WorldWideScience

Sample records for vessel security officer

  1. 33 CFR 104.215 - Vessel Security Officer (VSO).

    Science.gov (United States)

    2010-07-01

    ...) Understanding of the importance of creating and maintaining safe working and living conditions for passengers... responsibility to preserve the marine environment; and (B) Basic working knowledge of pollution prevention... space numbering; and (B) Understanding of various vessel types; and working knowledge of nautical terms...

  2. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  3. Nuclear security officer training

    International Nuclear Information System (INIS)

    Harrington, W.F.

    1981-01-01

    Training has become complex and precise in today's world of critical review and responsibility. Entrusted to a security officer is the success or demise of large business. In more critical environments the security officer is entrusted with the monitoring and protection of life sensitive systems and devices. The awareness of this high visibility training requirement has been addressed by a limited few. Those involved in the nuclear power industry through dedication and commitment to the American public have without a doubt become leading pioneers in demanding training excellence

  4. Offices of Industrial Security International: A Review

    National Research Council Canada - National Science Library

    Sands, W

    1998-01-01

    The Defense Security Service (DSS), formerly the Defense Investigative Service (DIS), handles many of its overseas industrial security issues through its Offices of Industrial Security International...

  5. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  6. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  7. Report of the DHS Small Vessel Security Institute

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  8. Report of the DHS National Small Vessel Security Summit

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  9. Infectious disease protection for healthcare security officers.

    Science.gov (United States)

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  10. Analisa Greenwater Akibat Gerakan Offshore Security Vessel

    Directory of Open Access Journals (Sweden)

    Maulidya Octaviani Bustamin

    2012-09-01

    Full Text Available Analisa  Tugas  Akhir  ini,  terdiri  atas  beberapa  tahapan.  Yang pertama yaitu perancangan struktur Offshore Security Vessel (OSV dengan bantuan software MAXSURF guna mendapatkan Lines Plan. Offset data yang diperoleh digunakan dalam pemodelan menggunakan MOSES,  kemudian  dilakukan  analisa  gerak  OSV  dalam  gelombang  regular  dan dinyatakan dalam grafik RAO. Analisa gerak relatif vertikal  haluan dihitung dari RAO gerakan, dan kemudian melakukan evaluasi perilaku di gelombang acak dengan analisis spektra gelombang. Dari analisa spektra didapatkan parameter greenwater sehingga dapat dihitung peluang, intensitas dan tekanan greenwater. Dari hasil analisa diperoleh RAO gerak vertikal Offshore Security Vessel (OSV pada  gelombang  reguler yang dipengaruhi  oleh  kecepatan,  kondisi  muatan  dan arah gelombang. Peluang terjadinya greenwater terbesar terjadi pada sudut datang gelombang following sea (0o dimana harga terbesar terjadi pada ω = 0.2 rad/sec dengan periode 29 detik mencapai 0.477. Intensitas greenwater terbesar terjadi pada saat sudut datang gelombang following sea (0o adalah sebanyak 59.265 per jam dan 0.378 per detik. Tekanan greenwater terbesar terjadi pada saat sudut datang gelombang head sea (180o sebesar 1678x10-6 MPa. Dengan nilai tersebut, deck mampu menahan beban akibat tekanan greenwater.

  11. 18 CFR 3a.51 - Designation of security officers.

    Science.gov (United States)

    2010-04-01

    ... Top Secret Control Officer and Security Officer for classified material for the Federal Power Commission. The Director, OAO, will designate alternate Top Secret Control Officers and alternated Security... the duties for which the Top Secret Control Officer and Security Officer is responsible. As used...

  12. Office of Safeguards and Security - Operational Interface

    International Nuclear Information System (INIS)

    Hammond, G.A.

    1987-01-01

    The mission of the Office of Safeguards and Security (OSS), Department of Energy (DOE) is to: Develop policy and programs to protect DOE facilities, nuclear materials, and classified information; Provide oversight for safeguards and security operations; Direct research and development (RandD) to support the protection program; and Strengthen international safeguards in support of nonproliferation policy. Objectives are to maintain an integrated safeguards and security system that is effective against a wide range of threats, and do so in a manner to minimize impacts on facility operation. Implementation is the responsibility of field offices and contractors operating DOE facilities. The OSS-operational interface is the focus of this discussion with emphasis on RandD to meet user needs. The scope and project selection process will be discussed along with information required for evaluation, and field operational planning and budgeting commitments to permit implementation of successful RandD results

  13. 12 CFR 605.501 - Information Security Officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  14. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  15. 41 CFR 105-53.133 - Information Security Oversight Office.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Information Security... FUNCTIONS Central Offices § 105-53.133 Information Security Oversight Office. (a) Creation and authority. The Information Security Oversight Office (ISOO), headed by the Director of ISOO, who is appointed by...

  16. 12 CFR 568.2 - Designation of security officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Designation of security officer. 568.2 Section 568.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.2 Designation of security officer. Within 30 days after the effective date of insurance of...

  17. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Science.gov (United States)

    2012-10-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... comments on the development of a Facility Security Officer training program. The notice contains an inaccurate Internet link to RSVP for the public meeting. DATES: The notice of public meeting; request for...

