upon the psychology of driving—namely, make the driver feel like they have less control, reduce the level of trust in the vehicle, make drivers less situationally aware, but might reduce the workload and make driving might less stressful. Drivers were asked to drive in a driving simulator under manual and automatic inte...

  7. Evaluation of an Electronic Smart-Card Based School Absenteeism Surveillance System

    OpenAIRE

    So, HC; Lam, CK; Tam, YH; Cowling, BJ; Leung, GM; Lau, EHY; Ip, DKM

    2014-01-01

    We evaluated the performance of an electronic smart-card based school absenteeism surveillance system which was initiated in 2008 in Hong Kong. The result demonstrated the feasibility and potential benefit of employing electronic school absenteeism data as captured automatically by a smart card system as an alternative data stream for monitoring influenza activities, and flexibility in establishing surveillance for emerging diseases. The increasing popularity of usage of smart card technology...

  8. Conic surveillance evasion

    NARCIS (Netherlands)

    Lewin, J.; Olsder, G.J.

    1979-01-01

    A surveillance-evasion differential game of degree with a detection zone in the shape of a two-dimensional cone is posed. The nature of the optimal strategies and the singular phenomena of the value function are described and correlated to subsets of the space of all possible parameter combinations,

  9. Laser surveillance system (LASSY)

    International Nuclear Information System (INIS)

    Boeck, H.; Hammer, J.

    1988-01-01

    The development progress during the reporting period 1988 of the laser surveillance system of spent fuel pools is summarized. The present engineered system comes close to a final version for field application as all technical questions have been solved in 1988. 14 figs., 1 tab. (Author)

  10. Laser surveillance system (LASSY)

    International Nuclear Information System (INIS)

    Boeck, H.

    1991-09-01

    Laser Surveillance System (LASSY) is a beam of laser light which scans a plane above the water or under-water in a spent-fuel pond. The system can detect different objects and estimates its coordinates and distance as well. LASSY can operate in stand-alone configuration or in combination with a video surveillance to trigger signal to a videorecorder. The recorded information on LASSY computer's disk comprises date, time, start and stop angle of detected alarm, the size of the disturbance indicated in number of deviated points and some other information. The information given by the laser system cannot be fully substituted by TV camera pictures since the scanning beam creates a horizontal surveillance plan. The engineered prototype laser system long-term field test has been carried out in Soluggia (Italy) and has shown its feasibility and reliability under the conditions of real spent fuel storage pond. The verification of the alarm table on the LASSY computer with the recorded video pictures of TV surveillance system confirmed that all alarm situations have been detected. 5 refs

  11. Infectieziekten Surveillance Informatie Systeem

    NARCIS (Netherlands)

    Sprenger MJW; van Pelt W; CIE

    1994-01-01

    In the Netherlands an electronic network has been proposed for structured data transfer and communication concerning the control of infectious diseases. This project has been baptized ISIS (Infectious diseases Surveillance Information System). It is an initiative of the Dutch Government. ISIS

  12. Surveillance and Communication

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Albrechtslund, Anders; Lauritsen, Peter

    2017-01-01

    , and acquaintances are up to on social media. In turn, they also leave trails of digital footprints that may be collected and analyzed by governments, businesses, or hackers. The imperceptible nature of this new surveillance raises some pressing concerns about our digital lives as our data doubles increasingly...

  13. Enforcement of Privacy Policies over Multiple Online Social Networks for Collaborative Activities

    Science.gov (United States)

    Wu, Zhengping; Wang, Lifeng

    Our goal is to tend to develop an enforcement architecture of privacy policies over multiple online social networks. It is used to solve the problem of privacy protection when several social networks build permanent or temporary collaboration. Theoretically, this idea is practical, especially due to more and more social network tend to support open source framework “OpenSocial”. But as we known different social network websites may have the same privacy policy settings based on different enforcement mechanisms, this would cause problems. In this case, we have to manually write code for both sides to make the privacy policy settings enforceable. We can imagine that, this is a huge workload based on the huge number of current social networks. So we focus on proposing a middleware which is used to automatically generate privacy protection component for permanent integration or temporary interaction of social networks. This middleware provide functions, such as collecting of privacy policy of each participant in the new collaboration, generating a standard policy model for each participant and mapping all those standard policy to different enforcement mechanisms of those participants.

  14. Will smart surveillance systems listen, understand and speak Slovene?

    Directory of Open Access Journals (Sweden)

    Simon Dobrišek

    2013-12-01

    Full Text Available The paper deals with the spoken language technologies that could enable the so-called smart (intelligent surveillance systems to listen, understand and speak Slovenian in the near future. Advanced computational methods of artificial perception and pattern recognition enable such systems to be at least to some extent aware of the environment, the presence of people and other phenomena that could be subject to surveillance. Speech is one such phenomenon that has the potential to be a key source of information in certain security situations. Technologies that enable automatic speech and speaker recognition as well as their psychophysical state by computer analysis of acoustic speech signals provide an entirely new dimension to the development of smart surveillance systems. Automatic recognition of spoken threats, screaming and crying for help, as well as a suspicious psycho-physical state of a speaker provide such systems to some extent with intelligent behaviour. The paper investigates the current state of development of these technologies and the requirements and possibilities of these systems to be used for the Slovenian spoken language, as well as different possible security application scenarios. It also addresses the broader legal and ethical issues raised by the development and use of such technologies, especially as audio surveillance is one of the most sensitive issues of privacy protection.

  15. Law Enforcement of Cyber Terorism in Indonesia

    Directory of Open Access Journals (Sweden)

    Sri Ayu Astuti

    2015-12-01

    Full Text Available Cyber terrorism is one of the category of crimes that cross border organized and has been established as an extraordinary crime. This crime is becoming a serious threat to countries in the world. In this regard, the Government's attitude of firmness needed to enforce cyber laws against the freedom development in social media. The development of the immeasurable it in the country of Indonesia required the limitations by doing legal liability over the behavior of law which deviates towards the use of technology tools. Strict law enforcement efforts as a clear attitude to stop actively moving massive terrorism, by enacting the provisions of the law on information and electronic transactions as well as the law of terrorism effectively. How To Cite: Astuti, S. (2015. Law Enforcement of Cyber Terorism in Indonesia. Rechtsidee, 2(2, 157-178. doi:http://dx.doi.org/10.21070/jihr.v2i2.82

  16. A Review on Regulatory Enforcement Policy

    International Nuclear Information System (INIS)

    Lim, Ji Han; Lee, Kyung Joo; Choi, Young Sung

    2017-01-01

    This paper examine the meaning and principle of enforcement through examples from other countries. Regulatory enforcement is the last stage of safety regulation and how it is exercised when one failing to meet regulatory requirements can have significant ripple effect across the industry. Thus, right philosophy and principle should be established. It is not recommended to emphasize neither deterrence approach nor behavior modification approach. This should be also taken into consideration when setting up the principle and system of regulatory enforcement. In the process of Vienna Declaration, Europe and the U.S showed the fundamental differences in their approaches to safety regulation. Considering this, it is required to remain cautious at all times on what to be improved in the aspect of internal consistency within our system and also in the aspect of procedure.

  17. Normalized Metadata Generation for Human Retrieval Using Multiple Video Surveillance Cameras

    Directory of Open Access Journals (Sweden)

    Jaehoon Jung

    2016-06-01

    Full Text Available Since it is impossible for surveillance personnel to keep monitoring videos from a multiple camera-based surveillance system, an efficient technique is needed to help recognize important situations by retrieving the metadata of an object-of-interest. In a multiple camera-based surveillance system, an object detected in a camera has a different shape in another camera, which is a critical issue of wide-range, real-time surveillance systems. In order to address the problem, this paper presents an object retrieval method by extracting the normalized metadata of an object-of-interest from multiple, heterogeneous cameras. The proposed metadata generation algorithm consists of three steps: (i generation of a three-dimensional (3D human model; (ii human object-based automatic scene calibration; and (iii metadata generation. More specifically, an appropriately-generated 3D human model provides the foot-to-head direction information that is used as the input of the automatic calibration of each camera. The normalized object information is used to retrieve an object-of-interest in a wide-range, multiple-camera surveillance system in the form of metadata. Experimental results show that the 3D human model matches the ground truth, and automatic calibration-based normalization of metadata enables a successful retrieval and tracking of a human object in the multiple-camera video surveillance system.

  18. NRC program of inspection and enforcement

    International Nuclear Information System (INIS)

    LeDoux, J.C.; Rehfuss, C.

    1978-01-01

    The Nuclear Regulatory Commission (NRC) regulates civilian uses of nuclear materials to ensure the protection of the public health and safety and the environment. The Office of Inspection and Enforcement (IE) develops and implements the inspection, investigation, and enforcement programs for the NRC. The IE conducts inspection programs for reactors under construction and in operation, nuclear industry vendors, fuel facilities and users of nuclear materials, and all aspects of the safeguarding of facilities and materials. Recently the IE began implementing a program that will place inspectors on site at nuclear power reactors and will provide for national appraisal of licensee performance and for an evaluation of the effectiveness of the inspection programs

  19. Evaluation of ADS-B Surveillance Data to Identify Flight Operations with Reduced Safety Margin in the National Airspace System, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — As part of the FAA's plans for modernization of the Air Traffic Control (ATC) system, Automatic Dependent Surveillance - Broadcast (ADS-B) will be the basis of the...

  20. Quality Assessment of Compressed Video for Automatic License Plate Recognition

    DEFF Research Database (Denmark)

    Ukhanova, Ann; Støttrup-Andersen, Jesper; Forchhammer, Søren

    2014-01-01

    Definition of video quality requirements for video surveillance poses new questions in the area of quality assessment. This paper presents a quality assessment experiment for an automatic license plate recognition scenario. We explore the influence of the compression by H.264/AVC and H.265/HEVC s...... recognition in our study has a behavior similar to human recognition, allowing the use of the same mathematical models. We furthermore propose an application of one of the models for video surveillance systems......Definition of video quality requirements for video surveillance poses new questions in the area of quality assessment. This paper presents a quality assessment experiment for an automatic license plate recognition scenario. We explore the influence of the compression by H.264/AVC and H.265/HEVC...... standards on the recognition performance. We compare logarithmic and logistic functions for quality modeling. Our results show that a logistic function can better describe the dependence of recognition performance on the quality for both compression standards. We observe that automatic license plate...

  1. Surveillance and Datalink Communication Performance Analysis for Distributed Separation Assurance System Architectures

    Science.gov (United States)

    Chung, William W.; Linse, Dennis J.; Alaverdi, Omeed; Ifarraguerri, Carlos; Seifert, Scott C.; Salvano, Dan; Calender, Dale

    2012-01-01

    This study investigates the effects of two technical enablers: Automatic Dependent Surveillance - Broadcast (ADS-B) and digital datalink communication, of the Federal Aviation Administration s Next Generation Air Transportation System (NextGen) under two separation assurance (SA) system architectures: ground-based SA and airborne SA, on overall separation assurance performance. Datalink performance such as successful reception probability in both surveillance and communication messages, and surveillance accuracy are examined in various operational conditions. Required SA performance is evaluated as a function of subsystem performance, using availability, continuity, and integrity metrics to establish overall required separation assurance performance, under normal and off-nominal conditions.

  2. A video imaging system and related control hardware for nuclear safeguards surveillance applications

    International Nuclear Information System (INIS)

    Whichello, J.V.

    1987-03-01

    A novel video surveillance system has been developed for safeguards applications in nuclear installations. The hardware was tested at a small experimental enrichment facility located at the Lucas Heights Research Laboratories. The system uses digital video techniques to store, encode and transmit still television pictures over the public telephone network to a receiver located in the Australian Safeguards Office at Kings Cross, Sydney. A decoded, reconstructed picture is then obtained using a second video frame store. A computer-controlled video cassette recorder is used automatically to archive the surveillance pictures. The design of the surveillance system is described with examples of its operation

  3. Surface-water surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Saldi, K.A.; Dirkes, R.L.; Blanton, M.L.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the Surface water on and near the Hanford Site is monitored to determine the potential effects of Hanford operations. Surface water at Hanford includes the Columbia River, riverbank springs, ponds located on the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site. Columbia River sediments are also included in this discussion. Tables 5.3.1 and 5.3.2 summarize the sampling locations, sample types, sampling frequencies, and sample analyses included in surface-water surveillance activities during 1994. Sample locations are also identified in Figure 5.3.1. This section describes the surveillance effort and summarizes the results for these aquatic environments. Detailed analytical results are reported by Bisping (1995).

  4. Water radiological surveillance (II)

    International Nuclear Information System (INIS)

    Pablo San Martin de, M.

    2008-01-01

    This paper summarizes the characteristics of the Environmental Surveillance Radiological Networks (ESRN) currently operating in CEDEX. In the first part, the Spanish Continental Waters ESRN has been presented. This second one describes Spanish Costal Waters ESRN and the High Sensitivity Networks in Continental and Marine Waters. It also presents the Radiological Surveillance of Drinking Waters that CEDEX carries out in waters of public consumption management by the Canal de Isabel II (CYII) and by the Mancomunity of Canals Taibilla (M.C.T.). The legislation applicable in each case is reviewed as well. Due to its extension the article has been divided into two parts. As Spanish Continental Waters ESRN has been reviewed in the first part, the others ESRN are discussed in this second one. (Author) 10 refs

  5. Surface-water surveillance

    International Nuclear Information System (INIS)

    Saldi, K.A.; Dirkes, R.L.; Blanton, M.L.

    1995-01-01

    This section of the 1994 Hanford Site Environmental Report summarizes the Surface water on and near the Hanford Site is monitored to determine the potential effects of Hanford operations. Surface water at Hanford includes the Columbia River, riverbank springs, ponds located on the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site. Columbia River sediments are also included in this discussion. Tables 5.3.1 and 5.3.2 summarize the sampling locations, sample types, sampling frequencies, and sample analyses included in surface-water surveillance activities during 1994. Sample locations are also identified in Figure 5.3.1. This section describes the surveillance effort and summarizes the results for these aquatic environments. Detailed analytical results are reported by Bisping (1995)

  6. 17 CFR 37.9 - Enforceability.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Enforceability. 37.9 Section 37.9 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES TRANSACTION... pursuant to the rules of, a registered derivatives transaction execution facility shall not be void...

  7. 7 CFR 3016.43 - Enforcement.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Enforcement. 3016.43 Section 3016.43 Agriculture Regulations of the Department of Agriculture (Continued) OFFICE OF THE CHIEF FINANCIAL OFFICER, DEPARTMENT OF AGRICULTURE UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL...

  8. Commercial Court and Enforcement Assessment Tool

    OpenAIRE

    Ebeid, Omniah; Gramckow, Heike

    2016-01-01

    An effective and efficient justice system is essential for sustained economic growth. In a well-functioning, independent, and efficient justice system, decisions are taken within a reasonable time and are predictably and effectively enforced, and individual rights, including property rights, are adequately protected. Among other objectives, the efficiency of the judicial system is importan...

  9. 18 CFR 1b.21 - Enforcement hotline.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Enforcement hotline. 1b.21 Section 1b.21 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION... shall be treated as non-public by the Commission and its staff, consistent with the provisions of...

  10. Intimate Partner Violence within Law Enforcement Families

    Science.gov (United States)

    Anderson, Anita S.; Lo, Celia C.

    2011-01-01

    Using data from the Baltimore Police Stress and Domestic Violence study, the authors examined how exposure to stressful events on the job affects law enforcement employees' physical aggression toward domestic partners, evaluating the role of negative emotions and authoritarian spillover in mediating the impact of such task-related stress. The…

  11. 30 CFR 903.843 - Federal enforcement.

    Science.gov (United States)

    2010-07-01

    ... request, to a designated Arizona State agency with jurisdiction over mining. ... Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND ENFORCEMENT, DEPARTMENT OF THE INTERIOR PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE ARIZONA § 903.843 Federal...

  12. 8 CFR 270.2 - Enforcement procedures.

    Science.gov (United States)

    2010-01-01

    ... Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS PENALTIES FOR DOCUMENT FRAUD § 270.2 Enforcement procedures. (a) Procedures for the filing of complaints. Any person or entity... charges for document fraud committed by refugees at the time of entry. The Service shall not issue a...

  13. 31 CFR 31.218 - Enforcement.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Enforcement. 31.218 Section 31.218 Money and Finance: Treasury Office of the Secretary of the Treasury TROUBLED ASSET RELIEF PROGRAM... more of the following sanctions: (1) Rejection of work tainted by an organizational conflict of...

  14. 7 CFR 1145.3 - Enforcement.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 9 2010-01-01 2009-01-01 true Enforcement. 1145.3 Section 1145.3 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements... contracts and based on the results of the investigation will take appropriate action. ...

  15. Intergroup Bias in Parliamentary Rule Enforcement

    DEFF Research Database (Denmark)

    Hjorth, Frederik Georg

    2016-01-01

    Political actors are often assigned roles requiring them to enforce rules without giving in-groups special treatment. But are such institutional roles likely to be successful? Here, I exploit a special case of exogenously assigned intergroup relations: debates in the Danish Parliament, in which P...... of clear rules, complete observability, and a tradition of parliamentary cooperation....

  16. 30 CFR 933.843 - Federal enforcement.

    Science.gov (United States)

    2010-07-01

    ... PROGRAMS FOR THE CONDUCT OF SURFACE MINING OPERATIONS WITHIN EACH STATE NORTH CAROLINA § 933.843 Federal... violations on surface coal mining and reclamation operations. (b) OSM will furnish a copy of each enforcement action and order to show cause issued pursuant to this part to the North Carolina Department of Natural...

  17. 16 CFR 1602.1 - Enforcement policy.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Enforcement policy. 1602.1 Section 1602.1 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION FLAMMABLE FABRICS ACT REGULATIONS STATEMENTS OF..., set aside, or repealed by the Consumer Product Safety Commission, by any court of competent...

  18. 12 CFR 370.11 - Enforcement mechanisms.

    Science.gov (United States)

    2010-01-01

    ... TEMPORARY LIQUIDITY GUARANTEE PROGRAM § 370.11 Enforcement mechanisms. (a) Termination of Participation. If... participate in the temporary liquidity guarantee program, the FDIC will inform the entity that it will no longer be provided the protections of the temporary liquidity guarantee program. (1) Termination of...

  19. Price-Anderson Nuclear Safety Enforcement Program. 1996 Annual report

    International Nuclear Information System (INIS)

    1996-01-01

    This first annual report on DOE's Price Anderson Amendments Act enforcement program covers the activities, accomplishments, and planning for calendar year 1996. It also includes the infrastructure development activities of 1995. It encompasses the activities of the headquarters' Office of Enforcement in the Office of Environment, Safety and Health (EH) and Investigation and the coordinators and technical advisors in DOE's Field and Program Offices and other EH Offices. This report includes an overview of the enforcement program; noncompliances, investigations, and enforcement actions; summary of significant enforcement actions; examples where enforcement action was deferred; and changes and improvements to the program

  20. Medical Surveillance Monthly Report

    Science.gov (United States)

    2016-12-01

    Illness Prevention and Sun Safety. “Sun Safety.” https:// phc.amedd.army.mil/ topics /discond/hipss/Pages/ SunSafety.aspx. Accessed on 7 December 2016. 22...febrile illness; however, after its wide- spread introduction into immunologically MSMR Vol. 23 No. 12 December 2016 Page 8 naïve populations, a...October 2016 (data as of 22 November 2016) MSMR’s Invitation to Readers Medical Surveillance Monthly Report (MSMR) invites readers to submit topics for

  1. Automatic Program Development

    DEFF Research Database (Denmark)

    Automatic Program Development is a tribute to Robert Paige (1947-1999), our accomplished and respected colleague, and moreover our good friend, whose untimely passing was a loss to our academic and research community. We have collected the revised, updated versions of the papers published in his...... honor in the Higher-Order and Symbolic Computation Journal in the years 2003 and 2005. Among them there are two papers by Bob: (i) a retrospective view of his research lines, and (ii) a proposal for future studies in the area of the automatic program derivation. The book also includes some papers...... by members of the IFIP Working Group 2.1 of which Bob was an active member. All papers are related to some of the research interests of Bob and, in particular, to the transformational development of programs and their algorithmic derivation from formal specifications. Automatic Program Development offers...

  2. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  3. History of trichinellosis surveillance

    Directory of Open Access Journals (Sweden)

    Blancou J.

    2001-06-01

    Full Text Available The origin of trichinellosis, which existed in ancient times as testified by the discovery of parasite larvae on an Egyptian mummy, unfolded in several stages: discovery of encapsulated larvae (in the 1820s, identification and scientific description of these larvae (Paget Owen, 1835, followed by experimental infestations of animals (dogs, pigs, rabbits, mice or of humans as from 1850.The main occurrences of trichinellosis were followed with particular attention in Europe (Germany, Denmark, France, etc. and in the United States of America at the end of the XIXth century. They affected numerous domestic animal species (pigs, horses, etc. or wildlife and humans. Germany paid the heaviest toll with regard to the disease in humans, between 1860 and 1880, with several thousands of patients and more than 500 deaths.Different trichinellosis surveillance systems were set up in the relevant countries in the 1860s. In humans, this surveillance was carried out on affected living patients by a biopsy of the biceps muscles and subsequently by an analysis of eosinophilia (1895. In animals, surveillance was for a long time solely based on postmortem examination of the muscles of the affected animals. This method was used for the first time in 863 in Germany, and from the 1 890s, on several hundreds of thousands of pigs in Europe or in the United States of America.

  4. Informed consent: Enforcing pharmaceutical companies' obligations abroad.

    Science.gov (United States)

    Lee, Stacey B

    2010-06-15

    The past several years have seen an evolution in the obligations of pharmaceutical companies conducting clinical trials abroad. Key players, such as international human rights organizations, multinational pharmaceutical companies, the United States government and courts, and the media, have played a significant role in defining these obligations. This article examines how such obligations have developed through the lens of past, present, and future recommendations for informed consent protections. In doing so, this article suggests that, no matter how robust obligations appear, they will continue to fall short of providing meaningful protection until they are accompanied by a substantive enforcement mechanism that holds multinational pharmaceutical companies accountable for their conduct. Issues of national sovereignty, particularly in the United States, will continue to prevent meaningful enforcement by an international tribunal or through one universally adopted code of ethics. This article argues that, rather than continuing to pursue an untenable international approach, the Alien Torts Statute (ATS) offers a viable enforcement mechanism, at least for US-based pharmaceutical companies. Recent federal appellate court precedent interpreting the ATS provides the mechanism for granting victims redress and enforcing accountability of sponsors (usually pharmaceutical companies and research and academic institutions) for informed consent misconduct. Substantive human rights protections are vital in order to ensure that every person can realize the "right to health." This article concludes that by building on the federal appellate court's ATS analysis, which grants foreign trial participants the right to pursue claims of human rights violations in US courts, a mechanism can be created for enforcing not only substantive informed consent, but also human rights protections.

