WorldWideScience

Sample records for vessel security officer

  1. 33 CFR 104.215 - Vessel Security Officer (VSO).

    Science.gov (United States)

    2010-07-01

    ... board and in port. (iv) Protection of the marine environment: (A) Understanding of vessel personnel's responsibility to preserve the marine environment; and (B) Basic working knowledge of pollution prevention... security plan; (ii) Assessing security risk, threat and vulnerability; (iii) Undertaking regular...

  2. Change of Computer Security Officer

    CERN Multimedia

    IT Department

    2008-01-01

    After many years of successfully protecting the CERN site in her role as Computer Security Officer (CSO), Denise Heagerty is being assigned to a new role within the IT Department. David Myers has been appointed to the position of CSO for one year from 1st September. W. von Rüden, IT Department Head

  3. Security and Office Administration Coordinator | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Job Summary Under the supervision of the Manager, Local Operations (MLO), the Security and Office Administration Coordinator effectively manages all matters related to the security of IDRC employees in Nairobi, and to the protection of assets at the ROSSA. The incumbent collaborates with the Office Administration ...

  4. Analisa Greenwater Akibat Gerakan Offshore Security Vessel

    Directory of Open Access Journals (Sweden)

    Maulidya Octaviani Bustamin

    2012-09-01

    Full Text Available Analisa  Tugas  Akhir  ini,  terdiri  atas  beberapa  tahapan.  Yang pertama yaitu perancangan struktur Offshore Security Vessel (OSV dengan bantuan software MAXSURF guna mendapatkan Lines Plan. Offset data yang diperoleh digunakan dalam pemodelan menggunakan MOSES,  kemudian  dilakukan  analisa  gerak  OSV  dalam  gelombang  regular  dan dinyatakan dalam grafik RAO. Analisa gerak relatif vertikal  haluan dihitung dari RAO gerakan, dan kemudian melakukan evaluasi perilaku di gelombang acak dengan analisis spektra gelombang. Dari analisa spektra didapatkan parameter greenwater sehingga dapat dihitung peluang, intensitas dan tekanan greenwater. Dari hasil analisa diperoleh RAO gerak vertikal Offshore Security Vessel (OSV pada  gelombang  reguler yang dipengaruhi  oleh  kecepatan,  kondisi  muatan  dan arah gelombang. Peluang terjadinya greenwater terbesar terjadi pada sudut datang gelombang following sea (0o dimana harga terbesar terjadi pada ω = 0.2 rad/sec dengan periode 29 detik mencapai 0.477. Intensitas greenwater terbesar terjadi pada saat sudut datang gelombang following sea (0o adalah sebanyak 59.265 per jam dan 0.378 per detik. Tekanan greenwater terbesar terjadi pada saat sudut datang gelombang head sea (180o sebesar 1678x10-6 MPa. Dengan nilai tersebut, deck mampu menahan beban akibat tekanan greenwater.

  5. 77 FR 2019 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-01-13

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI AGENCY: Coast Guard, DHS. ACTION: Temporary interim rule with...

  6. 77 FR 24381 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-04-24

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI AGENCY: Coast Guard, DHS. ACTION: Temporary interim rule...

  7. 32 CFR 2400.42 - Security Officer.

    Science.gov (United States)

    2010-07-01

    ... serve as the Security Officer and will supervise the administration of this Regulation. He/she will... listing by title and name of all persons who have been designated in writing to have original Top Secret... listing of OSTP officials designated in writing to have declassification and downgrading authority. (d...

  8. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Science.gov (United States)

    2010-07-01

    ... baggage; and (vi) Vessel stores; (2) Threat assessments, including the purpose and methodology of the... availability of security communications, information, and equipment. (c) Analysis and recommendations. In... may, if damaged or used illicitly, pose a risk to people, property, or operations on board the vessel...

  9. 42 CFR 401.130 - Materials available at social security district offices and branch offices.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Materials available at social security district... Confidentiality and Disclosure § 401.130 Materials available at social security district offices and branch... inspection at the social security district offices and branch offices: (1) Compilation of the Social Security...

  10. Report of the DHS Small Vessel Security Institute

    Science.gov (United States)

    2007-10-19

    approach implemented by the Aircraft Owners and Pilots Association 54 National Small Vessel Security Summit ( AOPA ). This program encourages...implemented by the Aircraft Owners and Pilots Association ( AOPA ). • Security zone: provide much more information to the boating public so that...One stakeholder recommended that the AWW adapt the “Lock Up. Look Out” program implemented by the Aircraft Owners and Pilots Association ( AOPA ). This

  11. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Science.gov (United States)

    2012-10-17

    ... SECURITY Coast Guard Facility Security Officer Training Requirements; Correction AGENCY: Coast Guard, DHS...), announcing a public meeting to receive comments on the development of a Facility Security Officer training program. The notice contains an inaccurate Internet link to RSVP for the public meeting. DATES: The notice...

  12. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy... submitted to the Information Security Oversight Office (ISOO) no later than Wednesday, March 17, 2010. ISOO... regulation 41 CFR 101-6, announcement is made for a meeting of the National Industrial Security Program...

  13. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Science.gov (United States)

    2010-07-01

    ... vessel stores and bunkers. 104.280 Section 104.280 Navigation and Navigable Waters COAST GUARD... § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or operator must ensure that security measures relating to the delivery of vessel stores and bunkers are...

  14. 78 FR 13691 - Guidance Regarding Inspection and Certification of Vessels Under the Maritime Security Program

    Science.gov (United States)

    2013-02-28

    ... SECURITY Coast Guard Guidance Regarding Inspection and Certification of Vessels Under the Maritime Security... availability of Navigation and Vessel Inspection Circular (NVIC) 01-13, ``Inspection and Certification of Vessels Under the Maritime Security Program (MSP).'' The MSP serves as a means for establishing a fleet of...

  15. The chief information security officer insights, tools and survival skills

    CERN Document Server

    Kouns, Barry

    2011-01-01

    Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills.

  16. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Science.gov (United States)

    2010-07-01

    ... vessel stores and bunkers. 105.270 Section 105.270 Navigation and Navigable Waters COAST GUARD... Requirements § 105.270 Security measures for delivery of vessel stores and bunkers. (a) General. The facility owner or operator must ensure that security measures relating to the delivery of vessel stores and...

  17. 49 CFR 1562.29 - Armed security officer requirements.

    Science.gov (United States)

    2010-10-01

    ... security officer onboard an aircraft operating into or out of DCA may not consume alcohol or use an...) Is not under the influence of alcohol or another intoxicating or hallucinatory drug or substance; and... service with a public agency as a law enforcement officer, other than for reasons of mental instability...

  18. Trusted Mobile Client for Document Security in Mobile Office Automation

    OpenAIRE

    Xiaojun Yu; Qiaoyan Wen

    2011-01-01

    Mobile Office Automation is a popular application on the mobile platform. However, the mobile platform has no enough security protection in front of the open system, such as internet. The document security problem in this application has become a hot topic. This paper proposed a new solution to this problem. The solution based on the trusted computing technology, which implements the platform security by hardware. The solution also includes the transparent encryption technology that means app...

  19. 76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security

    Science.gov (United States)

    2011-10-07

    ... URBAN DEVELOPMENT Order of Succession for the Office of Disaster Management and National Security AGENCY... Security Officer, Office of Disaster Management and National Security, Department of Housing and Urban... functions and duties of the Chief Disaster and National Security Officer, Office of Disaster Management and...

  20. POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-09-01

    Full Text Available This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices, to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.

  1. 77 FR 61771 - Facility Security Officer Training Requirements

    Science.gov (United States)

    2012-10-11

    ... comment on a draft model FSO training course and other elements of the FSO training program. DATES: A... receive comments on the development of a Facility Security Officer training program, with the primary... comments on a draft model FSO training course as well as other aspects of the FSO training program. A draft...

  2. Exploring questions of power: Peace officers and private security ...

    African Journals Online (AJOL)

    Private security officers (PSOs) are well positioned to help the police, as they may witness crimes in the course of their duties. PSOs protect organisations (public and private) and individuals as their paying clients. But the PSOs can only perform their duty as ordinary citizens, not as police. This article presents the findings of ...

  3. 33 CFR 104.225 - Security training for all other vessel personnel.

    Science.gov (United States)

    2010-07-01

    ..., whether part-time, full-time, temporary, or permanent, must have knowledge of, through training or equivalent job experience in the following, as appropriate: (a) Relevant provisions of the Vessel Security...

  4. 76 FR 63547 - Security Zone; Columbia and Willamette Rivers, Dredge Vessels Patriot and Liberty

    Science.gov (United States)

    2011-10-13

    ... Patriot and Liberty AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary security zone within 200 yards of the Dredge Vessels Patriot and Liberty while the... due to insufficient time in which to publish an NPRM since the Dredge Vessels Patriot and Liberty...

  5. 75 FR 45055 - Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2010-08-02

    ... Vessels, Puget Sound, WA AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The U.S. Coast... vessels while underway in the Puget Sound Captain of the Port (COTP) Area of Responsibility (AOR). These... remaining in the security zones unless authorized by the COTP, Puget Sound or Designated Representative...

  6. Report of the DHS National Small Vessel Security Summit

    Science.gov (United States)

    2007-10-19

    Summit ( AOPA ). This program encourages private pilots to secure their aircraft to prevent possible thefts, which could help impede terrorists. He...adopt the “Lock Up. Look Out.” approach implemented by the Aircraft Owners and Pilots Association ( AOPA ). • Security zone: provide much more...Owners and Pilots Association ( AOPA ). This program encourages private pilots to secure their aircraft, get to know their fellow hangar tenants

  7. 77 FR 50926 - Security Zones; Certain Dangerous Cargo Vessels, Tampa, FL

    Science.gov (United States)

    2012-08-23

    ... anhydrous ammonia, liquefied propane gas (LPG), and ammonium nitrate. The security zones will start at buoys... CDC vessel is one carrying anhydrous ammonia, liquefied propane gas, and ammonium nitrate. The.... 14. Environment We have analyzed this rule under Department of Homeland Security Management Directive...

  8. 76 FR 62433 - Delegation of Authority to the Office of Disaster Management and National Security

    Science.gov (United States)

    2011-10-07

    ... URBAN DEVELOPMENT Delegation of Authority to the Office of Disaster Management and National Security... Secretary delegates authority to the Chief Disaster and National Security Officer, Office of Disaster Management and National Security. DATES: Effective Date: September 30, 2011. FOR FURTHER INFORMATION CONTACT...

  9. 75 FR 68370 - Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...

    Science.gov (United States)

    2010-11-05

    ... Infrastructure Protection; Chemical Security Awareness Training Program AGENCY: National Protection and Programs... currently approved information collection request (ICR) for the Chemical Security Awareness Training Program... Management Office. ] Title: Chemical Security Awareness Training Program. OMB Number: 1670-0009. CSATP...

  10. Vessel-sourced pollution: a security threat in Malaysian waters ...

    African Journals Online (AJOL)

    Vessel-sourced pollution is one of the major sources of marine pollution and it encompasses accidental discharge of oil, intentional discharge of oil (like discharge from ballast tanks), chemicals, dumping, etc. The United Nations Convention on the Law of the Sea (UNCLOS), 1982 and some other conventions make ...

  11. Violence and psychological distress among police officers and security guards.

    Science.gov (United States)

    Leino, T M; Selin, R; Summala, H; Virtanen, M

    2011-09-01

    Police officers and security guards are more exposed to violence during their work duties than the general workforce and it can damage their psychological health. Still research on specific forms of violence and a potential pathway through which violence may affect distress is scarce. The aim of this study was to investigate the association of two forms of violence with distress among police officers and security guards and whether personal worry about future violence mediates this association. Violence was specified as physically violent acts and threats or assaults with a deadly weapon. Symptoms of psychological distress were measured using the General Health Questionnaire-12 scale. Analyses of 1993 completed responses (response rate 58%) showed that the odds ratio of distress for 'physically violent acts was' 1.67 (95% CI = 1.11-2.51) and for 'threats or assaults with a deadly weapon' 1.62 (95% CI = 1.20-2.17). When personal worry about future violence was taken into account, the association between exposure to physically violent acts and distress was completely broken. Instead, with the same adjustment, the association between exposure to threats or assaults with a deadly weapon and distress held. The results indicate that the association between physically violent acts and distress is mediated by personal worry about future violence, while threats or assaults with a deadly weapon had a stronger and independent association with distress. It is concluded that there is association between violence and distress. Personal worry about future violence mediates this association.

  12. VESSEL-SOURCED POLLUTION: A SECURITY THREAT IN ...

    African Journals Online (AJOL)

    more than 80 per cent and 90 per cent of China's and Japan's oil respectively pass through this route.44 The presence of heavy ships traversing the Straits. 44 Stommy-Annika M, and Grob F, 'Piracy and World Trade: The Economic Cost' in Mair .S, (ed), Piracy and Maritime Security, (Germany Institute for International and ...

  13. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Science.gov (United States)

    2012-12-26

    ... RECORDS ADMINISTRATION Information Security Oversight Office; State, Local, Tribal, and Private Sector... matters relating to the Classified National Security Information Program for State, Local, Tribal, and... number of individuals planning to attend must be submitted to the Information Security Oversight Office...

  14. 24 CFR 960.505 - Occupancy by police officers to provide security for public housing residents.

    Science.gov (United States)

    2010-04-01

    ... provide security for public housing residents. 960.505 Section 960.505 Housing and Urban Development... provide security for public housing residents. (a) Police officer. For purpose of this subpart E, “police... security for residents of a public housing development, the PHA may allow police officers who would not...

  15. Computer Security Considerations in Federal Procurements: A Guide for Procurement Initiators, Contracting Officers and Computer Security Officials

    Science.gov (United States)

    1992-03-01

    Computer Security Act of 198’ (Pub. L. 100-235) and Office of Management and Budget Circular A-130 mandate that U.S. Government agencies protect automated information and the resources used to process it (hardware, firmware, and software). OMB Circular A-130 specifically mandates that, as a part of protecting computer systems, agencies incorporate computer security in the system acquisition process. This NIST Special Publication provides guidance for federal procurement initiators, contracting officers, and computer security

  16. 78 FR 261 - Moving Security Zone Around Escorted Vessels on the Lower Mississippi River

    Science.gov (United States)

    2013-01-03

    ... been deemed by the COTP New Orleans to require escort protection during transit between mile marker 88... the Port of New Orleans (COTP New Orleans) is establishing a Moving Security Zone on the Mississippi river, mile marker 88.0 through mile marker 106.0, extending 300 yards on all sides of vessels being...

  17. 33 CFR 165.1405 - Regulated Navigation Areas and Security Zones; Designated Escorted Vessels-Philippine Sea and...

    Science.gov (United States)

    2010-07-01

    ... Security Zones; Designated Escorted Vessels-Philippine Sea and Apra Harbor, Guam (including Cabras Island... Areas and Security Zones; Designated Escorted Vessels-Philippine Sea and Apra Harbor, Guam (including... point of origin. (2) Apra Harbor, Guam—All waters from surface to bottom of Apra Harbor, Guam, shoreward...

  18. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  19. 12 CFR 344.9 - Personal securities trading reporting by bank officers and employees.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Personal securities trading reporting by bank... TRANSACTIONS § 344.9 Personal securities trading reporting by bank officers and employees. (a) Officers and... indirect influence or control; (2) Transactions in registered investment company shares; (3) Transactions...

  20. Physician office readiness for managing Internet security threats.

    Science.gov (United States)

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  1. The information systems security officer's guide establishing and managing an information protection program

    CERN Document Server

    Kovacich, Gerald L

    2003-01-01

    Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

  2. 12 CFR 551.150 - How do my officers and employees file reports of personal securities trading transactions?

    Science.gov (United States)

    2010-01-01

    ... of personal securities trading transactions? 551.150 Section 551.150 Banks and Banking OFFICE OF... TRANSACTIONS Securities Trading Policies and Procedures § 551.150 How do my officers and employees file reports of personal securities trading transactions? An officer or employee described in § 551.140(d) must...

  3. 20 CFR 220.56 - Securing medical evidence at the hearings officer hearing level.

    Science.gov (United States)

    2010-04-01

    ... reasoning will be explained in the decision rationale. Where such resolution is not possible, the hearings officer will secure additional medical evidence (e.g., clinical findings, laboratory test, diagnosis...

  4. Overlapping values, mutual prejudices. Empirical research into the ethos of police officers and private security guards

    NARCIS (Netherlands)

    Steden, van R.; Wal, van der Z.; Lasthuizen, K.M.

    2015-01-01

    What determines professional motivations and values of security operatives: sector or profession? Our paper aims to answer this question by reporting on a survey study among police officers (n=405) and private security guards (n=329) in the Netherlands. Our results show that both groups closely

  5. Biometric Enhancement of Home and Office Security to Reduce ...

    African Journals Online (AJOL)

    Insecurity is posing national threat in Nigeria today. You do not know who your next door neighbor is, because of security challenges in the country. Indiscriminate killing of innocent people, kidnapping, fraud by unknown person is becoming a worrisome national problem. The question is how do we minimize this menace?

  6. POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    OpenAIRE

    I. A. Zikratov; A. V. Gurtov; T. V. Zikratova; Kozlova, E. V.

    2014-01-01

    This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for inform...

  7. Training security officers to recognize the perils of weapons of mass destruction and pandemic flu contaminates.

    Science.gov (United States)

    Luizzo, Anthony J; Scaglione, Bernard J

    2007-01-01

    In order to effectively manage disasters, hospital security operatives need to learn the ABC's of diagnosing exposure models, spotting exposed persons, and donning appropriate contaminate-controlling attire to limit potential exposure. This article spells out how the establishment of a WMD training program gives the Security Department the capability of helping to contain WMD exposures before they adversely impact the institutional setting. The department's "awesome" role in keeping hospitals free from contamination requires, according to the authors, dedicated, well trained, appropriately equipped, and highly motivated security officers who keep a watchful eye over the institutions they protect.

  8. Securing Wireless LANs A Practical Guide for Network Managers, LAN Administrators and the Home Office User

    CERN Document Server

    Held, Gilbert

    2003-01-01

    Wireless LANs will enable small teams and communities to communicate via their mobile devices without cables. This new technology will facilitate communication in small businesses/teams such as in hospitals, on construction sites, warehouses, etc.Held provides a comprehensive guide to the implementation, planning and monitoring of all aspects of wireless LAN security in small offices/small to medium business (SMBs).Securing Wireless LANs is timely in addressing the security issues of this important new technology and equips its readers with the tools they need to make the appropriate choice fo

  9. The Impact of the Structure, Function, and Resources of the Campus Security Office on Campus Safety

    Science.gov (United States)

    Bennett, Patricia Anne

    2012-01-01

    The topic of this dissertation is college and university safety. This national quantitative study utilized resource dependency theory to examine relationships between the incidence of reported campus crimes and the structure, function, and resources of campus security offices. This study uncovered a difference in reported total crime rates,…

  10. Accessibility and security of digital records in the Office of the ...

    African Journals Online (AJOL)

    This paper investigates the accessibility and security of digital records in the Office of the Premier (OTP) in Eastern Cape. A case study was conducted in the OTP for a period of 6 weeks. Questionnaires, interviews, observations and document analysis were used to collect data. It was established that the department does ...

  11. 77 FR 33605 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2012-06-07

    ... Security State, Local, and Regional Fusion Center Initiative PIA, December 11, 2008 (point 6) and whether..., Reporting, Analysis, and Fusion System of Records AGENCY: Privacy Office, DHS. ACTION: Final rule. SUMMARY..., and Fusion System of Records'' from certain provisions of the Privacy Act. Specifically, the...

  12. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-11-30

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met.

  13. The Future Security Environment: Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent

    Science.gov (United States)

    2015-09-01

    Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent FOR THIS AND OTHER PUBLICATIONS, VISIT US AT http://www.carlisle.army.mil...SUBTITLE The Future Security Environment: Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...DIFFERENTIATE AND GROW MILLENNIAL OFFICER TALENT Colonel Michael J. Arnold September 2015 The views expressed in this report are those of the author and do

  14. USCG Vessel

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  15. Wireless Sensor Buoys for Perimeter Security of Military Vessels and Seabases

    Science.gov (United States)

    2015-12-01

    RELATED TECHNOLOGICAL APPLICATIONS ..................................14 1. Wireless Sensor Networks...methods to protect property and assets. Some critical facilities such as military bases, nuclear power plants , and borders have begun to...base, nuclear power plant , border, or other secured area” [1]. The concept of maintaining a secure perimeter is highly relevant in modern times

  16. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge... duties must maintain a TWIC, and must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition...