  18. 77 FR 61771 - Facility Security Officer Training Requirements

    Science.gov (United States)

    2012-10-11

    ... following: (1) Draft model FSO training course; (2) Computer-based training and distance learning; (3... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer... Security Officer training program, with the primary focus on developing the curriculum for such a program...

  19. Report of the DHS National Small Vessel Security Summit

    Science.gov (United States)

    2007-10-19

    Fetterman , Maine Department of Marine Resources Lt Bill Krul, Marine Patrol, St. Clair County, Michigan Sgt Jim Lambert, Marine Patrol, Alameda...Major John C. Fetterman – State of Maine Major Fetterman currently serves as Vice President of the National Association of State Boating Law...or seemingly out of place vessel enters a maritime community, it will attract the attention of his officers. Major Fetterman was concerned that

  20. Report of the DHS Small Vessel Security Institute

    Science.gov (United States)

    2007-10-19

    Local Government Interests: LtCol Don Holway; Florida Fish and Wildlife Conservation Commission Maj John Fetterman , Maine Department of Marine...AWW program to help fill gaps in law enforcement patrols. 68 National Small Vessel Security Summit Major John C. Fetterman – State of Maine...Major Fetterman currently serves as Vice President of the National Association of State Boating Law Administrators and for the last 30 years has been a

  1. The chief information security officer insights, tools and survival skills

    CERN Document Server

    Kouns, Barry

    2011-01-01

    Chief Information Security Officers are bombarded with huge challenges every day, from recommending security applications to strategic thinking and business innovation. This guide describes the hard and soft skills that a successful CISO requires: not just a good knowledge of information security, but also attributes such as flexibility and communication skills.

  2. 42 CFR 401.130 - Materials available at social security district offices and branch offices.

    Science.gov (United States)

    2010-10-01

    ... (HIM-10). (13) Home Health Agency Manual (HIM-11). (14) Outpatient Physical Therapy Provider Manual... social security district offices and branch offices: (1) Claims Manual of the Social Security Administration. (2) Department Staff Manual on Organization, Department of Health and Human Services, Part F, CMS...

  3. Prototype of smart office system using based security system

    Science.gov (United States)

    Prasetyo, T. F.; Zaliluddin, D.; Iqbal, M.

    2018-05-01

    Creating a new technology in the modern era gives a positive impact on business and industry. Internet of Things (IoT) as a new communication technology is very useful in realizing smart systems such as: smart home, smart office, smart parking and smart city. This study presents a prototype of the smart office system which was designed as a security system based on IoT. Smart office system development method used waterfall model. IoT-based smart office system used platform (project builder) cayenne so that. The data can be accessed and controlled through internet network from long distance. Smart office system used arduino mega 2560 microcontroller as a controller component. In this study, Smart office system is able to detect threats of dangerous objects made from metals, earthquakes, fires, intruders or theft and perform security monitoring outside the building by using raspberry pi cameras on autonomous robots in real time to the security guard.

  4. Use of Security Officers on Inpatient Psychiatry Units.

    Science.gov (United States)

    Lawrence, Ryan E; Perez-Coste, Maria M; Arkow, Stan D; Appelbaum, Paul S; Dixon, Lisa B

    2018-04-02

    Violent and aggressive behaviors are common among psychiatric inpatients. Hospital security officers are sometimes used to address such behaviors. Research on the role of security in inpatient units is scant. This study examined when security is utilized and what happens when officers arrive. The authors reviewed the security logbook and the medical records for all patients discharged from an inpatient psychiatry unit over a six-month period. Authors recorded when security calls happened, what behaviors triggered security calls, what outcomes occurred, and whether any patient characteristics were associated with security calls. A total of 272 unique patients were included. A total of 49 patients (18%) generated security calls (N=157 calls). Security calls were most common in the first week of hospitalization (N=45 calls), and roughly half of the patients (N=25 patients) had only one call. The most common inciting behavior was "threats to persons" (N=34 calls), and the most common intervention was intramuscular antipsychotic injection (N=49 calls). The patient variables associated with security calls were having more than one prior hospitalization (odds ratio [OR]=4.56, p=.001, 95% confidence interval [CI]=1.80-11.57), involuntary hospitalization (OR=5.09, pSecurity officers were often called for threats of violence and occasionally called for actual violence. Patient variables associated with security calls are common among inpatients, and thus clinicians should stay attuned to patients' moment-to-moment care needs.

  5. The Office of Safeguards and Security Nonproliferation Support Program

    International Nuclear Information System (INIS)

    Desmond, W.J.

    1996-01-01

    The Nonproliferation Support Program was established in the Department of Energy, Office of Safeguards and Security on october 1, 1995. its mission includes providing assistance to Departmental efforts for improved international material protection, control and accounting programs by coordinating and leveraging domestic safeguards and security policy, practice and experience into the international arena. A major objective of the program is to balance US national security requirements with global support of the nonproliferation objectives. This paper describes the organization of the Office of Safeguards and Security and the Nonproliferation Support Program role and responsibility, and presents some of the current areas of program emphasis and activity

  6. Security and Office Administration Coordinator | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Under the supervision of the Manager, Local Operations (MLO), the Security and ... Sees to the continuous updating and relevance of the Business Continuity Plan ... BCP to local management (Manager and Regional Director) and to the Head ...

  7. 76 FR 27897 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port...