  5. Automatic text summarization

    CERN Document Server

    Torres Moreno, Juan Manuel

    2014-01-01

    This new textbook examines the motivations and the different algorithms for automatic document summarization (ADS). We performed a recent state of the art. The book shows the main problems of ADS, difficulties and the solutions provided by the community. It presents recent advances in ADS, as well as current applications and trends. The approaches are statistical, linguistic and symbolic. Several exemples are included in order to clarify the theoretical concepts.  The books currently available in the area of Automatic Document Summarization are not recent. Powerful algorithms have been develop

  6. Automatic Ultrasound Scanning

    DEFF Research Database (Denmark)

    Moshavegh, Ramin

    on the user adjustments on the scanner interface to optimize the scan settings. This explains the huge interest in the subject of this PhD project entitled “AUTOMATIC ULTRASOUND SCANNING”. The key goals of the project have been to develop automated techniques to minimize the unnecessary settings...... on the scanners, and to improve the computer-aided diagnosis (CAD) in ultrasound by introducing new quantitative measures. Thus, four major issues concerning automation of the medical ultrasound are addressed in this PhD project. They touch upon gain adjustments in ultrasound, automatic synthetic aperture image...

  7. Automatic NAA. Saturation activities

    International Nuclear Information System (INIS)

    Westphal, G.P.; Grass, F.; Kuhnert, M.

    2008-01-01

    A system for Automatic NAA is based on a list of specific saturation activities determined for one irradiation position at a given neutron flux and a single detector geometry. Originally compiled from measurements of standard reference materials, the list may be extended also by the calculation of saturation activities from k 0 and Q 0 factors, and f and α values of the irradiation position. A systematic improvement of the SRM approach is currently being performed by pseudo-cyclic activation analysis, to reduce counting errors. From these measurements, the list of saturation activities is recalculated in an automatic procedure. (author)

  8. Automatic evidence retrieval for systematic reviews.

    Science.gov (United States)

    Choong, Miew Keen; Galgani, Filippo; Dunn, Adam G; Tsafnat, Guy

    2014-10-01

    Snowballing involves recursively pursuing relevant references cited in the retrieved literature and adding them to the search results. Snowballing is an alternative approach to discover additional evidence that was not retrieved through conventional search. Snowballing's effectiveness makes it best practice in systematic reviews despite being time-consuming and tedious. Our goal was to evaluate an automatic method for citation snowballing's capacity to identify and retrieve the full text and/or abstracts of cited articles. Using 20 review articles that contained 949 citations to journal or conference articles, we manually searched Microsoft Academic Search (MAS) and identified 78.0% (740/949) of the cited articles that were present in the database. We compared the performance of the automatic citation snowballing method against the results of this manual search, measuring precision, recall, and F1 score. The automatic method was able to correctly identify 633 (as proportion of included citations: recall=66.7%, F1 score=79.3%; as proportion of citations in MAS: recall=85.5%, F1 score=91.2%) of citations with high precision (97.7%), and retrieved the full text or abstract for 490 (recall=82.9%, precision=92.1%, F1 score=87.3%) of the 633 correctly retrieved citations. The proposed method for automatic citation snowballing is accurate and is capable of obtaining the full texts or abstracts for a substantial proportion of the scholarly citations in review articles. By automating the process of citation snowballing, it may be possible to reduce the time and effort of common evidence surveillance tasks such as keeping trial registries up to date and conducting systematic reviews.

  9. Third party objection and action against enforcement: Request for exclusion

    Directory of Open Access Journals (Sweden)

    Salma Marija

    2014-01-01

    Full Text Available This paper deals with a right of a third party to prevent enforcement on the basis of a claim and evidence that rights or assets seized in enforcement proceeding belong to him (third party and not to the enforcement debtor. In most of jurisdictions that were subject of analysis of this paper, this right of a third party is exercised by filing an objection to the court conducting enforcement proceedings. The claim of the third party is directed towards the enforcement creditor as well as against the enforcement debtor. In the event the claim of the third party is being contested, the court instructs the third party to initiate litigation proceedings for determining whether the third party is entitled to exclusion of such rights or assets from enforcement, especially if such third party holds property rights or some other rights over the assets that are being subject to enforcement proceedings. In majority of analyzed jurisdictions, enforcement proceedings are being suspended provided the third party, in the objection being filed makes prima facie likely, on the basis of credible evidence, that his assets were seized in the enforcement proceedings. However, according to the law of the Republic of Serbia, a credible objection of a third party does not result in suspension of enforcement proceedings, something that is being criticized in this paper. As a result of this provision of the law, a bona fide third party is forced to endure the enforcement although his claim has been made likely and subsequently confirmed in the litigation proceedings. The author, in particular, points to the legal consequences of mala fide enforcement creditor that knew that the assets that are being subject of the enforcement proceedings do not belong to the enforcement debtor. The author is of the opinion that, in such cases, the enforcement creditor should be obliged to pay to the third party damages that such party suffered as a result of enforcement proceedings being

  10. Appendix F. Developmental enforcement algorithm definition document : predictive braking enforcement algorithm definition document.

    Science.gov (United States)

    2012-05-01

    The purpose of this document is to fully define and describe the logic flow and mathematical equations for a predictive braking enforcement algorithm intended for implementation in a Positive Train Control (PTC) system.

  11. EPA Enforcement and Compliance History Online: EPA Enforcement Action Data Set

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Enforcement and Compliance History Online (ECHO) data sets have been compiled for access to larger sets of national data to ensure that ECHO meets your data...

  12. 76 FR 43691 - Unique Device Identification for Postmarket Surveillance and Enforcement; Public Workshop

    Science.gov (United States)

    2011-07-21

    ... limited and, therefore, FDA may limit the number of participants from each organization. If time and space... with device interoperability. 15. The current and future state of MMIS and RTLS systems to support safe.... Any lessons learned that can be applied from documenting medication use. 24. How the documentation of...

  13. Advanced digital video surveillance for safeguard and physical protection

    International Nuclear Information System (INIS)

    Kumar, R.

    2002-01-01

    Full text: Video surveillance is a very crucial component in safeguard and physical protection. Digital technology has revolutionized the surveillance scenario and brought in various new capabilities like better image quality, faster search and retrieval of video images, less storage space for recording, efficient transmission and storage of video, better protection of recorded video images, and easy remote accesses to live and recorded video etc. The basic safeguard requirement for verifiably uninterrupted surveillance has remained largely unchanged since its inception. However, changes to the inspection paradigm to admit automated review and remote monitoring have dramatically increased the demands on safeguard surveillance system. Today's safeguard systems can incorporate intelligent motion detection with very low rate of false alarm and less archiving volume, embedded image processing capability for object behavior and event based indexing, object recognition, efficient querying and report generation etc. It also demands cryptographically authenticating, encrypted, and highly compressed video data for efficient, secure, tamper indicating and transmission. In physical protection, intelligent on robust video motion detection, real time moving object detection and tracking from stationary and moving camera platform, multi-camera cooperative tracking, activity detection and recognition, human motion analysis etc. is going to play a key rote in perimeter security. Incorporation of front and video imagery exploitation tools like automatic number plate recognition, vehicle identification and classification, vehicle undercarriage inspection, face recognition, iris recognition and other biometric tools, gesture recognition etc. makes personnel and vehicle access control robust and foolproof. Innovative digital image enhancement techniques coupled with novel sensor design makes low cost, omni-directional vision capable, all weather, day night surveillance a reality

  14. 48 CFR 1322.406 - Administration and enforcement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Administration and enforcement. 1322.406 Section 1322.406 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE... Involving Construction 1322.406 Administration and enforcement. ...

  15. 48 CFR 1222.406 - Administration and enforcement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Administration and enforcement. 1222.406 Section 1222.406 Federal Acquisition Regulations System DEPARTMENT OF TRANSPORTATION... Involving Construction 1222.406 Administration and enforcement. ...

  16. 40 CFR 205.57 - Selective enforcement auditing requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing requirements. 205.57 Section 205.57 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE... Selective enforcement auditing requirements. ...

  17. 40 CFR 204.57 - Selective enforcement auditing.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing. 204.57 Section 204.57 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT... enforcement auditing. ...

  18. 40 CFR 205.160 - Selective enforcement auditing (SEA) requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing (SEA) requirements. 205.160 Section 205.160 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... Selective enforcement auditing (SEA) requirements. ...

  19. Child Support Enforcement Annual Data Reports Form 157 - YR 2013

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  20. Child Support Enforcement Annual Data Report Form 157

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Office of Child Support Enforcement's Annual Data Report from State agencies administering child support enforcement plans under Title IV-D of the Social...

  1. Fusing Intelligence With Law Enforcement Information: An Analytic Imperative

    National Research Council Canada - National Science Library

    Thornlow, Christopher C

    2005-01-01

    ... and Law Enforcement Communities to fuse and analyze foreign threat intelligence with domestic law enforcement information in a timely fashion to provide adequate indications and warning of such an...

  2. Law Enforcement Strategies for Preventing Rail Trespassing Risk Factors.

    Science.gov (United States)

    2016-03-01

    The Volpe Center has investigated law enforcement methods that have successfully prevented trespassing along the railroad right of way. The types of law enforcement strategies currently being used and procedures followed in the field are documented, ...

  3. Weight enforcement and evasion : Oregon case study: final report.

    Science.gov (United States)

    2002-03-01

    This study examines the incidence of overweight trucks and its relation to regulatory enforcement activity. Addressed are questions of scale operations in relation to weight violations and the effectiveness of enforcement levels, automated preclearan...

  4. Law Enforcement Support Office (LESO) 1999 National Conference

    National Research Council Canada - National Science Library

    Lytle, Michael

    1999-01-01

    The Law Enforcement Support Office (LESO) national conference was a three-day forum to inform and update federal, state and local law enforcement agents, of the DoD role supporting the National Drug Control Strategy...

  5. Cliff : the automatized zipper

    NARCIS (Netherlands)

    Baharom, M.Z.; Toeters, M.J.; Delbressine, F.L.M.; Bangaru, C.; Feijs, L.M.G.

    2016-01-01

    It is our strong believe that fashion - more specifically apparel - can support us so much more in our daily life than it currently does. The Cliff project takes the opportunity to create a generic automatized zipper. It is a response to the struggle by elderly, people with physical disability, and

  6. Automatic Complexity Analysis

    DEFF Research Database (Denmark)

    Rosendahl, Mads

    1989-01-01

    One way to analyse programs is to to derive expressions for their computational behaviour. A time bound function (or worst-case complexity) gives an upper bound for the computation time as a function of the size of input. We describe a system to derive such time bounds automatically using abstract...

  7. Automatic Oscillating Turret.

    Science.gov (United States)

    1981-03-01

    Final Report: February 1978 ZAUTOMATIC OSCILLATING TURRET SYSTEM September 1980 * 6. PERFORMING 01G. REPORT NUMBER .J7. AUTHOR(S) S. CONTRACT OR GRANT...o....e.... *24 APPENDIX P-4 OSCILLATING BUMPER TURRET ...................... 25 A. DESCRIPTION 1. Turret Controls ...Other criteria requirements were: 1. Turret controls inside cab. 2. Automatic oscillation with fixed elevation to range from 20* below the horizontal to

  8. Reactor component automatic grapple

    International Nuclear Information System (INIS)

    Greenaway, P.R.

    1982-01-01

    A grapple for handling nuclear reactor components in a medium such as liquid sodium which, upon proper seating and alignment of the grapple with the component as sensed by a mechanical logic integral to the grapple, automatically seizes the component. The mechanical logic system also precludes seizure in the absence of proper seating and alignment. (author)

  9. Automatic sweep circuit

    International Nuclear Information System (INIS)

    Keefe, D.J.

    1980-01-01

    An automatically sweeping circuit for searching for an evoked response in an output signal in time with respect to a trigger input is described. Digital counters are used to activate a detector at precise intervals, and monitoring is repeated for statistical accuracy. If the response is not found then a different time window is examined until the signal is found

  10. Automatic sweep circuit

    Science.gov (United States)

    Keefe, Donald J.

    1980-01-01

    An automatically sweeping circuit for searching for an evoked response in an output signal in time with respect to a trigger input. Digital counters are used to activate a detector at precise intervals, and monitoring is repeated for statistical accuracy. If the response is not found then a different time window is examined until the signal is found.

  11. Recursive automatic classification algorithms

    Energy Technology Data Exchange (ETDEWEB)

    Bauman, E V; Dorofeyuk, A A

    1982-03-01

    A variational statement of the automatic classification problem is given. The dependence of the form of the optimal partition surface on the form of the classification objective functional is investigated. A recursive algorithm is proposed for maximising a functional of reasonably general form. The convergence problem is analysed in connection with the proposed algorithm. 8 references.

  12. Automatic Commercial Permit Sets

    Energy Technology Data Exchange (ETDEWEB)

    Grana, Paul [Folsom Labs, Inc., San Francisco, CA (United States)

    2017-12-21

    Final report for Folsom Labs’ Solar Permit Generator project, which has successfully completed, resulting in the development and commercialization of a software toolkit within the cloud-based HelioScope software environment that enables solar engineers to automatically generate and manage draft documents for permit submission.

  13. Automated intelligent video surveillance system for ships

    Science.gov (United States)

    Wei, Hai; Nguyen, Hieu; Ramu, Prakash; Raju, Chaitanya; Liu, Xiaoqing; Yadegar, Jacob

    2009-05-01

    To protect naval and commercial ships from attack by terrorists and pirates, it is important to have automatic surveillance systems able to detect, identify, track and alert the crew on small watercrafts that might pursue malicious intentions, while ruling out non-threat entities. Radar systems have limitations on the minimum detectable range and lack high-level classification power. In this paper, we present an innovative Automated Intelligent Video Surveillance System for Ships (AIVS3) as a vision-based solution for ship security. Capitalizing on advanced computer vision algorithms and practical machine learning methodologies, the developed AIVS3 is not only capable of efficiently and robustly detecting, classifying, and tracking various maritime targets, but also able to fuse heterogeneous target information to interpret scene activities, associate targets with levels of threat, and issue the corresponding alerts/recommendations to the man-in- the-loop (MITL). AIVS3 has been tested in various maritime scenarios and shown accurate and effective threat detection performance. By reducing the reliance on human eyes to monitor cluttered scenes, AIVS3 will save the manpower while increasing the accuracy in detection and identification of asymmetric attacks for ship protection.

  14. A Comparison of Military and Law Enforcement Body Armour

    OpenAIRE

    Robin Orr; Ben Schram; Rodney Pope

    2018-01-01

    Law-enforcement officers increasingly wear body armour for protection; wearing body armour is common practice in military populations. Law-enforcement and military occupational demands are vastly different and military-styled body armour may not be suitable for law-enforcement. This study investigated differences between selected military body armour (MBA: 6.4 kg) and law-enforcement body armour (LEBA: 2.1 kg) in impacts on postural sway, vertical jump, agility, a functional movement screen (...

  15. Surveillance technologies II; Proceedings of the Meeting, Orlando, FL, Apr. 21-23, 1992

    Science.gov (United States)

    Gowrinathan, Sankaran; Shanley, James F.

    1992-08-01

    Topics addressed include sensor systems and algorithm development; detectors, focal planes, and components; law enforcement technologies; airborne/tactical surveillance sensors; stable optics for geostationary remote sensors; and spaceborne surveillance. Particular attention is given to near-ultraviolet/near-infrared image mixing, ocean topography experiment star tracker performance data, a programmable timing generator for focal plane array testing and operation, a PC-based focal plane evaluation system, augmentation of image resolution for law enforcement, an integrated geophysical approach to the detection of buried objects and clandestine tunnels, the signal attenuation dependence on a segmented window structure, thermal design and performance of the visible ultraviolet experiment sensor, dimensionally stable graphite-fiber-reinforced composite mirror technology, modeling the effects of IR subpixel nonuniformities on sensor performance, and a global vision electrooptical system. (For individual items see A93-29981 to A93-29996)

  16. Heroin and fentanyl overdoses in Kentucky: Epidemiology and surveillance.

    Science.gov (United States)

    Slavova, Svetla; Costich, Julia F; Bunn, Terry L; Luu, Huong; Singleton, Michael; Hargrove, Sarah L; Triplett, Jeremy S; Quesinberry, Dana; Ralston, William; Ingram, Van

    2017-08-01

    The study aims to describe recent changes in Kentucky's drug overdose trends related to increased heroin and fentanyl involvement, and to discuss future directions for improved drug overdose surveillance. The study used multiple data sources (death certificates, postmortem toxicology results, emergency department [ED] records, law enforcement drug submissions, and prescription drug monitoring records) to describe temporal, geographic, and demographic changes in drug overdoses in Kentucky. Fentanyl- and heroin-related overdose death rates increased across all age groups from years 2011 to 2015 with the highest rates consistently among 25-34-year-olds. The majority of the heroin and fentanyl overdose decedents had histories of substantial exposures to legally acquired prescription opioids. Law enforcement drug submission data were strongly correlated with drug overdose ED and mortality data. The 2016 crude rate of heroin-related overdose ED visits was 104/100,000, a 68% increase from 2015 (62/100,000). More fentanyl-related overdose deaths were reported between October, 2015, and September, 2016, than ED visits, in striking contrast with the observed ratio of >10 to 1 heroin-related overdose ED visits to deaths. Many fatal fentanyl overdoses were associated with heroin adulterated with fentanyl; fentanyl and other synthetic drugs. In order to inform coordinated public health and safety responses, drug overdose surveillance must move from a reactive to a proactive mode, utilizing the infrastructure for electronic health records. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Wallops Ship Surveillance System

    Science.gov (United States)

    Smith, Donna C.

    2011-01-01

    Approved as a Wallops control center backup system, the Wallops Ship Surveillance Software is a day-of-launch risk analysis tool for spaceport activities. The system calculates impact probabilities and displays ship locations relative to boundary lines. It enables rapid analysis of possible flight paths to preclude the need to cancel launches and allow execution of launches in a timely manner. Its design is based on low-cost, large-customer- base elements including personal computers, the Windows operating system, C/C++ object-oriented software, and network interfaces. In conformance with the NASA software safety standard, the system is designed to ensure that it does not falsely report a safe-for-launch condition. To improve the current ship surveillance method, the system is designed to prevent delay of launch under a safe-for-launch condition. A single workstation is designated the controller of the official ship information and the official risk analysis. Copies of this information are shared with other networked workstations. The program design is divided into five subsystems areas: 1. Communication Link -- threads that control the networking of workstations; 2. Contact List -- a thread that controls a list of protected item (ocean vessel) information; 3. Hazard List -- threads that control a list of hazardous item (debris) information and associated risk calculation information; 4. Display -- threads that control operator inputs and screen display outputs; and 5. Archive -- a thread that controls archive file read and write access. Currently, most of the hazard list thread and parts of other threads are being reused as part of a new ship surveillance system, under the SureTrak project.

  18. 32 CFR 637.7 - Drug enforcement activities.

    Science.gov (United States)

    2010-07-01

    .... Provost marshals and U.S. Army law enforcement supervisors at all levels will ensure that active drug... National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND... important nature of the drug enforcement effort. (a) MPI and DAC detectives/investigators will conduct...

  19. 10 CFR 431.383 - Enforcement process for electric motors.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Enforcement process for electric motors. 431.383 Section... COMMERCIAL AND INDUSTRIAL EQUIPMENT Enforcement § 431.383 Enforcement process for electric motors. (a) Test... motor sold by a particular manufacturer or private labeler, which indicates that the electric motor may...

  20. 45 CFR 164.412 - Law enforcement delay.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Law enforcement delay. 164.412 Section 164.412 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED... § 164.412 Law enforcement delay. If a law enforcement official states to a covered entity or business...

  1. 49 CFR 1542.217 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1542.217 Section 1542... Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used... the criminal laws of the State and local jurisdictions in which the airport is located— (1) A crime...

  2. 49 CFR 1546.211 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1546.211 Section 1546... § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...) When using a screening system required by § 1546.101(a), (b), or (c), provide for law enforcement...

  3. 49 CFR 1544.217 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1544.217 Section 1544... AND COMMERCIAL OPERATORS Operations § 1544.217 Law enforcement personnel. (a) The following applies to... for law enforcement personnel meeting the qualifications and standards specified in §§ 1542.215 and...

  4. Hybrid static-runtime information flow and declassification enforcement

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Conti, M.; Etalle, S.; Crispo, B.

    2013-01-01

    There are different paradigms for enforcing information flow and declassification policies. These approaches can be divided into static analyzers and runtime enforcers. Each class has its own strengths and weaknesses, each being able to enforce a different set of policies. In this paper we introduce

  5. Hybrid static-runtime information flow and declassification enforcement

    NARCIS (Netherlands)

    Rocha, Bruno P.S.; Conti, Mauro; Etalle, Sandro; Crispo, Bruno

    There are different paradigms for enforcing information flow and declassification policies. These approaches can be divided into static analyzers and runtime enforcers. Each class has its own strengths and weaknesses, each being able to enforce a different set of policies. In this paper, we

  6. 32 CFR 634.33 - Training of law enforcement personnel.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Training of law enforcement personnel. 634.33 Section 634.33 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Traffic Supervision § 634.33 Training of law enforcement personnel. (a) A...

  7. 32 CFR 806b.8 - Obtaining law enforcement records.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Obtaining law enforcement records. 806b.8 Section 806b.8 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Obtaining Law Enforcement Records and Confidentiality Promises § 806b.8 Obtaining law enforcement records. The Commander, Air...

  8. 20 CFR 401.155 - Law enforcement purposes.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Law enforcement purposes. 401.155 Section 401... INFORMATION Disclosure of Official Records and Information § 401.155 Law enforcement purposes. (a) General. The Privacy Act allows us to disclose information for law enforcement purposes under certain...