  17. 76 FR 17782 - Security Zone: Passenger Vessels, Sector Southeastern New England Captain of the Port Zone

    Science.gov (United States)

    2011-03-31

    ... evaluate its effects on them and participate in the rulemaking process. If you think your small business or... will not restrict any waterway for a long period of time. The vast majority of passenger vessel... would have a significant economic impact on a substantial number of small entities. The term ``small...

  18. 76 FR 47996 - Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA; Correction

    Science.gov (United States)

    2011-08-08

    ... (NCSM 702), CCGS SIYAY, and the USCGC ALERT (WMEC 630) which include all waters within 500 yards from... (NCSM 702), CCGS SIYAY, and the USCGC ALERT (WMEC 630) while these vessels are participating in the... within 500 yards of the HMCS WHITEHORSE (NCSM 705), HMCS NANAIMO (NCSM 702), CCGS SIYAY, and the USCGC...

  19. 77 FR 44475 - Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2012-07-30

    ... Vessels, Puget Sound, WA AGENCY: Coast Guard, DHS. ACTION: Notice of enforcement of regulation. SUMMARY... Anthony P. LaBoy, Sector Puget Sound, Waterways Management Division, U.S. Coast Guard; telephone 206-217-6323, email SectorPugetSound[email protected] . If you have questions on viewing the docket, call Renee V...

  20. Cost-Benefit Analysis Methodology: Install Commercially Compliant Engines on National Security Exempted Vessels?

    Science.gov (United States)

    2015-11-05

    Carderock Division (NAVSSES), Machinery Research and Engineering Dept., Philadelphia, PA, USA. 2. Life Cycle Engineering, Federal Solutions Group , Energy...Federal Solutions Group , Energy Programs, Pittsburgh, PA, USA. 3. Alion Science and Technology, Industrial Engineering Division, Analysis Department...designation of Emission Control Area ( ECA ) now applies to all U.S. coasts. Within ECAs , all vessels, regardless of flag, are required to meet the

  1. 77 FR 30400 - Moving Security Zone Around Escorted Vessels on the Lower Mississippi River

    Science.gov (United States)

    2012-05-23

    ... deemed by the COTP New Orleans to require escort protection during transit between mile marker 90.0 to... the Port of New Orleans (COTP New Orleans) is re-establishing and extending the effective period for the moving security zone on the Mississippi river, mile marker 90 through mile marker 110, extending...

  2. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  3. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    Energy Technology Data Exchange (ETDEWEB)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  4. The Effects of Personality Traits on Being Perceived as a Leader: An Empirical Study in a Private Security Officer Sample

    OpenAIRE

    Engin Balli

    2013-01-01

    Leaders function as a person who influence followers to contribute toward the performance of their organizations. So, it is critical in organizational efficiency to know who would be perceived as a leader by followers, and which characteristics and behaviours are necessary for leadership. The purpose of this research is to study the effects of personality traits on being perceived as a leader in a private security officer sample, in Turkey which has different cultural characteristics from cou...

  5. 46 CFR 11.462 - Endorsements for master or mate of uninspected fishing industry vessels.

    Science.gov (United States)

    2010-10-01

    ... industry vessels. 11.462 Section 11.462 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT... Officers § 11.462 Endorsements for master or mate of uninspected fishing industry vessels. (a) This section..., which are documented to engage in the fishing industry, with the exception of: (1) Wooden ships of...

  6. 46 CFR 78.30-20 - Master's and officer's responsibility.

    Science.gov (United States)

    2010-10-01

    ... responsibility. (a) Nothing in this part shall exonerate any master or officer in command from the consequences... 46 Shipping 3 2010-10-01 2010-10-01 false Master's and officer's responsibility. 78.30-20 Section 78.30-20 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS...

  7. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... information to carry out national security, law enforcement, immigration, intelligence, or other functions... including phone numbers, e-mail addresses, and address; Physical description including height, weight, eye... information; Watch list information; Medical records; Financial information; Results of intelligence analysis...

  8. 77 FR 54808 - Vessels in Foreign and Domestic Trades

    Science.gov (United States)

    2012-09-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Customs and Border Protection 19 CFR Part 4 Vessels in Foreign and Domestic Trades CFR Correction In Title 19 of the Code of Federal Regulations, Parts 1 to 99, revised as of April 1, 2012, on page...

  9. Report: EPA Needs to Improve Physical Security at Its Offices in Las Vegas, Nevada

    Science.gov (United States)

    Report #10-P-0059, February 3, 2010. EPA needs to improve physical security at its Las Vegas facilities. The Las Vegas Finance Center’s (LVFC’s) server room and other key areas are susceptible to unauthorized access by personnel not a part of LVFC.

  10. 76 FR 5603 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-02-01

    ... article or who use traditional and/or social media in real time to keep their audience situationally aware... Coordination and Planning--004 Publicly Available Social Media Monitoring and Situational Awareness Initiative... it proposes to establish a new Department of Homeland Security system of records titled, ``Department...

  11. 75 FR 69689 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2010-11-15

    ..., DHS leadership, and participation in interagency operations. OPS integrates DHS and interagency... the DHS Records Officer to develop a NARA approved retention schedule. System Manager and address... able to conduct an effective search, and your request may be denied due to lack of specificity or lack...

  12. Design of an Officer Assignment and Career Planning Decision Support System for Electronic Security Command

    Science.gov (United States)

    1988-12-01

    vii Abstract .............................. viii I. Introduction ......................... 1 Air Force Assignment Guidelines ............. 1 Air Force...PLANNING DECISION SUPPORT SYSTEM FOR ELECTRONIC SEORITY COMMAND I. Introduction Air Force Assionment Guidelines The primary objective of the officer...to multiple-criteria decision making (MC)M): 1) Multi-attribute decision analysis (MADA), which "is the descriptive version of MCDM " and 2) rulti

  13. 76 FR 28315 - Security Zone; Vessels Carrying Hazardous Cargo, Sector Columbia River Captain of the Port Zone

    Science.gov (United States)

    2011-05-17

    ... cargoes include, but are not limited to, liquefied petroleum gas, ammonium nitrate and associated mixtures... Department of Homeland Security Management Directive 023-01 and Commandant Instruction M16475.lD, which guide...

  14. 75 FR 76328 - Security Zone; Vessels Carrying Hazardous Cargo, Sector Columbia River Captain of the Port Zone

    Science.gov (United States)

    2010-12-08

    ... to, liquefied petroleum gas, ammonium nitrate and associated mixtures, anhydrous ammonia, and... of Homeland Security Management Directive 023-01 and Commandant Instruction M16475.1D, which guide...

  15. TRAINING OF DEVELOPMENT OF SKILLS OF PROFESSIONAL COMMUNICATION THE SECURITY OFFICER OF THE CRIMINAL INVESTIGATION DEPARTMENT OF THE INTERNAL AFFAIRS

    Directory of Open Access Journals (Sweden)

    Yuliya Leonidovna Lampusova

    2015-08-01

    Full Text Available Training is a form of active learning that is aimed at developing knowledge, skills, and attitudes. To improve operational security officers of Internal Affairs Agencies activity, we have schemed out training for the development of communication skills. This paper presents the exercises focusing on the professional communication skills of employees of the Criminal Investigation Department of the Interior development. Eight exercises are described, the main objectives of them are: learning to navigate the feelings of the partner, the ability to change the position of the interlocutor, the formation of the ability to listen to the end and not to interrupt, developing the ability to talk, improving the communicative competence and the development of the ability to accurately convey information.

  16. 49 CFR 1548.16 - Security threat assessments for each proprietor, general partner, officer, director, and certain...

    Science.gov (United States)

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.16 Security... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for each proprietor...

  17. USCG Vessel Events

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  18. USCG Vessel Pollution

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  19. 77 FR 6013 - Moving Security Zone Around Escorted Vessels On the Lower Mississippi River Between Mile Marker...

    Science.gov (United States)

    2012-02-07

    ... Lower Mississippi River Between Mile Marker 90.0 Above Head of Passes to Mile Marker 110.0 Above Head of Passes AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Captain of the Port of New Orleans (COTP New Orleans) has established moving security zones on the Mississippi River, from mile...

  20. U.S. Department of Energy Office of Health, Safety and Security Illness and Injury Surveillance Program Worker Health at a Glance, 2000-2009

    Energy Technology Data Exchange (ETDEWEB)

    Strader, Cliff [US Dept. of Energy, Washington, DC (United States); Richter, Bonnie [US Dept. of Energy, Washington, DC (United States)

    2013-01-23

    The Worker Health at a Glance, 2000 – 2009 provides an overview of selected illness and injury patterns among the current DOE contractor workforce that have emerged over the 10-years covered by this report. This report is a roll-up of data from 16 individual DOE sites, assigned to one of three program offices (Office of Environmental Management, Office of Science and the National Nuclear Security Administration). In this report, an absences is defined as 40 or more consecutive work hours (5+ calendar days) off the job. Shorter absences were not included.

  1. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  2. Vessel Operating Units (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains data for vessels that are greater than five net tons and have a current US Coast Guard documentation number. Beginning in1979, the NMFS...

  3. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  4. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis

    OpenAIRE

    van Dongen Diana; Smid Tjabe; Timmermans Daniëlle RM

    2011-01-01

    Abstract Background The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Methods Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on ...

  5. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis.

    Science.gov (United States)

    van Dongen, Diana; Smid, Tjabe; Timmermans, Daniëlle R M

    2011-11-09

    The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. © 2011 van Dongen et al; licensee BioMed Central Ltd.

  6. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    van Dongen Diana

    2011-11-01

    Full Text Available Abstract Background The amount of exposure to electromagnetic fields (EMF at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Methods Three occupational groups, the general Dutch working population (n = 567, airport security officers who work with metal detectors (n = 106, and MRI radiographers who work with MRI (n = 193, were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Results Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. Conclusions These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF.

  7. Emotional Exhaustion and Job Satisfaction in Airport Security Officers - Work-Family Conflict as Mediator in the Job Demands-Resources Model.

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners' job performance. The present study bridges this research gap by applying the job demands-resources (JD-R) model and using work-family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD-R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  8. 76 FR 21768 - Privacy Act of 1974; Department of Homeland Security/Office of Health Affairs-001 Contractor...

    Science.gov (United States)

    2011-04-18

    ... exercise oversight over all medical and public health activities of'' DHS. Section II, DHS Delegation 5001.... 321e by granting the Chief Medical Officer ``the authority to exercise oversight over all medical and..., in support of the Office of Health Affair's responsibilities for medical and health matters. This...

  9. 76 FR 18614 - Bureau of Diplomatic Security, Office of Foreign Missions; 60-Day Notice of Proposed Information...

    Science.gov (United States)

    2011-04-04

    ...: Notice of request for public comments. SUMMARY: The Department of State is seeking Office of Management....S. and bonded warehouse vendors. Estimated Number of Respondents: 1,005 missions. Estimated Number... Office of Foreign Missions' electronic data submission (e-Gov) Bonded Warehouse program. This application...

  10. A Systematic Approach to Applying Lean Techniques to Optimize an Office Process at the Y-12 National Security Complex

    Energy Technology Data Exchange (ETDEWEB)

    Credille, Jennifer [Y-12 National Security Complex, Oak Ridge, TN (United States); Univ. of Tennessee, Knoxville, TN (United States); Owens, Elizabeth [Y-12 National Security Complex, Oak Ridge, TN (United States); Univ. of Tennessee, Knoxville, TN (United States)

    2017-10-11

    This capstone offers the introduction of Lean concepts to an office activity to demonstrate the versatility of Lean. Traditionally Lean has been associated with process improvements as applied to an industrial atmosphere. However, this paper will demonstrate that implementing Lean concepts within an office activity can result in significant process improvements. Lean first emerged with the conception of the Toyota Production System. This innovative concept was designed to improve productivity in the automotive industry by eliminating waste and variation. Lean has also been applied to office environments, however the limited literature reveals most Lean techniques within an office are restricted to one or two techniques. Our capstone confronts these restrictions by introducing a systematic approach that utilizes multiple Lean concepts. The approach incorporates: system analysis, system reliability, system requirements, and system feasibility. The methodical Lean outline provides tools for a successful outcome, which ensures the process is thoroughly dissected and can be achieved for any process in any work environment.

  11. 75 FR 75486 - Maritime Security Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk...

    Science.gov (United States)

    2010-12-03

    ... Manager, Docket Operations, telephone 202-366-9826. SUPPLEMENTARY INFORMATION: Somali pirates operate... thwarting pirate attacks and incorporates lessons-learned since the issuance of Revision 2. MARSEC Directive... underway, the vessels are subjected to the same type of threats from attacking pirates. Vessels berthed in...

  12. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Science.gov (United States)

    2010-01-01

    ... Information/Privacy Act Program, Department of Justice, 425 Eye Street, NW., 2nd Floor, ULLICO Building... Service: Chief, FOIA Information Management Branch, GSA (CAIM), 1800 F Street, NW., Washington, DC 20405... SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Pt. 5, App. A Appendix A to Part 5—FOIA/Privacy Act Offices...

  13. 15 CFR 758.7 - Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs...

    Science.gov (United States)

    2010-01-01

    ... EAR. Officials of BIS, the Office of Export Enforcement, the U.S. Customs Service and postmasters... with the EAR. This includes assuring that: (1) Exports without a license issued by BIS are either..., correspondence, and any other relevant documents, as well as furnish other information bearing upon a particular...

  14. Emotional Exhaustion and Job Satisfaction in Airport Security Officers − Work−Family Conflict as Mediator in the Job Demands–Resources Model

    Directory of Open Access Journals (Sweden)

    Sophie eBaeriswyl

    2016-05-01

    Full Text Available The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners. Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD−R model and using work–family conflict (WFC as an intervening variable to study relationships between work characteristics (workload and supervisor support, emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a supervisor support as a major job resource predicted job satisfaction among screeners; (b workload as a major job demand predicted their emotional exhaustion; and (c WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  15. Emotional Exhaustion and Job Satisfaction in Airport Security Officers – Work–Family Conflict as Mediator in the Job Demands–Resources Model

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD–R) model and using work–family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed. PMID:27242581

  16. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  17. 76 FR 2402 - Maritime Security Directive 104-6 (Rev 5); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2011-01-13

    ... pirates operate along a 2,300 mile coast and in 2.5 million square miles of ocean. Given the size and... management practices that have proven to be successful in thwarting pirate attacks and incorporates lessons... subjected to the same type of threats from attacking pirates. Vessels berthed in high risk waters should...

  18. Research vessels

    Digital Repository Service at National Institute of Oceanography (India)

    Rao, P.S.

    by the research vessels RV Gaveshani and ORV Sagar Kanya are reported. The work carried out by the three charted ships is also recorded. A short note on cruise plans for the study of ferromanganese nodules is added...

  19. 75 FR 33885 - Office of International Affairs; Survey of Foreign Ownership of U.S. Securities as of June 30, 2010

    Science.gov (United States)

    2010-06-15

    ..., corporation, financial institution, or other entity or instrumentality thereof, including a government... securities (including selected money market instruments), and long-term debt securities. How To Report...

  20. Office of Personnel Management Catch 62 Match

    Data.gov (United States)

    Social Security Administration — SSA provides the Office of Personnel Management (OPM) with tax returns, Social Security benefits, and military retirement information for the purpose of correctly...

  1. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  2. 46 CFR 153.9 - Foreign flag vessel endorsement application.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Foreign flag vessel endorsement application. 153.9... Foreign flag vessel endorsement application. (a) Application for a vessel whose flag administration is... endorsement from the cognizant Officer in Charge, Marine Inspection and have aboard the vessel copies of IMO...

  3. 77 FR 4573 - Maritime Security Directive 104-6 (Rev 6); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2012-01-30

    ... voyages through or in designated high risk waters, and provides additional counter-piracy guidance and... review of global piracy and terrorism threats. MARSEC Directive 104-6 (Rev 2) provided additional counter... Transportation/Maritime Administration, Office of Naval Intelligence, Department of Commerce, Department of...

  4. 75 FR 32840 - Securities Offering Disclosures

    Science.gov (United States)

    2010-06-09

    ... Office of Thrift Supervision Securities Offering Disclosures AGENCY: Office of Thrift Supervision (OTS... on the following information collection. Title of Proposal: Securities Offering Disclosures. OMB... requirement: 12 CFR 563g. Description: The Securities Offering regulation provides necessary information...

  5. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  6. 78 FR 30388 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel SAFARI; Invitation for Public...

    Science.gov (United States)

    2013-05-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel SAFARI... of the vessel SAFARI is: Intended Commercial Use Of Vessel: ``Sailing charters, tourism''. Geographic...

  7. 76 FR 79763 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel TANGO; Invitation for Public...

    Science.gov (United States)

    2011-12-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel TANGO... of the vessel TANGO is: INTENDED COMMERCIAL USE OF VESSEL: ``Sightseeing, sportfishing, scuba diving...

  8. 77 FR 13696 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel SIREN; Invitation for Public...

    Science.gov (United States)

    2012-03-07

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel SIREN... the vessel SIREN is: Intended Commercial Use Of Vessel: ``Sailing charters.'' Geographic Region...

  9. Vessel Traffic Services.

    Science.gov (United States)

    1982-12-01

    Yorker" articles titled Silent Spring by Rachel Carson in 1963 produced a unifying effect, "the sort of rallying point of the movement to protect the...6232, 92d Cong., 1st. sess., 1971, p. 2. 15. Carson , Rachel L. , The Sea Around Us, New York: Oxford Univesity Press, 195-, p. IV. 16. U.S., Congress...Government Printing Office, 1974. 63. Buhler, L. and Geiger, J., Vessel Traffic Data Extraction MethodoloqX, Silver Spring , Maryland, O6erFae-tns

  10. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  11. 46 CFR 25.26-5 - Commercial fishing industry vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Commercial fishing industry vessels. 25.26-5 Section 25.26-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS Emergency Position Indicating Radio Beacons (EPIRB) § 25.26-5 Commercial fishing industry vessels. (a) The owner of a...

  12. 33 CFR 104.270 - Security measures for restricted areas.

    Science.gov (United States)

    2010-07-01

    ... restricted areas in order to: (1) Prevent or deter unauthorized access; (2) Protect persons authorized to be on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5) Protect... within the area constitutes a breach of security. (d) Maritime Security (MARSEC) Level 1. The vessel...

  13. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  14. Vessel Operator System

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Operator cards are required for any operator of a charter/party boat and or a commercial vessel (including carrier and processor vessels) issued a vessel permit from...

  15. Federal Bureau of Investigation (FBI) Field Office Jurisdiction/Divisions

    Data.gov (United States)

    Department of Homeland Security — This dataset represents the FBI (Federal Bureau of Investigations) national field office jurisdiction/divisional boundary locations. The field offices are centrally...

  16. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  17. 32 CFR 700.826 - Physical security.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Physical security. 700.826 Section 700.826... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate... officer shall take action to protect and maintain the security of the command against dangers from fire...

  18. What Can History Teach Us A Comparative Historical Analysis On the Reserve Officer Training Corps and the Department of Homeland Security

    Science.gov (United States)

    2015-12-01

    department. One business and financing news source states: 127 “Cyber Security Overview...entrepreneurial sector discuss this tendency and how to combat it. One such work is The Lean Startup : How Today’s...innovation, creativity, and growth. I believe this is wrong. As startups grow, entrepreneurs can build organizations that learn how to balance the needs

  19. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe......, but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral power. The Great War proves that these laws provided an adequate tool to be wielded by the politicians actually in office during that conflict. Following...... World War I it is not surprising that a salient feature of the defence debate is aversion against armed conflict. The Wilsonian agenda of a new system of collective security featuring prominently in the peace talks as well as in European debate generally does indeed have ramifications in Danish...

  20. 46 CFR 50.05-15 - Vessels subject to regulations in this subchapter.

    Science.gov (United States)

    2010-10-01

    ...-15 Section 50.05-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING GENERAL PROVISIONS Application § 50.05-15 Vessels subject to regulations in this subchapter. (a) Passenger vessels, tank vessels, cargo and miscellaneous vessels, nautical schoolships, mobile offshore...

  1. Field Office Contact Information for Application Developers

    Data.gov (United States)

    Social Security Administration — SSA provides a web service and downloadable file for SSA Field Office locations, telephone numbers, and hours of operation. (Note: If you think an office might be...

  2. 76 FR 67255 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel KIWI CAT; Invitation for...

    Science.gov (United States)

    2011-10-31

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel KIWI CAT... the vessel KIWI CAT is: INTENDED COMMERCIAL USE OF VESSEL: ``Small vessel 12 person chartering service...

  3. Office of Personnel Management (OPM)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for the Office of Personnel Management. OPM will use the SSN verifications in its investigative...