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0342] Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port Columbia River... will enforce the security and safety zone in 33 CFR 165.1318 for large passenger vessels operating in...

  8. 76 FR 62439 - Order of Succession for the Office of Disaster Management and National Security

    Science.gov (United States)

    2011-10-07

    ... Office of Disaster Management and National Security AGENCY: Office of the Secretary, HUD. ACTION: Notice... Succession for the Office of Disaster Management and National Security. This is the first order of succession... L. McClure, Acting Chief Disaster and National Security Officer, Office of Disaster Management and...

  9. 75 FR 68370 - Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...

    Science.gov (United States)

    2010-11-05

    ... DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate [Docket No. DHS-2010-0071] Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office...

  10. POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-09-01

    Full Text Available This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices, to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.

  11. 33 CFR 165.1151 - Security Zones; liquefied hazardous gas tank vessels, San Pedro Bay, California.

    Science.gov (United States)

    2010-07-01

    ... a tank vessel as liquefied petroleum gas, liquefied natural gas, or similar liquefied gas products... Eleventh Coast Guard District § 165.1151 Security Zones; liquefied hazardous gas tank vessels, San Pedro... the sea floor, within a 500 yard radius around any liquefied hazardous gas (LHG) tank vessel that is...

  12. 77 FR 24381 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-04-24

    ...-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI... channel's entrance during the arrival and departure of the Passenger Vessel Safari Explorer in Kaunakakai... entrance during the arrival and departure of the Passenger Vessel Safari Explorer in Kaunakakai Harbor...

  13. 77 FR 2019 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-01-13

    ...-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI... vessel SAFARI EXPLORER to its intended berth in the harbor. Entry into the temporary security zone is... operation of the SAFARI EXPLORER into Molokai has been voluntarily suspended by the operating company...

  14. Target assignment for security officers to K targets (TASK)

    International Nuclear Information System (INIS)

    Rowland, J.R.; Shelton, K.W.; Stunkel, C.B.

    1983-02-01

    A probabilistic algorithm is developed to provide an optimal Target Assignment for Security officers to K targets (TASK) using a maximin criterion. Under the assumption of only a limited number (N) of security officers, the TASK computer model determines deployment assignments which maximize the system protection against sabotage by an adversary who may select any link in the system, including the weakest, for the point of attack. Applying the TASK model to a hypothetical nuclear facility containing a nine-level building reveals that aggregate targets covering multiple vital areas should be utilized to reduce the number of possible target assignments to a value equal to or only slightly larger than N. The increased probability that a given aggregate target is covered by one or more security officers offsets the slight decrease in interruption probability due to its occurring earlier in the adversary's path. In brief, the TASK model determines the optimal maximin deployment strategy for limited numbers of security officers and calculates a quantitative measure of the resulting system protection

  15. 10 CFR 1.46 - Office of Nuclear Security and Incident Response.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Office of Nuclear Security and Incident Response. 1.46... Headquarters Program Offices § 1.46 Office of Nuclear Security and Incident Response. The Office of Nuclear... evaluation and assessment of technical issues involving security at nuclear facilities, and is the agency...

  16. Progress report for the Office of Safeguards and Security for FY 1982

    International Nuclear Information System (INIS)

    Smith, D.H.; McKown, H.S.; Walker, R.L.; Sherman, R.L.; Pritchard, C.A.; Carter, J.A.

    1982-12-01

    Progress in various areas funded by, or of interest to, the Office of Safeguards and Security during FY 1982 is reported. The quadrupole mass spectrometer and its mobile laboratory visited several sites; results were uniformly excellent. We designed, built, and evaluated a new ion source for this instrument; as a result, performance is considerably enhanced. We have completed initial evaluation of lutetium for use as a double spike in calibrating holding tanks or other vessels of indeterminate volume. Precisions and accuracies of about 0.1% were obtained. Two uranium standards have been evaluated using NBS isotopic standards and SALE samples

  17. 33 CFR 165.121 - Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode Island.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: High... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.121 Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode...

  18. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  19. 75 FR 75486 - Maritime Security Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk...

    Science.gov (United States)

    2010-12-03

    ... Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk Waters AGENCY: Coast Guard, DHS... Maritime Transportation Security Act (MTSA) on international voyages through or in designated high risk... MARSEC Directives are available at your local Captain of the Port (COTP) office. Phone numbers and...

  20. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Science.gov (United States)

    2010-07-01

    ... baggage; and (vi) Vessel stores; (2) Threat assessments, including the purpose and methodology of the assessment, for the area or areas in which the vessel operates or at which passengers embark or disembark; (3... and control procedures; (ii) Identification systems; (iii) Surveillance and monitoring equipment; (iv...

  1. 12 CFR 563g.17 - Sales of securities at an office of a savings association.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Sales of securities at an office of a savings association. 563g.17 Section 563g.17 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.17 Sales of securities at an office of a savings association. Sales of...

  2. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge...) Methods of physical screening of persons, personal effects, baggage, cargo, and vessel stores; and (m) The...

  3. 75 FR 45055 - Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2010-08-02

    ...-AA87 Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... (NCSM 710) which include all waters within 100 yards from the vessels while underway in the Puget Sound... authorized by the COTP, Puget Sound or Designated Representative. DATES: This rule is effective from 8 a.m...