  9. 21 CFR 1309.26 - Exemption of law enforcement officials.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Exemption of law enforcement officials. 1309.26 Section 1309.26 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION OF MANUFACTURERS, DISTRIBUTORS, IMPORTERS AND EXPORTERS OF LIST I CHEMICALS Requirements for Registration § 1309.26 Exemption of law enforcement...

  10. 21 CFR 1301.24 - Exemption of law enforcement officials.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Exemption of law enforcement officials. 1301.24 Section 1301.24 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION OF MANUFACTURERS, DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Exceptions to Registration and Fees § 1301.24 Exemption of law enforcement...

  11. 25 CFR 11.1003 - Law enforcement officer's duties.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Law enforcement officer's duties. 11.1003 Section 11.1003 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Juvenile Offender Procedure § 11.1003 Law enforcement officer's duties. A law enforcement officer who takes a minor into...

  12. 46 CFR 4.03-55 - Law enforcement officer.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Law enforcement officer. 4.03-55 Section 4.03-55 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE CASUALTIES AND INVESTIGATIONS Definitions § 4.03-55 Law enforcement officer. Law enforcement officer means a Coast Guard commissioned, warrant or petty officer...

  13. 78 FR 44165 - Nuclear Regulatory Commission Enforcement Policy

    Science.gov (United States)

    2013-07-23

    ... NUCLEAR REGULATORY COMMISSION [NRC-2013-0159] Nuclear Regulatory Commission Enforcement Policy AGENCY: Nuclear Regulatory Commission. ACTION: Enforcement policy; request for comment. SUMMARY: The U.S... Policy. In SRM-SECY-12-0047, ``Revisions to the Nuclear Regulatory Commission Enforcement Policy,'' dated...

  14. 10 CFR 431.198 - Enforcement testing for distribution transformers.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Enforcement testing for distribution transformers. 431.198... COMMERCIAL AND INDUSTRIAL EQUIPMENT Distribution Transformers Compliance and Enforcement § 431.198 Enforcement testing for distribution transformers. (a) Test notice. Upon receiving information in writing...

  15. 20 CFR 638.805 - Security and law enforcement.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Security and law enforcement. 638.805 Section... and law enforcement. (a) The Job Corps Director shall provide guidelines to protect the security of... jurisdiction with the appropriate State and locality with respect to criminal law enforcement as long as a...

  16. 50 CFR 10.22 - Law enforcement offices.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 1 2010-10-01 2010-10-01 false Law enforcement offices. 10.22 Section 10... GENERAL PROVISIONS Addresses § 10.22 Law enforcement offices. Service law enforcement offices and their areas of responsibility follow. Mail should be addressed: “Assistant Regional Director, Division of Law...

  17. 45 CFR 5.68 - Exemption seven: Law enforcement.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Exemption seven: Law enforcement. 5.68 Section 5... INFORMATION REGULATIONS Reasons for Withholding Some Records § 5.68 Exemption seven: Law enforcement. We are not required to disclose information or records that the government has compiled for law enforcement...

  18. 77 FR 32901 - State Enforcement of Household Goods Consumer Protection

    Science.gov (United States)

    2012-06-04

    ... enforce certain consumer protection provisions of Title 49 of the United States Code (U.S.C.) and related... bring civil actions in the U.S. district courts to enforce the consumer protection provisions that apply..., 386, and 387 State Enforcement of Household Goods Consumer Protection AGENCY: Federal Motor Carrier...

  19. 24 CFR 125.401 - Private Enforcement Initiative.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Private Enforcement Initiative. 125... FAIR HOUSING FAIR HOUSING INITIATIVES PROGRAM § 125.401 Private Enforcement Initiative. (a) The Private Enforcement Initiative provides funding on a single-year or multi-year basis, to investigate violations and...

  20. 32 CFR 634.26 - Traffic law enforcement principles.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Traffic law enforcement principles. 634.26 Section 634.26 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW... law enforcement principles. (a) Traffic law enforcement should motivate drivers to operate vehicles...

  1. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L.E.

    1993-01-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest Laboratory (PNL) for the US Department of Energy (DOE). Samples are routinely collected and analyzed to determine the quality of air, surface water, ground water, soil, sediment, wildlife, vegetation, foodstuffs, and farm products at Hanford Site and surrounding communities. This document contains the planned schedule for routine sample collection for the Surface Environmental Surveillance Project (SESP) and Drinking Water Project, and Ground-Water Surveillance Project.

  2. The installation and performance test of the surveillance system for DUPIC facility

    International Nuclear Information System (INIS)

    Kim, Dong Young; Kim, Ho Dong; Cha, Hong Ryul

    2000-07-01

    We have developed the real time surveillance system, named by DSSS, for DUPIC test facility. The system acquires data from He-3 neutron monitors(DSNM) and CCD cameras to automatically diagnose the transportation status of nuclear material. This technical report shortly illustrates important features of hardware and software of the system

  3. The installation and performance test of the surveillance system for DUPIC facility

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Dong Young; Kim, Ho Dong; Cha, Hong Ryul

    2000-07-01

    We have developed the real time surveillance system, named by DSSS, for DUPIC test facility. The system acquires data from He-3 neutron monitors(DSNM) and CCD cameras to automatically diagnose the transportation status of nuclear material. This technical report shortly illustrates important features of hardware and software of the system.

  4. Self-surveillance

    DEFF Research Database (Denmark)

    Albrechtslund, Anders

    Gadgets and applications are increasingly being developed and used for tracking, quantifying, and documenting everyday life activities and especially health and fitness devices such as GPS-enabled sports watches are well-known and popular. However, self-surveillance practices involving networked...... pressure, fitness activities, sleep cycles, etc. can be broadcasted, e.g. as tweets on Twitter or status updates on Facebook. Such quantification practices with monitoring technologies become co-producing when individuals constitute themselves as subjects engaging in self-tracking, self-care, and self...

  5. Surveillance test interval optimization

    International Nuclear Information System (INIS)

    Cepin, M.; Mavko, B.

    1995-01-01

    Technical specifications have been developed on the bases of deterministic analyses, engineering judgment, and expert opinion. This paper introduces our risk-based approach to surveillance test interval (STI) optimization. This approach consists of three main levels. The first level is the component level, which serves as a rough estimation of the optimal STI and can be calculated analytically by a differentiating equation for mean unavailability. The second and third levels give more representative results. They take into account the results of probabilistic risk assessment (PRA) calculated by a personal computer (PC) based code and are based on system unavailability at the system level and on core damage frequency at the plant level

  6. GSFC Supplier Surveillance

    Science.gov (United States)

    Kelly, Michael P.

    2011-01-01

    Topics covered include: Develop Program/Project Quality Assurance Surveillance Plans The work activities performed by the developer and/or his suppliers are subject to evaluation and audit by government-designated representatives. CSO supports project by selecting on-site supplier representative s by one of several methods: (1) a Defense Contract Management Agency (DCMA) person via a Letter Of Delegation (LOD), (2) an independent assurance contractor (IAC) via a contract Audits, Assessments, and Assurance (A3) Contract Code 300 Mission Assurance Support Contract (MASC)

  7. Forensic imaging tools for law enforcement

    Energy Technology Data Exchange (ETDEWEB)

    SMITHPETER,COLIN L.; SANDISON,DAVID R.; VARGO,TIMOTHY D.

    2000-01-01

    Conventional methods of gathering forensic evidence at crime scenes are encumbered by difficulties that limit local law enforcement efforts to apprehend offenders and bring them to justice. Working with a local law-enforcement agency, Sandia National Laboratories has developed a prototype multispectral imaging system that can speed up the investigative search task and provide additional and more accurate evidence. The system, called the Criminalistics Light-imaging Unit (CLU), has demonstrated the capabilities of locating fluorescing evidence at crime scenes under normal lighting conditions and of imaging other types of evidence, such as untreated fingerprints, by direct white-light reflectance. CLU employs state of the art technology that provides for viewing and recording of the entire search process on videotape. This report describes the work performed by Sandia to design, build, evaluate, and commercialize CLU.

  8. Surface Environmental Surveillance Procedures Manual

    International Nuclear Information System (INIS)

    Hanf, Robert W.; Poston, Ted M.

    2000-01-01

    Shows and explains certain procedures needed for surface environmental surveillance. Hanford Site environmental surveillance is conducted by the Pacific Northwest National Laboratory (PNNL) for the U.S. Department of Energy (DOE) under the Surface Environmental Surveillance Project (SESP). The basic requirements for site surveillance are set fourth in DOE Order 5400.1, General Environmental Protection Program Requirements. Guidance for the SESP is provided in DOE Order 5484.1, Environmental Protection, Safety, and Health Protection Information Reporting Requirements and DOE Order 5400.5, Radiation Protection of the Public and Environment. Guidelines for environmental surveillance activities are provided in DOE/EH-0173T, Environmental Regulatory Guide for Radiological Effluent Monitoring and Environmental Surveillance. An environmental monitoring plan for the Hanford Site is outlined in DOE/RL 91-50 Rev. 2, Environmental Monitoring Plan, United States Department of Energy, Richland Operations Office. Environmental surveillance data are used in assessing the impact of current and past site operations on human health and the environment, demonstrating compliance with applicable local, state, and federal environmental regulations, and verifying the adequacy of containment and effluent controls. SESP sampling schedules are reviewed, revised, and published each calendar year in the Hanford Site Environmental Surveillance Master Sampling Schedule. Environmental samples are collected by SESP staff in accordance with the approved sample collection procedures documented in this manual. Personnel training requirements are documented in SESP-TP-01 Rev.2, Surface Environmental Surveillance Project Training Program.

  9. Nuclear forensics in law enforcement applications

    International Nuclear Information System (INIS)

    Grant, P.M.; Moody, K.J.; Hutcheon, I.D.; Phinney, D.L.; Whipple, R.E.; Haas, J.S.; Alcaraz, A.; Andrews, J.E.; Klunder, G.L.; Russo, R.E.

    1998-01-01

    Over the past several years, the Livermore Forensic Science Center has conducted analyses of nuclear-related samples in conjunction with domestic and international criminal investigations. Law enforcement officials have sought conventional and nuclear-forensic analyses of questioned specimens that have typically consisted of miscellaneous metal species or actinide salts. The investigated activities have included nuclear smuggling and the proliferation of alleged fissionable materials, nonradioactive hoaxes such as 'Red Mercury', and the interdiction of illegal laboratories engaged in methamphetamine synthesis. (author)

  10. Social Background, Cooperative Behavior, and Norm Enforcement

    OpenAIRE

    Kocher, Martin; Martinsson, Peter; Visser, Martine

    2009-01-01

    Studies have shown that there are differences in cooperative behavior across countries. Furthermore, differences in the use of and the reaction to the introduction of a norm enforcement mechanism have recently been documented in cross-cultural studies. We present data that prove that stark differences in both dimensions can exist even within the same town. For this end, we created a unique data set, based on one-shot public goods experiments conducted in South Africa. Most of our group differ...

  11. Digital Rights Enforcement for Pervasive Computing Applications

    OpenAIRE

    Dahlem, Dominik

    2005-01-01

    Increasingly, application software is expanding from the desktop into mobile application environments, such as handset devices and embedded systems which are more limited in resources and volatile in their network connectivity. An integrated architecture that can protect intellectual property for both types of environments should offer the promise of reduced software maintenance costs. Software licensing is an existing mechanism by which specific license agreements are enforced be...

  12. Volunteer Flying Organizations: Law Enforcements Untapped Resource

    Science.gov (United States)

    2016-12-01

    World War II, women in the United States turned manpower into woman power as housewives across the nation took manufacturing jobs building bombers...delineates responsibilities for the entire volunteer organization. Safety -first Flying Culture CHP CHP’s first- class safety program uses the most...civilian pilots to augment law enforcement based aviation operations. This thesis uses recommendations of the Public Safety Aviation Accreditation

  13. Sonoma Persistent Surveillance System

    Energy Technology Data Exchange (ETDEWEB)

    Pennington, D M

    2006-03-24

    Sonoma offers the first cost-effective, broad-area, high-resolution, real-time motion imagery system for surveillance applications. Sonoma is unique in its ability to provide continuous, real-time video imagery of an area the size of a small city with resolutions sufficient to track 8,000 moving objects in the field of view. At higher resolutions and over smaller areas, Sonoma can even track the movement of individual people. The visual impact of the data available from Sonoma is already causing a paradigm shift in the architecture and operation of other surveillance systems. Sonoma is expected to cost just one-tenth the price of comparably sized sensor systems. Cameras mounted on an airborne platform constantly monitor an area, feeding data to the ground for real-time analysis. Sonoma was designed to provide real-time data for actionable intelligence in situations such as monitoring traffic, special events, border security, and harbors. If a Sonoma system had been available in the aftermath of the Katrina and Rita hurricanes, emergency responders would have had real-time information on roads, water levels, and traffic conditions, perhaps saving many lives.

  14. Automatic indexing, compiling and classification

    International Nuclear Information System (INIS)

    Andreewsky, Alexandre; Fluhr, Christian.

    1975-06-01

    A review of the principles of automatic indexing, is followed by a comparison and summing-up of work by the authors and by a Soviet staff from the Moscou INFORM-ELECTRO Institute. The mathematical and linguistic problems of the automatic building of thesaurus and automatic classification are examined [fr

  15. Automatization of welding

    International Nuclear Information System (INIS)

    Iwabuchi, Masashi; Tomita, Jinji; Nishihara, Katsunori.

    1978-01-01

    Automatization of welding is one of the effective measures for securing high degree of quality of nuclear power equipment, as well as for correspondence to the environment at the site of plant. As the latest ones of the automatic welders practically used for welding of nuclear power apparatuses in factories of Toshiba and IHI, those for pipes and lining tanks are described here. The pipe welder performs the battering welding on the inside of pipe end as the so-called IGSCC countermeasure and the succeeding butt welding through the same controller. The lining tank welder is able to perform simultaneous welding of two parallel weld lines on a large thin plate lining tank. Both types of the welders are demonstrating excellent performance at the shops as well as at the plant site. (author)

  16. Automatic structural scene digitalization.

    Science.gov (United States)

    Tang, Rui; Wang, Yuhan; Cosker, Darren; Li, Wenbin

    2017-01-01

    In this paper, we present an automatic system for the analysis and labeling of structural scenes, floor plan drawings in Computer-aided Design (CAD) format. The proposed system applies a fusion strategy to detect and recognize various components of CAD floor plans, such as walls, doors, windows and other ambiguous assets. Technically, a general rule-based filter parsing method is fist adopted to extract effective information from the original floor plan. Then, an image-processing based recovery method is employed to correct information extracted in the first step. Our proposed method is fully automatic and real-time. Such analysis system provides high accuracy and is also evaluated on a public website that, on average, archives more than ten thousands effective uses per day and reaches a relatively high satisfaction rate.

  17. Automatic trend estimation

    CERN Document Server

    Vamos¸, C˘alin

    2013-01-01

    Our book introduces a method to evaluate the accuracy of trend estimation algorithms under conditions similar to those encountered in real time series processing. This method is based on Monte Carlo experiments with artificial time series numerically generated by an original algorithm. The second part of the book contains several automatic algorithms for trend estimation and time series partitioning. The source codes of the computer programs implementing these original automatic algorithms are given in the appendix and will be freely available on the web. The book contains clear statement of the conditions and the approximations under which the algorithms work, as well as the proper interpretation of their results. We illustrate the functioning of the analyzed algorithms by processing time series from astrophysics, finance, biophysics, and paleoclimatology. The numerical experiment method extensively used in our book is already in common use in computational and statistical physics.

  18. Automatic food decisions

    DEFF Research Database (Denmark)

    Mueller Loose, Simone

    Consumers' food decisions are to a large extent shaped by automatic processes, which are either internally directed through learned habits and routines or externally influenced by context factors and visual information triggers. Innovative research methods such as eye tracking, choice experiments...... and food diaries allow us to better understand the impact of unconscious processes on consumers' food choices. Simone Mueller Loose will provide an overview of recent research insights into the effects of habit and context on consumers' food choices....

  19. Automatic LOD selection

    OpenAIRE

    Forsman, Isabelle

    2017-01-01

    In this paper a method to automatically generate transition distances for LOD, improving image stability and performance is presented. Three different methods were tested all measuring the change between two level of details using the spatial frequency. The methods were implemented as an optional pre-processing step in order to determine the transition distances from multiple view directions. During run-time both view direction based selection and the furthest distance for each direction was ...

  20. 2012 Sexually Transmitted Diseases Surveillance

    Science.gov (United States)

    ... Data Appendix Tables A1 - A4 STD Surveillance Case Definitions Contributors Related Links STD Home STD Data & Statistics NCHHSTP Atlas Interactive STD Data - 1996-2013 STD Health Equity HIV/AIDS Surveillance & Statistics Follow STD STD on Twitter STD on Facebook File Formats Help: How do I view different ...

  1. GHOST: global hepatitis outbreak and surveillance technology.

    Science.gov (United States)

    Longmire, Atkinson G; Sims, Seth; Rytsareva, Inna; Campo, David S; Skums, Pavel; Dimitrova, Zoya; Ramachandran, Sumathi; Medrzycki, Magdalena; Thai, Hong; Ganova-Raeva, Lilia; Lin, Yulin; Punkova, Lili T; Sue, Amanda; Mirabito, Massimo; Wang, Silver; Tracy, Robin; Bolet, Victor; Sukalac, Thom; Lynberg, Chris; Khudyakov, Yury

    2017-12-06

    Hepatitis C is a major public health problem in the United States and worldwide. Outbreaks of hepatitis C virus (HCV) infections associated with unsafe injection practices, drug diversion, and other exposures to blood are difficult to detect and investigate. Effective HCV outbreak investigation requires comprehensive surveillance and robust case investigation. We previously developed and validated a methodology for the rapid and cost-effective identification of HCV transmission clusters. Global Hepatitis Outbreak and Surveillance Technology (GHOST) is a cloud-based system enabling users, regardless of computational expertise, to analyze and visualize transmission clusters in an independent, accurate and reproducible way. We present and explore performance of several GHOST implemented algorithms using next-generation sequencing data experimentally obtained from hypervariable region 1 of genetically related and unrelated HCV strains. GHOST processes data from an entire MiSeq run in approximately 3 h. A panel of seven specimens was used for preparation of six repeats of MiSeq libraries. Testing sequence data from these libraries by GHOST showed a consistent transmission linkage detection, testifying to high reproducibility of the system. Lack of linkage among genetically unrelated HCV strains and constant detection of genetic linkage between HCV strains from known transmission pairs and from follow-up specimens at different levels of MiSeq-read sampling indicate high specificity and sensitivity of GHOST in accurate detection of HCV transmission. GHOST enables automatic extraction of timely and relevant public health information suitable for guiding effective intervention measures. It is designed as a virtual diagnostic system intended for use in molecular surveillance and outbreak investigations rather than in research. The system produces accurate and reproducible information on HCV transmission clusters for all users, irrespective of their level of bioinformatics

  2. The surveillance error grid.

    Science.gov (United States)

    Klonoff, David C; Lias, Courtney; Vigersky, Robert; Clarke, William; Parkes, Joan Lee; Sacks, David B; Kirkman, M Sue; Kovatchev, Boris

    2014-07-01

    Currently used error grids for assessing clinical accuracy of blood glucose monitors are based on out-of-date medical practices. Error grids have not been widely embraced by regulatory agencies for clearance of monitors, but this type of tool could be useful for surveillance of the performance of cleared products. Diabetes Technology Society together with representatives from the Food and Drug Administration, the American Diabetes Association, the Endocrine Society, and the Association for the Advancement of Medical Instrumentation, and representatives of academia, industry, and government, have developed a new error grid, called the surveillance error grid (SEG) as a tool to assess the degree of clinical risk from inaccurate blood glucose (BG) monitors. A total of 206 diabetes clinicians were surveyed about the clinical risk of errors of measured BG levels by a monitor. The impact of such errors on 4 patient scenarios was surveyed. Each monitor/reference data pair was scored and color-coded on a graph per its average risk rating. Using modeled data representative of the accuracy of contemporary meters, the relationships between clinical risk and monitor error were calculated for the Clarke error grid (CEG), Parkes error grid (PEG), and SEG. SEG action boundaries were consistent across scenarios, regardless of whether the patient was type 1 or type 2 or using insulin or not. No significant differences were noted between responses of adult/pediatric or 4 types of clinicians. Although small specific differences in risk boundaries between US and non-US clinicians were noted, the panel felt they did not justify separate grids for these 2 types of clinicians. The data points of the SEG were classified in 15 zones according to their assigned level of risk, which allowed for comparisons with the classic CEG and PEG. Modeled glucose monitor data with realistic self-monitoring of blood glucose errors derived from meter testing experiments plotted on the SEG when compared to

  3. [Entomological surveillance in Mauritius].

    Science.gov (United States)

    Gopaul, R

    1995-01-01

    The entomological surveillance is an essential link in the fight against malaria in Mauritius. Because of the large number of malaria-infected travellers in Mauritius and the presence of the vector Anopheles arabiensis, the risk of local transmission is very real. The medical entomology division together with the malaria control unit and the health appointees exert a rigorous entomological surveillance of malaria. Field agents make entomological investigations of pilot villages and around the harbor and airport, where there have been cases of malaria, in addition to a few randomly chosen regions. All of the inhabited regions are accessible because of a good highway infrastructure, which enables a complete coverage for the entomological prospectives. Entomological controls are also conducted in the airplanes and the ships. All of the captured mosquitos and the harvested larva are transferred to a laboratory for identification, dissection or sensibility tests, etc. The larva of A. arabiensis have not yet developed resistance to Temephos and the adults are still sensitive to DDT. Thus, the larval habitats are treated with Temephos and DDT is sprayed in the residences where there have been native cases of malaria. The entomology division studies the ecology and the evolution of the larval habitats, as well as the impact of the anti-larval fight on the anophelene density. In addition to the chemical fight, a biological control is being tried with larva-eating fish such as Lebistes and Tilapia. In general, the anophelene density in Mauritius is low, but after the big summer rains, especially during a period of cyclones, there is a considerable increase of larval habitats and consequently a higher number of A. arabiensis. Therefore during this season, it is necessary to make an even more rigorous entomological surveillance. A. arabiensis has a strong exophile tendency even if it is endophage and exophage. This mosquito is zoophile, mostly towards cattle, and the

  4. Surveillance theory and its implications for law

    NARCIS (Netherlands)

    Timan, Tjerk; Galic, Masa; Koops, Bert-Jaap; Brownsword, Roger; Scotford, Eloise; Yeung, Karen

    2017-01-01

    This chapter provides an overview of key surveillance theories and their implications for law and regulation. It presents three stages of theories that characterise changes in thinking about surveillance in society and the disciplining, controlling, and entertaining functions of surveillance.