  4. 6 CFR 27.315 - Presiding officers for proceedings.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Presiding officers for proceedings. 27.315 Section 27.315 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.315 Presiding officers for proceedings. (a...

  5. 17 CFR 200.26a - Office of Information Technology.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible...

  6. 78 FR 28237 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2013-05-14

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Advisory Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory...-4941, Attn: Helen Jackson. Mail: Alternate Designated Federal Officer, National Security...

  7. 78 FR 23823 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel FISHIN GAME; Invitation for...

    Science.gov (United States)

    2013-04-22

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF... GAME; Invitation for Public Comments AGENCY: Maritime Administration, Department of Transportation... the applicant the intended service of the vessel FISHIN GAME is: Intended Commercial Use Of Vessel...

  8. United States Department of Energy National Nuclear Security Administration Sandia Field Office NESHAP Annual Report CY2014 for Sandia National Laboratories New Mexico

    Energy Technology Data Exchange (ETDEWEB)

    evelo, stacie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Miller, Mark L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-05-01

    This report provides a summary of the radionuclide releases from the United States (U.S.) Department of Energy (DOE) National Nuclear Security Administration facilities at Sandia National Laboratories, New Mexico (SNL/NM) during Calendar Year (CY) 2014, including the data, calculations, and supporting documentation for demonstrating compliance with 40 Code of Federal Regulation (CFR) 61, Subpart H--NATIONAL EMISSION STANDARDS FOR EMISSIONS OF RADIONUCLIDES OTHER THAN RADON FROM DEPARTMENT OF ENERGY FACILITIES. A description is given of the sources and their contributions to the overall dose assessment. In addition, the maximally exposed individual (MEI) radiological dose calculation and the population dose to local and regional residents are discussed.

  9. BIOASSAY VESSEL FAILURE ANALYSIS

    Energy Technology Data Exchange (ETDEWEB)

    Vormelker, P

    2008-09-22

    Two high-pressure bioassay vessels failed at the Savannah River Site during a microwave heating process for biosample testing. Improper installation of the thermal shield in the first failure caused the vessel to burst during microwave heating. The second vessel failure is attributed to overpressurization during a test run. Vessel failure appeared to initiate in the mold parting line, the thinnest cross-section of the octagonal vessel. No material flaws were found in the vessel that would impair its structural performance. Content weight should be minimized to reduce operating temperature and pressure. Outer vessel life is dependent on actual temperature exposure. Since thermal aging of the vessels can be detrimental to their performance, it was recommended that the vessels be used for a limited number of cycles to be determined by additional testing.

  10. 78 FR 63235 - Tank Vessel Oil Transfers

    Science.gov (United States)

    2013-10-23

    ... engaged in oil transfer operations? 12. Are there conflicts or areas of improvement with regard to... SECURITY Coast Guard Tank Vessel Oil Transfers AGENCY: Coast Guard, DHS. ACTION: Notice and request for comments. SUMMARY: The Coast Guard announces that it is considering new measures to reduce the risks of oil...

  11. Guam Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Guam. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  12. Florida Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Florida. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  13. Vessel Arrival Info - Legacy

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Vessel Arrival Info is a spreadsheet that gets filled out during the initial stage of the debriefing process by the debriefer. It contains vessel name, trip...

  14. Computer Security: Security operations at CERN (4/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  15. 46 CFR 188.10-53 - Oceanographic research vessel.

    Science.gov (United States)

    2010-10-01

    ... research, including those studies about the sea such as seismic, gravity meter, and magnetic exploration... 46 Shipping 7 2010-10-01 2010-10-01 false Oceanographic research vessel. 188.10-53 Section 188.10-53 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS...

  16. 76 FR 18132 - Interest on Untimely Paid Vessel Repair Duties

    Science.gov (United States)

    2011-04-01

    ..., Reporting and recordkeeping requirements, Shipping, Vessels. 19 CFR Part 24 Accounting, Claims, Customs... ``will''; and m. In paragraph (c)(1), by removing the words ``CBP Office of Finance, Indianapolis...

  17. ALICE HMPID Radiator Vessel

    CERN Multimedia

    2003-01-01

    View of the radiator vessels of the ALICE/HMPID mounted on the support frame. Each HMPID module is equipped with 3 indipendent radiator vessels made out of neoceram and fused silica (quartz) windows glued together. The spacers inside the vessel are needed to stand the hydrostatic pressure. http://alice-hmpid.web.cern.ch/alice-hmpid

  18. 31 CFR 306.89 - Public officers.

    Science.gov (United States)

    2010-07-01

    ..., DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT GENERAL REGULATIONS GOVERNING U.S. SECURITIES Assignments in Behalf of Private or Public Organizations § 306.89 Public officers. Securities registered in... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Public officers. 306.89 Section 306...

  19. 75 FR 17205 - Securities Offering Disclosures

    Science.gov (United States)

    2010-04-05

    ... Office of Thrift Supervision Securities Offering Disclosures AGENCY: Office of Thrift Supervision (OTS... of Proposal: Securities Offering Disclosures. OMB Number: 1550-0035. Form Numbers: SEC Forms S-1, S-3... Securities Offering regulation provides necessary information, including financial disclosure, to persons to...

  20. 17 CFR 140.1 - Headquarters office.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Headquarters office. 140.1..., FUNCTIONS, AND PROCEDURES OF THE COMMISSION Organization § 140.1 Headquarters office. (a) General. The headquarters office of the Commission is located at Three Lafayette Centre, 1155 21st Street, NW., Washington...

  1. Pressure vessel design manual

    CERN Document Server

    Moss, Dennis R

    2013-01-01

    Pressure vessels are closed containers designed to hold gases or liquids at a pressure substantially different from the ambient pressure. They have a variety of applications in industry, including in oil refineries, nuclear reactors, vehicle airbrake reservoirs, and more. The pressure differential with such vessels is dangerous, and due to the risk of accident and fatality around their use, the design, manufacture, operation and inspection of pressure vessels is regulated by engineering authorities and guided by legal codes and standards. Pressure Vessel Design Manual is a solutions-focused guide to the many problems and technical challenges involved in the design of pressure vessels to match stringent standards and codes. It brings together otherwise scattered information and explanations into one easy-to-use resource to minimize research and take readers from problem to solution in the most direct manner possible. * Covers almost all problems that a working pressure vessel designer can expect to face, with ...

  2. Maury Journals - German Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — German vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  3. 75 FR 2152 - Certificate of Alternative Compliance for the Anchor Handling Tug Supply Vessel HOLIDAY

    Science.gov (United States)

    2010-01-14

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Anchor Handling Tug Supply Vessel... Alternative Compliance was issued for the anchor handling tug supply vessel HOLIDAY as required by 33 U.S.C.... SUPPLEMENTARY INFORMATION: Background and Purpose The anchor handling tug supply vessel HOLIDAY will be used for...

  4. 75 FR 17755 - Certificate of Alternative Compliance for the Offshore Supply Vessel C-ATLAS

    Science.gov (United States)

    2010-04-07

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Offshore Supply Vessel C-ATLAS AGENCY... Compliance was issued for the offshore supply vessel C-ATLAS as required by 33 U.S.C. 1605(c) and 33 CFR 81... Regulations, Parts 81 and 89, has been issued for the offshore supply vessel C-ATLAS. Full compliance with 72...

  5. 46 CFR 2.01-10 - Inspection requirements-domestic vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Inspection requirements-domestic vessels. 2.01-10 Section 2.01-10 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC VESSEL INSPECTIONS Inspecting and Certificating of Vessels § 2.01-10 Inspection requirements—domestic...

  6. 75 FR 17755 - Certificate of Alternative Compliance for the Offshore Supply Vessel GULF TIGER

    Science.gov (United States)

    2010-04-07

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Offshore Supply Vessel GULF TIGER AGENCY... Compliance was issued for the offshore supply vessel GULF TIGER as required by 33 U.S.C. 1605(c) and 33 CFR... TIGER. Full compliance with 72 COLREGS and the Inland Rules Act would hinder the vessel's ability to...

  7. 76 FR 30954 - Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to the United...

    Science.gov (United States)

    2011-05-27

    ... each access point to the ship is guarded by armed, private security guards and that they have total... SECURITY Coast Guard Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to... Security tab; International Port Security Program (ISPS Code); Port Security Advisory link. FOR FURTHER...

  8. 77 FR 53901 - Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to the United...

    Science.gov (United States)

    2012-09-04

    ... armed, private security guards and that they have total visibility of the exterior (both landside and... SECURITY Coast Guard Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to....mil under the Maritime Security tab; International Port Security Program (ISPS Code); Port Security...

  9. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must meet the following standards: (1) Address each vulnerability identified in the facility's Security...

  10. 78 FR 13752 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel GATO; Invitation for Public...

    Science.gov (United States)

    2013-02-28

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel GATO... of the vessel GATO is: Intended Commercial Use of Vessel: Six pack charters, half day and full day...

  11. 77 FR 56264 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel HAPPY ENDINGS; Invitation for...

    Science.gov (United States)

    2012-09-12

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel HAPPY ENDINGS... of the vessel HAPPY ENDINGS is: Intended Commercial Use of Vessel: ``Sunset, day and overnight...

  12. 78 FR 64282 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel MULLIGAN; Invitation for...

    Science.gov (United States)

    2013-10-28

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel MULLIGAN... intended service of the vessel MULLIGAN is: Intended Commercial Use of Vessel: ``Full day \\1/2\\ day and...

  13. 76 FR 67254 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel LINDA GRACE; Invitation for...

    Science.gov (United States)

    2011-10-31

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel LINDA GRACE... the vessel LINDA GRACE is: INTENDED COMMERCIAL USE OF VESSEL: ``2 to 8 hour day sails, week-end...

  14. 77 FR 14054 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel CABARET V; Invitation for...

    Science.gov (United States)

    2012-03-08

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel CABARET V... the vessel CABARET V is: Intended Commercial Use of Vessel: ``Sportfishing without commercial sale and...

  15. 78 FR 25530 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel BLUE DOLPHIN; Invitation for...

    Science.gov (United States)

    2013-05-01

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel BLUE DOLPHIN... of the vessel BLUE DOLPHIN is: Intended Commercial Use Of Vessel: ``Skippered daysailing in Puget...

  16. 77 FR 26822 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel LONGWOOD BATEAU; Invitation...

    Science.gov (United States)

    2012-05-07

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel LONGWOOD BATEAU... the vessel LONGWOOD BATEAU is: INTENDED COMMERCIAL USE OF VESSEL: ``Day outings, harbor cruises and...

  17. 78 FR 35092 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel BEAR BOAT; Invitation for...

    Science.gov (United States)

    2013-06-11

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel BEAR BOAT... of the vessel BEAR BOAT is: Intended Commercial Use of Vessel: ``Crewed and unscrewed (bareboat...

  18. 77 FR 5628 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel BIG GAME; Invitation for...

    Science.gov (United States)

    2012-02-03

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel BIG GAME... the vessel BIG GAME is: Intended Commercial Use of Vessel: ``Fishing charter boat.'' Geographic Region...

  19. 78 FR 19066 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel MI CASA; Invitation for...

    Science.gov (United States)

    2013-03-28

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel MI CASA... of the vessel MI CASA is: Intended Commercial Use of Vessel: Passenger charters. Geographic Region...

  20. 76 FR 67253 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel ACERO AZUL; Invitation for...

    Science.gov (United States)

    2011-10-31

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel ACERO AZUL... the vessel ACERO AZUL is: INTENDED COMMERCIAL USE OF VESSEL: ``Passenger for hire.'' GEOGRAPHIC REGION...

  1. 37 CFR 212.5 - Recordation of distinctive identification of vessel hull designer.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Recordation of distinctive identification of vessel hull designer. 212.5 Section 212.5 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE... of distinctive identification of vessel hull designer. (a) General. Any owner of a vessel hull may...

  2. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  3. 50 CFR 300.116 - Requirements for a vessel monitoring system for U.S. vessels.

    Science.gov (United States)

    2010-10-01

    ... procedures indicated on an installation and activation checklist, which is available from OLE; and (2) Submit to OLE a statement certifying compliance with the checklist, as prescribed on the checklist. (c... instructions from that office. If notified by NMFS that a vessel's VMS is not operating properly, the owner and...

  4. 12 CFR 568.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and... program. (a) Contents of security program. The security program shall: (1) Establish procedures for... officers and employees in their responsibilities under the security program and in proper employee conduct...

  5. 22 CFR 8.7 - Security.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the committee...

  6. PRESSURE-RESISTANT VESSEL

    NARCIS (Netherlands)

    Beukers, A.; De Jong, T.

    1997-01-01

    Abstract of WO 9717570 (A1) The invention is directed to a wheel-shaped pressure-resistant vessel for gaseous, liquid or liquefied material having a substantially rigid shape, said vessel comprising a substantially continuous shell of a fiber-reinforced resin having a central opening, an inner

  7. Containment vessel drain system

    Energy Technology Data Exchange (ETDEWEB)

    Harris, Scott G.

    2018-01-30

    A system for draining a containment vessel may include a drain inlet located in a lower portion of the containment vessel. The containment vessel may be at least partially filled with a liquid, and the drain inlet may be located below a surface of the liquid. The system may further comprise an inlet located in an upper portion of the containment vessel. The inlet may be configured to insert pressurized gas into the containment vessel to form a pressurized region above the surface of the liquid, and the pressurized region may operate to apply a surface pressure that forces the liquid into the drain inlet. Additionally, a fluid separation device may be operatively connected to the drain inlet. The fluid separation device may be configured to separate the liquid from the pressurized gas that enters the drain inlet after the surface of the liquid falls below the drain inlet.

  8. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  9. Microcomputer Security Issues in an Office Environment.

    Science.gov (United States)

    1986-11-01

    users and system processes; o Privileged instructions - limiting access to certain functions (e.g., reading and writing to disk) to trusted system...is based on OPNAVINST 5239.1A. It is listed in Appendix G. ig -F11"d The Aproach The OISSO must work with each project manager, each DBA, and the end...must first ensure the encryption process never writes unencrypted text on hard disk, either through its own procedures or at the option of the user

  10. 76 FR 67471 - Delegation Authority for the Office of the Chief Information Officer

    Science.gov (United States)

    2011-11-01

    ...: Juanita Galbreath, Deputy Chief Information Officer for Cyber Security and Privacy, Office of the Chief... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOUSING AND.... 3506), the Privacy Act of 1974 (5 U.S.C. 552(a)), and the E-Government Act of 2002. The CIO shall...

  11. 78 FR 68784 - Cargo Securing Manuals

    Science.gov (United States)

    2013-11-15

    ... Stowage and Securing (CSS Code),'' any container vessel, subject to SOLAS, whose keel is laid on or after.... In order to test this, we developed an estimate of lost or jettisoned cargo incidents that are...

  12. 46 CFR 15.915 - Engineer Officer Endorsements.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Engineer Officer Endorsements. 15.915 Section 15.915... REQUIREMENTS Equivalents § 15.915 Engineer Officer Endorsements. The following licenses and MMC officer... designated duty engineer license or endorsement authorizes service as chief or assistant engineer on vessels...

  13. 46 CFR 196.27-1 - Master's and officer's responsibility.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Master's and officer's responsibility. 196.27-1 Section... VESSELS OPERATIONS Lookouts § 196.27-1 Master's and officer's responsibility. (a) Nothing in this part shall exonerate any master or officer in command from the consequences of any neglect to keep a proper...

  14. 46 CFR 97.27-5 - Master's and officer's responsibility.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Master's and officer's responsibility. 97.27-5 Section... VESSELS OPERATIONS Lookouts § 97.27-5 Master's and officer's responsibility. (a) Nothing in this part shall exonerate any master or officer in command from the consequences of any neglect to keep a proper...

  15. 2013 Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  16. 2011 Passenger Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  17. 2011 Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  18. 2013 Passenger Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  19. 2013 Tanker Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  20. 2013 Cargo Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  1. High Performance Marine Vessels

    CERN Document Server

    Yun, Liang

    2012-01-01

    High Performance Marine Vessels (HPMVs) range from the Fast Ferries to the latest high speed Navy Craft, including competition power boats and hydroplanes, hydrofoils, hovercraft, catamarans and other multi-hull craft. High Performance Marine Vessels covers the main concepts of HPMVs and discusses historical background, design features, services that have been successful and not so successful, and some sample data of the range of HPMVs to date. Included is a comparison of all HPMVs craft and the differences between them and descriptions of performance (hydrodynamics and aerodynamics). Readers will find a comprehensive overview of the design, development and building of HPMVs. In summary, this book: Focuses on technology at the aero-marine interface Covers the full range of high performance marine vessel concepts Explains the historical development of various HPMVs Discusses ferries, racing and pleasure craft, as well as utility and military missions High Performance Marine Vessels is an ideal book for student...

  2. Cheboygan Vessel Base

    Data.gov (United States)

    Federal Laboratory Consortium — Cheboygan Vessel Base (CVB), located in Cheboygan, Michigan, is a field station of the USGS Great Lakes Science Center (GLSC). CVB was established by congressional...

  3. Maury Journals - US Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — U.S. vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  4. 2011 Cargo Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  5. 2011 Tanker Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  6. 2013 Fishing Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  7. Coastal Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains catch (landed catch) and effort for fishing trips made by vessels that have been issued a Federal permit for the Gulf of Mexico reef fish,...

  8. Development and Validation of Nigerian Army Commanding Officers ...

    African Journals Online (AJOL)

    The factors depicted eight core functions of the commanding officer namely: general, command and training, administration, welfare, security, communication, liaison, and miscellaneous. The commanding officers' job description index constituted psychological constructs, which had implications for appointment, training and ...

  9. LANL Robotic Vessel Scanning

    Energy Technology Data Exchange (ETDEWEB)

    Webber, Nels W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-11-25

    Los Alamos National Laboratory in J-1 DARHT Operations Group uses 6ft spherical vessels to contain hazardous materials produced in a hydrodynamic experiment. These contaminated vessels must be analyzed by means of a worker entering the vessel to locate, measure, and document every penetration mark on the vessel. If the worker can be replaced by a highly automated robotic system with a high precision scanner, it will eliminate the risks to the worker and provide management with an accurate 3D model of the vessel presenting the existing damage with the flexibility to manipulate the model for better and more in-depth assessment.The project was successful in meeting the primary goal of installing an automated system which scanned a 6ft vessel with an elapsed time of 45 minutes. This robotic system reduces the total time for the original scope of work by 75 minutes and results in excellent data accumulation and transmission to the 3D model imaging program.

  10. Office of Personnel Management (OPM) Earnings

    Data.gov (United States)

    Social Security Administration — Each year the Office of Personnel Management (OPM) sends SSA a file to be verified and matched against the Master Earnings File (MEF) and Employer Information File...

  11. Local Governments (Executive Offices) Sector (NAICS 921110)

    Science.gov (United States)

    EPA regulatory information for government executive offices, including state implementation plans (SIPs), local emergency planning under EPCRA, drinking water treatment, water supply security, and compliance assistance for boiler & combustion regulations.

  12. 76 FR 37983 - Family Offices

    Science.gov (United States)

    2011-06-29

    ... the family member definition by ascending up the family tree from the founders would not address the... ] of G1's family tree without registering under the Advisers Act.\\28\\ \\27\\ No formal documentation or... COMMISSION 17 CFR Part 275 RIN 3235-AK66 Family Offices AGENCY: Securities and Exchange Commission. ACTION...

  13. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  14. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ....235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered... Tier 3 facilities may not submit an ASP in lieu of a Security Vulnerability Assessment. (b) The...

  15. 78 FR 18425 - Proposed Information Collection VA Police Officer Pre-Employment Screening Checklist); Comment...

    Science.gov (United States)

    2013-03-26

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF VETERANS AFFAIRS Proposed Information Collection VA Police Officer Pre-Employment Screening Checklist); Comment Request AGENCY: Office of Operations, Security, and Preparedness, Department of Veterans Affairs. ACTION...

  16. 10 CFR 1.32 - Office of the Executive Director for Operations.

    Science.gov (United States)

    2010-01-01

    ... of Nuclear Reactor Regulation, the Office of New Reactors, the Office of Nuclear Material Safety and... Nuclear Regulatory Research, the Office of Nuclear Security and Incident Response, and the NRC Regional...

  17. Back office to box office

    DEFF Research Database (Denmark)

    Haigh, Matthew

    Consider the representation of value in the organizations we rely on for our long retirements. Social security has been symbolized by private mechanisms such as the employment-related pension scheme, yet, reporting requirement would impute its fitness for financial trading. A scheme's financier...