  4. 77 FR 50926 - Security Zones; Certain Dangerous Cargo Vessels, Tampa, FL

    Science.gov (United States)

    2012-08-23

    ... (LPG), and ammonium nitrate. The security zones will start at buoys 3 and 4 in Tampa Bay ``F'' cut... propane gas, and ammonium nitrate. The security zones prohibit any vessel from entering within 500 yards.... We seek any comments or information that may lead to the discovery of a significant environmental...

  5. 76 FR 63547 - Security Zone; Columbia and Willamette Rivers, Dredge Vessels Patriot and Liberty

    Science.gov (United States)

    2011-10-13

    ... or his designated representative. The security zone will be in effect while the Dredge Vessels are... its effects on them and participate in the rulemaking process. Small businesses may send comments on... requirements. (c) Enforcement period. The security zone created by this section will be in effect from 7 a.m...

  6. 76 FR 40617 - Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington

    Science.gov (United States)

    2011-07-11

    ... better evaluate its effects on them and participate in the rulemaking process. Small businesses may send... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0505] RIN 1625-AA87 Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington AGENCY...

  7. VESSEL-SOURCED POLLUTION: A SECURITY THREAT IN ...

    African Journals Online (AJOL)

    and some other conventions make provisions concerning protection of ma- ... the pollution of the marine in Malaysia, it appears that pollution by vessels .... pollution from ships and maritime safety; providing effective legal, technical and scientific ..... of the offence after the service of the notice on the offending ship through.

  8. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Science.gov (United States)

    2010-07-01

    ... Information Security Oversight Office. 2400.19 Section 2400.19 National Defense Other Regulations Relating to... SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19 Declassification by the Director of the Information Security Oversight Office. If the Director of the Information...

  9. Tentative job analysis for a high-level, fixed-site, nuclear security officer

    International Nuclear Information System (INIS)

    Adams, K.G.; Trujillo, A.A.

    1977-10-01

    A tentative job analysis for a high-level, fixed-site, nuclear security officer is presented. The primary objective of the report is to provide a framework for evaluating the functions of a security officer in physical protection systems. Several job requirements related to duties, basic skills, personal contacts, supervision, working conditions, and decision making are presented. Individual character traits desirable in security officers are described

  10. 24 CFR 960.505 - Occupancy by police officers to provide security for public housing residents.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Occupancy by police officers to... HOUSING Occupancy by Over-Income Families or Police Officers § 960.505 Occupancy by police officers to provide security for public housing residents. (a) Police officer. For purpose of this subpart E, “police...

  11. 76 FR 12745 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0055] Privacy Act of... Operations Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  12. 77 FR 44475 - Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2012-07-30

    ...-AA87 Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... temporary rule, call or email Lieutenant Junior Grade Anthony P. LaBoy, Sector Puget Sound, Waterways Management Division, U.S. Coast Guard; telephone 206-217-6323, email SectorPugetSound[email protected] . If you...

  13. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  14. 33 CFR 165.103 - Safety and Security Zones; LPG Vessel Transits in Portland, Maine, Captain of the Port Zone...

    Science.gov (United States)

    2010-07-01

    ... within a 500-yard radius of any Liquefied Petroleum Gas (LPG) vessel while it is moored at the LPG... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; LPG... and Security Zones; LPG Vessel Transits in Portland, Maine, Captain of the Port Zone, Portsmouth...

  15. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... Security, Washington, DC 20528. For privacy issues please contact: Mary Ellen Callahan (703-235- [[Page...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of Operations... System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The...

  16. Physician office readiness for managing Internet security threats.

    Science.gov (United States)

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  17. 12 CFR 551.150 - How do my officers and employees file reports of personal securities trading transactions?

    Science.gov (United States)

    2010-01-01

    ... of personal securities trading transactions? 551.150 Section 551.150 Banks and Banking OFFICE OF... TRANSACTIONS Securities Trading Policies and Procedures § 551.150 How do my officers and employees file reports of personal securities trading transactions? An officer or employee described in § 551.140(d) must...

  18. The information systems security officer's guide establishing and managing an information protection program

    CERN Document Server

    Kovacich, Gerald L

    2003-01-01

    Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

  19. 33 CFR 106.205 - Company Security Officer (CSO).

    Science.gov (United States)

    2010-07-01

    ... TWIC. (b) Qualifications. The CSO must have general knowledge, through training or equivalent job...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security training and education, including security measures and procedures. (c) In addition to the knowledge and...

  20. US statutes of general interest to safeguards and security officers

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1988-09-01

    This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)

  1. Biometric Enhancement of Home and Office Security to Reduce ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    Biometrics security technology uses the physiological and ... verification and authentication methodology to verify how facial screening explores the different ... mouth, nose etc and stores the bio-information extracted from the face of every ...

  2. Overlapping values, mutual prejudices. Empirical research into the ethos of police officers and private security guards

    NARCIS (Netherlands)

    van Steden, R.; van der Wal, Z.; Lasthuizen, K.M.

    2015-01-01

    What determines professional motivations and values of security operatives: sector or profession? Our article aims to answer this question through a survey study among police officers (n = 405) and private security guards (n = 329) in the Netherlands. Our results show that both groups closely

  3. 33 CFR 165.1317 - Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters, Washington. 165.1317 Section 165.1317 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS...