  5. Reporting and Surveillance for Norovirus Outbreaks

    Science.gov (United States)

    ... Vaccine Surveillance Network (NVSN) Foodborne Diseases Active Surveillance Network (FoodNet) National Outbreak Reporting System (NORS) Estimates of Foodborne Illness in the United States CDC's Vessel Sanitation Program CDC Feature: Surveillance for Norovirus Outbreaks Top ...

  6. Total process surveillance: (TOPS)

    International Nuclear Information System (INIS)

    Millar, J.H.P.

    1992-01-01

    A Total Process Surveillance system is under development which can provide, in real-time, additional process information from a limited number of raw measurement signals. This is achieved by using a robust model based observer to generate estimates of the process' internal states. The observer utilises the analytical reduncancy among a diverse range of transducers and can thus accommodate off-normal conditions which lead to transducer loss or damage. The modular hierarchical structure of the system enables the maximum amount of information to be assimilated from the available instrument signals no matter how diverse. This structure also constitutes a data reduction path thus reducing operator cognitive overload from a large number of varying, and possibly contradictory, raw plant signals. (orig.)

  7. Surveillance of the environmental radioactivity

    International Nuclear Information System (INIS)

    Schneider, Th.; Gitzinger, C.; Jaunet, P.; Eberbach, F.; Clavel, B.; Hemidy, P.Y.; Perrier, G.; Kiper, Ch.; Peres, J.M.; Josset, M.; Calvez, M.; Leclerc, M.; Leclerc, E.; Aubert, C.; Levelut, M.N.; Debayle, Ch.; Mayer, St.; Renaud, Ph.; Leprieur, F.; Petitfrere, M.; Catelinois, O.; Monfort, M.; Baron, Y.; Target, A.

    2008-01-01

    The objective of these days was to present the organisation of the surveillance of the environmental radioactivity and to allow an experience sharing and a dialog on this subject between the different actors of the radiation protection in france. The different presentations were as follow: evolution and stakes of the surveillance of radioactivity in environment; the part of the European commission, regulatory aspects; the implementation of the surveillance: the case of Germany; Strategy and logic of environmental surveillance around the EDF national centers of energy production; environmental surveillance: F.B.F.C. site of Romans on Isere; steps of the implementation 'analysis for release decree at the F.B.F.C./C.E.R.C.A. laboratory of Romans; I.R.S.N. and the environmental surveillance: situation and perspectives; the part of a non institutional actor, the citizenship surveillance done by A.C.R.O.; harmonization of sampling methods: the results of inter operators G.T. sampling; sustainable observatory of environment: data traceability and samples conservation; inter laboratories tests of radioactivity measurements; national network of environmental radioactivity measurement: laboratories agreements; the networks of environmental radioactivity telemetry: modernization positioning; programme of observation and surveillance of surface environment and installations of the H.A.-M.A.V.L. project (high activity and long life medium activity); Evolution of radionuclides concentration in environment and adaptation of measurements techniques to the surveillance needs; the national network of radioactivity measurement in environment; modes of data restoration of surveillance: the results of the Loire environment pilot action; method of sanitary impacts estimation in the area of ionizing radiations; the radiological impact of atmospheric nuclear tests in French Polynesia; validation of models by the measure; network of measurement and alert management of the atmospheric

  8. Secure surveillance videotapes

    International Nuclear Information System (INIS)

    Resnik, W.M.; Kadner, S.P.; Olsen, R.; Chitumbo, K.; Pepper, S.

    1995-01-01

    With assistance from the US Program for Technical Assistance to IAEA Safeguards (POTAS), Aquila Technologies Group developed the Tamper-Resistant Analog Media (TRAM-1000) system to provide standard VHS surveillance video tapes with an enhanced tamper-indicating capability. This project represents further implementation of the partnership approach in facilities including light water reactors with MOX facilities. These facilities use Uniplex Digiquad system video tapes. The partnership approach ensures that one organization can exchange the tapes in a machine without the presence of the other, without losing continuity of information. The TRAM-1000 system development project was accomplished in two stages. In the first stage of the project, the original system delivered to the IAEA, consists of three parts: (1) the tamper detection unit, (2) a specially augmented VHS video tape, and (3) an HP-95 reader. The tamper detection unit houses a VACOSS active fiber-optic seal and an electronic identification tag (E-TAG) reader. In the second stage of the project, the original TRAM-1000 was modified to its current design based on agency input. After delivery of the original TRAM-1000 system to the IAEA, it was reviewed by inspectors. The inspectors felt that the initial system's tape storage/transport method could be simplified. Rather than threading the fiber through the tape spindles, the inspectors suggested that the tape be placed in a bag capable of being sealed. Also, a more flexible fiber-optic cable was recommended. As a result of these suggestions, Aquila developed a tamper-proof bag specifically for holding a surveillance video tape and sealable with a VACOSS fiber optical seal

  9. An airport surface surveillance solution based on fusion algorithm

    Science.gov (United States)

    Liu, Jianliang; Xu, Yang; Liang, Xuelin; Yang, Yihuang

    2017-01-01

    In this paper, we propose an airport surface surveillance solution combined with Multilateration (MLAT) and Automatic Dependent Surveillance Broadcast (ADS-B). The moving target to be monitored is regarded as a linear stochastic hybrid system moving freely and each surveillance technology is simplified as a sensor with white Gaussian noise. The dynamic model of target and the observation model of sensor are established in this paper. The measurements of sensors are filtered properly by estimators to get the estimation results for current time. Then, we analysis the characteristics of two fusion solutions proposed, and decide to use the scheme based on sensor estimation fusion for our surveillance solution. In the proposed fusion algorithm, according to the output of estimators, the estimation error is quantified, and the fusion weight of each sensor is calculated. The two estimation results are fused with weights, and the position estimation of target is computed accurately. Finally the proposed solution and algorithm are validated by an illustrative target tracking simulation.

  10. Social Norms and the Enforcement of Laws

    OpenAIRE

    Daron Acemoglu; Matthew O. Jackson

    2014-01-01

    We examine the interplay between social norms and the enforcement of laws. Agents choose a behavior (e.g., tax evasion, production of low-quality products, corruption, substance abuse, etc.) and then are randomly matched with another agent. An agent's payoff decreases with the mismatch between her behavior and her partner's, as well as average behavior in society. A law is an upper bound (cap) on behavior and a law-breaker, when detected, pays a fine and has her behavior forced down to the le...

  11. Computational infrastructure for law enforcement. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Lades, M.; Kunz, C.; Strikos, I.

    1997-02-01

    This project planned to demonstrate the leverage of enhanced computational infrastructure for law enforcement by demonstrating the face recognition capability at LLNL. The project implemented a face finder module extending the segmentation capabilities of the current face recognition so it was capable of processing different image formats and sizes and create the pilot of a network-accessible image database for the demonstration of face recognition capabilities. The project was funded at $40k (2 man-months) for a feasibility study. It investigated several essential components of a networked face recognition system which could help identify, apprehend, and convict criminals.

  12. Powerful subjects of tax law enforcement

    OpenAIRE

    Igor Dementyev

    2017-01-01

    УДК 342.6The subject. Competence of government bodies and their officials in the sphere of application of the tax law is considered in the article.The purpose of research is to determine the ratio of tax enforcement and application of the tax law, as well as the relationship between the concepts “party of tax enforcement” and “participant of tax legal relations”.Main results and scope of their application. The circle of participants of tax legal relations is broader than the circle of parties...

  13. Radiological response training for law enforcement personnel

    International Nuclear Information System (INIS)

    Maixner, R.D.

    1983-01-01

    A specialized training course for Nevada's law enforcement personnel has been conducted by Reynolds Electrical and Engineering Co., Inc. for the US Department of Energy since February 1981. This course is designed for those persons who are first to arrive at a transportation accident scene. The course provides a basic understanding of radiation protection, the prevention of contamination spread from the accident site, use of radiation detection equipment, and decontamination procedures. The Department of Energy's Nevada Operations Office provides the training at no cost to Nevada agencies. Each agency selects its attendees. Details of the course are given

  14. The law enforcement agencies in Turkey

    International Nuclear Information System (INIS)

    Aygun, A.

    2001-01-01

    Full text: In Turkey, the law enforcement agencies are gathered into two main authorities. These are as below. 1. Under the Ministry of Interior: General Commander of Gendarmarie; General Directorate of National Police; General Commandery of Coast Guard; 2. Within the Undersecretariat of Customs there are two main service units to combat smuggling. These are: General Directorate of Customs Enforcement (GDCE) and General Directorate of Customs. The responsible areas of these administrations are legally as below: The region of Gendarmarie: It covers rural areas. In that region, Gendarmarie is responsible, inter alia, combating smuggling; The region of police: General Directorate of National Police has performed its tasks, one of which is to combat smuggling in the city areas; The region of Territorial Waters: Coast Guard is related authority in territorial water for, among other things, fighting smuggling. The region of Customs: General Directorate of Customs Enforcement fulfills in these regions as the authority and responsible law enforcement agent. The main difference between GDCE and other law enforcement agencies are: GDCE is the only Administration whose main aim is to struggle against smuggling; Generally, all units conduct their operations in their responsible region, however, if it is necessary, depending on the case, an operation can be performed jointly only in another region in cooperation with the relevant agent. In that context, as far as General Directorate of Customs Enforcement is concerned, fulfilling an operation in other regions is not a legal necessity. Any units of GDCE can seize and do operation all over Turkey by itself, without any regional limitations from legislation. Organizational Structure of the Customs Administration in Turkey - The principle functions of the General Directorate of Customs are: implementation of customs policies, collection of customs taxes, inspection of passengers and goods, also, investigation of smuggling

  15. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  16. Automatic quantitative renal scintigraphy

    International Nuclear Information System (INIS)

    Valeyre, J.; Deltour, G.; Delisle, M.J.; Bouchard, A.

    1976-01-01

    Renal scintigraphy data may be analyzed automatically by the use of a processing system coupled to an Anger camera (TRIDAC-MULTI 8 or CINE 200). The computing sequence is as follows: normalization of the images; background noise subtraction on both images; evaluation of mercury 197 uptake by the liver and spleen; calculation of the activity fractions on each kidney with respect to the injected dose, taking into account the kidney depth and the results referred to normal values; edition of the results. Automation minimizes the scattering parameters and by its simplification is a great asset in routine work [fr

  17. AUTOMATIC FREQUENCY CONTROL SYSTEM

    Science.gov (United States)

    Hansen, C.F.; Salisbury, J.D.

    1961-01-10

    A control is described for automatically matching the frequency of a resonant cavity to that of a driving oscillator. The driving oscillator is disconnected from the cavity and a secondary oscillator is actuated in which the cavity is the frequency determining element. A low frequency is mixed with the output of the driving oscillator and the resultant lower and upper sidebands are separately derived. The frequencies of the sidebands are compared with the secondary oscillator frequency. deriving a servo control signal to adjust a tuning element in the cavity and matching the cavity frequency to that of the driving oscillator. The driving oscillator may then be connected to the cavity.

  18. Automatic dipole subtraction

    International Nuclear Information System (INIS)

    Hasegawa, K.

    2008-01-01

    The Catani-Seymour dipole subtraction is a general procedure to treat infrared divergences in real emission processes at next-to-leading order in QCD. We automatized the procedure in a computer code. The code is useful especially for the processes with many parton legs. In this talk, we first explain the algorithm of the dipole subtraction and the whole structure of our code. After that we show the results for some processes where the infrared divergences of real emission processes are subtracted. (author)

  19. Automatic programmable air ozonizer

    International Nuclear Information System (INIS)

    Gubarev, S.P.; Klosovsky, A.V.; Opaleva, G.P.; Taran, V.S.; Zolototrubova, M.I.

    2015-01-01

    In this paper we describe a compact, economical, easy to manage auto air ozonator developed at the Institute of Plasma Physics of the NSC KIPT. It is designed for sanitation, disinfection of premises and cleaning the air from foreign odors. A distinctive feature of the developed device is the generation of a given concentration of ozone, approximately 0.7 maximum allowable concentration (MAC), and automatic maintenance of a specified level. This allows people to be inside the processed premises during operation. The microprocessor controller to control the operation of the ozonator was developed

  20. Fuzzy operation and real time surveillance of a nuclear reactor

    International Nuclear Information System (INIS)

    Si-Fodil, M.; Guely, F.; Siarry, P.; Tyran, J.L.

    1997-01-01

    The operating power of nuclear power plants needs to be modulated according to the thin evolutions of electric power demand. Two parameters are concerned by load following operations: the power axial disequilibrium and the position of control rods. This paper deals with the automation of the control of power axial disequilibrium using boration-dilution. An automatic system based on fuzzy logic is proposed which can be substituted to the expert operator who is in charge of this fastidious manual task. The management of water and boron flow rates are studied in details. A Graphic interface was designed for the real-time surveillance of the reactor. (J.S.)

  1. Commercial-vehicle enforcement: a guide for law-enforcement managers

    International Nuclear Information System (INIS)

    1987-01-01

    The purpose of the document is to provide a resource for law enforcement agencies to evaluate their programs, and to promote the uniform application of concepts already shown to be effective in other jurisdictions, which identify and address commercial-vehicle traffic safety needs

  2. REGULATION AND ENFORCEMENT OF COMPETITION POLICY

    Directory of Open Access Journals (Sweden)

    Liviana Andreea Niminet

    2014-12-01

    Full Text Available Competition policy starts by shaping a legislative framework. This is aimed to establish boundaries for conducting competition and also sets limits of licit and illicit demarcation, for competitive and anticompetitive practices. The Romanian Competition Law has a divalent approach and it aims to provide specific behavioral conditions in order to stimulate and protect free-market competition, with the ultimate goal of developing a balanced, efficient and competitive economy. Our country’s Competition policy is based on punishing the behavior. There are three such types of anti-competitive behavior, namely: agreements between undertakings, abuse of dominant position and mergers and other concentrations between undertakings. Recent Practice proved that this “enforcement-conduct-punishment” structure is not necessary the best way to address competition and it is high time for authorities to switch both regulation and enforcement of competition from the “classical perspective” towards concepts like “competition advocacy” and “soft power” and give competition policy a new, reshaped face.

  3. Sex Trafficking, Law Enforcement and Perpetrator Accountability

    Directory of Open Access Journals (Sweden)

    Holly Burkhalter

    2012-06-01

    Full Text Available In theory, everyone – except for criminals involved in their exploitation - agrees that children must not be in the sex industry and further, that those who prey on them must be prosecuted and punished. Virtually every country in the world has adopted national laws prohibiting the commercial sexual exploitation of children. International law is clear on this point, as well. Yet, when governments – and NGOs working with them – take action to extract children from commercial sex venues, common ground on protecting children from abuse can quickly erode with concerns about the efficacy of police intervention, the possibility of collateral harm to consenting adult sex workers or a decrease in access to HIV-prevention and related health services. The author argues that healing this divide must come through the reform of local police – and that, without the participation of law enforcement, there can be no long-term protection for children vulnerable to trafficking and related exploitation. In this article, human rights practitioner Holly Burkhalter argues that healing this divide must be accomplished through the reform of local police – and that human rights advocates, local governments and others seeking to combat trafficking cannot achieve long-term, sustainable protection for children without the involvement of law enforcement.

  4. Enforcement of evaluation by achievement analysis system

    International Nuclear Information System (INIS)

    Konishi, Yasutoshi; Sonoyama, Minoru; Suzuki, Atsushi

    2004-02-01

    Japan Nuclear Cycle Development Institute (JNC) has developed FBR achievement analysis system by the last fiscal year and has enforced the investigation of its functional expansion. That system is based on the AHP (Analytic Hierarchy Process) to do comparative evaluation multilaterally between proposed concepts of FBR cycle or between FBR cycle and other power source systems. This fiscal year, we enforced achievement analysis for 22 cases of proposed concepts of FBR cycle and between FBR cycle and other power source systems (LWR, thermal power generation, hydraulic power generation, etc.). The evaluation items related with technical feasibility and social acceptability were included in addition to those of economy, resource utilization effectiveness, environmental burden reduction, nuclear proliferation resistance and safety. Also, we investigated social changes that could happen in our country in the future, and we drew 4 future scenarios combining likely changes, then we investigated classifications of weight that seem to be adequate under each scenario with its calculation logic. In establishing points of view or structure of evaluation, and in the process of drawing scenarios, we collected comments from experts in OR (Operations Research) field and energy field. (author)

  5. Automatic personnel contamination monitor

    International Nuclear Information System (INIS)

    Lattin, Kenneth R.

    1978-01-01

    United Nuclear Industries, Inc. (UNI) has developed an automatic personnel contamination monitor (APCM), which uniquely combines the design features of both portal and hand and shoe monitors. In addition, this prototype system also has a number of new features, including: micro computer control and readout, nineteen large area gas flow detectors, real-time background compensation, self-checking for system failures, and card reader identification and control. UNI's experience in operating the Hanford N Reactor, located in Richland, Washington, has shown the necessity of automatically monitoring plant personnel for contamination after they have passed through the procedurally controlled radiation zones. This final check ensures that each radiation zone worker has been properly checked before leaving company controlled boundaries. Investigation of the commercially available portal and hand and shoe monitors indicated that they did not have the sensitivity or sophistication required for UNI's application, therefore, a development program was initiated, resulting in the subject monitor. Field testing shows good sensitivity to personnel contamination with the majority of alarms showing contaminants on clothing, face and head areas. In general, the APCM has sensitivity comparable to portal survey instrumentation. The inherit stand-in, walk-on feature of the APCM not only makes it easy to use, but makes it difficult to bypass. (author)

  6. Civil Enforcement Case Report Data Dictionary | ECHO | US ...

    Science.gov (United States)

    ECHO, Enforcement and Compliance History Online, provides compliance and enforcement information for approximately 800,000 EPA-regulated facilities nationwide. ECHO includes permit, inspection, violation, enforcement action, and penalty information about facilities regulated under the Clean Air Act (CAA) Stationary Source Program, Clean Water Act (CWA) National Pollutant Elimination Discharge System (NPDES), and/or Resource Conservation and Recovery Act (RCRA). Information also is provided on surrounding demographics when available.

  7. Sharing Powers Within Exclusive Competences: Rethinking EU Antitrust Law Enforcement

    OpenAIRE

    Van Cleynenbreugel, Pieter

    2016-01-01

    Although the establishment of competition rules forms part of the EU’s exclusive competences, the application and enforcement of those rules has always been shared consistently between the EU and its Member States.The sharing of enforcement powers is conceptualised traditionally as a delegation of the exercise of exclusively conferred competences. The Court of Justice of the European Union’s case law in the context of EU antitrust law enforcement nevertheless raises profound questions as to t...

  8. Labor Law Enforcement in California, 1970-2000

    OpenAIRE

    Bar-Cohen, Limor; Carrillo, Deana Milam

    2002-01-01

    This chapter examines the record of two state agencies within the California Department of Industrial Relations, the Division of Labor Standards Enforcement (DLSE) and the California Occupational Safety and Health Program (Cal/OSHA), over the 1970-2000 period. Although the data available on the performance of these agencies are severely limited - in most cases consisting only of enforcement activity measures, without any valid measures of enforcement outcomes, it is possible to draw some conc...

  9. NRC Enforcement Policy Review, July 1995-July 1997

    International Nuclear Information System (INIS)

    Lieberman, J.; Pedersen, R.M.

    1998-04-01

    On June 30, 1995, the Nuclear Regulatory Commission (NRC) issued a complete revision of its General Statement of Policy and Procedure for Enforcement Action (Enforcement Policy) (60 FR 34381). In approving the 1995 revision to the Enforcement Policy, the Commission directed the staff to perform a review of its implementation of the Policy after approximately 2 years of experience and to consider public comments. This report represents the results of that review

  10. Automatic sets and Delone sets

    International Nuclear Information System (INIS)

    Barbe, A; Haeseler, F von

    2004-01-01

    Automatic sets D part of Z m are characterized by having a finite number of decimations. They are equivalently generated by fixed points of certain substitution systems, or by certain finite automata. As examples, two-dimensional versions of the Thue-Morse, Baum-Sweet, Rudin-Shapiro and paperfolding sequences are presented. We give a necessary and sufficient condition for an automatic set D part of Z m to be a Delone set in R m . The result is then extended to automatic sets that are defined as fixed points of certain substitutions. The morphology of automatic sets is discussed by means of examples

  11. Automatic Modulation Recognition by Support Vector Machines Using Wavelet Kernel

    Energy Technology Data Exchange (ETDEWEB)

    Feng, X Z; Yang, J; Luo, F L; Chen, J Y; Zhong, X P [College of Mechatronic Engineering and Automation, National University of Defense Technology, Changsha (China)

    2006-10-15

    Automatic modulation identification plays a significant role in electronic warfare, electronic surveillance systems and electronic counter measure. The task of modulation recognition of communication signals is to determine the modulation type and signal parameters. In fact, automatic modulation identification can be range to an application of pattern recognition in communication field. The support vector machines (SVM) is a new universal learning machine which is widely used in the fields of pattern recognition, regression estimation and probability density. In this paper, a new method using wavelet kernel function was proposed, which maps the input vector xi into a high dimensional feature space F. In this feature space F, we can construct the optimal hyperplane that realizes the maximal margin in this space. That is to say, we can use SVM to classify the communication signals into two groups, namely analogue modulated signals and digitally modulated signals. In addition, computer simulation results are given at last, which show good performance of the method.