  18. Enhancing supply vessel safety

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    A supply-vessel bridge installation consists of a navigating bridge and a control position aft, from which operators control the ship when close to rigs or platforms, and operate winches and other loading equipment. The international Convention for Safety of I Ale at Sea (SOLAS) does not regulate the layout, so design varies to a large degree, often causing an imperfect working environment. As for other types of ships, more than half the offshore service vessel accidents at sea are caused by bridge system failures. A majority can be traced back to technical design, and operational errors. The research and development project NAUT-OSV is a response to the offshore industry's safety concerns. Analysis of 24 incidents involving contact or collision between supply vessels and offshore installations owned or operated by Norwegian companies indicated that failures in the bridge system were often the cause.

  19. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks......, the collaboration between science, anthropology and the military, transnational terrorism, and the ethical consequences of security expertise. Together they challenge our understanding of how expertise works and what consequences it has for security politics and international relations. This book...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  20. Nuclear reactor pressure vessel support system

    Science.gov (United States)

    Sepelak, George R.

    1978-01-01

    A support system for nuclear reactor pressure vessels which can withstand all possible combinations of stresses caused by a postulated core disrupting accident during reactor operation. The nuclear reactor pressure vessel is provided with a flange around the upper periphery thereof, and the flange includes an annular vertical extension formed integral therewith. A support ring is positioned atop of the support ledge and the flange vertical extension, and is bolted to both members. The plug riser is secured to the flange vertical extension and to the top of a radially outwardly extension of the rotatable plug. This system eliminates one joint through which fluids contained in the vessel could escape by making the fluid flow path through the joint between the flange and the support ring follow the same path through which fluid could escape through the plug risers. In this manner, the sealing means to prohibit the escape of contained fluids through the plug risers can also prohibit the escape of contained fluid through the securing joint.

  1. 46 CFR 2.01-50 - Persons other than crew on towing, oyster, or fishing steam vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Persons other than crew on towing, oyster, or fishing steam vessels. 2.01-50 Section 2.01-50 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES... than crew on towing, oyster, or fishing steam vessels. (a) A steam vessel engaged in towing, oyster...

  2. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  3. DoD Industrial Security Program

    Science.gov (United States)

    1985-12-01

    case, the protective marking to be used wll be: Classification determination pending. Protect as though classified (CONFIDENTIAL. SCRET , or TOP SECRET...Communications Security CONUS Continental United States COR Central Office of Record COSMIC- TOP SECRET Property of NATO and Subject to Special Security...SlOP Single Integrated Operational Plan SFF Standard Practice Procedure(s) SSS Signature Security Service TO Transportation Officer (TS) TOP SECRET

  4. 77 FR 49059 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel CHAT DE MER; Invitation for...

    Science.gov (United States)

    2012-08-15

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel CHAT DE MER... of the vessel CHAT DE MER is: Intended Commercial Use of Vessel: Primarily carrying passengers that...

  5. 78 FR 76406 - Requested Administrative Waiver of the Coastwise Trade Laws: Vessel CHA-SON; Invitation for...

    Science.gov (United States)

    2013-12-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Maritime Administration Requested Administrative Waiver of the Coastwise Trade Laws: Vessel CHA-SON... of the vessel CHA-SON is: Intended Commercial Use of Vessel: ``Ocean charter fishing on the nearshore...

  6. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  7. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... MANAGEMENT 5 CFR Chapter XCIX RIN 3206-AM 53 National Security Personnel System AGENCY: Department of Defense... Defense and Office of Personnel Management regulations concerning the National Security Personnel System... the Department of Defense (DOD) authority to establish a National Security Personnel System (NSPS) in...

  8. GOLD PRESSURE VESSEL SEAL

    Science.gov (United States)

    Smith, A.E.

    1963-11-26

    An improved seal between the piston and die member of a piston-cylinder type pressure vessel is presented. A layer of gold, of sufficient thickness to provide an interference fit between the piston and die member, is plated on the contacting surface of at least one of the members. (AEC)

  9. Network of endocardial vessels.

    Science.gov (United States)

    Lee, Byung-Cheon; Kim, Hong Bae; Sung, Baeckkyoung; Kim, Ki Woo; Sohn, Jamin; Son, Boram; Chang, Byung-Joon; Soh, Kwang-Sup

    2011-01-01

    Although there have been reports on threadlike structures inside the heart, they have received little attention. We aimed to develop a method for observing such structures and to reveal their ultrastructures. An in situ staining method, which uses a series of procedures of 0.2-0.4% trypan blue spraying and washing, was applied to observe threadlike structures on the surfaces of endocardia. The threadlike structures were isolated and observed by using confocal laser scanning microscopy (CLSM) and transmission electron microscopy (TEM). Networks of endocardial vessels (20 μm in thickness) with expansions (40-100 μm in diameter) were visualized; they were movable on the endocardium of the bovine atrium and ventricle. CLSM showed that (1) rod-shaped nuclei were aligned along the longitudinal direction of the endocardial vessel and (2) there were many cells inside the expansion. TEM on the endocardial vessel revealed that (1) there existed multiple lumens (1-7 μm in diameter) and (2) the extracellular matrices mostly consisted of collagen fibers, which were aligned along the longitudinal direction of the endocardial vessel or were locally organized in reticular structures. We investigated the endocardial circulatory system in bovine cardiac chambers and its ultrastructures, such as nucleic distributions, microlumens, and collagenous extracellular matrices. Copyright © 2011 S. Karger AG, Basel.

  10. Pressurized Vessel Slurry Pumping

    Energy Technology Data Exchange (ETDEWEB)

    Pound, C.R.

    2001-09-17

    This report summarizes testing of an alternate ''pressurized vessel slurry pumping'' apparatus. The principle is similar to rural domestic water systems and ''acid eggs'' used in chemical laboratories in that material is extruded by displacement with compressed air.

  11. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  12. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  13. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  14. 77 FR 64819 - New Agency Information Collection Activity Under OMB Review: Office of Law Enforcement/Federal...

    Science.gov (United States)

    2012-10-23

    ... SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review... INFORMATION CONTACT: Susan L. Perkins, TSA PRA Officer, Office of Information Technology (OIT), TSA-11... other forms of information technology. Information Collection Requirement Title: LEO Reimbursement...

  15. Maritime Training Serbian Autonomous Vessel Protection Detachment

    Directory of Open Access Journals (Sweden)

    Šoškić Svetislav D.

    2014-06-01

    Full Text Available The crisis in Somalia has caused appearance of piracy at sea in the Gulf of Aden and the Western Indian Ocean. Somali pirates have become a threat to economic security of the world because almost 30 percent of world oil and 20 percent of global trade passes through the Gulf of Aden. Solving the problem of piracy in this part of the world have included international organizations, institutions, military alliances and the states, acting in accordance with international law and UN Security Council resolutions. The European Union will demonstrate the application of a comprehensive approach to solving the problem of piracy at sea and the crisis in Somalia conducting naval operation — EU NAVFOR Atalanta and operation EUTM under the Common Security and Defense Policy. The paper discusses approaches to solving the problem of piracy in the Gulf of Aden and the crisis in Somalia. Also, the paper points to the complexity of the crisis in Somalia and dilemmas correctness principles that are applied to solve the problem piracy at sea. One of goals is protections of vessels of the World Food Programme (WFP delivering food aid to displaced persons in Somalia. Republic of Serbia joined in this mission and trained and sent one a autonomous team in this military operation for protection WFP. This paper consist the problem of modern piracy, particularly in the area of the Horn of Africa became a real threat for the safety of maritime ships and educational process of Serbian Autonomous vessel protection detachment. Serbian Military Academy adopted and developed educational a training program against piracy applying all the provisions and recommendations of the IMO conventions and IMO model courses for Serbian Autonomous vessel protection detachment.

  16. 78 FR 57643 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-09-19

    ... SECURITY Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity Education Office (CEO) National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog (Training Catalog) Collection AGENCY: Cybersecurity Education Office, DHS...

  17. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Science.gov (United States)

    2013-06-12

    ... SECURITY Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity Education Office (CEO) National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog (Training Catalog) Collection AGENCY: Cybersecurity Education Office, DHS...

  18. 19 CFR 123.34 - Certain vehicle and vessel shipments.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Certain vehicle and vessel shipments. 123.34 Section 123.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CUSTOMS RELATIONS WITH CANADA AND MEXICO Shipments in Transit Through the United...

  19. Hawaii Abandoned Vessel Inventory, Kauai

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Kauai. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  20. CNMI Abandoned Vessel Inventory, Tinian

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Tinian. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  1. Puerto Rico Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Puerto Rico. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  2. American Samoa Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for American Samoa. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  3. Hawaii Abandoned Vessel Inventory, Oahu

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Oahu, Hawaii. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  4. Hawaii Abandoned Vessel Inventory, Molokai

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Molokai, Hawaii. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  5. CNMI Abandoned Vessel Inventory, Rota

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Rota. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  6. Hawaii Abandoned Vessel Inventory, Lanai

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Lanai. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  7. For-Hire Vessel Directory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Vessel Directory is maintained as the sample frame for the For-Hire Survey. I contains data on for-hire vessels on the Atlantic and Gulf coasts. Data include...

  8. CNMI Abandoned Vessel Inventory, Saipan

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Saipan. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  9. Hawaii Abandoned Vessel Inventory, Maui

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Maui. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral habitats...

  10. Vessels in Transit - Web Tool

    Data.gov (United States)

    Department of Transportation — A web tool that provides real-time information on vessels transiting the Saint Lawrence Seaway. Visitors may sort by order of turn, vessel name, or last location in...

  11. 76 FR 68772 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-11-07

    ... intends to submit Information Collection Requests (ICRs) to the Office of Management and Budget (OMB... INFORMATION CONTACT: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone (202) 475-3652... vessel to provide information that details the vessel operator's ballast water management efforts. Need...

  12. Pressure vessel design manual

    Energy Technology Data Exchange (ETDEWEB)

    Moss, D.R.

    1987-01-01

    The first section of the book covers types of loadings, failures, and stress theories, and how they apply to pressure vessels. The book delineates the procedures for designing typical components as well as those for designing large openings in cylindrical shells, ring girders, davits, platforms, bins and elevated tanks. The techniques for designing conical transitions, cone-cylinder intersections, intermediate heads, flat heads, and spherically dished covers are also described. The book covers the design of vessel supports subject to wind and seismic loads and one section is devoted to the five major ways of analyzing loads on shells and heads. Each procedure is detailed enough to size all welds, bolts, and plate thicknesses and to determine actual stresses.

  13. New research vessels

    Science.gov (United States)

    1984-04-01

    Two “new” ocean-going research vessels operated by the Scripps Institution of Oceanography and the National Science Foundation (NSF) will soon begin full-time scientific duties off the coast of California and in the Antarctic, respectively. The 37.5-m Scripps vessel, named Robert Gordon Sprout in honor of the ex-president of the University of California, replaces the smaller ship Ellen B. Scripps, which had served the institution since 1965. The new ship is a slightly modified Gulf Coast workboat. Under the name of Midnight Alaskan, it had been used for high-resolution geophysical surveys in American and Latin American waters by such firms as Arco Oil & Gas, Exxon, Pennzoil, and Racal-Decca before its purchase by Scripps from a Lousiana chartering firm last summer.

  14. Large vessel vasculitides

    OpenAIRE

    Morović-Vergles, Jadranka; Pukšić, Silva; Gudelj Gračanin, Ana

    2013-01-01

    Large vessel vasculitis includes Giant cell arteritis and Takayasu arteritis. Giant cell arteritis is the most common form of vasculitis affect patients aged 50 years or over. The diagnosis should be considered in older patients who present with new onset of headache, visual disturbance, polymyalgia rheumatica and/or fever unknown cause. Glucocorticoides remain the cornerstone of therapy. Takayasu arteritis is a chronic panarteritis of the aorta ant its major branches presenting commonly in y...

  15. Very Versatile Vessel

    Science.gov (United States)

    2009-09-01

    data. This source provides information on aluminum hydrofoil vessels without the added weight of foil structures. The composite armor around the...seating compartment. The sides should also limit wave splash on the deck. The freeboard should contribute reserve buoyancy , increasing large-angle and...Resistance, Powering, and Propulsion Savitsky’s Method Since model testing data or other reliable performance data was unavailable for the proposed

  16. Passport officers' errors in face matching.

    Directory of Open Access Journals (Sweden)

    David White

    Full Text Available Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of 'fraudulent' photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately--though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection.

  17. Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course

    Directory of Open Access Journals (Sweden)

    Marcin Zyczkowski

    2017-06-01

    Full Text Available In this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that we can obtain quite acceptable results.

  18. 75 FR 3245 - Agency Information Collection Activities: Aircraft/Vessel Report (Form I-92)

    Science.gov (United States)

    2010-01-20

    ... Report (Form I-92) AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION... approval in accordance with the Paperwork Reduction Act: Aircraft/ Vessel Report (Form I-92). This is a... forms of information. Title: Aircraft/Vessel Report. OMB Number: 1651-0102. Form Number: I-92. Abstract...

  19. 46 CFR 170.095 - Data submittal for a vessel equipped to lift.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Data submittal for a vessel equipped to lift. 170.095 Section 170.095 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND... vessel equipped to lift. The following data must be submitted with the plans required by § 170.075 if the...

  20. 75 FR 20371 - Certificate of Alternative Compliance for the Offshore Supply Vessel LEBOUEF TIDE

    Science.gov (United States)

    2010-04-19

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Offshore Supply Vessel LEBOUEF TIDE... Alternative Compliance was issued for the offshore supply vessel LEBOUEF TIDE as required by 33 U.S.C. 1605(c... LEBOUEF TIDE. The horizontal distance between the forward and aft masthead lights may be 25 -9 . Placing...

  1. 75 FR 39955 - Certificate of Alternative Compliance for the Offshore Supply Vessel MONICA W CALLAIS

    Science.gov (United States)

    2010-07-13

    ... SECURITY Coast Guard Certificate of Alternative Compliance for the Offshore Supply Vessel MONICA W CALLAIS... Alternative Compliance was issued for the offshore supply vessel MONICA W CALLAIS as required by 33 U.S.C... MONICA W CALLAIS, O.N. 1226851. The horizontal distance between the forward and aft masthead lights may...

  2. 76 FR 33161 - Installation and Use of Engine Cut-off Switches on Recreational Vessels

    Science.gov (United States)

    2011-06-08

    ... Security FR Federal Register NBSAC National Boating Safety Advisory Council NMMA National Marine... caused by persons being struck by a recreational vessel or a propeller. Under 46 U.S.C. Chapter 43... appropriate course of action to address the recreational vessel and propeller strike-related casualty issue...

  3. 46 CFR 8.545 - Scope of inspection for enrolled vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Scope of inspection for enrolled vessels. 8.545 Section 8.545 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC VESSEL INSPECTION ALTERNATIVES Streamlined Inspection Program § 8.545 Scope of inspection for enrolled...

  4. 78 FR 6732 - Changes to Standard Numbering System, Vessel Identification System, and Boating Accident Report...

    Science.gov (United States)

    2013-01-31

    ... SECURITY Coast Guard 33 CFR Parts 173, 174, 181, and 187 RIN 1625-AB45 Changes to Standard Numbering System, Vessel Identification System, and Boating Accident Report Database AGENCY: Coast Guard, DHS. ACTION: Rule... Numbering System, Vessel Identification System, and Boating Accident Report Database rule became effective...

  5. 78 FR 61223 - Regulated Navigation Area; Southern Oahu Tsunami Vessel Evacuation, Honolulu, HI

    Science.gov (United States)

    2013-10-03

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Regulated Navigation Area; Southern Oahu Tsunami Vessel... evacuation of Southern Oahu ports. DATES: Comments and related material must be received by the Coast Guard... Southern Oahu Tsunami Vessel Evacuation regulated navigation area. All recommendations received careful...

  6. 75 FR 68467 - Transportation for Individuals With Disabilities: Passenger Vessels

    Science.gov (United States)

    2010-11-08

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION 49 CFR Part 39 RIN 2105-AB87 Transportation for Individuals With Disabilities: Passenger Vessels... remain consistent with those of DOJ. One of these organizations pointed out that the DOJ ADA rules become...

  7. 17 CFR 256.921 - Office supplies and expenses.

    Science.gov (United States)

    2010-04-01

    .... Bank messenger and service charges. 3. Books, periodicals, bulletins and subscriptions to newspapers... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Office supplies and expenses. 256.921 Section 256.921 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  8. 8111/8116 Security Police Staff Officers 8121/8124 Security Police Officers AFSC: 81XX

    Science.gov (United States)

    1992-02-01

    U 4 a -W 0 a 4’.4 aU -.4 65 .4 . 6 C U 49 4 w F "a L0 5. OCW 0 xC= 0 * a 0a -4 00a5 C aU a W w L L an c 04 0 FAU Im~U 1 a &6 -4 U. _ .1 V A - 00 I 40...W 4o- niAA fia IAI Ln IA IAI IA UlI inI WML nL a i iA IA 4 44 4r %4 4447 IT4 r t .4 U W C a - aOCA P C4 ~ . -40 IE U. 2. 0.4 -A xc 0. . m4 .-1 .4

  9. 20 CFR 404.1212 - Police officers and firefighters.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Police officers and firefighters. 404.1212... May Be Covered § 404.1212 Police officers and firefighters. (a) General. For Social Security coverage purposes under section 218 of the Act, a police officer's or firefighter's position is any position so...

  10. Facing the Future: Slovenian Armed Forces Officer Corps and Professionalism

    Science.gov (United States)

    2011-12-16

    officer corps, jurisdiction, officer education, professional authonomy, civil-military relations, operational enviroment 16. SECURITY CLASSIFICATION OF...expressed in SAOC? Definitions Ethics. “Values, norms , and symbols regulating the behavior of the professional toward his client, public, and... management techniques in the military as they can have a disastrous effect on unit coherence and officer professionalism. If not applied correctly and

  11. Software Security Knowledge: Training

    Science.gov (United States)

    2011-05-01

    Threat Classification last ed~ed by 8 Robert Auger 10 months, 3 weeks ago u Page hlstol’f ~ Check for plagiarism Threat Classification ’Taxonomy...ocbtr © 2011 MITRE Making Security Measurable· A Policy-Based Vulnerability Analysis Framework By SOPHIE JEAN E:-IGLE B.S. ( University of...Science in tlte OFFICE OF GRADUATE STUDIES of the UNIVERSITY OF CALIFORNIA DAVIS Approved: Professor Matt BlsllOJl (Olalrl ProfessorS. Fdix Wu

  12. Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety

    Science.gov (United States)

    1998-05-01

    Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...

  13. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  14. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  15. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  16. 75 FR 77783 - Designation of National Security Positions

    Science.gov (United States)

    2010-12-14

    ...; ] OFFICE OF PERSONNEL MANAGEMENT 5 CFR Part 732 RIN 3206-AM27 Designation of National Security Positions... Management (OPM) is proposing to revise its regulation regarding designation of national security positions... should observe when designating national security positions as required under E.O. 10450, Security...

  17. 76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment

    Science.gov (United States)

    2011-04-21

    ... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs...), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), Cyber... a cyber network security assessment so that a full measure of gaps and capabilities can be completed...

  18. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    .... 9701.508 Section 9701.508 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor...

  19. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  20. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Science.gov (United States)

    2010-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...

  1. 78 FR 49311 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving Proposed...

    Science.gov (United States)

    2013-08-13

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving Proposed... On June 5, 2013, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed...

  2. 75 FR 65511 - Employee Benefits Security Administration; Submission for OMB Review

    Science.gov (United States)

    2010-10-25

    ...., permitting electronic submission of responses. Agency: Employee Benefits Security Administration. Type of... of the Secretary Employee Benefits Security Administration; Submission for OMB Review ACTION: Notice..., Attn: OMB Desk Officer for the Department of Labor--Employee Benefits Security Administration (EBSA...