  4. 33 CFR 165.1318 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of the Port Zone 165.1318 Section 165.1318 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND...

  5. Security Transition Program Office 1994 fiscal year work plan WBS 6.11

    International Nuclear Information System (INIS)

    Brogdon, R.C. Jr.

    1993-10-01

    The Security Transition Program Office (STPO) will change the Hanford Safeguards and Security Protection Program from one that supported the national defense program to one that supports environmental restoration and waste management. A Successful Safeguards and Security Protection Program transition will have an industrial security foundation supplemented to protect material interests and information resources. The transition will change the current approaches to protection philosophy to ones that will provide the Hanford Site with the following: consolidation, reduction, and elimination of safeguards and security interests and targets; greater open Site access; maximum application of technology and automation; interpretation of security policies and procedures in light of the Hanford Site's environmental mission; coexistence with other emergency services; streamlined operations; and protection of employees and the public from health, safety, fire, security, and safeguards risks. This report describes the 1994 program objectives, the technical base, schedule baseline, cost, funding, manpower, and the 1993 program workscope

  6. A fear of coercion and accountability? Security officers and the non-use of force

    NARCIS (Netherlands)

    Eski, Y.

    2017-01-01

    Based on fieldwork among operational security officers working in the Hamburg and Rotterdam ports, it became clear these frontline port policing professionals possess a critical, even fearful attitude towards coercion while performing their duties in the ports. The power of arrest and the

  7. Accessibility and security of digital records in the Office of the ...

    African Journals Online (AJOL)

    Accessibility and security of digital records in the Office of the Premier in ... preservation and accessibility of digital records for effective e-governance. ... Questionnaires, interviews, observations and document analysis were used to collect data. ... be knowledgeable in the use of the technologies that generate digital records.

  8. 76 FR 21768 - Privacy Act of 1974; Department of Homeland Security/Office of Health Affairs-001 Contractor...

    Science.gov (United States)

    2011-04-18

    ... Homeland Security, Washington, DC 20520. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0013] Privacy Act of... Immunization Records System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of Privacy Act system of...

  9. ‘Persons of versatility’: private security officers and private policing in residential estates in Hong Kong

    OpenAIRE

    Kwong, Wilkie

    2013-01-01

    This study is the result of exploratory research on the daily lives and experiences of private security officers working in Hong Kong housing estates. As the first qualitative investigation of its kind, it examined two case studies of separate estates through the lens of Nodal Governance, which involved interviews with security practitioners and end-users, work practice observations, and documentary analysis. Security officers were found to ‘wear many hats’. Apart from crime prevention, the ...

  10. 15 CFR 758.7 - Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs...

    Science.gov (United States)

    2010-01-01

    ... forfeiture. In addition to the authority of Customs officers to seize and detain items, both Customs... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Authority of the Office of Export Enforcement, the Bureau of Industry and Security, Customs offices and Postmasters in clearing shipments 758.7...

  11. 78 FR 261 - Moving Security Zone Around Escorted Vessels on the Lower Mississippi River

    Science.gov (United States)

    2013-01-03

    ... provides for enhanced protection of escorted vessels while causing little if any disruption to other routine navigation since most vessels will be allowed to transit within the outer 250 yards of the...

  12. A locking mechanism for securing a loading buoy to a vessel. Lsemekanisme for fastgjring av en lastebye til et farty

    Energy Technology Data Exchange (ETDEWEB)

    Breivik, K.; Smedal, A.

    1994-07-04

    The invention relates to a locking mechanism for securing a loading/unloading buoy on a vessel. The buoy is of the type to be introduced into a submerged downwardly open receiving space in the vessel, and to be fastened in a releasable manner in the receiving space. The mechanism comprises hydraulically actuated locking elements, mounted about horizontal axes at the sides of the receiving space, to pivot between the locking and releasing positions, the buoy having a peripheral collar having a downwards facing abutment edge for engagement with the locking elements in the locking position thereof. 6 figs.

  13. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  14. Contemporary, emerging, and ratified wireless security standards: an update for the networked dental office.

    Science.gov (United States)

    Mupparapu, Muralidhar

    2006-02-15

    Wireless networking is not new to contemporary dental offices around the country. Wireless routers and network cards have made access to patient records within the office handy and, thereby, saving valuable chair side time and increasing productivity. As is the case with any rapidly developing technology, wireless technology also changes with the same rate. Unless, the users of the wireless networking understand the implications of these changes and keep themselves updated periodically, the office network will become obsolete very quickly. This update of the emerging security protocols and pertaining to ratified wireless 802.11 standards will be timely for the contemporary dentist whose office is wirelessly networked. This article brings the practicing dentist up-to-date on the newer versions and standards in wireless networking that are changing at a fast pace. The introduction of newer 802.11 standards like super G, Super AG, Multiple Input Multiple Output (MIMO), and pre-n are changing the pace of adaptation of this technology. Like any other rapidly transforming technology, information pertaining to wireless networking should be a priority for the contemporary dentist, an eventual end-user in order to be a well-informed and techno-savvy consumer.