  12. Automatic Modulation Recognition by Support Vector Machines Using Wavelet Kernel

    International Nuclear Information System (INIS)

    Feng, X Z; Yang, J; Luo, F L; Chen, J Y; Zhong, X P

    2006-01-01

    Automatic modulation identification plays a significant role in electronic warfare, electronic surveillance systems and electronic counter measure. The task of modulation recognition of communication signals is to determine the modulation type and signal parameters. In fact, automatic modulation identification can be range to an application of pattern recognition in communication field. The support vector machines (SVM) is a new universal learning machine which is widely used in the fields of pattern recognition, regression estimation and probability density. In this paper, a new method using wavelet kernel function was proposed, which maps the input vector xi into a high dimensional feature space F. In this feature space F, we can construct the optimal hyperplane that realizes the maximal margin in this space. That is to say, we can use SVM to classify the communication signals into two groups, namely analogue modulated signals and digitally modulated signals. In addition, computer simulation results are given at last, which show good performance of the method

  13. Automatic road traffic safety management system in urban areas

    Directory of Open Access Journals (Sweden)

    Oskarbski Jacek

    2017-01-01

    Full Text Available Traffic incidents and accidents contribute to decreasing levels of transport system reliability and safety. Traffic management and emergency systems on the road, using, among others, automatic detection, video surveillance, communication technologies and institutional solutions improve the organization of the work of various departments involved in traffic and safety management. Automation of incident management helps to reduce the time of a rescue operation as well as of the normalization of the flow of traffic after completion of a rescue operation, which also affects the reduction of the risk of secondary accidents and contributes to reducing their severity. The paper presents the possibility of including city traffic departments in the process of incident management. The results of research on the automatic incident detection in cities are also presented.

  14. Automatic Emotional State Detection using Facial Expression Dynamic in Videos

    Directory of Open Access Journals (Sweden)

    Hongying Meng

    2014-11-01

    Full Text Available In this paper, an automatic emotion detection system is built for a computer or machine to detect the emotional state from facial expressions in human computer communication. Firstly, dynamic motion features are extracted from facial expression videos and then advanced machine learning methods for classification and regression are used to predict the emotional states. The system is evaluated on two publicly available datasets, i.e. GEMEP_FERA and AVEC2013, and satisfied performances are achieved in comparison with the baseline results provided. With this emotional state detection capability, a machine can read the facial expression of its user automatically. This technique can be integrated into applications such as smart robots, interactive games and smart surveillance systems.

  15. Radioisotopic Thermoelectric Generator (RTG) Surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Mulford, Roberta Nancy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-29

    This lecture discusses stockpile stewardship efforts and the role surveillance plays in the process. Performance of the RTGs is described, and the question of the absence of anticipated He is addressed.

  16. Surveillance of nuclear power reactors

    International Nuclear Information System (INIS)

    Marini, J.

    1983-01-01

    Surveillance of nuclear power reactors is now a necessity imposed by such regulatory documents as USNRC Regulatory Guide 1.133. In addition to regulatory requirements, however, nuclear reactor surveillance offers plant operators significant economic advantages insofar as a single day's outage is very costly. The economic worth of a reactor surveillance system can be stated in terms of the improved plant availability provided through its capability to detect incidents before they occur and cause serious damage. Furthermore, the TMI accident has demonstrated the need for monitoring certain components to provide operators with clear information on their functional status. In response to the above considerations, Framatome has developed a line of products which includes: pressure vessel leakage detection systems, loose part detection systems, component vibration monitoring systems, and, crack detection and monitoring systems. Some of the surveillance systems developed by Framatome are described in this paper

  17. Youth Risk Behavior Surveillance System

    Science.gov (United States)

    ... Youth Risk Behavior Surveillance System (YRBSS) monitors six types of health-risk behaviors that contribute to the leading causes of death and disability among youth and adults, including— Behaviors that contribute ...

  18. Deterring Spoilers: Peace Enforcement Operations and Political Settlements to Conflict

    National Research Council Canada - National Science Library

    Manseau, Nicole C

    2008-01-01

    .... In Somalia, Operation Restore Hope provided a strong peace enforcement operation, but ultimately failed to deter spoilers to United Nations negotiations for a political settlement to the conflict...

  19. Understanding Law Enforcement Support to National Security Problems and Prospects

    National Research Council Canada - National Science Library

    Davies, Jeffrey S

    2008-01-01

    This paper explores law enforcement as an element of national power, defines its contributions, limitations, and challenges, and provides recommendations to maximize interagency competencies and unity...

  20. Enforcing Transferable Permit Systems in the Presence of Market Power

    International Nuclear Information System (INIS)

    Chavez, C.A.; Stanlund, J.K.

    2003-01-01

    We derive an enforcement strategy for a transferable permit system in the presence of market power that achieves complete compliance in a cost-effective manner. We show that the presence of a firm with market influence makes designing an enforcement strategy more difficult than enforcing a perfectly competitive system. We also re-consider the suggestion that a firm with market influence should be allocated permits so that it chooses to not participate in the permit market. When enforcement and its costs are taken into account, that suggestion does not hold except in a very special case

  1. Health surveillance - myth and reality

    International Nuclear Information System (INIS)

    Sharp, C.

    1998-01-01

    This paper discusses the principles, health benefit and cost-effectiveness of health surveillance in the occupational setting, which apply to exposure to ionising radiations in the same manner as to other hazards in the workplace. It highlights the techniques for undertaking health surveillance, discusses their relative advantages and disadvantages and illustrates these in relation to specific hazards. The responsibilities of the medical staff and of the worker are also discussed. (author)

  2. Surface Environmental Surveillance Procedures Manual

    Energy Technology Data Exchange (ETDEWEB)

    RW Hanf; TM Poston

    2000-09-20

    Environmental surveillance data are used in assessing the impact of current and past site operations on human health and the environment, demonstrating compliance with applicable local, state, and federal environmental regulations, and verifying the adequacy of containment and effluent controls. SESP sampling schedules are reviewed, revised, and published each calendar year in the Hanford Site Environmental Surveillance Master Sampling Schedule. Environmental samples are collected by SESP staff in accordance with the approved sample collection procedures documented in this manual.

  3. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...

  4. Automatic identification in mining

    Energy Technology Data Exchange (ETDEWEB)

    Puckett, D; Patrick, C [Mine Computers and Electronics Inc., Morehead, KY (United States)

    1998-06-01

    The feasibility of monitoring the locations and vital statistics of equipment and personnel in surface and underground mining operations has increased with advancements in radio frequency identification (RFID) technology. This paper addresses the use of RFID technology, which is relatively new to the mining industry, to track surface equipment in mine pits, loading points and processing facilities. Specific applications are discussed, including both simplified and complex truck tracking systems and an automatic pit ticket system. This paper concludes with a discussion of the future possibilities of using RFID technology in mining including monitoring heart and respiration rates, body temperatures and exertion levels; monitoring repetitious movements for the study of work habits; and logging air quality via personnel sensors. 10 refs., 5 figs.

  5. Automatic quantitative metallography

    International Nuclear Information System (INIS)

    Barcelos, E.J.B.V.; Ambrozio Filho, F.; Cunha, R.C.

    1976-01-01

    The quantitative determination of metallographic parameters is analysed through the description of Micro-Videomat automatic image analysis system and volumetric percentage of perlite in nodular cast irons, porosity and average grain size in high-density sintered pellets of UO 2 , and grain size of ferritic steel. Techniques adopted are described and results obtained are compared with the corresponding ones by the direct counting process: counting of systematic points (grid) to measure volume and intersections method, by utilizing a circunference of known radius for the average grain size. The adopted technique for nodular cast iron resulted from the small difference of optical reflectivity of graphite and perlite. Porosity evaluation of sintered UO 2 pellets is also analyzed [pt

  6. Semi-automatic fluoroscope

    International Nuclear Information System (INIS)

    Tarpley, M.W.

    1976-10-01

    Extruded aluminum-clad uranium-aluminum alloy fuel tubes must pass many quality control tests before irradiation in Savannah River Plant nuclear reactors. Nondestructive test equipment has been built to automatically detect high and low density areas in the fuel tubes using x-ray absorption techniques with a video analysis system. The equipment detects areas as small as 0.060-in. dia with 2 percent penetrameter sensitivity. These areas are graded as to size and density by an operator using electronic gages. Video image enhancement techniques permit inspection of ribbed cylindrical tubes and make possible the testing of areas under the ribs. Operation of the testing machine, the special low light level television camera, and analysis and enhancement techniques are discussed

  7. Automatic surveying techniques

    International Nuclear Information System (INIS)

    Sah, R.

    1976-01-01

    In order to investigate the feasibility of automatic surveying methods in a more systematic manner, the PEP organization signed a contract in late 1975 for TRW Systems Group to undertake a feasibility study. The completion of this study resulted in TRW Report 6452.10-75-101, dated December 29, 1975, which was largely devoted to an analysis of a survey system based on an Inertial Navigation System. This PEP note is a review and, in some instances, an extension of that TRW report. A second survey system which employed an ''Image Processing System'' was also considered by TRW, and it will be reviewed in the last section of this note. 5 refs., 5 figs., 3 tabs

  8. AUTOMATIC ARCHITECTURAL STYLE RECOGNITION

    Directory of Open Access Journals (Sweden)

    M. Mathias

    2012-09-01

    Full Text Available Procedural modeling has proven to be a very valuable tool in the field of architecture. In the last few years, research has soared to automatically create procedural models from images. However, current algorithms for this process of inverse procedural modeling rely on the assumption that the building style is known. So far, the determination of the building style has remained a manual task. In this paper, we propose an algorithm which automates this process through classification of architectural styles from facade images. Our classifier first identifies the images containing buildings, then separates individual facades within an image and determines the building style. This information could then be used to initialize the building reconstruction process. We have trained our classifier to distinguish between several distinct architectural styles, namely Flemish Renaissance, Haussmannian and Neoclassical. Finally, we demonstrate our approach on various street-side images.

  9. System for automatic detection of lung nodules exhibiting growth

    Science.gov (United States)

    Novak, Carol L.; Shen, Hong; Odry, Benjamin L.; Ko, Jane P.; Naidich, David P.

    2004-05-01

    Lung nodules that exhibit growth over time are considered highly suspicious for malignancy. We present a completely automated system for detection of growing lung nodules, using initial and follow-up multi-slice CT studies. The system begins with automatic detection of lung nodules in the later CT study, generating a preliminary list of candidate nodules. Next an automatic system for registering locations in two studies matches each candidate in the later study to its corresponding position in the earlier study. Then a method for automatic segmentation of lung nodules is applied to each candidate and its matching location, and the computed volumes are compared. The output of the system is a list of nodule candidates that are new or have exhibited volumetric growth since the previous scan. In a preliminary test of 10 patients examined by two radiologists, the automatic system identified 18 candidates as growing nodules. 7 (39%) of these corresponded to validated nodules or other focal abnormalities that exhibited growth. 4 of the 7 true detections had not been identified by either of the radiologists during their initial examinations of the studies. This technique represents a powerful method of surveillance that may reduce the probability of missing subtle or early malignant disease.

  10. Dynamic Enforcement of the Strict Integrity Policy

    Institute of Scientific and Technical Information of China (English)

    ZHANGXiangfeng; LIANGHongliang; SUNYufang

    2005-01-01

    The Strict integrity policy (SIP) in Biba's integrity model is widely used in protecting information integrity, but the static integrity labels of both subjects and objects increase compatibility cost of applications and might prevent some operations that are indeed harmless.In order to improve compatibility, Dynamic enforcement of the Strict integrity policy (DESIP) is put forward. The current integrity label attribute of a subject in SIP is replaced with two attributes in DESIP, which are used to confine dynamically the range of objects a subject could be allowed to access. The new rules of access control in DESIP are given for each kind of access mode (observe,modify and invoke) together with the proofs of their valid-ity. Comparison between SIP and DESIP shows that after a sequence of operations, a subject controlled by DESIP tends to behave in a similar way as it is controlled by SIP and DESIP is more compatible than SIP.

  11. [The protection of health in law enforcement].

    Science.gov (United States)

    Pira, Enrico

    2014-01-01

    Herein the question of health protection/safety and well being in the Law Enforcement is introduced and includes examples of some particular risk conditions that may be multiple and polymorphous. Not only the "traditional" sources are involved in these risks, like chemical, physical and biological agents, but other issues emerge in these "new scenarios" connected to risk factors involving organization and/or psychosocial elements. From this, we may deduce that there is a specific need for all the operators involved in prevention/care in this particular sector to be well versed on the highest possible updated specialized knowledge along with having a complete and thorough mastery of the best practices in Occupational Medicine to face this task in the correct manner:

  12. Elementary Surveillance (ELS) and Enhanced Surveillance (EHS) Validation via Mode S Secondary Radar Surveillance

    National Research Council Canada - National Science Library

    Grappel, Robert D; Harris, Garrett S; Kozar, Mark J; Wiken, Randall T

    2008-01-01

    ...) and Enhanced Surveillance (ERS) data link applications. The intended audience for this report is an engineering staff assigned the task of implementing a monitoring system used to determine ELS and EHS compliance...

  13. [Assessment of psychological conditions for the use of firearms in law enforcement].

    Science.gov (United States)

    Vilardell Molas, Jordi; Martí Agustí, Gabriel; Solé i Sanosa, M Angels

    2014-03-01

    To handle firearms safely, an individual needs to be in sound psychological conditions. This point is especially relevant in law enforcement, given that this group is likely to experience situations where there is a reasonably severe risk to life, physical integrity and that of third parties. These conditions cause high levels of stress and become a significant source of psychological strain. The assessment of these psychological conditions in law enforcement must stay ahead of this strain and should act preventively, establishing surveillance that is the product of a consensus between the needs of professionals and organizations. This evaluation should be conducted by technical specialists who understand and know the occupational reality of these professionals. A good assessment methodology starts with the need to discover the basic areas that need exploring, the ideal procedure for assessing these issues and the criteria that determine the aptitude (or lack thereof) for handling firearms. Once these goals have been established, we can be assured that the assessment will follow a set of principles that will give it homogeneity, effectiveness and efficiency. This type of assessment will help accomplish the mission that these security professionals are entrusted to by law, which is to protect the free exercise of rights and freedoms and ensure citizen safety. Copyright © 2014 Elsevier España, S.L. All rights reserved.

  14. Organizational safety climate and supervisor safety enforcement: Multilevel explorations of the causes of accident underreporting.

    Science.gov (United States)

    Probst, Tahira M

    2015-11-01

    According to national surveillance statistics, over 3 million employees are injured each year; yet, research indicates that these may be substantial underestimates of the true prevalence. The purpose of the current project was to empirically test the hypothesis that organizational safety climate and transactional supervisor safety leadership would predict the extent to which accidents go unreported by employees. Using hierarchical linear modeling and survey data collected from 1,238 employees in 33 organizations, employee-level supervisor safety enforcement behaviors (and to a less consistent extent, organizational-level safety climate) predicted employee accident underreporting. There was also a significant cross-level interaction, such that the effect of supervisor enforcement on underreporting was attenuated in organizations with a positive safety climate. These results may benefit human resources and safety professionals by pinpointing methods of increasing the accuracy of accident reporting, reducing actual safety incidents, and reducing the costs to individuals and organizations that result from underreporting. (c) 2015 APA, all rights reserved).

  15. Critical Surveillance Studies in the Information Society

    Directory of Open Access Journals (Sweden)

    Thomas Allmer

    2011-11-01

    Full Text Available The overall aim of this paper is to clarify how we can theorize and systemize economic surveillance. Surveillance studies scholars like David Lyon stress that economic surveillance such as monitoring consumers or the workplace are central aspects of surveillance societies. The approach that is advanced in this work recognizes the importance of the role of the economy in contemporary surveillance societies. The paper at hand constructs theoretically founded typologies in order to systemize the existing literature of surveillance studies and to analyze examples of surveillance. Therefore, it mainly is a theoretical approach combined with illustrative examples. This contribution contains a systematic discussion of the state of the art of surveillance and clarifies how different notions treat economic aspects of surveillance. In this work it is argued that the existing literature is insufficient for studying economic surveillance. In contrast, a typology of surveillance in the modern economy, which is based on foundations of a political economy approach, allows providing a systematic analysis of economic surveillance on the basis of current developments on the Internet. Finally, some political recommendations are drawn in order to overcome economic surveillance. This contribution can be fruitful for scholars who want to undertake a systematic analysis of surveillance in the modern economy and who want to study the field of surveillance critically.

  16. Automatic remote communication system

    International Nuclear Information System (INIS)

    Yamamoto, Yoichi

    1990-05-01

    The Upgraded RECOVER (Remote Continual Verification) system is a communication system for remote continual verification of security and safeguards status of nuclear material in principal nuclear facilities. The system is composed of a command center and facility sub-systems. A command center is a mini-computer system to process C/S (Containment and Surveillance) status data. Facility sub-systems consists of OSM (On-site Multiplexer), MU (Monitoring Unit) and C/S sensor. The system uses public telephone network for communication between a command center and facility sub-systems, and it encrypts communication data to prevent falsification and wiretapping by unauthorized persons. This system inherits the design principle of RECOVER system that was tested by IAEA before. We upgraded and expanded its capabilities more than those of RECOVER. The development of this system began in 1983, and it finished in 1987. Performance tests of the system were carried out since 1987. It showed a farely good result with some indications which should need further improvements. The Upgraded RECOVER system provides timely information about the status of C/S systems, which could contribute to the reduction of inspection effort and the improvement of cost performance. (author)

  17. 48 CFR 822.406 - Administration and enforcement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Administration and enforcement. 822.406 Section 822.406 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS... Involving Construction 822.406 Administration and enforcement. ...

  18. 40 CFR 205.171 - Selective enforcement auditing (SEA) requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Selective enforcement auditing (SEA) requirements. 205.171 Section 205.171 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... § 205.171 Selective enforcement auditing (SEA) requirements. ...

  19. Improving Law Enforcement Cross Cultural Competencies through Continued Education

    Science.gov (United States)

    Sereni-Massinger, Christine; Wood, Nancy

    2016-01-01

    Over the last thirty years Community Oriented Policing (COP) has spawned advancements in creating community partnerships with law enforcement agencies. Agencies that focus on such partnerships have served to reduce crime and resolve conflict. However, community opinions towards law enforcement have become increasingly negative due to recent civil…

  20. 49 CFR 1542.215 - Law enforcement support.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement support. 1542.215 Section 1542.215..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.215 Law... program under § 1542.103(a) or (b) must provide: (1) Law enforcement personnel in the number and manner...

  1. 29 CFR 1614.503 - Enforcement of final Commission decisions.

    Science.gov (United States)

    2010-07-01

    ... ADEA, the Equal Pay Act or the Rehabilitation Act and to seek judicial review of the agency's refusal... 1614.503 Labor Regulations Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION FEDERAL SECTOR EQUAL EMPLOYMENT OPPORTUNITY Remedies and Enforcement § 1614.503 Enforcement of final...

  2. 12 CFR 268.503 - Enforcement of final EEOC decisions.

    Science.gov (United States)

    2010-01-01

    ... the decision pursuant to title VII, the ADEA, the Equal Pay Act or the Rehabilitation Act and to seek... RESERVE SYSTEM RULES REGARDING EQUAL OPPORTUNITY Remedies and Enforcement § 268.503 Enforcement of final... Procedures Act, 5 U.S.C. 701 et seq., and the mandamus statute, 28 U.S.C. 1361, or to commence de novo...

  3. 40 CFR 63.313 - Implementation and enforcement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Implementation and enforcement. 63.313 Section 63.313 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Standards for Coke Oven Batteries § 63.313 Implementation and enforcement. (a) This subpart can be...

  4. The Convention on the Recognition and Enforcement of Foreign ...

    African Journals Online (AJOL)

    The Convention on the Recognition and Enforcement of Foreign Arbitral Awards, often referred to as the New York Convention, has established itself as a regulatory and enforcement instrument which is crucial to international trade. This is evident from the fact that more than 150 countries have so far ratified the convention.

  5. The Cost of Enforcing Building Energy Codes: Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Alison [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Vine, Ed [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Price, Sarah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Sturges, Andrew [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Rosenquist, Greg [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-04-01

    The purpose of this literature review is to summarize key findings regarding the costs associated with enforcing building energy code compliance—primarily focusing on costs borne by local government. The review takes into consideration over 150 documents that discuss, to some extent, code enforcement. This review emphasizes those documents that specifically focus on costs associated with energy code enforcement. Given the low rates of building energy code compliance that have been reported in existing studies, as well as the many barriers to both energy code compliance and enforcement, this study seeks to identify the costs of initiatives to improve compliance and enforcement. Costs are reported primarily as presented in the original source. Some costs are given on a per home or per building basis, and others are provided for jurisdictions of a certain size. This literature review gives an overview of state-based compliance rates, barriers to code enforcement, and U.S. Department of Energy (DOE) and key stakeholder involvement in improving compliance with building energy codes. In addition, the processes and costs associated with compliance and enforcement of building energy codes are presented. The second phase of this study, which will be presented in a different report, will consist of surveying 34 experts in the building industry at the national and state or local levels in order to obtain additional cost information, building on the findings from the first phase, as well as recommendations for where to most effectively spend money on compliance and enforcement.

  6. 19 CFR Appendix A to Part 210 - Adjudication and Enforcement

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Adjudication and Enforcement A Appendix A to Part 210 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE ADJUDICATION AND ENFORCEMENT Pt. 210, App. A Appendix A to Part 210—Adjudication and...

  7. The effect of enforcement on speed behaviour : a literature review.

    NARCIS (Netherlands)

    Oei, H.-l.

    1998-01-01

    The objective of this literature study is to give an overview of research on speed enforcement and its effect on speed behaviour and safety. This study will be used to find new strategies and tactics to enhance the efficiency and effectiveness of speed enforcement by the police in terms of behaviour

  8. 28 CFR 0.29j - Law enforcement authority.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Law enforcement authority. 0.29j Section 0.29j Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE 4-Office of the Inspector General § 0.29j Law enforcement authority. Subject to guidelines promulgated by the Attorney General, Special Agents of the Offic...

  9. 49 CFR 1542.221 - Records of law enforcement response.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Records of law enforcement response. 1542.221 Section 1542.221 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.221 Records of law enforcement...

  10. Randomized Trial of Law Enforcement Training on Autism Spectrum Disorders

    Science.gov (United States)

    Teagardin, Jill; Dixon, Dennis R.; Smith, Marlena N.; Granpeesheh, Doreen

    2012-01-01

    The core symptoms of autism spectrum disorders (ASD) are likely to affect interactions between law enforcement officers and persons with ASD. If law enforcement officers are not trained to identify and appropriately respond to persons with ASD, it is possible that officers may exacerbate a situation, resulting in unnecessary trauma, injury, or…

  11. 36 CFR 1270.50 - Consultation with law enforcement agencies.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Consultation with law enforcement agencies. 1270.50 Section 1270.50 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PRESIDENTIAL RECORDS PRESIDENTIAL RECORDS Presidential Records Compiled for Law Enforcement Purposes § 1270.50 Consultation with...