  3. Vanishing corneal vessels

    Science.gov (United States)

    Nicholson, Luke; Chana, Rupinder

    2013-01-01

    We wish to highlight the importance of acknowledging the accompanying effects of topical phenylephrine drops on the eye other than its intended mydriasis. We reported a case of a 92-year-old woman with a corneal graft who was noted to have superficial corneal vascularisation which was not documented previously. After the instillation of topical tropicamide 1% and phenylephrine 2.5%, for funduscopy, the corneal vascularisation was not visible. When reassessed on another visit, tropicamide had no effect on the vessels and only phenylephrine did. We wish to highlight that when reviewing patients in cornea clinics, instilling phenylephrine prior to being seen may mask important corneal vascularisation. PMID:24121816

  4. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  5. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  6. The office based CHIVA

    Directory of Open Access Journals (Sweden)

    Passariello F

    2013-09-01

    Full Text Available Fausto Passariello,1 Stefano Ermini,2 Massimo Cappelli,3 Roberto Delfrate,4 Claude Franceschi5 1Centro Diagnostico Aquarius, Napoli, Italy; 2Private Practice, Grassina, Italy; 3Private Practice, Firenze, Italy; 4Casa di Cure Figlie di Maria, Cremona, Italy; 5Hospital St Joseph, Service d'Explorations Vasculaires, Paris, France Abstract: The cure Conservatrice Hémodynamique de l'Insuffisance Veineuse en Ambulatoire (CHIVA can be office based (OB. The OB-CHIVA protocol is aimed at transferring CHIVA procedures to specialists rooms. The protocol will check the feasibility of OB-CHIVA, data pertaining to recurrence, and will offer the opportunity to study saphenous femoral junction (SFJ stump evolution, the role of the washing vessels and the arch recanalization rate, and gather new data about the effect of the length of the treated saphenous vein. A simplified diagnostic procedure will allow an essential ultrasound examination of the venous net while a schematic and easily readable algorithm guides therapeutic choices. The Riobamba draining crossotomy (RDC tactic is composed of a set of OB procedures. While some of these procedures are, at the moment, only proposals, others are already applied. Devices generally used in ablative procedures such as Light Amplification by Stimulated Emission of Radiation (LASER, radio frequency, steam, and mechanical devices are used in this context to serve to conservative interventions for CHIVA. New techniques have also been proposed for devalvulation and tributary disconnection. Detailed follow-up is necessary in order to determine the effects of therapy and possible disease evolution. Finally, information is added about the informed consent and the ethical considerations of OB-CHIVA research. Keywords: CHIVA, office based procedures, LASER, RF, steam

  7. 46 CFR 289.2 - Vessels included.

    Science.gov (United States)

    2010-10-01

    ... CONSTRUCTION-DIFFERENTIAL SUBSIDY VESSELS, OPERATING-DIFFERENTIAL SUBSIDY VESSELS AND OF VESSELS SOLD OR ADJUSTED UNDER THE MERCHANT SHIP SALES ACT 1946 § 289.2 Vessels included. Vessels subject to the provisions of this part are: (a) All vessels which may in the future be constructed or sold with construction...

  8. Blood flow reprograms lymphatic vessels to blood vessels.

    Science.gov (United States)

    Chen, Chiu-Yu; Bertozzi, Cara; Zou, Zhiying; Yuan, Lijun; Lee, John S; Lu, MinMin; Stachelek, Stan J; Srinivasan, Sathish; Guo, Lili; Vicente, Andres; Vincente, Andres; Mericko, Patricia; Levy, Robert J; Makinen, Taija; Oliver, Guillermo; Kahn, Mark L

    2012-06-01

    Human vascular malformations cause disease as a result of changes in blood flow and vascular hemodynamic forces. Although the genetic mutations that underlie the formation of many human vascular malformations are known, the extent to which abnormal blood flow can subsequently influence the vascular genetic program and natural history is not. Loss of the SH2 domain-containing leukocyte protein of 76 kDa (SLP76) resulted in a vascular malformation that directed blood flow through mesenteric lymphatic vessels after birth in mice. Mesenteric vessels in the position of the congenital lymphatic in mature Slp76-null mice lacked lymphatic identity and expressed a marker of blood vessel identity. Genetic lineage tracing demonstrated that this change in vessel identity was the result of lymphatic endothelial cell reprogramming rather than replacement by blood endothelial cells. Exposure of lymphatic vessels to blood in the absence of significant flow did not alter vessel identity in vivo, but lymphatic endothelial cells exposed to similar levels of shear stress ex vivo rapidly lost expression of PROX1, a lymphatic fate-specifying transcription factor. These findings reveal that blood flow can convert lymphatic vessels to blood vessels, demonstrating that hemodynamic forces may reprogram endothelial and vessel identity in cardiovascular diseases associated with abnormal flow.

  9. Efficient Vessel Tracking  with Accuracy Guarantees

    DEFF Research Database (Denmark)

    Redoutey, Martin; Scotti, Eric; Jensen, Christian Søndergaard

    2008-01-01

    Safety and security are top concerns in maritime navigation, particularly as maritime traffic continues to grow and as crew sizes are reduced. The Automatic Identification System (AIS) plays a key role in regard to these concerns. This system, whose objective is in part to identify and locate ves...... accuracies at lower communication costs. The techniques employ movement predictions that are shared between vessels and the VTS. Empirical studies with a prototype implementation and real vessel data demonstrate that the techniques are capable of significantly improving the AIS....

  10. The vessel fluence; Fluence cuve

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This book presents the proceedings of the technical meeting on the reactors vessels fluence. They are grouped in eight sessions: the industrial context and the stakes of the vessels control; the organization and the methodology for the fluence computation; the concerned physical properties; the reference computation methods; the fluence monitoring in an industrial context; vessels monitoring under irradiation; others methods in the world; the research and development programs. (A.L.B.)

  11. [Large vessel vasculitides].

    Science.gov (United States)

    Morović-Vergles, Jadranka; Puksić, Silva; Gracanin, Ana Gudelj

    2013-01-01

    Large vessel vasculitis includes Giant cell arteritis and Takayasu arteritis. Giant cell arteritis is the most common form of vasculitis affect patients aged 50 years or over. The diagnosis should be considered in older patients who present with new onset of headache, visual disturbance, polymyalgia rheumatica and/or fever unknown cause. Glucocorticoides remain the cornerstone of therapy. Takayasu arteritis is a chronic panarteritis of the aorta ant its major branches presenting commonly in young ages. Although all large arteries can be affected, the aorta, subclavian and carotid arteries are most commonly involved. The most common symptoms included upper extremity claudication, hypertension, pain over the carotid arteries (carotidynia), dizziness and visual disturbances. Early diagnosis and treatment has improved the outcome in patients with TA.

  12. Vessel segmentation in screening mammograms

    Science.gov (United States)

    Mordang, J. J.; Karssemeijer, N.

    2015-03-01

    Blood vessels are a major cause of false positives in computer aided detection systems for the detection of breast cancer. Therefore, the purpose of this study is to construct a framework for the segmentation of blood vessels in screening mammograms. The proposed framework is based on supervised learning using a cascade classifier. This cascade classifier consists of several stages where in each stage a GentleBoost classifier is trained on Haar-like features. A total of 30 cases were included in this study. In each image, vessel pixels were annotated by selecting pixels on the centerline of the vessel, control samples were taken by annotating a region without any visible vascular structures. This resulted in a total of 31,000 pixels marked as vascular and over 4 million control pixels. After training, the classifier assigns a vesselness likelihood to the pixels. The proposed framework was compared to three other vessel enhancing methods, i) a vesselness filter, ii) a gaussian derivative filter, and iii) a tubeness filter. The methods were compared in terms of area under the receiver operating characteristics curves, the Az values. The Az value of the cascade approach is 0:85. This is superior to the vesselness, Gaussian, and tubeness methods, with Az values of 0:77, 0:81, and 0:78, respectively. From these results, it can be concluded that our proposed framework is a promising method for the detection of vessels in screening mammograms.

  13. Americium behaviour in plastic vessels

    Energy Technology Data Exchange (ETDEWEB)

    Legarda, F.; Herranz, M. [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain); Idoeta, R., E-mail: raquel.idoeta@ehu.e [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain); Abelairas, A. [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain)

    2010-07-15

    The adsorption of {sup 241}Am dissolved in water in different plastic storage vessels was determined. Three different plastics were investigated with natural and distilled waters and the retention of {sup 241}Am by these plastics was studied. The same was done by varying vessel agitation time, vessel agitation speed, surface/volume ratio of water in the vessels and water pH. Adsorptions were measured to be between 0% and 70%. The adsorption of {sup 241}Am is minimized with no water agitation, with PET or PVC plastics, and by water acidification.

  14. 19 CFR 103.31 - Information on vessel manifests and summary statistical reports.

    Science.gov (United States)

    2010-04-01

    ... submitted to the Disclosure Law Officer at least 60 days prior to the expiration of the current..., trade journals, and similar publications shall be permitted to examine vessel manifests and summary... consignee. (iii) The certification must be submitted to the Disclosure Law Officer, Headquarters, U.S...

  15. 19 CFR 4.1 - Boarding of vessels; cutter and dock passes.

    Science.gov (United States)

    2010-04-01

    ... agent of the vessel or consular officer exclusively for purposes relating to Customs formalities, shall... authorities and taken in charge by an officer of the Customs, as follows: (1) To persons on official business... not result in undue interference with the performance of official business. (d) No person in charge of...

  16. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  17. 46 CFR 287.9 - Valuation of securities in fund.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Valuation of securities in fund. 287.9 Section 287.9 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS AFFECTING SUBSIDIZED VESSELS AND... finance the construction or acquisition of new vessels which are deposited in the construction reserve...

  18. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  19. 6 CFR 27.245 - Review and approval of site security plans.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  20. 31 CFR 500.513 - Purchase and sale of certain securities.

    Science.gov (United States)

    2010-07-01

    ... on a national securities exchange, but purchases or sales of such securities shall be made at market... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FOREIGN ASSETS CONTROL REGULATIONS... securities. (a) The bona fide purchase and sale of securities on a national securities exchange by banking...

  1. 75 FR 18857 - Privacy Act of 1974; Department of Homeland Security Citizenship and Immigration Services...

    Science.gov (United States)

    2010-04-13

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security Citizenship and... Security system of records notice titled, ``Department of Homeland Security Citizenship and Immigration... efficient and secure processing of information to aid the Citizenship and Immigration Services Ombudsman in...

  2. How Nation-States Craft National Security Strategy Documents

    Science.gov (United States)

    2012-10-01

    Security Secretariat (akin to the U.S. National Security Staff or what was previ- ously known as the NSC Staff) component of the Cabi - net Office under...the Cabi - net Office, in addition to the critical addition of the Treasury (Her Majesty’s Treasury [HMT]), as well as the DFID,203 and Departments

  3. Hospital security and safety--aloha style.

    Science.gov (United States)

    Devaney, D E

    1991-01-01

    Visitors to Hawaii need not be fazed by concerns that they will be unable to communicate during a medical crisis. Trained IAHSS security officers representing all races and ethnic groups provide friendly, helpful service. The Hawaii Chapter of IAHSS coordinates activities of mutual concern among the nine major medical centers on Oahu and Maui. Hospital security does play an integral role in the activities of the Honolulu Police Department's Council of Police and Private Security (COPPS).

  4. Security measures for AIDS and HIV.

    Science.gov (United States)

    Torres, C G; Turner, M E; Harkess, J R; Istre, G R

    1991-02-01

    This study describes the measures being taken by AIDS surveillance offices across the country to ensure the security of information regarding patients with AIDS and HIV infection. Security measures were evaluated according to the cumulative number of AIDS cases reported, whether partner notification services were provided, and whether HIV seropositive reporting by name was also required. This study showed that public health departments have taken extra steps to ensure the security of AIDS and HIV data.

  5. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  6. 50 CFR 648.8 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Vessel identification. 648.8 Section 648.8... identification. (a) Vessel name and official number. Each fishing vessel subject to this part and over 25 ft (7.6... or ocean quahog vessels licensed under New Jersey law may use the appropriate vessel identification...

  7. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  8. Office of Child Support and Enforcement (OCSE) State Wage Alerts

    Data.gov (United States)

    Social Security Administration — The OCSE State Wage Alert is a quarterly match which detects SSI overpayments by identifying unreported wage and unemployment data provided to the Office of Child...

  9. Hearing Office Average Processing Time Ranking Report, February 2016

    Data.gov (United States)

    Social Security Administration — A ranking of ODAR hearing offices by the average number of hearings dispositions per ALJ per day. The average shown will be a combined average for all ALJs working...

  10. Hearing Office Dispositions Per ALJ Per Day Rate Ranking Report

    Data.gov (United States)

    Social Security Administration — A ranking of ODAR hearing offices by the average number of hearings dispositions per ALJ per day. The average shown will be a combined average for all ALJs working...

  11. 77 FR 40624 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-07-10

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting...

  12. 77 FR 24211 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-04-23

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting...

  13. 77 FR 27472 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-05-10

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an...

  14. 76 FR 35228 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-06-16

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting...

  15. 77 FR 53899 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-09-04

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an...

  16. 77 FR 6132 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-02-07

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting...

  17. 78 FR 3906 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-01-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an...

  18. 77 FR 5816 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-02-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an...

  19. 76 FR 62426 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-10-07

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an...

  20. 78 FR 65351 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-10-31

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting...

  1. 78 FR 74155 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-12-10

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting...

  2. 77 FR 9951 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-02-21

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting...

  3. 76 FR 61369 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-10-04

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting...

  4. 76 FR 46827 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-08-03

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting...

  5. 77 FR 18253 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-03-27

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an...

  6. 77 FR 16044 - Information Collection Requests to Office of Management and Budget.

    Science.gov (United States)

    2012-03-19

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Requests to Office of Management and Budget. AGENCY: Coast... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an...

  7. 76 FR 57749 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-09-16

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting...

  8. 78 FR 26798 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-05-08

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an...

  9. 78 FR 23573 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-19

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an...

  10. 78 FR 19503 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-01

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting...

  11. 78 FR 12083 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-02-21

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF HOMELAND SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an...

  12. 76 FR 46824 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-08-03

    ... SECURITY Coast Guard Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting.... FOR FURTHER INFORMATION CONTACT: Contact Ms. Kenlinishia Tyler, Office of Information Management...

  13. 77 FR 6571 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-02-08

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting.... FOR FURTHER INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone...

  14. 78 FR 54666 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-09-05

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting... 20593-7710. FOR FURTHER INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management...

  15. 78 FR 5192 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-01-24

    ... SECURITY Coast Guard Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting an... FURTHER INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475...

  16. 77 FR 17081 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-03-23

    ... SECURITY Coast Guard Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting.... Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for...

  17. 78 FR 54667 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-09-05

    ... SECURITY Coast Guard Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting... FURTHER INFORMATION: Contact Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532...

  18. 76 FR 52338 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-08-22

    ... SECURITY Coast Guard Information Collection Request to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting.... Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for...

  19. 78 FR 19502 - Information Collection Requests to Office of Management and Budget.

    Science.gov (United States)

    2013-04-01

    ... SECURITY Coast Guard Information Collection Requests to Office of Management and Budget. AGENCY: Coast... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting..., Office of Information Management, telephone 202-475-3532, or fax 202-475-3929, for questions on these...

  20. Program Office Guide to Ada. Edition 1

    Science.gov (United States)

    1986-09-17

    publication. MARK V. ZIEMBA , 2Lt, USAF Project Officer, Software Engineering Tools & Methods ARTHUR G. DECELLES, Capt, USAF Program Manager, Computer...UNLIMITED G3 SAME AS RPT D DTIC USERS 21 ABSTRACT SECURITY CLASSIFICATION UNCLASSIFIED 22a. NAME OF RESPONSIBLE INDIVIDUAL M.V. Ziemba

  1. Reforming the American Military Officer Personnel System

    Science.gov (United States)

    2015-12-02

    AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND HOMELAND SECURITY Testimony Reforming the American Military Officer Personnel System Bernard......For a long time, I have argued and written about the need to reform the career military structure by increasing the maximum years of service an

  2. Burnout among Prison Caseworkers and Corrections Officers

    Science.gov (United States)

    Carlson, Joseph R.; Thomas, George

    2006-01-01

    The purpose of this paper is to compare burnout between prison caseworkers and correctional officers and examine reasons for the high turnover of caseworkers. The study was conducted through surveys at a maximum/medium men's prison and at an all security level women's prison in the Midwest. By using the Maslach Burnout Inventory, it was found that…

  3. 2D Fast Vessel Visualization Using a Vessel Wall Mask Guiding Fine Vessel Detection

    Directory of Open Access Journals (Sweden)

    Sotirios Raptis

    2010-01-01

    and then try to approach the ridges and branches of the vasculature's using fine detection. Fine vessel screening looks into local structural inconsistencies in vessels properties, into noise, or into not expected intensity variations observed inside pre-known vessel-body areas. The vessels are first modelled sufficiently but not precisely by their walls with a tubular model-structure that is the result of an initial segmentation. This provides a chart of likely Vessel Wall Pixels (VWPs yielding a form of a likelihood vessel map mainly based on gradient filter's intensity and spatial arrangement parameters (e.g., linear consistency. Specific vessel parameters (centerline, width, location, fall-away rate, main orientation are post-computed by convolving the image with a set of pre-tuned spatial filters called Matched Filters (MFs. These are easily computed as Gaussian-like 2D forms that use a limited range sub-optimal parameters adjusted to the dominant vessel characteristics obtained by Spatial Grey Level Difference statistics limiting the range of search into vessel widths of 16, 32, and 64 pixels. Sparse pixels are effectively eliminated by applying a limited range Hough Transform (HT or region growing. Major benefits are limiting the range of parameters, reducing the search-space for post-convolution to only masked regions, representing almost 2% of the 2D volume, good speed versus accuracy/time trade-off. Results show the potentials of our approach in terms of time for detection ROC analysis and accuracy of vessel pixel (VP detection.

  4. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  5. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  6. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  7. BY FRUSTUM CONFINING VESSEL

    Directory of Open Access Journals (Sweden)

    Javad Khazaei

    2016-09-01

    Full Text Available Helical piles are environmentally friendly and economical deep foundations that, due to environmental considerations, are excellent additions to a variety of deep foundation alternatives available to the practitioner. Helical piles performance depends on soil properties, the pile geometry and soil-pile interaction. Helical piles can be a proper alternative in sensitive environmental sites if their bearing capacity is sufficient to support applied loads. The failure capacity of helical piles in this study was measured via an experimental research program that was carried out by Frustum Confining Vessel (FCV. FCV is a frustum chamber by approximately linear increase in vertical and lateral stresses along depth from top to bottom. Due to special geometry and applied bottom pressure, this apparatus is a proper choice to test small model piles which can simulate field stress conditions. Small scale helical piles are made with either single helix or more helixes and installed in fine grained sand with three various densities. Axial loading tests including compression and tension tests were performed to achieve pile ultimate capacity. The results indicate the helical piles behavior depends essentially on pile geometric characteristics, i.e. helix configuration and soil properties. According to the achievements, axial uplift capacity of helical model piles is about equal to usual steel model piles that have the helixes diameter. Helical pile compression bearing capacity is too sufficient to act as a medium pile, thus it can be substituted other piles in special geoenvironmental conditions. The bearing capacity also depends on spacing ratio, S/D, and helixes diameter.

  8. Southeast Region Headboat Survey-Vessel list/Vessel Directory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This is a database of vessels that have been on the SRHS through time, their owners/operators, marinas/docks and their contact information. This assists in...

  9. 33 CFR 155.1052 - Response plan development and evaluation criteria for vessels carrying group V petroleum oil as a...

    Science.gov (United States)

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR VESSELS Tank Vessel Response Plans for Oil § 155... equipment, including— (1) Sonar, sampling equipment, or other methods for locating the oil on the bottom or...

  10. 8 CFR 252.3 - Great Lakes vessels and tugboats arriving in the United States from Canada; special procedures.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Great Lakes vessels and tugboats arriving... DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS LANDING OF ALIEN CREWMEN § 252.3 Great Lakes vessels... and tugboats. An immigration examination shall not be required of any crewman aboard a Great Lakes...

  11. 46 CFR 171.124 - Watertight integrity above the margin line in a vessel less than 100 gross tons.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Watertight integrity above the margin line in a vessel less than 100 gross tons. 171.124 Section 171.124 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... Integrity Above the Margin Line § 171.124 Watertight integrity above the margin line in a vessel less than...

  12. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    Science.gov (United States)

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  13. Officer Computer Utilization Report

    Science.gov (United States)

    1992-03-01

    SOCIAL AND BEHAVIORAL SCIENCE 055 DENTISTRY 136 ANTHROPOLOGY 056 ENVIRONMENTAL HEALTH 137 CRIMINAL JUSTICE 057 HEALTH ADMINISTRATION 138 GEOGRAPHY 058...154 LAW. ENVIRONMENTAL 162 VETERINARY 074 OTHER HISTORY FIELD 155 LAW. FORENSIC SCIENCE 163 OTHER 075 OTHER AREA STUDIES 156 LAW. INTERNATIONAL -7...SURVEY OFFICER 207 WEAPONS TECHNICAL INFORMATION OFFICER 208 WEAPONS TECHNICAL OFFICER -m GENERAL DENTISTRY 272 DENTA.. OFFICER GENERAL PRACTITIONER

  14. 33 CFR 104.235 - Vessel recordkeeping requirements.

    Science.gov (United States)

    2010-07-01

    ... board a copy of the last 10 DoSs and a copy of each continuing DoS for at least 90 days after the end of... the Company Security Officer or the VSO stating the date the audit was completed. (c) Any records...