  15. U.S. statutes of general interest to safeguards and security officers

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1988-01-01

    A handbook of enforcement provisions of Federal law and regulations was prepared for use by U.S. DOE Security Inspectors. This handbook provides security inspectors for the U.S. Department of Energy, security officers at Nuclear Regulatory Licensee facilities, and others with a single document containing most of the Federal law provisions available to assist them in enforcing agency regulations. The handbook contains selected enforcement provisions of Titles 18, 42 and 50 of the United States Code (USC). Topical coverage of Title 18 includes Espionage and Misrepresentation or Impersonation; Theft and Embezzlement; Malicious Mischief; Conspiracy; Search and Seizure. A miscellaneous section deals with explosives, blackmail, firearms, and other subjects. Certain enforcement sections of Title 42 of the USC (The Atomic Energy Act) and of the Internal Security Act of the United States Code (Title 50) are also provided. Finally, relevant parts of the Federal Property Management Regulations of Title 50, Chapter 101 of the Code of Federal Regulations are presented. A comprehensive index is provided based on key words

  16. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Bjornstad, D.J.; Curlee, T.R. (Oak Ridge National Lab., TN (United States)); Bohi, D.R. (Resources for the Future, Inc., Washington, DC (United States))

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab.

  17. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    International Nuclear Information System (INIS)

    Bjornstad, D.J.; Curlee, T.R.; Bohi, D.R.

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab

  18. 33 CFR 165.114 - Safety and Security Zones: Escorted Vessels-Boston Harbor, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.114 Safety and Security Zones: Escorted Vessels—Boston Harbor, Massachusetts. (a...

  19. Annual Waste Minimization Summary Report for the National Nuclear Security Administration Nevada Site Office

    International Nuclear Information System (INIS)

    Alfred J. Karns

    2007-01-01

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U. S. Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during CY06. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit ((number s ign)NEV HW0021) and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the DOE, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume and toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO

  20. USCG Vessel

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  1. 19 CFR 162.3 - Boarding and search of vessels.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Boarding and search of vessels. 162.3 Section 162.3 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... Boarding and search of vessels. (a) General authority. A Customs officer, for the purpose of examining the...

  2. 76 FR 30374 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-25

    ... http://www.regulations.gov on or before July 25, 2011 or reach the Docket Management Facility by that... that occur on the vessel, and provide law enforcement officials in the course and scope of an... industry best practices for placement and retention of video recording devices exist? If yes, please...

  3. 78 FR 13691 - Guidance Regarding Inspection and Certification of Vessels Under the Maritime Security Program

    Science.gov (United States)

    2013-02-28

    ...-level approach would enable the Coast Guard to apply traditional inspection methods to newly reflagged... enrolled MSP vessels would continue to be inspected by the Coast Guard in a manner similar to traditional... oversight, and evaluations of Authorized Class Society (ACS) survey activities. We received eight public...

  4. The Future Security Environment: Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent

    Science.gov (United States)

    2015-09-01

    and M. Epstein, “ Millennials and the World of Work: An Organizational and Management Perspective,” Journal of Business and Psychology, Vol. 25, 2010...Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent FOR THIS AND OTHER PUBLICATIONS, VISIT US AT http://www.carlisle.army.mil...SUBTITLE The Future Security Environment: Why the U.S. Army Must Differentiate and Grow Millennial Officer Talent 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  5. Near field communication (NFC) model for arduino uno based security systems office system

    Science.gov (United States)

    Chairunnas, A.; Abdurrasyid, I.

    2018-03-01

    Currently, many offices or companies that start growing rapidly in a company or office should have a very limited room to enter only people entitled to enter the room and use the facilities contained in it, for example, Files in it must have many files and documents very important because to reduce the abuse of files and irresponsible person. Because it will be made room door security system by using Near Field Communication on android smartphone. Software used is Arduino IDE. The tools used in this system are Arduino Uno R3, NFC shield, pear sensor, bell, led, servo, 16 × 2 LCD, and Near Field Communication (NFC) in android smartphone. This system runs based on 2 inputs of a new technology that is Near Field Communication (NFC) in android smartphone. And also use pear sensor to detect unauthorized person entering the room. If the correct password is entered then the door will open and the pear sensor will light off if wrong then the bell will light up.

  6. Wireless networking for the dental office: current wireless standards and security protocols.

    Science.gov (United States)

    Mupparapu, Muralidhar; Arora, Sarika

    2004-11-15

    Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.

  7. Wireless Sensor Buoys for Perimeter Security of Military Vessels and Seabases

    Science.gov (United States)

    2015-12-01

    two decades have demonstrated that attacks of this type are indeed possible, and that current security measures may not be sufficient to mitigate such...attack by small surface crafts. The past two decades have demonstrated that attacks of this type are indeed possible, and that current security measures ...xiii LIST OF ACRONYMS AND ABBREVIATIONS ADAPT AP ARA AT/FP COTS DARPA DOD DODINST EF-21 GPS GUI IEEE ISR LCS LiDAR LTE MAC MAGTF

  8. Cost-Benefit Analysis Methodology: Install Commercially Compliant Engines on National Security Exempted Vessels?

    Science.gov (United States)

    2015-11-05

    environment track record. Commercial compliance measures are checked to ensure the vessel can meet all intact and damage stability (center of gravity...From NAVSEA, the authors would like to thank Mr. Abe Boughner (NAVSEA 05D4); and Mr. Philip McCormick and Mr. Brittany Basilone, [NAVSEA 05C...sourceapportionmentbpttsd.pdf US EPA, 40 CFR 94 (Title 40—Protection of Environment , Chapter I – EPA, Subchapter C – Air Programs, Part 94 – Control

  9. 76 FR 44880 - Security Zone; Escorted Vessels in Captain of the Port Ohio Valley Zone

    Science.gov (United States)

    2011-07-27

    ... potential terrorist acts and would enhance public and maritime safety and security. DATES: Comments and... coast of Yemen and the prior attack on the USS COLE demonstrate the maritime terrorism threat. These attacks manifest a continuing threat to U.S. maritime assets as described in the President's finding in...