  12. Constitutional Basis for the Enforcement of ''Executive'' Policies that ...

    African Journals Online (AJOL)

    Although "executive" policies remain an important governance tool, there appears to be confusion on the status and possible basis for their judicial enforcement in South Africa. The aim of this article is to critically reflect on the status and possible constitutional basis for the enforceability of "executive" policies that give effect ...

  13. Legal Enforcement of Social Rights: Enabling Conditions and Impact Assessment

    NARCIS (Netherlands)

    S. Gloppen (Siri)

    2009-01-01

    textabstractThis article commends the concise and useful analysis of courts and the legal enforcement of economic, social and cultural rights given in Christian Courtis’ book, Courts and the Legal Enforcement of Economic, Social and Cultural Rights: Comparative Experiences of Justiciability. Yet, in

  14. Enforcing Competition Rules in South Africa: Thieves at the Dinner ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2013-03-01

    Mar 1, 2013 ... Describing and analyzing competition law in South Africa, this book promotes a deeper understanding of the development of this foundational economic law within its specific national, social and economic context. Enforcing Competition Rules in South Africa draws strongly on case law and enforcement ...

  15. A Case for Criminal Enforcement of Federal Environmental Laws

    Science.gov (United States)

    1989-02-19

    enforcement scheme can actually contribute to improper disposal. Szasz , Corporations. Organized Crime. and the Disposal of Hazardous Waste: An...the Syndicate Control Mystiaue, 1 Nat’l Envtl. Enforcement J. 3 (Dec. 1986). 150. See Szasz , supra note 79. 151. United States v. MacDonald & Watson

  16. When is public enforcement of insider trading regulations effective?

    NARCIS (Netherlands)

    Wielhouwer, J.L.

    2013-01-01

    In this paper we investigate when public enforcement of insider trading regulations reduces the amount of insider trading. We model a game between a potentially self-interested regulator enforcing insider trading laws and a trader who may be trading on inside information. We show that equilibrium

  17. 12 CFR 403.11 - Enforcement and investigation procedures.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Enforcement and investigation procedures. 403.11 Section 403.11 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES CLASSIFICATION, DECLASSIFICATION, AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION § 403.11 Enforcement and investigation...

  18. 25 CFR 11.909 - Law enforcement records.

    Science.gov (United States)

    2010-04-01

    ... BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Children's Court § 11.909 Law enforcement records. (a) Law enforcement records and files... minor's parents or guardian, the presenting officer, or others by order of the children's court. ...

  19. 24 CFR 125.201 - Administrative Enforcement Initiative.

    Science.gov (United States)

    2010-04-01

    ... Initiative. 125.201 Section 125.201 Housing and Urban Development Regulations Relating to Housing and Urban... FAIR HOUSING FAIR HOUSING INITIATIVES PROGRAM § 125.201 Administrative Enforcement Initiative. The Administrative Enforcement Initiative provides funding to State and local fair housing agencies administering...

  20. Practical Run-Time Norm Enforcement with Bounded Lookahead

    NARCIS (Netherlands)

    Alechina, Natasha; Bulling, Nils; Dastani, Mehdi; Logan, Brian

    2015-01-01

    Norms have been widely proposed as a means of coordinating and controlling the behaviour of agents in a multi-agent system. A key challenge in normative MAS is norm enforcement: how and when to restrict the agents’ behaviour in order to obtain a desirable outcome? Even if a norm can be enforced

  1. Decentralized enforcement, sequential bargaining, and the clean development mechanism

    Energy Technology Data Exchange (ETDEWEB)

    Hovi, Jon

    2001-07-01

    While there is a vast literature both on international bargaining and on how international agreements can be enforced, very little work has been done on how bargaining and enforcement interact. An important exception is Fearon (1998), who models international cooperation as a two-stage process in which the bargaining process is constrained by a need for decentralized enforcement (meaning that the agreement must be enforced by the parties themselves rather than a third party, such as a court). Using the Clean Development Mechanism as an example, the present paper proposes a different model of this kind of interaction. The model follows Fearon's in so far as we both use the infinitely repeated Prisoners' Dilemma to capture the enforcement phase of the game. However, while Fearon depicts the bargaining stage as a War of Attrition, the present model sees that stage as a sequential bargaining game of the Staahl-Rubinstein type. The implications of the present model are compared both to those of the Staahl-Rubinstein model and to those of the Fearon model. A surprising conclusion is that a need for decentralized enforcement tends to make the bargaining outcome more symmetrical than otherwise. Thus, the impact of bargaining power is actually smaller when the resulting agreement must be enforced by the parties themselves than it is if enforcement is taken care of by a third party. (author)

  2. Attitude of Nigerian courts to the enforcement of foreign judgments ...

    African Journals Online (AJOL)

    ... serious need of reform. The study therefore called on the Nigerian Minister of Justice to do the needful so that the position of the law as it pertains to the enforcement of foreign judgment in Nigeria will be well settled and devoid of ambiguity. Keywords: Foreign Judgment, Enforcement, Registration, Recognition, Commerce ...

  3. 15 CFR 922.103 - Management and enforcement.

    Science.gov (United States)

    2010-01-01

    ... provisions of any grant or cooperative agreement. NOAA may act to deputize enforcement agents of the American Samoa Government (ASG) to enforce the regulations in this subpart in accordance with existing law. If NOAA chooses to exercise this provision, a memorandum of understanding shall be executed between NOAA...

  4. Task force on compliance and enforcement. Final report. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    1978-03-01

    Recommendations for measures to strengthen the FEA enforcement program in the area of petroleum price regulation are presented. Results of task force efforts are presented in report and recommendations sections concerned with pending cases, compliance program organization, enforcement powers, compliance strategy, and audit staffing and techniques. (JRD)

  5. Real time biometric surveillance with gait recognition

    Science.gov (United States)

    Mohapatra, Subasish; Swain, Anisha; Das, Manaswini; Mohanty, Subhadarshini

    2018-04-01

    Bio metric surveillance has become indispensable for every system in the recent years. The contribution of bio metric authentication, identification, and screening purposes are widely used in various domains for preventing unauthorized access. A large amount of data needs to be updated, segregated and safeguarded from malicious software and misuse. Bio metrics is the intrinsic characteristics of each individual. Recently fingerprints, iris, passwords, unique keys, and cards are commonly used for authentication purposes. These methods have various issues related to security and confidentiality. These systems are not yet automated to provide the safety and security. The gait recognition system is the alternative for overcoming the drawbacks of the recent bio metric based authentication systems. Gait recognition is newer as it hasn't been implemented in the real-world scenario so far. This is an un-intrusive system that requires no knowledge or co-operation of the subject. Gait is a unique behavioral characteristic of every human being which is hard to imitate. The walking style of an individual teamed with the orientation of joints in the skeletal structure and inclinations between them imparts the unique characteristic. A person can alter one's own external appearance but not skeletal structure. These are real-time, automatic systems that can even process low-resolution images and video frames. In this paper, we have proposed a gait recognition system and compared the performance with conventional bio metric identification systems.

  6. DOE enforcement program roles and responsibilities: DOE handbook

    International Nuclear Information System (INIS)

    1995-08-01

    The Price-Anderson Act provides indemnification to DOE contractors who manage and conduct nuclear activities in the DOE complex. The government acts as an insurer for these contractors against any findings of liability from the nuclear activities of the contractor within the scope of its contract. 10 CFR Part 820 establishes the legal framework for implementing DOE's Nuclear Safety Enforcement Program. Integration with other DOE organizations and programs would assure that the enforcement process properly considers the actual or potential safety significance of a violation when determining an appropriate enforcement sanction. Achieving a proactive contractor compliance assurance rather than a heavy enforcement hand, will require a foundation of cooperation and teamwork across DOE organizations. This handbook identifies the areas of interface for the DOE Enforcement Program and provides guidance on roles and responsibilities for the key DOE organizational areas. It complements DOE-HDBK-1087-95 and 1089-95

  7. Project Surveillance and Maintenance Plan

    International Nuclear Information System (INIS)

    1985-09-01

    The Project Surveillance and Maintenance Plan (PSMP) describes the procedures that will be used by the US Department of Energy (DOE), or other agency as designated by the President to verify that inactive uranium tailings disposal facilities remain in compliance with licensing requirements and US Environmental Protection Agency (EPA) standards for remedial actions. The PSMP will be used as a guide for the development of individual Site Surveillance and Maintenance Plans (part of a license application) for each of the UMTRA Project sites. The PSMP is not intended to provide minimum requirements but rather to provide guidance in the selection of surveillance measures. For example, the plan acknowledges that ground-water monitoring may or may not be required and provides the [guidance] to make this decision. The Site Surveillance and Maintenance Plans (SSMPs) will form the basis for the licensing of the long-term surveillance and maintenance of each UMTRA Project site by the NRC. Therefore, the PSMP is a key milestone in the licensing process of all UMTRA Project sites. The Project Licensing Plan (DOE, 1984a) describes the licensing process. 11 refs., 22 figs., 8 tabs

  8. OzBot and haptics: remote surveillance to physical presence

    Science.gov (United States)

    Mullins, James; Fielding, Mick; Nahavandi, Saeid

    2009-05-01

    This paper reports on robotic and haptic technologies and capabilities developed for the law enforcement and defence community within Australia by the Centre for Intelligent Systems Research (CISR). The OzBot series of small and medium surveillance robots have been designed in Australia and evaluated by law enforcement and defence personnel to determine suitability and ruggedness in a variety of environments. Using custom developed digital electronics and featuring expandable data busses including RS485, I2C, RS232, video and Ethernet, the robots can be directly connected to many off the shelf payloads such as gas sensors, x-ray sources and camera systems including thermal and night vision. Differentiating the OzBot platform from its peers is its ability to be integrated directly with haptic technology or the 'haptic bubble' developed by CISR. Haptic interfaces allow an operator to physically 'feel' remote environments through position-force control and experience realistic force feedback. By adding the capability to remotely grasp an object, feel its weight, texture and other physical properties in real-time from the remote ground control unit, an operator's situational awareness is greatly improved through Haptic augmentation in an environment where remote-system feedback is often limited.

  9. Automatic EEG spike detection.

    Science.gov (United States)

    Harner, Richard

    2009-10-01

    Since the 1970s advances in science and technology during each succeeding decade have renewed the expectation of efficient, reliable automatic epileptiform spike detection (AESD). But even when reinforced with better, faster tools, clinically reliable unsupervised spike detection remains beyond our reach. Expert-selected spike parameters were the first and still most widely used for AESD. Thresholds for amplitude, duration, sharpness, rise-time, fall-time, after-coming slow waves, background frequency, and more have been used. It is still unclear which of these wave parameters are essential, beyond peak-peak amplitude and duration. Wavelet parameters are very appropriate to AESD but need to be combined with other parameters to achieve desired levels of spike detection efficiency. Artificial Neural Network (ANN) and expert-system methods may have reached peak efficiency. Support Vector Machine (SVM) technology focuses on outliers rather than centroids of spike and nonspike data clusters and should improve AESD efficiency. An exemplary spike/nonspike database is suggested as a tool for assessing parameters and methods for AESD and is available in CSV or Matlab formats from the author at brainvue@gmail.com. Exploratory Data Analysis (EDA) is presented as a graphic method for finding better spike parameters and for the step-wise evaluation of the spike detection process.

  10. Mass Processing of Sentinel-1 Images for Maritime Surveillance

    Directory of Open Access Journals (Sweden)

    Carlos Santamaria

    2017-07-01

    Full Text Available The free, full and open data policy of the EU’s Copernicus programme has vastly increased the amount of remotely sensed data available to both operational and research activities. However, this huge amount of data calls for new ways of accessing and processing such “big data”. This paper focuses on the use of Copernicus’s Sentinel-1 radar satellite for maritime surveillance. It presents a study in which ship positions have been automatically extracted from more than 11,500 Sentinel-1A images collected over the Mediterranean Sea, and compared with ship position reports from the Automatic Identification System (AIS. These images account for almost all the Sentinel-1A acquisitions taken over the area during the two-year period from the start of the operational phase in October 2014 until September 2016. A number of tools and platforms developed at the European Commission’s Joint Research Centre (JRC that have been used in the study are described in the paper. They are: (1 Search for Unidentified Maritime Objects (SUMO, a tool for ship detection in Synthetic Aperture Radar (SAR images; (2 the JRC Earth Observation Data and Processing Platform (JEODPP, a platform for efficient storage and processing of large amounts of satellite images; and (3 Blue Hub, a maritime surveillance GIS and data fusion platform. The paper presents the methodology and results of the study, giving insights into the new maritime surveillance knowledge that can be gained by analysing such a large dataset, and the lessons learnt in terms of handling and processing the big dataset.

  11. Informatics enables public health surveillance

    Directory of Open Access Journals (Sweden)

    Scott J. N McNabb

    2017-01-01

    Full Text Available Over the past decade, the world has radically changed. New advances in information and communication technologies (ICT connect the world in ways never imagined. Public health informatics (PHI leveraged for public health surveillance (PHS, can enable, enhance, and empower essential PHS functions (i.e., detection, reporting, confirmation, analyses, feedback, response. However, the tail doesn't wag the dog; as such, ICT cannot (should not drive public health surveillance strengthening. Rather, ICT can serve PHS to more effectively empower core functions. In this review, we explore promising ICT trends for prevention, detection, and response, laboratory reporting, push notification, analytics, predictive surveillance, and using new data sources, while recognizing that it is the people, politics, and policies that most challenge progress for implementation of solutions.

  12. Health surveillance of radiological work

    International Nuclear Information System (INIS)

    Pauw, H.; Vliet, J.V.D.; Zuidema, H.

    1988-01-01

    Shielding x-ray devices and issuing film badges to radiological workers in 1936 can be considered the start of radiological protection in the Philips enterprises in the Netherlands. Shielding and equipment were constantly improved based upon the dosimetry results of the filmbadges. The problem of radioactive waste led to the foundation of a central Philips committee for radiological protection in 1956, which in 1960 also issued an internal license system in order to regulate the proper precautions to be taken : workplace design and layout, technological provisions and working procedures. An evaluation of all radiological work in 1971 learnt that a stricter health surveillance program was needed to follow up the precautions issued by the license. On one hand a health surveillance program was established and on the other hand all types of radiological work were classified. In this way an obligatory and optimal health surveillance program was issued for each type of radiological work

  13. Hybrid Multidimensional Relational and Link Analytical Knowledge Discovery for Law Enforcement

    Energy Technology Data Exchange (ETDEWEB)

    Joslyn, Cliff A.; Gillen, David S.; Burke, John S.; Critchlow, Terence J.; Damante, Matt; Fernandes, Robert

    2008-08-01

    The challenges facing the Department of Homeland Security (DHS) require not only multi-dimensional, but also multi-scale data analysis. In particular, the ability to seamlessly move from summary information, such as trends, into detailed analysis of individual entities, while critical for law enforcement, typically requires manually transferring information among multiple tools. Such time-consuming and error prone processes significantly hamper the analysts' ability to quickly explore data and identify threats. As part of a DHS Science and Technology effort, we have been developing and deploying for Immigration and Customs Enforcement the CubeLink system integrating information between relational data cubes and link analytical semantic graphs. In this paper we describe CubeLink in terms of the underlying components, their integration, and the formal mapping from multidimensional data analysis into link analysis. In so doing, we provide a formal basis for one particular form of automatic schema-ontology mapping from OLAP data cubes to semantic graphs databases, and point the way towards future ``intelligent'' OLAP data cubes equipped with meta-data about their dimensional typing.

  14. Image simulation for automatic license plate recognition

    Science.gov (United States)

    Bala, Raja; Zhao, Yonghui; Burry, Aaron; Kozitsky, Vladimir; Fillion, Claude; Saunders, Craig; Rodríguez-Serrano, José

    2012-01-01

    Automatic license plate recognition (ALPR) is an important capability for traffic surveillance applications, including toll monitoring and detection of different types of traffic violations. ALPR is a multi-stage process comprising plate localization, character segmentation, optical character recognition (OCR), and identification of originating jurisdiction (i.e. state or province). Training of an ALPR system for a new jurisdiction typically involves gathering vast amounts of license plate images and associated ground truth data, followed by iterative tuning and optimization of the ALPR algorithms. The substantial time and effort required to train and optimize the ALPR system can result in excessive operational cost and overhead. In this paper we propose a framework to create an artificial set of license plate images for accelerated training and optimization of ALPR algorithms. The framework comprises two steps: the synthesis of license plate images according to the design and layout for a jurisdiction of interest; and the modeling of imaging transformations and distortions typically encountered in the image capture process. Distortion parameters are estimated by measurements of real plate images. The simulation methodology is successfully demonstrated for training of OCR.

  15. Containment and Surveillance Equipment Compendium

    International Nuclear Information System (INIS)

    Luetters, F.O.

    1980-02-01

    The Containment and Surveillance Equipment Compendium contains information sections describing the application and status of seals, optical surveillance systems, and monitors for international safeguards systems. The Compendium is a collection of information on equipment in use (generally by the IAEA) or under development in the US in diverse programs being conducted at numerous facilities under different sponsors. The Compendium establishes a baseline for the status and applications of C/S equipment and is a tool to assist in the planning of future C/S hardware development activities. The Appendix contains design concepts which can be developed to meet future goals

  16. 75 FR 652 - Energy Conservation Program: Certification, Compliance, and Enforcement Requirements for Certain...

    Science.gov (United States)

    2010-01-05

    ...; Comment Request; Certification, Compliance, and Enforcement Requirements for Consumer Products and Certain...: Certification, Compliance, and Enforcement Requirements for Certain Consumer Products and Commercial and... certification, compliance, and enforcement requirements for various consumer products and commercial and...

  17. National Enforcement Initiative: Preventing Animal Waste from Contaminating Surface and Ground Water

    Science.gov (United States)

    This page describes EPA's goal in preventing animal waste from contaminating surface and ground Water. It is an EPA National Enforcement Initiative. Both enforcement cases, and a map of enforcement actions are provided.

  18. State enforcement of federal standards: Implications for interstate pollution

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, Emma; Kennedy, Peter W. [Department of Economics, University of Victoria, Victoria, BC V8W 2Y2 (Canada)

    2008-08-15

    This paper explores the relationship between interstate air pollution and the division of power between federal and state agencies in setting and enforcing standards. In the context of the US Clean Air Act we argue that the EPA is able to monitor the adoption of technology-based standards more closely than it can monitor state-level enforcement, and that this causes an effective division of control between federal and state agencies. Our analysis offers three main insights into the interstate pollution problem in this setting. First, states have an incentive to enforce standards less stringently on firms located close to downwind borders, and this leads to excessive interstate pollution in equilibrium. Second, there can arise an inherent substitutability in the regulatory problem between strict standards and compliance effort, and this creates a strategic linkage between the federal policy on standards and state policies on enforcement. In particular, a tighter federal standard can induce less selective enforcement but can also lead to less enforcement overall. Third, states will attempt to neutralize the impact of location-based federal standards (that specifically target interstate pollution) in a way that actually exacerbates the underlying enforcement problem. (author)

  19. Prospects of development of the court decrees enforcement system

    Directory of Open Access Journals (Sweden)

    Kristina Sergeyevna Morkovskaya

    2015-06-01

    Full Text Available Objective the relevance of the topic the insufficient level of its scientific elaboration predetermined the research objectives which consist in the analysis of the institution of enforcement proceedings the identification of key challenges trends and ways to improve the current system of court decrees enforcement. Methods the methodological basis of the undertaken research is scientific method of cognition in conjunction with certain specific scientific methods the laws of formal logic historical method comparative legal method and systematic analysis of theoretical works studied in this work. Results the emerging trends in the enforcement proceedings reform in the country cannot be considered to be satisfactory in general although some initiatives seem quite appropriate in case of the proper performance. If you the situation cannot be rectified with the execution of judicial decrees basing on own experience only it is necessary to pay attention to foreign practices and to provide citizens with the right to an effective judicial protection. Of all approaches to reforming of the enforcement institution analyzed in the article the preferred for the Russian legal reality is modernization of the existing nonjudicial system of enforcement through civil procedural means. Scientific novelty at present neither the civil procedure nor the general theory of law has not developed a unified understanding of the civil procedural tools for improving the efficiency of enforcement proceedings. Practical value the main provisions and conclusions of the article can be used in research and teaching when viewing the issues of the effectiveness of enforcement proceedings. nbsp

  20. Activity Recognition Using A Combination of Category Components And Local Models for Video Surveillance

    OpenAIRE

    Lin, Weiyao; Sun, Ming-Ting; Poovendran, Radha; Zhang, Zhengyou

    2015-01-01

    This paper presents a novel approach for automatic recognition of human activities for video surveillance applications. We propose to represent an activity by a combination of category components, and demonstrate that this approach offers flexibility to add new activities to the system and an ability to deal with the problem of building models for activities lacking training data. For improving the recognition accuracy, a Confident-Frame- based Recognition algorithm is also proposed, where th...

  1. The Use of Satellite Imagery for Domestic Law Enforcement

    Science.gov (United States)

    2013-12-01

    traditionally conducted in a surveillance covey within close proximity to a potential perpetrator, may today involve a greater standoff that necessitate a...surveillance techniques, modern policing has been become to a science unto itself. What was traditionally conducted in a surveillance covey, within close ...current systems, the pictures still provided early analyst a means to determine an area order of battle. Specific weapons system and 17 Keyhole (KH

  2. Towards automatic exchange of information

    OpenAIRE

    Oberson, Xavier

    2015-01-01

    This article describes the various steps that led towards automatic exchange of information as the global standard and the issues that remain to be solved. First, the various competing models of exchange information, such as Double Tax Treaty (DTT), TIEA's, FATCA or UE Directives are described with a view to show how they interact between themselves. Second, the so-called Rubik Strategy is summarized and compared with an automatic exchange of information (AEOI). The third part then describes ...

  3. On the Enforcement of Specific Performance in Civil Law Countries

    DEFF Research Database (Denmark)

    Lando, Henrik; Rose, Caspar

    2003-01-01

    requires actions to beundertaken, and we relate this to costs of enforcement. We arguethat it is administratively costly to run a system of enforcementthat renders specific performance attractive to the aggrieved party,and that the Civil Law countries have (like Common Law countries)chosen not to incur...... these costs of enforcement. This is especiallyclear in the case of Denmark, where specific performance of actionshas been abandoned as a legal remedy.At the normative level, we argue that enforcement costs providesan additional rationale, over and above the rationales of the theoryof efficient breach...