  15. Office 365 For Dummies

    CERN Document Server

    Withee, Ken

    2012-01-01

    The information you need to create a virtual office that can be accessed anywhere Microsoft Office 365 is a revolutionary technology that allows individuals and companies of all sizes to create and maintain a virtual office in the cloud. Featuring familiar Office Professional applications, web apps, Exchange Online, and Lync Online, Office 365 offers business professionals added flexibility and an easy way to work on the go. This friendly guide explains the cloud, how Office 365 takes advantage of it, how to use the various components, and the many possibilities offered by Office 365. It provi

  16. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  17. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  18. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  19. Secure Directories

    OpenAIRE

    Chadwick, David W.

    2000-01-01

    This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol. Security can be provided by three functions: an application level firewall, an authentication mechanism, and an access control scheme. A description of the X.500 and LDAP access control models is presented followed by the authentication method...

  20. 46 CFR 287.8 - Investment of funds in securities.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Investment of funds in securities. 287.8 Section 287.8 Shipping MARITIME ADMINISTRATION, DEPARTMENT OF TRANSPORTATION REGULATIONS AFFECTING SUBSIDIZED VESSELS AND... may be substituted for securities or commitment to finance in the fund, subject to the provisions of...

  1. 33 CFR 106.135 - Alternative Security Program.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Alternative Security Program. 106.135 Section 106.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... facility; (b) The OCS facility does not serve vessels on international voyages; and (c) The Alternative...

  2. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  3. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  4. Composite Vessels for Containment of Extreme Blast Loadings

    Energy Technology Data Exchange (ETDEWEB)

    Pastrnak, J; Henning, C; Grundler, W; Switzer, V; Hollaway, R; Morrison, J; Hagler, L; Kokko, E; Deteresa, S; Hathcoat, B; Dalder, E

    2004-07-15

    A worldwide trend for explosives testing has been to replace open-air detonations with containment vessels, especially when any hazardous materials are involved. As part of the National Nuclear Security Administration's (NNSA) effort to ensure the safety and reliability of the nation's nuclear stockpile, researchers at Lawrence Livermore National Laboratory have been developing a high performance filament wound composite firing vessel that is nearly radiographically transparent. It was intended to contain a limited number of detonations of metal cased explosive assemblies in radiographic facilities such as the Advanced Hydrodynamic Facility (AHF) being studied by Los Alamos National Laboratory. A 2-meter diameter pressure vessel was designed to contain up to 35 kg (80 lb) of TNT equivalent explosive without leakage. Over the past 5 years a total of three half-scale (1 meter diameter) vessels have been constructed, and two of them were tested to 150% load with 8.2 kg (18-pound) spheres of C4 explosive. The low density and high specific strength advantages used in this composite vessel design may have other additional applications such as transporting sensitive explosives that could otherwise be moved only in very small quantities. Also, it could be used for highly portable, explosive containment systems for law enforcement.

  5. 46 CFR 11.522 - Service requirements for assistant engineer (limited oceans) of steam and/or motor vessels.

    Science.gov (United States)

    2010-10-01

    ... oceans) of steam and/or motor vessels. 11.522 Section 11.522 Shipping COAST GUARD, DEPARTMENT OF HOMELAND... Requirements for Engineer Officer § 11.522 Service requirements for assistant engineer (limited oceans) of... assistant engineer (limited oceans) of steam and/or motor vessels is three years of service in the...

  6. 2013 East Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  7. SC/OQ Vessel Database

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Data tables holding information for the Surf Clam/Ocean Quahog vessel and dealer/processor logbooks (negative and positive), as well as individual tag information...

  8. 2011 Great Lakes Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  9. 2011 West Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  10. 2013 Great Lakes Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  11. 2011 East Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  12. Integrin binding: Sticking around vessels

    Science.gov (United States)

    Blatchley, Michael R.; Gerecht, Sharon

    2017-09-01

    A study demonstrates that controlled integrin binding on a biomaterial was capable of promoting vascular cell sprouting and formation of a non-leaky blood vessel network in a healthy and diseased state.

  13. Transposition of the great vessels

    Science.gov (United States)

    ... vessel called the ductus arteriosus open, allowing some mixing of the 2 blood circulations. A procedure using ... they are not already immune. Eating well, avoiding alcohol, and controlling diabetes both before and during pregnancy ...

  14. 2013 West Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  15. Vessel Permit System Data Set

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — GARFO issues federal fishing permits annually to owners of fishing vessels who fish in the Greater Atlantic region, as required by federal regulation. These permits...

  16. 2011 Tug Towing Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  17. Caribbean PR Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains catch (landed catch) and effort for fishing trips made by vessels fishing in Puerto Rico. The catch and effort data for the entire trip are...

  18. Coastal Discard Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains data on the type and amount of marine resources that are discarded or interacted with by vessels that are selected to report to the Southeast...

  19. Bioreactor rotating wall vessel

    Science.gov (United States)

    2001-01-01

    The NASA Bioreactor provides a low turbulence culture environment which promotes the formation of large, three-dimensional cell clusters. Due to their high level of cellular organization and specialization, samples constructed in the bioreactor more closely resemble the original tumor or tissue found in the body. The work is sponsored by NASA's Office of Biological and Physical Research. The bioreactor is managed by the Biotechnology Cell Science Program at NASA's Johnson Space Center (JSC). NASA-sponsored bioreactor research has been instrumental in helping scientists to better understand normal and cancerous tissue development. In cooperation with the medical community, the bioreactor design is being used to prepare better models of human colon, prostate, breast and ovarian tumors. Cartilage, bone marrow, heart muscle, skeletal muscle, pancreatic islet cells, liver and kidney are just a few of the normal tissues being cultured in rotating bioreactors by investigators. Cell constructs grown in a rotating bioreactor on Earth (left) eventually become too large to stay suspended in the nutrient media. In the microgravity of orbit, the cells stay suspended. Rotation then is needed for gentle stirring to replenish the media around the cells.

  20. 49 CFR 15.5 - Sensitive security information.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Sensitive security information. 15.5 Section 15.5 Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.5 Sensitive security information. (a) In general. In accordance with 49 U.S.C. 40119(b)(1), SSI is information...

  1. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  2. 4 CFR 83.9 - Social Security number.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Social Security number. 83.9 Section 83.9 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PRIVACY PROCEDURES FOR PERSONNEL RECORDS § 83.9 Social Security number. (a) GAO may not require individuals to disclose their Social Security Number (SSN) unless...

  3. Working together: public law enforcement and private security.

    Science.gov (United States)

    Jones, Harold T

    2010-01-01

    Private security forces, including hospital security professionals, provide a vast largely untapped resource for public law enforcement in a number of critical areas affecting society, the author points out. At the same time, police agencies in some communities have programs which can be used to provide additional training for private security officers.

  4. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures for...

  5. 15 CFR 4a.2 - Deputy Assistant Secretary for Security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Deputy Assistant Secretary for Security. 4a.2 Section 4a.2 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION... Security. The Deputy Assistant Secretary for Security (DAS) is responsible for implementing E.O. 12958 and...

  6. 75 FR 62447 - Departmental Offices; Proposed Collections; Comment Requests

    Science.gov (United States)

    2010-10-08

    ... Management and Budget. The Office of International Affairs of the Department of the Treasury is soliciting comments concerning Treasury International Capital Form S, Purchases and Sales of Long-term Securities by... INFORMATION: Title: Treasury International Capital Form S, Purchases and Sales of Long-term Securities by...

  7. Prosopomorphic vessels from Moesia Superior

    Directory of Open Access Journals (Sweden)

    Nikolić Snežana

    2008-01-01

    Full Text Available The prosopomorphic vessels from Moesia Superior had the form of beakers varying in outline but similar in size. They were wheel-thrown, mould-made or manufactured by using a combination of wheel-throwing and mould-made appliqués. Given that face vessels are considerably scarcer than other kinds of pottery, more than fifty finds from Moesia Superior make an enviable collection. In this and other provinces face vessels have been recovered from military camps, civilian settlements and necropolises, which suggests that they served more than one purpose. It is generally accepted that the faces-masks gave a protective role to the vessels, be it to protect the deceased or the family, their house and possessions. More than forty of all known finds from Moesia Superior come from Viminacium, a half of that number from necropolises. Although tangible evidence is lacking, there must have been several local workshops producing face vessels. The number and technological characteristics of the discovered vessels suggest that one of the workshops is likely to have been at Viminacium, an important pottery-making centre in the second and third centuries.

  8. 78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-05-24

    ... Doc No: 2013-12433] DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board... Readiness, Defense Language and National Security Education Office (DLNSEO), DoD. ACTION: Meeting notice... National Security Education Board will take place. DATES: Monday, June 17, 2013, from 1:00 p.m. to 5:30 p.m...

  9. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration. ACTION...

  10. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security National Protection... extends administrative Privacy Act protections to all individuals when systems of records maintain...: Department of Homeland Security, Privacy Office. ACTION: Notice of Privacy Act System of Records. SUMMARY: In...

  11. Educational Attainment, Job Satisfaction, and the Professionalization of Correctional Officers.

    Science.gov (United States)

    Jurik, Nancy C.; And Others

    1987-01-01

    Analyzes the impact of an administrative effort to increase the educational attainment of correctional officers employed in a medium-security facility department of corrections. Educational attainment is found to be negatively associated with correctional officer job satisfaction when other variables are held constant. (Author/CH)

  12. 76 FR 5249 - Departmental Offices; Proposed Collection; Comment Request

    Science.gov (United States)

    2011-01-28

    ..., International Portfolio Investment Data Systems, Department of the Treasury, Room 5422, 1500 Pennsylvania Avenue... extension approval by the Office of Management and Budget. The Office of International Affairs within the... used to conduct annual surveys of holdings by foreign-residents of U.S. securities for portfolio...

  13. 19 CFR 101.2 - Authority of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Authority of Customs officers. 101.2 Section 101.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL PROVISIONS § 101.2 Authority of Customs officers. (a) Supremacy of delegated authority...

  14. 19 CFR 12.62 - Enforcement; duties of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Enforcement; duties of Customs officers. 12.62 Section 12.62 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...; duties of Customs officers. (a) In accordance with the authority contained in sections 10 and 12 of the...

  15. 41 CFR 101-25.106 - Servicing of office machines.

    Science.gov (United States)

    2010-07-01

    ...) Number of machines; including overall frequency of repairs required; (10) Security restrictions, if any... machines. 101-25.106 Section 101-25.106 Public Contracts and Property Management Federal Property...-General Policies § 101-25.106 Servicing of office machines. (a) The determination as to whether office...

  16. 77 FR 71369 - Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security...

    Science.gov (United States)

    2012-11-30

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 RIN 3235-AL12 Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security-Based Swap Participants and Capital Requirements for Broker-Dealers...

  17. 29 CFR 1918.67 - Notifying the ship's officers before using certain equipment.

    Science.gov (United States)

    2010-07-01

    ... bringing aboard ship internal combustion or electric powered tools, equipment or vehicles. (b) The employer shall also notify the officer in charge of the vessel before using the ship's electric power for the operation of any electric tools or equipment. ...

  18. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... MORTGAGE ASSOCIATION (FANNIE MAE) AND THE FEDERAL HOME LOAN MORTGAGE CORPORATION (FREDDIE MAC) Book-Entry...

  19. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  20. Automated method for identification and artery-venous classification of vessel trees in retinal vessel networks.

    Directory of Open Access Journals (Sweden)

    Vinayak S Joshi

    Full Text Available The separation of the retinal vessel network into distinct arterial and venous vessel trees is of high interest. We propose an automated method for identification and separation of retinal vessel trees in a retinal color image by converting a vessel segmentation image into a vessel segment map and identifying the individual vessel trees by graph search. Orientation, width, and intensity of each vessel segment are utilized to find the optimal graph of vessel segments. The separated vessel trees are labeled as primary vessel or branches. We utilize the separated vessel trees for arterial-venous (AV classification, based on the color properties of the vessels in each tree graph. We applied our approach to a dataset of 50 fundus images from 50 subjects. The proposed method resulted in an accuracy of 91.44% correctly classified vessel pixels as either artery or vein. The accuracy of correctly classified major vessel segments was 96.42%.

  1. Glossary of Computer Security Terms. Version 1

    Science.gov (United States)

    1988-10-21

    40 40 40 0 4w 40 NCSC-TG-004-88 Library No. S-231,238 FOREWORD This publication, "Glossary of Computer Security Terms," is issued by the National... Computer Security Center (NCSC) under the authority of and in accordance with Department of Defense (DoD) Directive 5215.1, " Computer Security Evaluation...r.lw" 73r൝ October 1988Director National Computer Security Center For ole by the Superintendent of Documents, Congresignal Sales Office, U.S

  2. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  3. Information security : the moving target

    CSIR Research Space (South Africa)

    Dlamini, MT

    2009-01-01

    Full Text Available or advertisement on the screen without causing any serious damage to the information or systems being used. However, rare cases of attacks with the potential to harm information economic and political uncertainty and secondly to the pres- sure from consumers... was screened by a security officer before the user could start the identification and authentication process. Since there were few terminals it was easy to keep track of all logged-in users and their activities. However, since there were no security...

  4. 50 CFR 697.8 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Vessel identification. 697.8 Section 697.8 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION....8 Vessel identification. (a) Vessel name and official number. Each fishing vessel issued a limited...

  5. Mechanosensing in developing lymphatic vessels.

    Science.gov (United States)

    Planas-Paz, Lara; Lammert, Eckhard

    2014-01-01

    The lymphatic vasculature is responsible for fluid homeostasis, transport of immune cells, inflammatory molecules, and dietary lipids. It is composed of a network of lymphatic capillaries that drain into collecting lymphatic vessels and ultimately bring fluid back to the blood circulation. Lymphatic endothelial cells (LECs) that line lymphatic capillaries present loose overlapping intercellular junctions and anchoring filaments that support fluid drainage. When interstitial fluid accumulates within tissues, the extracellular matrix (ECM) swells and pulls the anchoring filaments. This results in opening of the LEC junctions and permits interstitial fluid uptake. The absorbed fluid is then transported within collecting lymphatic vessels, which exhibit intraluminal valves that prevent lymph backflow and smooth muscle cells that sequentially contract to propel lymph.Mechanotransduction involves translation of mechanical stimuli into biological responses. LECs have been shown to sense and respond to changes in ECM stiffness, fluid pressure-induced cell stretch, and fluid flow-induced shear stress. How these signals influence LEC function and lymphatic vessel growth can be investigated by using different mechanotransduction assays in vitro and to some extent in vivo.In this chapter, we will focus on the mechanical forces that regulate lymphatic vessel expansion during embryonic development and possibly secondary lymphedema. In mouse embryos, it has been recently shown that the amount of interstitial fluid determines the extent of lymphatic vessel expansion via a mechanosensory complex formed by β1 integrin and vascular endothelial growth factor receptor-3 (VEGFR3). This model might as well apply to secondary lymphedema.

  6. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  7. 77 FR 10960 - Security Zone, East River and Bronx Kill; Randalls and Wards Islands, NY

    Science.gov (United States)

    2012-02-24

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA87 Security Zone, East River and Bronx Kill; Randalls and... establishing a temporary security zone on the waters of the East River and Bronx Kill, in the vicinity of... is intended to restrict vessels from a portion of the East River and Bronx Kill when public officials...

  8. 8 CFR 103.1 - Delegations of authority; designation of immigration officers.

    Science.gov (United States)

    2010-01-01

    ... immigration officers. 103.1 Section 103.1 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION... immigration officers. (a) Delegations of authority. Delegations of authority to perform functions and exercise authorities under the immigration laws may be made by the Secretary of Homeland Security as provided by § 2.1...

  9. HUD's Local Office Directory

    Data.gov (United States)

    Department of Housing and Urban Development — HUD is organized in 10 Regions. Each Region is managed by a Regional Administrator, who also oversees the Regional Office. Each Field Office within a Region is...

  10. Secure Ties

    NARCIS (Netherlands)

    Joep de Hart; Frans Knol; Cora Maas - de Waal; Theo Roes

    2002-01-01

    Original title: Zekere banden. Discussions about the Netherlands of today often throw up terms such as 'social cohesion', 'social integration', 'liveability' and 'security'. The Netherlands Institute for Social Research/SCP has carried out a study of this phenomenon and presents the results in

  11. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  12. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  13. Aviation Security: A Case for Risk-Based Passenger Screening

    Science.gov (United States)

    2011-12-01

    R Risk RBS Risk-Based Security SENTRI Secure Electronic Network for Traveler Rapid Inspection SF Secure Flight SOS Satisfaction of Search...PAL), and Secure Electronic Network for Travelers Rapid Inspection ( SENTRI ). (DHS, 2006, p. 19). F. CONCLUSION Federal risk-management guidance...Federal flight deck officers are deputized and armed federal law enforcement officials within the limited jurisdiction of the flight deck; they are

  14. Grounding Damage to Conventional Vessels

    DEFF Research Database (Denmark)

    Lützen, Marie; Simonsen, Bo Cerup

    2003-01-01

    regulations for design of bottom compartment layout with regard to grounding damages are largely based on statistical damage data. New and updated damage statistics holding 930 grounding accident records has been investigated. The bottom damage statistics is compared to current regulations for the bottom......The present paper is concerned with rational design of conventional vessels with regard to bottom damage generated in grounding accidents. The aim of the work described here is to improve the design basis, primarily through analysis of new statistical data for grounding damage. The current...... for the relation between the amount of deformed structure and the energy absorption. Finally, the paper shows how damage statistics for existing, conventional vessels can be used together with theoretical prediction methods for determining grounding damage distributions for new vessel types not included...

  15. 19 CFR 4.5 - Government vessels.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Government vessels. 4.5 Section 4.5 Customs Duties... VESSELS IN FOREIGN AND DOMESTIC TRADES Arrival and Entry of Vessels § 4.5 Government vessels. (a) No... that is the property of, the U.S. Department of Defense (DoD) will be treated as a Government vessel...

  16. Cultural differences in emotional intelligence among top officers on board merchant ships.

    Science.gov (United States)

    Johnsen, Bjørn Helge; Meeùs, Philippine; Meling, Jon; Rogde, Torbjørn; Eid, Jarle; Esepevik, Roar; Olsen, Olav Kjellevold; Sommerfelt-Pettersen, Jan

    2012-01-01

    The current research investigated cultural differences in emotional intelligence among top officers on board vessels of multicultural maritime companies. We found that Southeast Asian officers scored higher than European officers on the total Emotional Intelligence scale. When separating the EQ scale in its facets, higher scores for Asian officers were found on "Utilization of emotions", "Handling relationships", and on "Self-control". Another finding was that Chief officers/Second engineers scored higher than Masters/Chief Officers on "Self-control". Finally, we found a negative correlation between age and scores on the facet of "Self-control". These crosscultural differences may have implications for interpersonal relations and ship management.

  17. 46 CFR 282.21 - Wages of officers and crew.

    Science.gov (United States)

    2010-10-01

    ... OPERATORS OPERATING-DIFFERENTIAL SUBSIDY FOR LINER VESSELS ENGAGED IN ESSENTIAL SERVICES IN THE FOREIGN COMMERCE OF THE UNITED STATES Calculation of Subsidy Rates § 282.21 Wages of officers and crew. (a... (x) Penalty cargo bonuses. (c) Method of calculating U.S. wage cost (WC) Two different calculations...

  18. [Pulmonary blood vessels in goats].

    Science.gov (United States)

    Roos, H; Hegner, K; Vollmerhaus, B

    1999-05-01

    The blood vessels in the lung of the goat, which until now have received little attention, are described in detail for the first time. With regard to the segments of the lung, blood vessels are bronchovascular units in the lobi craniales, lobus medius and lobus accessorius, but bronchoartery units in the lobi caudales. We investigated the types of branches of the Aa. pulmonales dextra et sinistra, the inter- and intraspecific principles of the outlet of the pulmonary veins and the importance of bronchopulmonary segmentation of the lungs.

  19. Opinions about Component Energetic Security

    OpenAIRE

    Elena GOLUMBEANU (GEORGESCU)

    2012-01-01

    Collective security (international) represent the morphological expression of individual security components. According to the Report presented at the United Nations Development Programme, collective security (international) as well as national security, is the expression of seven synergistic dimensions as follows: economic security, food security, environmental security, personal security, community security, political security and individual security. As part of economic security, energy an...