  10. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... port in case of security threats or breaches of security; (j) Procedures for periodic plan review... (CSO), Vessel Security Officers (VSO), public safety officers, emergency response personnel, and crisis management organization representatives within the port, including 24-hour contact details; (m) Measures to...

  11. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  12. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  13. 76 FR 2402 - Maritime Security Directive 104-6 (Rev 5); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2011-01-13

    ... Directive 104-6 (Rev 5); Guidelines for U.S. Vessels Operating in High Risk Waters AGENCY: Coast Guard, DHS... designated high risk waters, and provides additional counter-piracy guidance and mandatory measures for these... MARSEC Directives are available at your local Captain of the Port (COTP) office. Phone numbers and...

  14. 76 FR 12609 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-03-08

    ... 20528. For privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer... Secretary 6 CFR Part 5 [Docket No. DHS-2010-0051] Privacy Act of 1974: Implementation of Exemptions... Center Tracker and Senior Watch Officer Logs System of Records AGENCY: Privacy Office, DHS. ACTION...

  15. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  16. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    Science.gov (United States)

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  17. Security Police Officer Utilization Field, AFSCs 8111, 8116, 8121, and 8124.

    Science.gov (United States)

    1981-06-01

    STATEMENT A M C Approved for public release 82 0 4 26Distribution Unlimited C=DCC=D= APS 8 1 X CECI I CODING INSTRUCTIONS -- -- -" Print the booklet copy...m == NAME (Last, First, Middle Initial) DATE OF BIRTH SEX YR NO DAY (MALE -"(11-34) (3s-5- rayo (41) PRESENT GRADE: SOCIAL SECURITY ACCOUNT NUMBER...Branch - 11. OIC Missile Support Branch - __m 12. OIC Weapons Systems Security , 4 8 CODE 99 X ~.t ! AFS 81XX -mmm -C - . .’ .9 - =, BACKGROUND

  18. CBO Testimony: Statement of Robert F. Hale, Assistant Director, National Security Division, Congressional Budget Office

    National Research Council Canada - National Science Library

    Hale, Robert F

    1991-01-01

    .... This testimony, by Robert F. Hale, Congressional Budget Office, covers the following topics: Socioeconomic Backgrounds of Enlisted Recruits, Racial Mix of Enlisted Recruits, Shifts in Recruiting during the 1980s, Altering the Composition of the Military: Reserve Mobilization and Conscription, and Should the Social Composition of the Military be a Concern?

  19. 76 FR 42005 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2011-07-18

    ... Disclosures) because release of the accounting of disclosures could alert the subject of an investigation of... efforts to preserve national security. Disclosure of the accounting would also permit the individual who... Title 6, Code of Federal Regulations, as follows: PART 5--DISCLOSURE OF RECORDS AND INFORMATION 0 1. The...

  20. TRAINING OF DEVELOPMENT OF SKILLS OF PROFESSIONAL COMMUNICATION THE SECURITY OFFICER OF THE CRIMINAL INVESTIGATION DEPARTMENT OF THE INTERNAL AFFAIRS

    Directory of Open Access Journals (Sweden)

    Yuliya Leonidovna Lampusova

    2015-08-01

    Full Text Available Training is a form of active learning that is aimed at developing knowledge, skills, and attitudes. To improve operational security officers of Internal Affairs Agencies activity, we have schemed out training for the development of communication skills. This paper presents the exercises focusing on the professional communication skills of employees of the Criminal Investigation Department of the Interior development. Eight exercises are described, the main objectives of them are: learning to navigate the feelings of the partner, the ability to change the position of the interlocutor, the formation of the ability to listen to the end and not to interrupt, developing the ability to talk, improving the communicative competence and the development of the ability to accurately convey information.

  1. 76 FR 28315 - Security Zone; Vessels Carrying Hazardous Cargo, Sector Columbia River Captain of the Port Zone

    Science.gov (United States)

    2011-05-17

    ... determination based on the fact that the security zones created by this rule will only be in effect during the... its effects on them and participate in the rulemaking process. Small businesses may send comments on... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2009-1134] RIN 1625...

  2. U.S. Department of Energy Office of Health, Safety and Security Illness and Injury Surveillance Program Worker Health at a Glance, 2000-2009

    Energy Technology Data Exchange (ETDEWEB)

    Strader, Cliff [US Dept. of Energy, Washington, DC (United States); Richter, Bonnie [US Dept. of Energy, Washington, DC (United States)

    2013-01-23

    The Worker Health at a Glance, 2000 – 2009 provides an overview of selected illness and injury patterns among the current DOE contractor workforce that have emerged over the 10-years covered by this report. This report is a roll-up of data from 16 individual DOE sites, assigned to one of three program offices (Office of Environmental Management, Office of Science and the National Nuclear Security Administration). In this report, an absences is defined as 40 or more consecutive work hours (5+ calendar days) off the job. Shorter absences were not included.