  4. Regional Disease Surveillance Meeting - Final Paper

    Energy Technology Data Exchange (ETDEWEB)

    Lesperance, Ann M.; Mahy, Heidi A.

    2006-08-08

    On June 1, 2006, public health officials working in surveillance, epidemiological modeling, and information technology communities from the Seattle/Tacoma area and State of Washington met with members of the Pacific Northwest National Laboratory (PNNL) to discuss the current state of disease surveillance and gaps and needs to improve the current systems. The meeting also included a discussion of PNNL initiatives that might be appropriate to enhance disease surveillance and the current tools being used for disease surveillance. Participants broke out into two groups to identify critical gaps and needs for improving a surveillance system, and discuss the requirements for developing improved surveillance. Each group developed a list of key priorities summarizing the requirements for improved surveillance. The objective of this meeting was to work towards the development of an improved disease surveillance system.

  5. Inappropriate colonoscopic surveillance of hyperplastic polyps.

    LENUS (Irish Health Repository)

    Keane, R A

    2011-11-15

    Colonoscopic surveillance of hyperplastic polyps alone is controversial and may be inappropriate. The colonoscopy surveillance register at a university teaching hospital was audited to determine the extent of such hyperplastic polyp surveillance. The surveillance endoscopy records were reviewed, those patients with hyperplastic polyps were identified, their clinical records were examined and contact was made with each patient. Of the 483 patients undergoing surveillance for colonic polyps 113 (23%) had hyperplastic polyps alone on last colonoscopy. 104 patients remained after exclusion of those under appropriate surveillance. 87 of the 104 patients (84%) were successfully contacted. 37 patients (8%) were under appropriate colonoscopic surveillance for a significant family history of colorectal carcinoma. 50 (10%) patients with hyperplastic polyps alone and no other clinical indication for colonoscopic surveillance were booked for follow up colonoscopy. This represents not only a budgetary but more importantly a clinical opportunity cost the removal of which could liberate valuable colonoscopy time for more appropriate indications.

  6. National Cardiac Device Surveillance Program Database

    Data.gov (United States)

    Department of Veterans Affairs — The National Cardiac Device Surveillance Program Database supports the Eastern Pacemaker Surveillance Center (EPSC) staff in its function of monitoring some 11,000...

  7. FPGA-Based Real-Time Motion Detection for Automated Video Surveillance Systems

    Directory of Open Access Journals (Sweden)

    Sanjay Singh

    2016-03-01

    Full Text Available Design of automated video surveillance systems is one of the exigent missions in computer vision community because of their ability to automatically select frames of interest in incoming video streams based on motion detection. This research paper focuses on the real-time hardware implementation of a motion detection algorithm for such vision based automated surveillance systems. A dedicated VLSI architecture has been proposed and designed for clustering-based motion detection scheme. The working prototype of a complete standalone automated video surveillance system, including input camera interface, designed motion detection VLSI architecture, and output display interface, with real-time relevant motion detection capabilities, has been implemented on Xilinx ML510 (Virtex-5 FX130T FPGA platform. The prototyped system robustly detects the relevant motion in real-time in live PAL (720 × 576 resolution video streams directly coming from the camera.

  8. Surveillance by diagnostic microbiology laboratories

    African Journals Online (AJOL)

    account for almost threequarters of all Acinetobacter baumannii bloodstream infections, supporting the decision to include colistin or tobramycin as empirical treatment options for ICU patients with suspected Gramnegative sepsis. The dissemination and utilisation of surveillance data is crucial if they are to impact on patient ...

  9. Symbolic power, robotting, and surveilling

    DEFF Research Database (Denmark)

    Skovsmose, Ole

    2012-01-01

    describes as it prioritises is discussed with reference to robotting and surveillance. In general, the symbolic power of mathematics and formal languages is summarised through the observations: that mathematics treats parts and properties as autonomous, that it dismembers what it addresses and destroys...

  10. Lip-reading enhancement for law enforcement

    Science.gov (United States)

    Theobald, Barry J.; Harvey, Richard; Cox, Stephen J.; Lewis, Colin; Owen, Gari P.

    2006-09-01

    Accurate lip-reading techniques would be of enormous benefit for agencies involved in counter-terrorism and other law-enforcement areas. Unfortunately, there are very few skilled lip-readers, and it is apparently a difficult skill to transmit, so the area is under-resourced. In this paper we investigate the possibility of making the lip-reading task more amenable to a wider range of operators by enhancing lip movements in video sequences using active appearance models. These are generative, parametric models commonly used to track faces in images and video sequences. The parametric nature of the model allows a face in an image to be encoded in terms of a few tens of parameters, while the generative nature allows faces to be re-synthesised using the parameters. The aim of this study is to determine if exaggerating lip-motions in video sequences by amplifying the parameters of the model improves lip-reading ability. We also present results of lip-reading tests undertaken by experienced (but non-expert) adult subjects who claim to use lip-reading in their speech recognition process. The results, which are comparisons of word error-rates on unprocessed and processed video, are mixed. We find that there appears to be the potential to improve the word error rate but, for the method to improve the intelligibility there is need for more sophisticated tracking and visual modelling. Our technique can also act as an expression or visual gesture amplifier and so has applications to animation and the presentation of information via avatars or synthetic humans.

  11. A novel framework for intelligent surveillance system based on abnormal human activity detection in academic environments.

    Science.gov (United States)

    Al-Nawashi, Malek; Al-Hazaimeh, Obaida M; Saraee, Mohamad

    2017-01-01

    Abnormal activity detection plays a crucial role in surveillance applications, and a surveillance system that can perform robustly in an academic environment has become an urgent need. In this paper, we propose a novel framework for an automatic real-time video-based surveillance system which can simultaneously perform the tracking, semantic scene learning, and abnormality detection in an academic environment. To develop our system, we have divided the work into three phases: preprocessing phase, abnormal human activity detection phase, and content-based image retrieval phase. For motion object detection, we used the temporal-differencing algorithm and then located the motions region using the Gaussian function. Furthermore, the shape model based on OMEGA equation was used as a filter for the detected objects (i.e., human and non-human). For object activities analysis, we evaluated and analyzed the human activities of the detected objects. We classified the human activities into two groups: normal activities and abnormal activities based on the support vector machine. The machine then provides an automatic warning in case of abnormal human activities. It also embeds a method to retrieve the detected object from the database for object recognition and identification using content-based image retrieval. Finally, a software-based simulation using MATLAB was performed and the results of the conducted experiments showed an excellent surveillance system that can simultaneously perform the tracking, semantic scene learning, and abnormality detection in an academic environment with no human intervention.

  12. The temporal relationship between drug supply indicators: an audit of international government surveillance systems

    Science.gov (United States)

    Werb, Dan; Kerr, Thomas; Nosyk, Bohdan; Strathdee, Steffanie; Montaner, Julio; Wood, Evan

    2013-01-01

    Objectives Illegal drug use continues to be a major threat to community health and safety. We used international drug surveillance databases to assess the relationship between multiple long-term estimates of illegal drug price and purity. Design We systematically searched for longitudinal measures of illegal drug supply indicators to assess the long-term impact of enforcement-based supply reduction interventions. Setting Data from identified illegal drug surveillance systems were analysed using an a priori defined protocol in which we sought to present annual estimates beginning in 1990. Data were then subjected to trend analyses. Main outcome measures Data were obtained from government surveillance systems assessing price, purity and/or seizure quantities of illegal drugs; systems with at least 10 years of longitudinal data assessing price, purity/potency or seizures were included. Results We identified seven regional/international metasurveillance systems with longitudinal measures of price or purity/potency that met eligibility criteria. In the USA, the average inflation-adjusted and purity-adjusted prices of heroin, cocaine and cannabis decreased by 81%, 80% and 86%, respectively, between 1990 and 2007, whereas average purity increased by 60%, 11% and 161%, respectively. Similar trends were observed in Europe, where during the same period the average inflation-adjusted price of opiates and cocaine decreased by 74% and 51%, respectively. In Australia, the average inflation-adjusted price of cocaine decreased 14%, while the inflation-adjusted price of heroin and cannabis both decreased 49% between 2000 and 2010. During this time, seizures of these drugs in major production regions and major domestic markets generally increased. Conclusions With few exceptions and despite increasing investments in enforcement-based supply reduction efforts aimed at disrupting global drug supply, illegal drug prices have generally decreased while drug purity has generally

  13. The temporal relationship between drug supply indicators: an audit of international government surveillance systems.

    Science.gov (United States)

    Werb, Dan; Kerr, Thomas; Nosyk, Bohdan; Strathdee, Steffanie; Montaner, Julio; Wood, Evan

    2013-09-30

    Illegal drug use continues to be a major threat to community health and safety. We used international drug surveillance databases to assess the relationship between multiple long-term estimates of illegal drug price and purity. We systematically searched for longitudinal measures of illegal drug supply indicators to assess the long-term impact of enforcement-based supply reduction interventions. Data from identified illegal drug surveillance systems were analysed using an a priori defined protocol in which we sought to present annual estimates beginning in 1990. Data were then subjected to trend analyses. Data were obtained from government surveillance systems assessing price, purity and/or seizure quantities of illegal drugs; systems with at least 10 years of longitudinal data assessing price, purity/potency or seizures were included. We identified seven regional/international metasurveillance systems with longitudinal measures of price or purity/potency that met eligibility criteria. In the USA, the average inflation-adjusted and purity-adjusted prices of heroin, cocaine and cannabis decreased by 81%, 80% and 86%, respectively, between 1990 and 2007, whereas average purity increased by 60%, 11% and 161%, respectively. Similar trends were observed in Europe, where during the same period the average inflation-adjusted price of opiates and cocaine decreased by 74% and 51%, respectively. In Australia, the average inflation-adjusted price of cocaine decreased 14%, while the inflation-adjusted price of heroin and cannabis both decreased 49% between 2000 and 2010. During this time, seizures of these drugs in major production regions and major domestic markets generally increased. With few exceptions and despite increasing investments in enforcement-based supply reduction efforts aimed at disrupting global drug supply, illegal drug prices have generally decreased while drug purity has generally increased since 1990. These findings suggest that expanding efforts at

  14. Approaches to canine health surveillance.

    Science.gov (United States)

    O'Neill, Dan G; Church, David B; McGreevy, Paul D; Thomson, Peter C; Brodbelt, Dave C

    2014-01-01

    Effective canine health surveillance systems can be used to monitor disease in the general population, prioritise disorders for strategic control and focus clinical research, and to evaluate the success of these measures. The key attributes for optimal data collection systems that support canine disease surveillance are representativeness of the general population, validity of disorder data and sustainability. Limitations in these areas present as selection bias, misclassification bias and discontinuation of the system respectively. Canine health data sources are reviewed to identify their strengths and weaknesses for supporting effective canine health surveillance. Insurance data benefit from large and well-defined denominator populations but are limited by selection bias relating to the clinical events claimed and animals covered. Veterinary referral clinical data offer good reliability for diagnoses but are limited by referral bias for the disorders and animals included. Primary-care practice data have the advantage of excellent representation of the general dog population and recording at the point of care by veterinary professionals but may encounter misclassification problems and technical difficulties related to management and analysis of large datasets. Questionnaire surveys offer speed and low cost but may suffer from low response rates, poor data validation, recall bias and ill-defined denominator population information. Canine health scheme data benefit from well-characterised disorder and animal data but reflect selection bias during the voluntary submissions process. Formal UK passive surveillance systems are limited by chronic under-reporting and selection bias. It is concluded that active collection systems using secondary health data provide the optimal resource for canine health surveillance.

  15. Environmental surveillance master sampling schedule

    International Nuclear Information System (INIS)

    Bisping, L.E.

    1995-02-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest Laboratory (PNL) for the U.S. Department of Energy (DOE). This document contains the planned 1994 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP), Drinking Water Project, and Ground-Water Surveillance Project. Samples are routinely collected for the SESP and analyzed to determine the quality of air, surface water, soil, sediment, wildlife, vegetation, foodstuffs, and farm products at Hanford Site and surrounding communities. The responsibility for monitoring onsite drinking water falls outside the scope of the SESP. PNL conducts the drinking water monitoring project concurrent with the SESP to promote efficiency and consistency, utilize expertise developed over the years, and reduce costs associated with management, procedure development, data management, quality control, and reporting. The ground-water sampling schedule identifies ground-water sampling .events used by PNL for environmental surveillance of the Hanford Site. Sampling is indicated as annual, semi-annual, quarterly, or monthly in the sampling schedule. Some samples are collected and analyzed as part of ground-water monitoring and characterization programs at Hanford (e.g. Resources Conservation and Recovery Act (RCRA), Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA), or Operational). The number of samples planned by other programs are identified in the sampling schedule by a number in the analysis column and a project designation in the Cosample column. Well sampling events may be merged to avoid redundancy in cases where sampling is planned by both-environmental surveillance and another program

  16. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L.E.

    1995-02-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest Laboratory (PNL) for the U.S. Department of Energy (DOE). This document contains the planned 1994 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP), Drinking Water Project, and Ground-Water Surveillance Project. Samples are routinely collected for the SESP and analyzed to determine the quality of air, surface water, soil, sediment, wildlife, vegetation, foodstuffs, and farm products at Hanford Site and surrounding communities. The responsibility for monitoring onsite drinking water falls outside the scope of the SESP. PNL conducts the drinking water monitoring project concurrent with the SESP to promote efficiency and consistency, utilize expertise developed over the years, and reduce costs associated with management, procedure development, data management, quality control, and reporting. The ground-water sampling schedule identifies ground-water sampling .events used by PNL for environmental surveillance of the Hanford Site. Sampling is indicated as annual, semi-annual, quarterly, or monthly in the sampling schedule. Some samples are collected and analyzed as part of ground-water monitoring and characterization programs at Hanford (e.g. Resources Conservation and Recovery Act (RCRA), Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA), or Operational). The number of samples planned by other programs are identified in the sampling schedule by a number in the analysis column and a project designation in the Cosample column. Well sampling events may be merged to avoid redundancy in cases where sampling is planned by both-environmental surveillance and another program.

  17. Automatic Constraint Detection for 2D Layout Regularization.

    Science.gov (United States)

    Jiang, Haiyong; Nan, Liangliang; Yan, Dong-Ming; Dong, Weiming; Zhang, Xiaopeng; Wonka, Peter

    2016-08-01

    In this paper, we address the problem of constraint detection for layout regularization. The layout we consider is a set of two-dimensional elements where each element is represented by its bounding box. Layout regularization is important in digitizing plans or images, such as floor plans and facade images, and in the improvement of user-created contents, such as architectural drawings and slide layouts. To regularize a layout, we aim to improve the input by detecting and subsequently enforcing alignment, size, and distance constraints between layout elements. Similar to previous work, we formulate layout regularization as a quadratic programming problem. In addition, we propose a novel optimization algorithm that automatically detects constraints. We evaluate the proposed framework using a variety of input layouts from different applications. Our results demonstrate that our method has superior performance to the state of the art.

  18. Automatic Constraint Detection for 2D Layout Regularization

    KAUST Repository

    Jiang, Haiyong

    2015-09-18

    In this paper, we address the problem of constraint detection for layout regularization. As layout we consider a set of two-dimensional elements where each element is represented by its bounding box. Layout regularization is important for digitizing plans or images, such as floor plans and facade images, and for the improvement of user created contents, such as architectural drawings and slide layouts. To regularize a layout, we aim to improve the input by detecting and subsequently enforcing alignment, size, and distance constraints between layout elements. Similar to previous work, we formulate the layout regularization as a quadratic programming problem. In addition, we propose a novel optimization algorithm to automatically detect constraints. In our results, we evaluate the proposed framework on a variety of input layouts from different applications, which demonstrates our method has superior performance to the state of the art.

  19. Independent component analysis for automatic note extraction from musical trills

    Science.gov (United States)

    Brown, Judith C.; Smaragdis, Paris

    2004-05-01

    The method of principal component analysis, which is based on second-order statistics (or linear independence), has long been used for redundancy reduction of audio data. The more recent technique of independent component analysis, enforcing much stricter statistical criteria based on higher-order statistical independence, is introduced and shown to be far superior in separating independent musical sources. This theory has been applied to piano trills and a database of trill rates was assembled from experiments with a computer-driven piano, recordings of a professional pianist, and commercially available compact disks. The method of independent component analysis has thus been shown to be an outstanding, effective means of automatically extracting interesting musical information from a sea of redundant data.

  20. Analysis of Environmental Law Enforcement Mechanism Based on Economic Principle

    Science.gov (United States)

    Cao, Hongjun; Shao, Haohao; Cai, Xuesen

    2017-11-01

    Strengthening and improving the environmental law enforcement mechanism is an important way to protect the ecological environment. This paper is based on economical principles, we did analysis of the marginal management costs by using Pigou means and the marginal transaction costs by using Coase means vary with the quantity growth of pollutant discharge Enterprises. We analyzed all this information, then we got the conclusion as follows. In the process of strengthening the environmental law enforcement mechanism, firstly, we should fully mobilize all aspects of environmental law enforcement, such as legislative bodies and law enforcement agencies, public welfare organizations, television, newspapers, enterprises, people and so on, they need to form a reasonable and organic structure system; then we should use various management means, such as government regulation, legal sanctions, fines, persuasion and denounce, they also need to form an organic structural system.

  1. Operational Design for Peace Enforcement: Lessons for the Operational Staff

    National Research Council Canada - National Science Library

    Neumann, Michael

    2004-01-01

    U.S. involvement in Somalia serves as a useful case study of the unique challenges an operational staff may face when applying operational design to the planning and execution of a peace enforcement operation. U.S...

  2. Verification of Security Policy Enforcement in Enterprise Systems

    Science.gov (United States)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  3. Child Support Enforcement Annual Data Report Form 34A - 2007

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  4. Enforcement and Effectiveness of Consumer Law in the Czech Republic

    Czech Academy of Sciences Publication Activity Database

    Pauknerová, Monika; Skalská, H.

    2017-01-01

    Roč. 7, č. 4 (2017), s. 243-254 ISSN 1805-8396 Institutional support: RVO:68378122 Keywords : consumer law * enforcement * alternative dispute resolution Subject RIV: AG - Legal Sciences OBOR OECD: Law

  5. Spatial service delivery system for smart licensing & enforcement management

    Science.gov (United States)

    Wahap, N. A.; Ismail, N. M.; Nor, N. M.; Ahmad, N.; Omar, M. F.; Termizi, A. A. A.; Zainal, D.; Noordin, N. M.; Mansor, S.

    2016-06-01

    Spatial information has introduced a new sense of urgency for a better understanding of the public needs in term of what, when and where they need services and through which devices, platform or physical locations they need them. The objective of this project is to value- add existing license management process for business premises which comes under the responsibility of Local Authority (PBT). Manipulation of geospatial and tracing technology via mobile platform allows enforcement officers to work in real-time, use a standardized system, improve service delivery, and optimize operation management. This paper will augment the scope and capabilities of proposed concept namely, Smart Licensing/Enforcement Management (SLEm). It will review the current licensing and enforcement practice of selected PBT in comparison to the enhanced method. As a result, the new enhanced system is expected to offer a total solution for licensing/enforcement management whilst increasing efficiency and transparency for smart city management and governance.

  6. 49 CFR 244.21 - Compliance and Enforcement.

    Science.gov (United States)

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS ON SAFETY INTEGRATION PLANS GOVERNING RAILROAD CONSOLIDATIONS, MERGERS, AND ACQUISITIONS OF CONTROL Safety Integration Plans § 244.21 Compliance and Enforcement. (a...

  7. Child Support Enforcement Annual Data Report Form 34A - 2006

    Data.gov (United States)

    U.S. Department of Health & Human Services — This dataset contains annual data on collections received and distributed by State agencies administering the Child Support Enforcement program under title IV-D of...

  8. recognition and enforcement of foreign arbitral awards in civil

    African Journals Online (AJOL)

    eliasn

    (CPC), rules on the recognition and enforcement of foreign judgments ..... copy of the judgment to be executed; and a certificate signed by the President or ...... Convention has been praised as: “the single most important pillar on which the.

  9. 78 FR 21826 - Defense Support of Civilian Law Enforcement Agencies

    Science.gov (United States)

    2013-04-12

    ... enforcement officials with respect to audits and investigations conducted, supervised, monitored, or initiated... that are undertaken primarily for a military or foreign affairs purpose. (B) Audits and investigations... acting as undercover agents, informants, investigators, or interrogators. (7) Forensic investigations or...

  10. Sharing Law Enforcement and Intelligence Information: The Congressional Role

    National Research Council Canada - National Science Library

    Best Jr., Richard A

    2007-01-01

    Almost all assessments of the attacks of September 11, 2001, have concluded that U.S. intelligence and law enforcement agencies had failed to share information that might have provided advance warning of the plot...

  11. Public education and enforcement research study : Macomb, Illinois : analysis

    Science.gov (United States)

    2011-03-01

    The Public Education and Enforcement Research Study (PEERS) was a collaborative effort between the Federal Railroad Administration, the Illinois Commerce Commission, and local communities in the State of Illinois. This project was designed to promote...

  12. Pesticides and Asbestos Programs and Enforcement Branch Case Tracking System

    Science.gov (United States)

    Tracks the entire life cycle of a regulated site from initial inspection through site response to enforcement actions. Separate site action history is maintained for each statute under which the site is regulated.

  13. Deporting the American Dream: Immigration Enforcement and Latino Foreclosures

    Directory of Open Access Journals (Sweden)

    Jacob S. Rugh

    2016-12-01

    Full Text Available Over the past decade, Latinos have been buffeted by two major forces: a record number of immigrant deportations and the housing foreclosure crisis. Yet, prior work has not assessed the link between the two. We hypothesize that deportations exacerbate rates of foreclosure among Latinos by removing income earners from owner-occupied households. We employ a quasi-experimental approach that leverages variation in county applications for 287(g immigration enforcement agreements with Immigration and Customs Enforcement and data on foreclosure filings from 2005–2012. These models uncover a substantial association of enforcement with Hispanic foreclosure rates. The association is stronger in counties with more immigrant detentions and a larger share of undocumented persons in owner-occupied homes. The results imply that local immigration enforcement plays an important role in understanding why Latinos experienced foreclosures most often. The reduced home ownership and wealth that result illustrate how legal status and deportation perpetuate the racial stratification of Latinos.