  20. Office 2013 simplified

    CERN Document Server

    Marmel, Elaine

    2013-01-01

    A basic introduction to learn Office 2013 quickly, easily, and in full color Office 2013 has new features and tools to master, and whether you're upgrading from an earlier version or using the Office applications for the first time, you'll appreciate this simplified approach. Offering a clear, visual style of learning, this book provides you with concise, step-by-step instructions and full-color screen shots that walk you through the applications in the Microsoft Office 2013 suite: Word, Excel, PowerPoint, Outlook, and Publisher.Shows you how to tackle dozens of Office 2013

  1. Office 2013 for dummies

    CERN Document Server

    Wang, Wallace

    2013-01-01

    Office 2013 For Dummies is the key to your brand new Office! Packed with straightforward, friendly instruction, this update to one of the bestselling Office books of all time gets you thoroughly up to speed and helps you learn how to take full advantage of the new features in Office 2013. After coverage of the fundamentals, you'll discover how to spice up your Word documents, edit Excel spreadsheets and create formulas, add pizazz to your PowerPoint presentation, and much more.Helps you harness the power of all five Office 2013 applications: Word, Excel, PowerPoint,

  2. 75 FR 37793 - Science Advisory Board Staff Office; Notification of a Public Meeting of the Science Advisory...

    Science.gov (United States)

    2010-06-30

    ... AGENCY Science Advisory Board Staff Office; Notification of a Public Meeting of the Science Advisory... provisions of FACA and all appropriate SAB Staff Office procedural policies. Background: Vessel ballast water... performance of such systems. In response, the SAB Staff Office requested public nomination of experts and...

  3. 76 FR 58852 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing and...

    Science.gov (United States)

    2011-09-22

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE... rating information and related information provided by Nationally Recognized Statistical Rating..., and facilitating transactions in municipal securities and municipal financial products, to remove...

  4. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  5. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  6. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  7. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Science.gov (United States)

    2010-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of the...

  8. 78 FR 12129 - Rescission of Social Security Acquiescence Rulings 92-2(6)

    Science.gov (United States)

    2013-02-21

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Rescission of Social Security Acquiescence Rulings 92-2(6) AGENCY: Social Security Administration. ACTION: Notice of Rescission of Social Security Acquiescence Ruling (AR) 92-2(6)--Difford v. Sullivan...

  9. 12 CFR 792.68 - Use and collection of Social Security numbers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Use and collection of Social Security numbers... Act § 792.68 Use and collection of Social Security numbers. The head of each NCUA Office shall take... furnish Social Security numbers, and that individuals who are requested to provide Social Security numbers...

  10. 76 FR 65558 - Rescission of Social Security Ruling 97-2p

    Science.gov (United States)

    2011-10-21

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Rescission of Social Security Ruling 97-2p AGENCY: Social Security Administration. ACTION: Notice of rescission of Social Security Ruling. SUMMARY: In accordance with 20 CFR 402.35(b)(1), the...

  11. 76 FR 60112 - Consent Based Social Security Number Verification (CBSV) Service

    Science.gov (United States)

    2011-09-28

    ... ADMINISTRATION Consent Based Social Security Number Verification (CBSV) Service AGENCY: Social Security... Service. SUMMARY: We provide limited fee-based Social Security number (SSN) verification service to... CONTACT: Gerard R. Hart, Office of Public Service and Operations Support, Social Security Administration...

  12. 76 FR 59472 - Self-Regulatory Organizations; International Securities Exchange, Inc., Order Granting Approval...

    Science.gov (United States)

    2011-09-26

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; International Securities Exchange, Inc., Order Granting Approval of... International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities and Exchange...

  13. Report: FY 2007 FISMA Report: Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2007-S-00003, September 25, 2007. This is the Office of Inspector General’s Fiscal Year 2007 Federal Information Security Management Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  14. Commercial Passenger Fishing Vessel Fishery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains the logbook data from U.S.A. Commercial Passenger Fishing Vessels (CPFV) fishing in the U.S.A. EEZ and in waters off of Baja California, from...

  15. Pressure vessel and method therefor

    Energy Technology Data Exchange (ETDEWEB)

    Saunders, Timothy

    2017-09-05

    A pressure vessel includes a pump having a passage that extends between an inlet and an outlet. A duct at the pump outlet includes at least one dimension that is adjustable to facilitate forming a dynamic seal that limits backflow of gas through the passage.

  16. BPC 157 and blood vessels.

    Science.gov (United States)

    Seiwerth, Sven; Brcic, Luka; Vuletic, Lovorka Batelja; Kolenc, Danijela; Aralica, Gorana; Misic, Marija; Zenko, Anita; Drmic, Domagoj; Rucman, Rudolf; Sikiric, Predrag

    2014-01-01

    This review focuses on the described effects of BPC 157 on blood vessels after different types of damage, and elucidate by investigating different aspects of vascular response to injury (endothelium damage, clotting, thrombosis, vasoconstriction, vasodilatation, vasculoneogenesis and edema formation) especially in connection to the healing processes. In this respect, BPC 157 was concluded to be the most potent angiomodulatory agent, acting through different vasoactive pathways and systems (e.g. NO, VEGF, FAK) and leading to optimization of the vascular response followed, as it has to be expected, by optimization of the healing process. Formation of new blood vessels involves two main, partly overlapping mechanisms, angiogenesis and vasculogenesis. The additional mechanism of arteriogenesis is involved in the formation of collaterals. In conjunction with blood vessel function, we at least have to consider leakage of fluid/proteins/plasma, resulting in edema/exudate formation as well as thrombogenesis. Blood vessels are also strongly involved in tumor biology. In this aspect, we have neoangiogenesis resulting in pathological vascularization, vascular invasion resulting in release of metastatic cells and the phenomenon of homing resulting in formation of secondary tumors--metastases.

  17. The determinants of fishing vessel accident severity.

    Science.gov (United States)

    Jin, Di

    2014-05-01

    The study examines the determinants of fishing vessel accident severity in the Northeastern United States using vessel accident data from the U.S. Coast Guard for 2001-2008. Vessel damage and crew injury severity equations were estimated separately utilizing the ordered probit model. The results suggest that fishing vessel accident severity is significantly affected by several types of accidents. Vessel damage severity is positively associated with loss of stability, sinking, daytime wind speed, vessel age, and distance to shore. Vessel damage severity is negatively associated with vessel size and daytime sea level pressure. Crew injury severity is also positively related to the loss of vessel stability and sinking. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  19. Reactor vessel lower head integrity

    Energy Technology Data Exchange (ETDEWEB)

    Rubin, A.M.

    1997-02-01

    On March 28, 1979, the Three Mile Island Unit 2 (TMI-2) nuclear power plant underwent a prolonged small break loss-of-coolant accident that resulted in severe damage to the reactor core. Post-accident examinations of the TMI-2 reactor core and lower plenum found that approximately 19,000 kg (19 metric tons) of molten material had relocated onto the lower head of the reactor vessel. Results of the OECD TMI-2 Vessel Investigation Project concluded that a localized hot spot of approximately 1 meter diameter had existed on the lower head. The maximum temperature on the inner surface of the reactor pressure vessel (RPV) in this region reached 1100{degrees}C and remained at that temperature for approximately 30 minutes before cooling occurred. Even under the combined loads of high temperature and high primary system pressure, the TMI-2 RPV did not fail. (i.e. The pressure varied from about 8.5 to 15 MPa during the four-hour period following the relocation of melt to the lower plenum.) Analyses of RPV failure under these conditions, using state-of-the-art computer codes, predicted that the RPV should have failed via local or global creep rupture. However, the vessel did not fail; and it has been hypothesized that rapid cooling of the debris and the vessel wall by water that was present in the lower plenum played an important role in maintaining RPV integrity during the accident. Although the exact mechanism(s) of how such cooling occurs is not known, it has been speculated that cooling in a small gap between the RPV wall and the crust, and/or in cracks within the debris itself, could result in sufficient cooling to maintain RPV integrity. Experimental data are needed to provide the basis to better understand these phenomena and improve models of RPV failure in severe accident codes.

  20. 46 CFR 42.05-63 - Ship(s) and vessel(s).

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Ship(s) and vessel(s). 42.05-63 Section 42.05-63... BY SEA Definition of Terms Used in This Subchapter § 42.05-63 Ship(s) and vessel(s). The terms ship(s) and vessel(s) are interchangeable or synonymous words, and include every description of watercraft...

  1. Vessel tree extraction using locally optimal paths

    DEFF Research Database (Denmark)

    Lo, Pechin Chien Pau; van Ginneken, Bram; de Bruijne, Marleen

    2010-01-01

    This paper proposes a method to extract vessel trees by continually extending detected branches with locally optimal paths. Our approach uses a cost function from a multi scale vessel enhancement filter. Optimal paths are selected based on rules that take into account the geometric characteristics...... of the vessel tree. Experiments were performed on 10 low dose chest CT scans for which the pulmonary vessel trees were extracted. The proposed method is shown to extract a better connected vessel tree and extract more of the small peripheral vessels in comparison to applying a threshold on the output...

  2. Electrically conductive containment vessel for molten aluminum

    Science.gov (United States)

    Holcombe, C.E.; Scott, D.G.

    1984-06-25

    The present invention is directed to a containment vessel which is particularly useful in melting aluminum. The vessel of the present invention is a multilayered vessel characterized by being electrically conductive, essentially nonwettable by and nonreactive with molten aluminum. The vessel is formed by coating a tantalum substrate of a suitable configuration with a mixture of yttria and particulate metal 10 borides. The yttria in the coating inhibits the wetting of the coating while the boride particulate material provides the electrical conductivity through the vessel. The vessel of the present invention is particularly suitable for use in melting aluminum by ion bombardment.

  3. Freeware Versus Commercial Office Productivity Software

    Science.gov (United States)

    2016-12-01

    vulnerability, cost, and reliability. In order to analyze the advantages and disadvantages of Google Apps versus Microsoft Office, we had to decide on the...software products such as Microsoft, Oracle, VMWare, and multiple others. In July 2010, Google announced the launch of Google Apps for Government...Google Apps , in the DOD in relation to reliability, cost, and security. The results of our analysis supported our recommendation to the DOD ESI to begin

  4. 78 FR 42535 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-07-16

    ... SECURITY Coast Guard Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting... years. A written request to the Coast Guard is necessary. Need: The Omnibus Budget Reconciliation Act of...

  5. 8 CFR 287.5 - Exercise of power by immigration officers.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Exercise of power by immigration officers. 287.5 Section 287.5 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS FIELD OFFICERS; POWERS AND DUTIES § 287.5 Exercise of power by immigration officers. (a) Power and...

  6. The Naval Plant Representative Office Organization Transition into the Defense Contract Management Command; Impacts on Customers

    Science.gov (United States)

    1992-06-01

    Representative Office organization transition into the Defense Contract Management Command: impacts on customers Tiffany, Murray L., III Monterey, California...1 TITLE (Include Security Classification) The Naval Plant Representative Office Organization Transition into the Defense Contract Management Command...public release; distribution is unlimited. The Naval Plant Representative Office Organization Transition into the Defense Contract Managagement Command

  7. 78 FR 77694 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-12-24

    ... SECURITY Coast Guard Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard... Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting... of Information Management, telephone 202-475-3532, or fax 202-372-8405, for questions on these...

  8. 78 FR 77693 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-12-24

    ... SECURITY Coast Guard Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard... Act of 1995, the U.S. Coast Guard intends to submit Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting...

  9. 75 FR 82091 - Agency Information Collection Activities: Submission for the Office of Management and Budget (OMB...

    Science.gov (United States)

    2010-12-29

    ...-related event to help maintain public health and safety, promote the common defense and security, and... Officer, Office of Information and Regulatory Affairs (3150-0146), NEOB-10202, Office of Management and... Doc No: 2010-32825] NUCLEAR REGULATORY COMMISSION [NRC-2010-0318] Agency Information Collection...

  10. 76 FR 26746 - Information Collection Requests to Office of Management and Budget; OMB Control Numbers: 1625...

    Science.gov (United States)

    2011-05-09

    ... SECURITY Coast Guard Information Collection Requests to Office of Management and Budget; OMB Control... submit Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of... the Docket Management Facility (DMF) at the U.S. Department of Transportation (DOT). To avoid...

  11. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  12. (No) Security in Automation!?

    CERN Document Server

    Lüders, S

    2008-01-01

    Modern Information Technologies like Ethernet, TCP/IP, web server or FTP are nowadays increas-ingly used in distributed control and automation systems. Thus, information from the factory floor is now directly available at the management level (From Shop-Floor to Top-Floor) and can be ma-nipulated from there. Despite the benefits coming with this (r)evolution, new vulnerabilities are in-herited, too: worms and viruses spread within seconds via Ethernet and attackers are becoming interested in control systems. Unfortunately, control systems lack the standard security features that usual office PCs have. This contribution will elaborate on these problems, discuss the vulnerabilities of modern control systems and present international initiatives for mitigation.

  13. 33 CFR 187.101 - What information must be collected to identify a vessel owner?

    Science.gov (United States)

    2010-07-01

    ... not an individual, but a business or other type of organization: (1) Names of all businesses or organizations that own the vessel. (2) Principal address of one business or organization. (3) Mailing address... this section. (4) One of the following unique identifiers for each owner: (i) Social Security Number...

  14. 77 FR 15261 - Safety Zone; Non-Compliant Vessel Pursuit Training Course, Wando River, Charleston, SC

    Science.gov (United States)

    2012-03-15

    ... Pursuit Training Course in Charleston, South Carolina from Monday, March 19, 2012 through Friday, March 23... enforcement tactics and high speed maneuvers during the training course. Discussion of Rule From Monday, March... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Non-Compliant Vessel Pursuit Training...

  15. 78 FR 28170 - Regulated Navigation Area; Southern Oahu Tsunami Vessel Evacuation; Honolulu, HI

    Science.gov (United States)

    2013-05-14

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA11 Regulated Navigation Area; Southern Oahu Tsunami Vessel... Southern Oahu ports. DATES: Comments and related material must be received by the Coast Guard on or before... and organized evacuation plan, in order to protect the infrastructure of the southern coast of Oahu...

  16. Reactor pressure vessel head vents and methods of using the same

    Science.gov (United States)

    Gels, John L; Keck, David J; Deaver, Gerald A

    2014-10-28

    Internal head vents are usable in nuclear reactors and include piping inside of the reactor pressure vessel with a vent in the reactor upper head. Piping extends downward from the upper head and passes outside of the reactor to permit the gas to escape or be forcibly vented outside of the reactor without external piping on the upper head. The piping may include upper and lowers section that removably mate where the upper head joins to the reactor pressure vessel. The removable mating may include a compressible bellows and corresponding funnel. The piping is fabricated of nuclear-reactor-safe materials, including carbon steel, stainless steel, and/or a Ni--Cr--Fe alloy. Methods install an internal head vent in a nuclear reactor by securing piping to an internal surface of an upper head of the nuclear reactor and/or securing piping to an internal surface of a reactor pressure vessel.

  17. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  18. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    The inclusion of China, India, Japan, Singapore and Italy as permanent observers in the Arctic Council has increased the international status of this forum significantly. This chapter aims to explain the background for the increased international interest in the Arctic region through an analysis...... of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  19. 78 FR 62430 - Department of Defense (DoD)-Defense Industrial Base (DIB) Voluntary Cyber Security and...

    Science.gov (United States)

    2013-10-22

    ... (DIB) Voluntary Cyber Security and Information Assurance (CS/IA) Activities AGENCY: Office of the DoD.... Dan Prieto at 703-571-5911, or the DIB Cyber Security and Information Assurance Program Office: (703... Industrial Base Voluntary Cyber Security and Information Assurance Activities. Response: Government...

  20. 77 FR 27615 - Department of Defense (DoD)-Defense Industrial Base (DIB) Voluntary Cyber Security and...

    Science.gov (United States)

    2012-05-11

    ... Cyber Security and Information Assurance (CS/IA) Activities AGENCY: Office of the DoD Chief Information.... FOR FURTHER INFORMATION CONTACT: DIB Cyber Security and Information Assurance Program Office: (703... security and information assurance activities through government-industry cooperation. (e) Immediately...

  1. AFSC/FMA/Vessel Assessment Logging

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Vessels fishing trawl gear, vessels fishing hook-and-line and pot gear that are also greater than 57.5 feet overall, and shoreside and floating processing facilities...

  2. Hawaii Abandoned Vessel Inventory, Hawaii Island

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Hawaii Island. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  3. US Virgin Islands Abandoned Vessel Inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for US Virgin Islands. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of...

  4. Hawaii Abandoned Vessel Inventory, Midway Island, NWHI

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Midway Island, NWHI. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of...

  5. Hawaii Abandoned Vessel Inventory, Kure, NWHI

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Kure, NWHI. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  6. Actemra Approved for Certain Blood Vessel Inflammation

    Science.gov (United States)

    ... 165836.html Actemra Approved for Certain Blood Vessel Inflammation Drug will treat adults with a condition called ... to treat adults with giant cell arteritis, an inflammation of the blood vessels (vasculitis). In a media ...

  7. Hawaii Abandoned Vessel Inventory, Maro Reef, NWHI

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Maro Reef, NWHI. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction of coral...

  8. PCs and networking for oceanographic research vessels

    Digital Repository Service at National Institute of Oceanography (India)

    Desai, R.G.P.; Desa, E.; Vithayathil, G.

    This paper, first describes briefly the evolution of data acquisition techniques and different system implementation, on board research vessels. A data acquisition system being developed for a coastal research vessel is then described which is based...

  9. Hawaii Abandoned Vessel Inventory, Lisianski Island, NWHI

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NOAA Abandoned Vessel Project Data for Lisianski Island, NWHI. Abandoned vessels pose a significant threat to the NOAA Trust resources through physical destruction...

  10. Report: Improvements Needed in Key EPA Information System Security Practices

    Science.gov (United States)

    Report #10-P-0146, June 15, 2010. Williams Adley found that EPA program offices lacked evidence that they planned and executed tests of information system security controls as required by federal requirements.

  11. Affairs of State: The Interagency and National Security

    National Research Council Canada - National Science Library

    Marcella, Gabriel

    2008-01-01

    The war colleges of the United States are a unique national asset. They are centers of academic excellence for preparing military and civilian officers for higher positions in the national security system...

  12. 49 CFR 1580.101 - Rail security coordinator.

    Science.gov (United States)

    2010-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad... Hazardous Materials Receivers, and Private Cars § 1580.101 Rail security coordinator. (a) Applicability...

  13. 33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.

    Science.gov (United States)

    2010-07-01

    ...; (k) Radio and telecommunications systems, including computer systems and networks; (l) Transportation and civil engineering; (m) Vessel and port operations; and (n) Knowledge of the impact, including cost impacts of implementing security measures on port operations. ...

  14. Purification of Mouse Brain Vessels.

    Science.gov (United States)

    Boulay, Anne-Cécile; Saubaméa, Bruno; Declèves, Xavier; Cohen-Salmon, Martine

    2015-11-10

    In the brain, most of the vascular system consists of a selective barrier, the blood-brain barrier (BBB) that regulates the exchange of molecules and immune cells between the brain and the blood. Moreover, the huge neuronal metabolic demand requires a moment-to-moment regulation of blood flow. Notably, abnormalities of these regulations are etiological hallmarks of most brain pathologies; including glioblastoma, stroke, edema, epilepsy, degenerative diseases (ex: Parkinson's disease, Alzheimer's disease), brain tumors, as well as inflammatory conditions such as multiple sclerosis, meningitis and sepsis-induced brain dysfunctions. Thus, understanding the signaling events modulating the cerebrovascular physiology is a major challenge. Much insight into the cellular and molecular properties of the various cell types that compose the cerebrovascular system can be gained from primary culture or cell sorting from freshly dissociated brain tissue. However, properties such as cell polarity, morphology and intercellular relationships are not maintained in such preparations. The protocol that we describe here is designed to purify brain vessel fragments, whilst maintaining structural integrity. We show that isolated vessels consist of endothelial cells sealed by tight junctions that are surrounded by a continuous basal lamina. Pericytes, smooth muscle cells as well as the perivascular astrocyte endfeet membranes remain attached to the endothelial layer. Finally, we describe how to perform immunostaining experiments on purified brain vessels.

  15. Collapsible Cryogenic Storage Vessel Project

    Science.gov (United States)

    Fleming, David C.

    2002-01-01

    Collapsible cryogenic storage vessels may be useful for future space exploration missions by providing long-term storage capability using a lightweight system that can be compactly packaged for launch. Previous development efforts have identified an 'inflatable' concept as most promising. In the inflatable tank concept, the cryogen is contained within a flexible pressure wall comprised of a flexible bladder to contain the cryogen and a fabric reinforcement layer for structural strength. A flexible, high-performance insulation jacket surrounds the vessel. The weight of the tank and the cryogen is supported by rigid support structures. This design concept is developed through physical testing of a scaled pressure wall, and through development of tests for a flexible Layered Composite Insulation (LCI) insulation jacket. A demonstration pressure wall is fabricated using Spectra fabric for reinforcement, and burst tested under noncryogenic conditions. An insulation test specimens is prepared to demonstrate the effectiveness of the insulation when subject to folding effects, and to examine the effect of compression of the insulation under compressive loading to simulate the pressure effect in a nonrigid insulation blanket under the action atmospheric pressure, such as would be seen in application on the surface of Mars. Although pressure testing did not meet the design goals, the concept shows promise for the design. The testing program provides direction for future development of the collapsible cryogenic vessel concept.

  16. 46 CFR 32.50-20 - Cargo piping for tank vessels constructed between November 10, 1936, and July 1, 1951-TB/ALL.

    Science.gov (United States)

    2010-10-01

    ... HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL REQUIREMENTS Pumps, Piping, and Hose... July 1, 1951—TB/ALL. (a) On tank vessels, the construction or conversion of which is started on or... may be omitted where the pipe is extra heavy, all joints are welded, and bends are installed to...

  17. 46 CFR 32.55-5 - Ventilation of tank vessels constructed between November 10, 1936, and July 1, 1951-TB/ALL.

    Science.gov (United States)

    2010-10-01

    ... actuated gas ejectors or blowers or ventilators fitted with heads for natural ventilation, will be approved... 46 Shipping 1 2010-10-01 2010-10-01 false Ventilation of tank vessels constructed between November... HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL REQUIREMENTS Ventilation and Venting...

  18. 46 CFR 31.10-5 - Inspection of new tank vessels-TB/ALL.

    Science.gov (United States)

    2010-10-01

    ... home office is located at 321 West 44th Street, New York, NY 10036, on the Internet at http://www.icgb... for the proper grade or grades of cargo shall be issued to the vessel or its owner. (c) Certificate of...

  19. 49 CFR 38.177 - Ferries, excursion boats and other vessels. [Reserved

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Ferries, excursion boats and other vessels. 38.177 Section 38.177 Transportation Office of the Secretary of Transportation AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY SPECIFICATIONS FOR TRANSPORTATION VEHICLES Other Vehicles and Systems § 38.177...

  20. 50 CFR 660.305 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Vessel identification. 660.305 Section 660.305 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC... Fisheries § 660.305 Vessel identification. (a) Display. The operator of a vessel that is over 25 ft (7.6 m...

  1. 50 CFR 660.704 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Vessel identification. 660.704 Section 660.704 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC... § 660.704 Vessel identification. (a) General. This section only applies to commercial fishing vessels...

  2. 50 CFR 660.504 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Vessel identification. 660.504 Section 660.504 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC... § 660.504 Vessel identification. (a) Official number. Each fishing vessel subject to this subpart must...

  3. 50 CFR 665.16 - Vessel identification.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Vessel identification. 665.16 Section 665... identification. (a) Applicability. Each fishing vessel subject to this part, except those identified in paragraph (e) of this section, must be marked for identification purposes, as follows: (1) A vessel that is...

  4. Integrating Multiple Autonomous Underwater Vessels, Surface Vessels and Aircraft into Oceanographic Research Vessel Operations

    Science.gov (United States)

    McGillivary, P. A.; Borges de Sousa, J.; Martins, R.; Rajan, K.

    2012-12-01

    Autonomous platforms are increasingly used as components of Integrated Ocean Observing Systems and oceanographic research cruises. Systems deployed can include gliders or propeller-driven autonomous underwater vessels (AUVs), autonomous surface vessels (ASVs), and unmanned aircraft systems (UAS). Prior field campaigns have demonstrated successful communication, sensor data fusion and visualization for studies using gliders and AUVs. However, additional requirements exist for incorporating ASVs and UASs into ship operations. For these systems to be optimally integrated into research vessel data management and operational planning systems involves addressing three key issues: real-time field data availability, platform coordination, and data archiving for later analysis. A fleet of AUVs, ASVs and UAS deployed from a research vessel is best operated as a system integrated with the ship, provided communications among them can be sustained. For this purpose, Disruptive Tolerant Networking (DTN) software protocols for operation in communication-challenged environments help ensure reliable high-bandwidth communications. Additionally, system components need to have considerable onboard autonomy, namely adaptive sampling capabilities using their own onboard sensor data stream analysis. We discuss Oceanographic Decision Support System (ODSS) software currently used for situational awareness and planning onshore, and in the near future event detection and response will be coordinated among multiple vehicles. Results from recent field studies from oceanographic research vessels using AUVs, ASVs and UAS, including the Rapid Environmental Picture (REP-12) cruise, are presented describing methods and results for use of multi-vehicle communication and deliberative control networks, adaptive sampling with single and multiple platforms, issues relating to data management and archiving, and finally challenges that remain in addressing these technological issues. Significantly, the

  5. 49 CFR 39.31 - May PVOs limit access to transportation or use of a vessel on the basis that a passenger has a...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false May PVOs limit access to transportation or use of a vessel on the basis that a passenger has a communicable disease? 39.31 Section 39.31 Transportation Office of the Secretary of Transportation TRANSPORTATION FOR INDIVIDUALS WITH DISABILITIES: PASSENGER VESSELS Nondiscrimination and Access to...

  6. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  7. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  8. Scoping Study of Airlift Circulation Technologies for Supplemental Mixing in Pulse Jet Mixed Vessels

    Energy Technology Data Exchange (ETDEWEB)

    Schonewill, Philip P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Berglin, Eric J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Boeringa, Gregory K. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Buchmiller, William C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burns, Carolyn A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Minette, Michael J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-04-07

    At the request of the U.S. Department of Energy Office of River Protection, Pacific Northwest National Laboratory (PNNL) conducted a scoping study to investigate supplemental technologies for supplying vertical fluid motion and enhanced mixing in Waste Treatment and Immobilization Plant (WTP) vessels designed for high solids processing. The study assumed that the pulse jet mixers adequately mix and shear the bottom portion of a vessel. Given that, the primary function of a supplemental technology should be to provide mixing and shearing in the upper region of a vessel. The objective of the study was to recommend a mixing technology and configuration that could be implemented in the 8-ft test vessel located at Mid-Columbia Engineering (MCE). Several mixing technologies, primarily airlift circulator (ALC) systems, were evaluated in the study. This technical report contains a review of ALC technologies, a description of the PNNL testing and accompanying results, and recommended features of an ALC system for further study.

  9. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    group security system has been designed to support four roles: The Security Domain Administrator is responsible for providing security functions defined in the top layer The Server Administrator. The central component of the group security system is the Policy and Group Key Distribution Server The Group Officer (GO) authorizes the creation of groups at a specific Policy and Group Key Distribution Server The Group Member (user) is any entity that participates in group transactions. Secure Group Applications The group security system has been designed to support four secure group applications: A Secure Instant Messaging: with the Secure Instant Messaging application A Secure Whiteboard A Secure Document Sharing A Secure Document Archiving: During the project, the group security system architecture was fully designed and preliminary prototyping was carried out for some of its components.

  10. Institutionalising a military judicial office and improving security of ...

    African Journals Online (AJOL)

    Challenges of judicial independence facing South African military judges are relatively well known. This article makes concrete suggestions on ways in which certain aspects of the judicial independence of South African military courts could be improved. It particularly argues for the institutionalisation of a military judicial ...

  11. 7 CFR 2.32 - Director, Office of Homeland Security.

    Science.gov (United States)

    2010-01-01

    ..., disseminate and store USDA intelligence requirements and convey information to the intelligence community. (3...). (8) Administer a competitive grant program to support the development and expansion of advanced... veterinarians; administer a competitive grant and low-interest loan assistance program to assist States in...

  12. Biometric Enhancement of Home and Office Security to Reduce ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    Your fingerprint, face and iris can grant or deny you access if they are tampered with. Since nobody can be trusted, our motivation is to find a way to minimize killer syndrome, impersonation, terrorism attack and fraud by unknown persons. We used verification and authentication methodology to verify how facial screening ...

  13. Prescreening Military Officer Candidates for High Level Security Clearances

    Science.gov (United States)

    1989-06-01

    a Commission in the United States Air Force (AF Form 56) which asks questions about criminal history, sexual deviancy, etc. Applicants who admit to...0 6 76 Homo-xuality 22 63 92 3 180 77 Sexual Perversion 0 5 16 1 22 78 Good of the Service 7 0 2 0 9 79 Failure of Selection for Promotion 2153 1196...Inan ilra far-y acoso ) ase as cesc be &Dove. FROM TWi DATE FORWARD, ec-ce-s -e Drug~ &me alco’soi aoi~sby mit-ibenrof *,*,eU.S Air orce woiates A.r

  14. Compliance with vessel speed restrictions to protect North Atlantic right whales

    Directory of Open Access Journals (Sweden)

    Gregory K. Silber

    2014-06-01

    Full Text Available Environmental regulations can only be effective if they are adhered to, but the motivations for regulatory compliance are not always clear. We assessed vessel operator compliance with a December 2008 regulation aimed at reducing collisions with the endangered North Atlantic right whale that requires vessels 65 feet or greater in length to travel at speeds of 10 knots or less at prescribed times and locations along the U.S. eastern seaboard. Extensive outreach efforts were undertaken to notify affected entities both before and after the regulation went into effect. Vessel speeds of 201,862 trips made between November 2008 and August 2013 by 8,009 individual vessels were quantified remotely, constituting a nearly complete census of transits made by the regulated population. Of these, 437 vessels (or their parent companies, some of whom had been observed exceeding the speed limit, were contacted through one of four non-punitive information programs. A fraction (n = 26 vessels/companies received citations and fines. Despite the efforts to inform mariners, initial compliance was low (<5% of the trips were completely <10 knots but improved in the latter part of the study. Each notification/enforcement program improved compliance to some degree and some may have influenced compliance across the entire regulated community. Citations/fines appeared to have the greatest influence on improving compliance in notified vessels/companies, followed in order of effectiveness by enforcement-office information letters, monthly summaries of vessel operations, and direct at-sea radio contact. Trips by cargo vessels exhibited the greatest change in behavior followed by tanker and passenger vessels. These results have application to other regulatory systems, especially where remote monitoring is feasible, and any setting where regulatory compliance is sought.

  15. Information security governance simplified from the boardroom to the keyboard

    CERN Document Server

    Fitzgerald, Todd

    2011-01-01

    Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security d

  16. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  17. The Tension between Privacy and Security

    NARCIS (Netherlands)

    de Baets, Antoon; Maret, Susan

    2016-01-01

    A Review of President’s Review Group on Intelligence and Communications Technologies, Liberty and Security in a Changing World, 2013 and United Nations Office of the High Commissioner, Report of the Special Rapporteur on the Right to Privacy, Joseph A. Cannataci, 2016.

  18. Education and the Degree of Data Security

    Science.gov (United States)

    Spears, Phillip Dewitt

    2013-01-01

    New technology development has researchers inundated with a plethora of data security issues linked to cyber attacks and hackers' ability to transmogrify their techniques. The present research focused on the information technology managing officers' (ITMOs') level of education, size of organization, organization's industry, and effect they have on…

  19. Office 2010 Bible

    CERN Document Server

    Walkenbach, John; Groh, Michael R

    2010-01-01

    The best of the best from the bestselling authors of Excel, Word, and PowerPoint Bibles !. Take your pick of applications from the Office 2010 suite and your choice of leading experts to show you how to use them. This Office 2010 Bible features the best-of-the-best content from the Excel 2010 Bible , by "Mr. Spreadsheet" John Walkenbach; the Word 2010 Bible by Microsoft MVP Herb Tyson; the PowerPoint 2010 Bible , by PowerPoint expert Faithe Wempen; and coverage of Access 2010 from Microsoft MVP Michael Alexander. If you want to quickly and effectively begin using Office 2010, start i

  20. Office 2013 digital classroom

    CERN Document Server

    Holland, Walter

    2013-01-01

    This complete training package makes learning the new Office 2013 even easier! Featuring both a video training DVD and a full-color book, this training package is like having your own personal instructor guiding you through each lesson of learning Office 2013, all while you work at your own pace. The self-paced lessons allow you to discover the new features and capabilities of the new Office suite. Each lesson includes step-by-step instructions and lesson files, and provides valuable video tutorials that complement what you're learning and clearly demonstrate how to do tasks. This essential

  1. Lawrence Livermore National Laboratory Safeguards and Security quarterly progress report ending March 31, 1996

    Energy Technology Data Exchange (ETDEWEB)

    Davis, B.; Davis, G.; Johnson, D.; Mansur, D.L.; Ruhter, W.D.; Strait, R.S.

    1996-04-01

    LLNL carries out safeguards and security activities for DOE Office of Safeguards and Security (OSS) and other organizations within and outside DOE. LLNL is supporting OSS in 6 areas: safeguards technology, safeguards and materials accountability, computer security--distributed systems, complex-wide access control, standardization of security systems, and information technology and security center. This report describes the activities in each of these areas.

  2. Progress of ITER vacuum vessel

    Energy Technology Data Exchange (ETDEWEB)

    Ioki, K., E-mail: Kimihiro.Ioki@iter.org [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); Bayon, A. [F4E, c/ Josep Pla, No. 2, Torres Diagonal Litoral, Edificio B3, E-08019 Barcelona (Spain); Choi, C.H.; Daly, E.; Dani, S.; Davis, J.; Giraud, B.; Gribov, Y.; Hamlyn-Harris, C.; Jun, C.; Levesy, B. [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); Kim, B.C. [NFRI, 52 Yeoeundong Yuseonggu, Daejeon 305-333 (Korea, Republic of); Kuzmin, E. [NTC “Sintez”, Efremov Inst., 189631 Metallostroy, St. Petersburg (Russian Federation); Le Barbier, R.; Martinez, J.-M. [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); Pathak, H. [ITER-India, A-29, GIDC Electronic Estate, Sector 25, Gandhinagar 382025 (India); Preble, J. [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); Sa, J.W. [NFRI, 52 Yeoeundong Yuseonggu, Daejeon 305-333 (Korea, Republic of); Terasawa, A.; Utin, Yu. [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); and others

    2013-10-15

    Highlights: ► This covers the overall status and progress of the ITER vacuum vessel activities. ► It includes design, R and D, manufacturing and approval process of the regulators. ► The baseline design was completed and now manufacturing designs are on-going. ► R and D includes ISI, dynamic test of keys and lip-seal welding/cutting technology. ► The VV suppliers produced full-scale mock-ups and started VV manufacturing. -- Abstract: Design modifications were implemented in the vacuum vessel (VV) baseline design in 2011–2012 for finalization. The modifications are mostly due to interface components, such as support rails and feedthroughs for the in-vessel coils (IVC). Manufacturing designs are being developed at the domestic agencies (DAs) based on the baseline design. The VV support design was also finalized and tests on scale mock-ups are under preparation. Design of the in-wall shielding (IWS) has progressed, considering the assembly methods and the required tolerances. Further modifications are required to be consistent with the DAs’ manufacturing designs. Dynamic tests on the inter-modular and stub keys to support the blanket modules are being performed to measure the dynamic amplification factor (DAF). An in-service inspection (ISI) plan has been developed and R and D was launched for ISI. Conceptual design of the VV instrumentation has been developed. The VV baseline design was approved by the agreed notified body (ANB) in accordance with the French Nuclear Pressure Equipment Order procedure.

  3. 78 FR 59706 - Secure Supply Chain Pilot Program; Correction

    Science.gov (United States)

    2013-09-27

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration Secure Supply Chain Pilot Program; Correction AGENCY: Food...). The document announced the start of the Secure Supply Chain Pilot Program (SSCPP). The document was...

  4. 75 FR 18872 - Ginnie Mae Multiclass Securities Program Documents

    Science.gov (United States)

    2010-04-13

    ... URBAN DEVELOPMENT Ginnie Mae Multiclass Securities Program Documents AGENCY: Office of the Chief.... Copies of available documents submitted to OMB may be obtained from Mr. McKinney. SUPPLEMENTARY...: Ginnie Mae Multiclass Securities Program Documents. OMB Approval Number: 2503-0030. Form Numbers: None...

  5. 75 FR 33099 - Amendment to Municipal Securities Disclosure

    Science.gov (United States)

    2010-06-10

    ... INFORMATION CONTACT: Martha Mahan Haines, Assistant Director and Chief, Office of Municipal Securities, at... securities was approximately $3.8 trillion. See E-mail between Martha M. Haines, Assistant Director and Chief... to carry VRDOs is evident in the spike in the weekly municipal swap index, which is based on VRDO...

  6. Employee Office Sampler

    Data.gov (United States)

    Social Security Administration — Capture/store/manage end-user work activities at designated times as needed for DOWS sampling. The end-user, e.g., CR, receives a desktop alert when a DOWS sample is...

  7. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  8. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  9. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  10. 12 CFR 344.8 - Securities trading policies and procedures.

    Science.gov (United States)

    2010-01-01

    ... responsibility for supervision of all officers or employees who: (i) Transmit orders to or place orders with... respect to all officers or employees who process orders for notification or settlement purposes, or...) For the fair and equitable allocation of securities and prices to accounts when orders for the same...

  11. 49 CFR 1542.201 - Security of the secured area.

    Science.gov (United States)

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the secured area. 1542.201 Section...

  12. 78 FR 79510 - Proposed Collection; Comment Request Upon Written Request Copies Available From: Securities and...

    Science.gov (United States)

    2013-12-30

    ... From the Federal Register Online via the Government Publishing Office ] SECURITIES AND EXCHANGE COMMISSION Proposed Collection; Comment Request Upon Written Request Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy, Washington, DC 20549-0213. Extension: Rule...

  13. 77 FR 72788 - Reduction of Use of Social Security Numbers in the Department of Defense

    Science.gov (United States)

    2012-12-06

    ... for identity theft. The Department of Defense takes the security and protection of its personnel's... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 157 Reduction of Use of Social Security Numbers in the Department of...

  14. 10 CFR Appendix B to Subpart B of... - Training and Qualification for Security Skills and Knowledge

    Science.gov (United States)

    2010-01-01

    ..., training or range practice) each security police officer shall be given a range safety presentation. (g... exercise shall be prepared for management review and planning and retained for a period of 1 year, unless a... approved ammunition list. (f) Each security police officer shall be given a basic principles of firearms...

  15. 76 FR 55693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2011-09-08

    ... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security National Protection... contact: Emily Andrew (703-235-2182), Privacy Officer, National Protection and Programs Directorate... policy, DHS extends administrative Privacy Act protections to all individuals where systems of records...

  16. Agencies Need Improved Financial Data Reporting for Private Security Contractors

    Science.gov (United States)

    2008-10-30

    OFFICE OF THE SPECIAL INSPECTOR GENERAL FOR IRAQ RECONSTRUCTION AGENCIES NEED IMPROVED FINANCIAL DATA REPORTING FOR PRIVATE SECURITY...SUBTITLE Agencies Need Improved Financial Data Reporting for Private Security Contractors 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM...IMPROVED FINANCIAL DATA REPORTING FOR PRIVATE SECURITY CONTRACTORS What SIGIR Found DoD, DoS, and USAID have not been required to

  17. NCEP Internal Office Notes

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The National Centers for Environmental Prediction (NCEP) and its predecessors have produced internal publications, known as Office Notes, since the mid-1950's. In...

  18. Office of Child Care

    Science.gov (United States)

    ... on Trafficking in Persons (OTIP) Public Assistance Reporting Information System (PARIS) By Region Office of Regional Operations (ORO) ... 2017 More News > Parent Resources Provider Resources CCDF Fundamentals Subscribe to Receive OCC Updates Home About What ...

  19. Border Security Agency Structure: A Hindrance to Demonstrating Border Security Success

    Science.gov (United States)

    2013-12-01

    White House Security Office leader Ridge were all opposed to the creation of a new department and that “adept White House coordination and leadership...Homeland Security.” Ranking member Bennie G. Thompson was joined by Congressmen Zoe Lofgren, and 11 others (Thompson, 2005). The comments were not... Bennie G. Thompson, e. a. (July 14, 2005). Protecting America against terrorists:The case for a comphrehensive reorganization of the Department of

  20. Homeland Security: What Are the Advantages and Disadvantages of Different Local Homeland Security Organizational Structures?

    Science.gov (United States)

    2015-06-01

    Bruce Hoffman, in his 2002 article titled, “Rethinking Terrorism and Counterterrorism Since 9/11,” emphasizes that the sheer number of vulnerable...Homeland Security Granting Process,” 444. 64 Bruce Hoffman, “Rethinking Terrorism and Counterterrorism since 9/11,” Studies in Conflict and...126 Archer Company comprehensive position questionnaire, DOHS, May 2014, 5. 127 Dekalb County Office of Homeland Security, Dekalb County Police