  14. Criminality or monopoly? Informal immigration enforcement in South Africa

    NARCIS (Netherlands)

    Vigneswaran, D.; Araia, T.; Hoag, C.; Tshabalala, X.

    2010-01-01

    Zimbabwean displacement has significant implications for the evolution of state forms in Southern Africa. In South Africa, Zimbabwean migrants' claims to residence confront exclusionary immigration laws. The South African government officials who are responsible for enforcing these laws have helped

  15. Privacy Impact Assessment for the Enforcement Action Response System

    Science.gov (United States)

    The Enforcement Action Response System collects waste transaction information, and liability determination information. Learn how this data is collected, how it will be used, access to the data, the purpose of data collection, and record retention policies

  16. Privacy Impact Assessment for the Enforcement Superfund Tracking System

    Science.gov (United States)

    This Enforcement Superfund Tracking System (ESTS) collects publicly available information from the California Secretary of State on businesses. Learn how this data is collected, how it will be used, access to the data, and the purpose of data collection.

  17. Price-Anderson Nuclear Safety Enforcement Program. 1997 annual report

    International Nuclear Information System (INIS)

    1998-01-01

    This report summarizes activities in the Department of Energy's Price-Anderson Amendments Act (PAAA) Enforcement Program in calendar year 1997 and highlights improvements planned for 1998. The DOE Enforcement Program involves the Office of Enforcement and Investigation in the DOE Headquarters Office of Environment, Safety and Health, as well as numerous PAAA Coordinators and technical advisors in DOE Field and Program Offices. The DOE Enforcement Program issued 13 Notices of Violation (NOV's) in 1997 for cases involving significant or potentially significant nuclear safety violations. Six of these included civil penalties totaling $440,000. Highlights of these actions include: (1) Brookhaven National Laboratory Radiological Control Violations / Associated Universities, Inc.; (2) Bioassay Program Violations at Mound / EG ampersand G, Inc.; (3) Savannah River Crane Operator Uptake / Westinghouse Savannah River Company; (4) Waste Calciner Worker Uptake / Lockheed-Martin Idaho Technologies Company; and (5) Reactor Scram and Records Destruction at Sandia / Sandia Corporation (Lockheed-Martin). Sandia / Sandia Corporation (Lockheed-Martin)

  18. 24 CFR 115.305 - Special enforcement effort (SEE) funds.

    Science.gov (United States)

    2010-04-01

    ... enforced a subpoena or made use of its prompt judicial action authority within the past year; (2) The... the most recent three years, or is currently engaged in, at least one major fair housing systemic...

  19. Enforcement of Intellectual Property, Pollution Abatement, and Directed Technical Change

    OpenAIRE

    Schaefer, Andreas

    2017-01-01

    We theoretically investigate the interaction between endogenous enforcement of intellectual property rights (IPRs) and tax-financed pollution abatement measures. IPRs affect dirty and clean intermediates alike such that higher IPR enforcement may promote the transition to the clean technology, if this technology is productive enough. If the green technology is relatively unproductive, higher IPRs promote the dirty technology while pollution is increasing. As households are due to subsistence ...

  20. Overview of the recognition and enforcement of international commercial arbitration

    Directory of Open Access Journals (Sweden)

    Sergey Kravtsov

    2017-01-01

    Full Text Available The subject. This informational article is devoted to the peculiarities of recognition and enforcement of international commercial arbitration awards according to different countries’ legislation and international legal regulation.The purpose of the article is to identify legal patterns of recognition and enforcement of international commercial arbitration awards in different countries.Methodology. The study is based on comparative law and formal law methods, analysis and synthesis.Results, scope of application. Enforcement of arbitral awards in foreign countries is ensured and guaranteed by multilateral conventions, bilateral treaties and national legislation. The New York Convention 1958 in a certain way limits the scope of legal protection of arbitral awards and leaves the procedure for recognition and enforcement of arbitral awards for consideration of the state court. The author analyses of differentiation of the recognition and enforcement regime of so-called "domestic" and "foreign" solutions of international commercial arbitration in terms of doctrinal approaches and practice of foreign countries. Special attention is given to the analysis of foreign arbitral awards of recognition and enforcement procedures is given to a denial of recognition and enforcement of foreign arbitral awards and their reasons. In spite of the explicit grounds for refusal of recognition and enforcement of foreign arbitral awards in New York Convention 1958, some countries try to establish certain exceptions to the rule in the national legislation. Results may be applicable in improvement of international legal regulation.Conclusions. The courts of the countries – participants of the New York Convention 1958 cannot cancel the foreign arbitral award or revise it substantially. The refutation of this award is possible only in the court of the state in whose territory the relevant arbitral award was made, and such court is not formally bound by the rules of the

  1. 25 CFR 11.1103 - Law enforcement officer's duties.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Law enforcement officer's duties. 11.1103 Section 11.1103 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Minor-in-Need-of-Care Procedure § 11.1103 Law enforcement officer's duties. Upon taking a minor into custody the officer...

  2. An empirical investigation of compliance and enforcement problems

    DEFF Research Database (Denmark)

    Kronbak, Lone Grønbæk; Jensen, Frank

    2011-01-01

    contributes to the literature by investigating compliance and enforcement in the empirical case of a mixed trawl fishery targeting Norway lobster in Kattegat and Skagerrak located north of Denmark with help from a simulated model. The paper presents results from two simulation models of the case study: one....... Another conclusion from the case study is that only small welfare effects are obtained by increasing enforcement efforts to reduce non-compliance....

  3. Environmental health surveillance system; Kankyo hoken surveillance system

    Energy Technology Data Exchange (ETDEWEB)

    Ono, M. [National Inst. for Environmental Studies, Tsukuba (Japan)

    1998-02-01

    The Central Environmental Pollution Prevention Council pointed out the necessity to establish an environmental health surveillance system (hereinafter referred to as System) in its report `on the first type district specified by the Environmental Pollution Caused Health Damages Compensation Act,` issued in 1986. A study team, established in Environment Agency, has been discussing to establish System since 1986. This paper outlines System, and some of the pilot surveillance results. It is not aimed at elucidation of the cause-effect relationships between health and air pollution but at discovery of problems, in which the above relationships in a district population are monitored periodically and continuously from long-term and prospective viewpoints, in order to help take necessary measures in the early stage. System is now collecting the data of the chronic obstructive lung diseases on a nation-wide scale through health examinations of 3-year-old and preschool children and daily air pollution monitoring. 6 refs., 3 figs., 1 tab.

  4. U.S. Environmental Protection Agency Office of Enforcement and Compliance Assurance New Mapping Tool for Enforcement Cases

    Data.gov (United States)

    U.S. Environmental Protection Agency — The new mapping tool shows facilities in the United States where the EPA concluded formal environmental enforcement actions between October 1, 2008 and September 30,...

  5. Public involvement in environmental surveillance at Hanford

    International Nuclear Information System (INIS)

    Hanf, R.W. Jr.; Patton, G.W.; Woodruff, R.K.; Poston, T.M.

    1994-08-01

    Environmental surveillance at the Hanford Site began during the mid-1940s following the construction and start-up of the nation's first plutonium production reactor. Over the past approximately 45 years, surveillance operations on and off the Site have continued, with virtually all sampling being conducted by Hanford Site workers. Recently, the US Department of Energy Richland Operations Office directed that public involvement in Hanford environmental surveillance operations be initiated. Accordingly, three special radiological air monitoring stations were constructed offsite, near hanford's perimeter. Each station is managed and operated by two local school teaches. These three stations are the beginning of a community-operated environmental surveillance program that will ultimately involve the public in most surveillance operations around the Site. The program was designed to stimulate interest in Hanford environmental surveillance operations, and to help the public better understand surveillance results. The program has also been used to enhance educational opportunities at local schools

  6. Issues ignored in laboratory quality surveillance

    International Nuclear Information System (INIS)

    Zeng Jing; Li Xingyuan; Zhang Tingsheng

    2008-01-01

    According to the work requirement of the related laboratory quality surveillance in ISO17025, this paper analyzed and discussed the issued ignored in the laboratory quality surveillance. In order to solve the present problem, it is required to understand the work responsibility in the quality surveillance correctly, to establish the effective working routine in the quality surveillance, and to conduct, the quality surveillance work. The object in the quality surveillance shall be 'the operator' who engaged in the examination/calibration directly in the laboratory, especially the personnel in training (who is engaged in the examination/calibration). The quality supervisors shall be fully authorized, so that they can correctly understand the work responsibility in quality surveillance, and are with the rights for 'full supervision'. The laboratory also shall arrange necessary training to the quality supervisor, so that they can obtain sufficient guide in time and are with required qualification or occupation prerequisites. (authors)

  7. Risk based surveillance for vector borne diseases

    DEFF Research Database (Denmark)

    Bødker, Rene

    of samples and hence early detection of outbreaks. Models for vector borne diseases in Denmark have demonstrated dramatic variation in outbreak risk during the season and between years. The Danish VetMap project aims to make these risk based surveillance estimates available on the veterinarians smart phones...... in Northern Europe. This model approach may be used as a basis for risk based surveillance. In risk based surveillance limited resources for surveillance are targeted at geographical areas most at risk and only when the risk is high. This makes risk based surveillance a cost effective alternative...... sample to a diagnostic laboratory. Risk based surveillance models may reduce this delay. An important feature of risk based surveillance models is their ability to continuously communicate the level of risk to veterinarians and hence increase awareness when risk is high. This is essential for submission...

  8. Reactor Vessel Surveillance Program for Advanced Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Kyeong-Hoon; Kim, Tae-Wan; Lee, Gyu-Mahn; Kim, Jong-Wook; Park, Keun-Bae; Kim, Keung-Koo

    2008-10-15

    This report provides the design requirements of an integral type reactor vessel surveillance program for an integral type reactor in accordance with the requirements of Korean MEST (Ministry of Education, Science and Technology Development) Notice 2008-18. This report covers the requirements for the design of surveillance capsule assemblies including their test specimens, test block materials, handling tools, and monitors of the surveillance capsule neutron fluence and temperature. In addition, this report provides design requirements for the program for irradiation surveillance of reactor vessel materials, a layout of specimens and monitors in the surveillance capsule, procedures of installation and retrieval of the surveillance capsule assemblies, and the layout of the surveillance capsule assemblies in the reactor.

  9. Health effects and medical surveillance

    International Nuclear Information System (INIS)

    1998-01-01

    Source of ionizing radiations have innumerable applications in the work place. Usually, even where the work is performed safely, the employees involved inevitably receive small, regular exposures to radiation that are not manifestly harmful. This Module explains how ionizing radiations can interact with and affect human tissues, the various factors that influence the outcome and the detrimental effects that may result. The medical surveillance that is appropriate for those working with radiation sources, depending on the degree of hazard of the work, is described. The Manual will be of most benefit it if forms part of more comprehensive training or is supplemented by the advice of a medically qualified expert. Where medical surveillance is appropriate for radiation employees, the services of a qualified doctor, occupational physician or other trained medical staff will be required

  10. Bat Rabies Surveillance in Europe

    DEFF Research Database (Denmark)

    Schatz, J.; Fooks, A. R.; McElhinney, L.

    2013-01-01

    Rabies is the oldest known zoonotic disease and was also the first recognized bat associated infection in humans. To date, four different lyssavirus species are the causative agents of rabies in European bats: the European Bat Lyssaviruses type 1 and 2 (EBLV-1, EBLV-2), the recently discovered...... putative new lyssavirus species Bokeloh Bat Lyssavirus (BBLV) and the West Caucasian Bat Virus (WCBV). Unlike in the new world, bat rabies cases in Europe are comparatively less frequent, possibly as a result of varying intensity of surveillance. Thus, the objective was to provide an assessment of the bat...... rabies surveillance data in Europe, taking both reported data to the WHO Rabies Bulletin Europe and published results into account. In Europe, 959 bat rabies cases were reported to the RBE in the time period 1977–2010 with the vast majority characterized as EBLV-1, frequently isolated in the Netherlands...

  11. SCORPIO - VVER core surveillance system

    International Nuclear Information System (INIS)

    Zalesky, K.; Svarny, J.; Novak, L.; Rosol, J.; Horanes, A.

    1997-01-01

    The Halden Project has developed the core surveillance system SCORPIO which has two parallel modes of operation: the Core Follow Mode and the Predictive Mode. The main motivation behind the development of SCORPIO is to make a practical tool for reactor operators which can increase the quality and quantity of information presented on core status and dynamic behavior. This can first of all improve plant safety as undesired core conditions are detected and prevented. Secondly, more flexible and efficient plant operation is made possible. So far the system has only been implemented on western PWRs but the basic concept is applicable to a wide range of reactor including WWERs. The main differences between WWERs and typical western PWRs with respect to core surveillance requirements are outlined. The development of a WWER version of SCORPIO was initiated in cooperation with the Nuclear Research Institute at Rez and industry partners in the Czech Republic. The first system will be installed at the Dukovany NPP. (author)

  12. Environmental surveillance master sampling schedule

    International Nuclear Information System (INIS)

    Bisping, L.E.

    1997-01-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest National Laboratory (PNNL)(a) for the US Department of Energy (DOE). This document contains the planned 1997 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP) and Drinking Water Monitoring Project. In addition, Section 3.0, Biota, also reflects a rotating collection schedule identifying the year a specific sample is scheduled for collection. The purpose of these monitoring projects is to evaluate levels of radioactive and nonradioactive pollutants in the Hanford environs, as required in DOE Order 5400.1, General Environmental Protection Program, and DOE Order 5400.5, Radiation Protection of the Public and the Environment. The sampling methods will be the same as those described in the Environmental Monitoring Plan, US Department of Energy, Richland Operations Office, DOE/RL91-50, Rev. 1, US Department of Energy, Richland, Washington

  13. Mining Surveillance and Maintenance Dollars

    International Nuclear Information System (INIS)

    MARTINEZ, R.

    2000-01-01

    Accelerating site cleanup to reduce facility risks to the workers, the public and the environment during a time of declining federal budgets represents a significant technical and economic challenge to U.S. Department of Energy (DOE) Operations Offices and their respective contractors. A significant portion of a facility's recurring annual expenses are associated with routine, long-term surveillance and maintenance (S and M) activities. However, ongoing S and M activities do nothing to reduce risks and basically spend money that could be reallocated towards facility deactivation. This paper discusses the background around DOE efforts to reduce surveillance and maintenance costs, one approach used to perform cost reviews, lessons learned from field implementation and what assistance is available to assist DOE sites in performing these evaluations

  14. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L E

    1992-01-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest Laboratory (PNL) for the US Department of Energy (DOE). This document contains the planned schedule for routine sample collection for the Surface Environmental Surveillance Project (SESP) and Ground-Water Monitoring Project. Samples for radiological analyses include Air-Particulate Filter, gases and vapor; Water/Columbia River, Onsite Pond, Spring, Irrigation, and Drinking; Foodstuffs/Animal Products including Whole Milk, Poultry and Eggs, and Beef; Foodstuffs/Produce including Leafy Vegetables, Vegetables, and Fruit; Foodstuffs/Farm Products including Wine, Wheat and Alfalfa; Wildlife; Soil; Vegetation; and Sediment. Direct Radiation Measurements include Terrestrial Locations, Columbia River Shoreline Locations, and Onsite Roadway, Railway and Aerial, Radiation Surveys.

  15. Automatic validation of numerical solutions

    DEFF Research Database (Denmark)

    Stauning, Ole

    1997-01-01

    This thesis is concerned with ``Automatic Validation of Numerical Solutions''. The basic theory of interval analysis and self-validating methods is introduced. The mean value enclosure is applied to discrete mappings for obtaining narrow enclosures of the iterates when applying these mappings...... differential equations, but in this thesis, we describe how to use the methods for enclosing iterates of discrete mappings, and then later use them for discretizing solutions of ordinary differential equations. The theory of automatic differentiation is introduced, and three methods for obtaining derivatives...... are described: The forward, the backward, and the Taylor expansion methods. The three methods have been implemented in the C++ program packages FADBAD/TADIFF. Some examples showing how to use the three metho ds are presented. A feature of FADBAD/TADIFF not present in other automatic differentiation packages...

  16. Automatic sample changers maintenance manual

    International Nuclear Information System (INIS)

    Myers, T.A.

    1978-10-01

    This manual describes and provides trouble-shooting aids for the Automatic Sample Changer electronics on the automatic beta counting system, developed by the Los Alamos Scientific Laboratory Group CNC-11. The output of a gas detector is shaped by a preamplifier, then is coupled to an amplifier. Amplifier output is discriminated and is the input to a scaler. An identification number is associated with each sample. At a predetermined count length, the identification number, scaler data plus other information is punched out on a data card. The next sample to be counted is automatically selected. The beta counter uses the same electronics as the prior count did, the only difference being the sample identification number and sample itself. This manual is intended as a step-by-step aid in trouble-shooting the electronics associated with positioning the sample, counting the sample, and getting the needed data punched on an 80-column data card

  17. Long Baseline Stereovision for Automatic Detection and Ranging of Moving Objects in the Night Sky

    Directory of Open Access Journals (Sweden)

    Vlad Turcu

    2012-09-01

    Full Text Available As the number of objects in Earth’s atmosphere and in low Earth orbit is continuously increasing; accurate surveillance of these objects has become important. This paper presents a generic, low cost sky surveillance system based on stereovision. Two cameras are placed 37 km apart and synchronized by a GPS-controlled external signal. The intrinsic camera parameters are calibrated before setup in the observation position, the translation vectors are determined from the GPS coordinates and the rotation matrices are continuously estimated using an original automatic calibration methodology based on following known stars. The moving objects in the sky are recognized as line segments in the long exposure images, using an automatic detection and classification algorithm based on image processing. The stereo correspondence is based on the epipolar geometry and is performed automatically using the image detection results. The resulting experimental system is able to automatically detect moving objects such as planes, meteors and Low Earth Orbit satellites, and measure their 3D position in an Earth-bound coordinate system.

  18. Performance indicators for rinderpest surveillance

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-12-01

    In 1986, the Joint FAO/IAEA Division of Nuclear Techniques in Food and Agriculture initiated a programme of assistance to FAO and IAEA Member States for the development of effective, quality assured veterinary laboratory diagnostic services. This programme introduced the use of standardized and internationally validated ELISA-based systems for the diagnosis and surveillance of the major transboundary diseases that affect livestock. This approach has proved of immense value in the monitoring of national, regional and global animal disease control and eradication programmes. One such programme focuses on the global elimination of rinderpest. Co-ordinated by FAO through the Global Rinderpest Eradication Programme (GREP) the joint FAO/IAEA Division of Nuclear Techniques in Food and Agriculture has developed critical diagnostic and epidemiological tools to assist this effort. As the final stages of the global eradication of rinderpest are reached, it is fitting that the Joint Division should again take the lead in providing guidance to Member States on how best to meet the criteria for quality assurance of national disease surveillance programmes - a prerequisite for international acceptance of freedom from a particular disease. This publication is intended to provide countries involved in rinderpest eradication with a detailed protocol for using performance indicators in evaluating their disease surveillance system and making, where necessary, adjustments to meet the criteria for acceptance specified in the OIE Rinderpest Pathway - a pathway that leads to international recognition of freedom from rinderpest. An initial publication (IAEA-TECDOC-1161) described guidelines for the use of performance indicators in rinderpest surveillance programmes. This publication now describes in detail the protocols and the linked indicators which have been developed and field validated through a series of FAO/IAEA meetings and through IAEA expert assignments to countries in Africa.

  19. Performance indicators for rinderpest surveillance

    International Nuclear Information System (INIS)

    2001-12-01

    In 1986, the Joint FAO/IAEA Division of Nuclear Techniques in Food and Agriculture initiated a programme of assistance to FAO and IAEA Member States for the development of effective, quality assured veterinary laboratory diagnostic services. This programme introduced the use of standardized and internationally validated ELISA-based systems for the diagnosis and surveillance of the major transboundary diseases that affect livestock. This approach has proved of immense value in the monitoring of national, regional and global animal disease control and eradication programmes. One such programme focuses on the global elimination of rinderpest. Co-ordinated by FAO through the Global Rinderpest Eradication Programme (GREP) the joint FAO/IAEA Division of Nuclear Techniques in Food and Agriculture has developed critical diagnostic and epidemiological tools to assist this effort. As the final stages of the global eradication of rinderpest are reached, it is fitting that the Joint Division should again take the lead in providing guidance to Member States on how best to meet the criteria for quality assurance of national disease surveillance programmes - a prerequisite for international acceptance of freedom from a particular disease. This publication is intended to provide countries involved in rinderpest eradication with a detailed protocol for using performance indicators in evaluating their disease surveillance system and making, where necessary, adjustments to meet the criteria for acceptance specified in the OIE Rinderpest Pathway - a pathway that leads to international recognition of freedom from rinderpest. An initial publication (IAEA-TECDOC-1161) described guidelines for the use of performance indicators in rinderpest surveillance programmes. This publication now describes in detail the protocols and the linked indicators which have been developed and field validated through a series of FAO/IAEA meetings and through IAEA expert assignments to countries in Africa

  20. Security surveillance challenges and proven thermal imaging capabilities in real-world applications

    Science.gov (United States)

    Francisco, Glen L.; Roberts, Sharon

    2004-09-01

    Uncooled thermal imaging was first introduced to the public in early 1980's by Raytheon (legacy Texas Instruments Defense Segment Electronics Group) as a solution for military applications. Since the introduction of this technology, Raytheon has remained the leader in this market as well as introduced commercial versions of thermal imaging products specifically designed for security, law enforcement, fire fighting, automotive and industrial uses. Today, low cost thermal imaging for commercial use in security applications is a reality. Organizations of all types have begun to understand the advantages of using thermal imaging as a means to solve common surveillance problems where other popular technologies fall short. Thermal imaging has proven to be a successful solution for common security needs such as: ¸ vision at night where lighting is undesired and 24x7 surveillance is needed ¸ surveillance over waterways, lakes and ports where water and lighting options are impractical ¸ surveillance through challenging weather conditions where other technologies will be challenged by atmospheric particulates ¸ low maintenance requirements due to remote or difficult locations ¸ low cost over life of product Thermal imaging is now a common addition to the integrated security package. Companies are relying on thermal imaging for specific applications where no other technology can perform.