  3. USCG Vessel Events

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  4. USCG Vessel Pollution

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  5. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  6. 6 CFR Appendix A to Part 5 - FOIA/Privacy Act Offices of the Department of Homeland Security

    Science.gov (United States)

    2010-01-01

    ... of the Secretary Office of the Deputy Secretary Office of the Under Secretary for Management B Office... Hazard Information System of the National Oceanic and Atmospheric Administration), National Oceanic and... Preparedness d. Strategic National Stockpile 2. Centers for Disease Control and Agency for Toxic Substances and...

  7. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis.

    Science.gov (United States)

    van Dongen, Diana; Smid, Tjabe; Timmermans, Daniëlle R M

    2011-11-09

    The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. © 2011 van Dongen et al; licensee BioMed Central Ltd.

  8. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    van Dongen Diana

    2011-11-01

    Full Text Available Abstract Background The amount of exposure to electromagnetic fields (EMF at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Methods Three occupational groups, the general Dutch working population (n = 567, airport security officers who work with metal detectors (n = 106, and MRI radiographers who work with MRI (n = 193, were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Results Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. Conclusions These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF.

  9. Vessel Operating Units (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains data for vessels that are greater than five net tons and have a current US Coast Guard documentation number. Beginning in1979, the NMFS...

  10. Emotional Exhaustion and Job Satisfaction in Airport Security Officers - Work-Family Conflict as Mediator in the Job Demands-Resources Model.

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners' job performance. The present study bridges this research gap by applying the job demands-resources (JD-R) model and using work-family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD-R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  11. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  12. 33 CFR 90.3 - Pushing vessel and vessel being pushed: Composite unit.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Pushing vessel and vessel being... HOMELAND SECURITY INLAND NAVIGATION RULES INLAND RULES: INTERPRETATIVE RULES § 90.3 Pushing vessel and vessel being pushed: Composite unit. Rule 24(b) of the Inland Rules states that when a pushing vessel and...

  13. 33 CFR 82.3 - Pushing vessel and vessel being pushed: Composite unit.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Pushing vessel and vessel being... HOMELAND SECURITY INTERNATIONAL NAVIGATION RULES 72 COLREGS: INTERPRETATIVE RULES § 82.3 Pushing vessel and vessel being pushed: Composite unit. Rule 24(b) of the 72 COLREGS states that when a pushing vessel and a...

  14. Protecting nuclear power plants. Chapter 2. On the importance of the security and safety of the reactor pressure vessel to external threats

    International Nuclear Information System (INIS)

    Ballesteros, A.; Gonzalez, J.; Debarberis, L.

    2006-01-01

    Nuclear power plants have blong been recognized as potential targets of terrorist attacks, and critics have long questioned the adequacy of the existing measures to defend against such attacks. The 11-S 2001, 11-M 2004 and 7-J 2005 attacks in USA, Spain and UK illustrated the deadly intention and abilities of modern terrorist groups. These attacks also brought to surface long standing concerns about the vulnerability of nuclear installations to possible terrorist attacks. Commercial nuclear reactors contain large inventory of radioactive fission products which, if dispersed, could pose a direct radiation hazard on the population. The reactor pressure vessel (RPV), which contains the nuclear fuel, is the most critical component of the plant. This paper shows that small amount of explosive material can produce irreversible damage in the RPV and the release of radioactive material. Therefor, access of working personal to the vicinity of the RPV during the refuelling outage should be stricktly limited. It should be considered a high priority security issue

  15. A Systematic Approach to Applying Lean Techniques to Optimize an Office Process at the Y-12 National Security Complex

    Energy Technology Data Exchange (ETDEWEB)

    Credille, Jennifer [Y-12 National Security Complex, Oak Ridge, TN (United States); Univ. of Tennessee, Knoxville, TN (United States); Owens, Elizabeth [Y-12 National Security Complex, Oak Ridge, TN (United States); Univ. of Tennessee, Knoxville, TN (United States)

    2017-10-11

    This capstone offers the introduction of Lean concepts to an office activity to demonstrate the versatility of Lean. Traditionally Lean has been associated with process improvements as applied to an industrial atmosphere. However, this paper will demonstrate that implementing Lean concepts within an office activity can result in significant process improvements. Lean first emerged with the conception of the Toyota Production System. This innovative concept was designed to improve productivity in the automotive industry by eliminating waste and variation. Lean has also been applied to office environments, however the limited literature reveals most Lean techniques within an office are restricted to one or two techniques. Our capstone confronts these restrictions by introducing a systematic approach that utilizes multiple Lean concepts. The approach incorporates: system analysis, system reliability, system requirements, and system feasibility. The methodical Lean outline provides tools for a successful outcome, which ensures the process is thoroughly dissected and can be achieved for any process in any work environment.

  16. Special report. Hospitals that are becoming 'hotel friendly' to guests ... and the role played by security officers.

    Science.gov (United States)

    1996-01-01

    Faced with increasing competition, hospitals in New York City are developing programs to become more user friendly and, like hotels, to treat patients more as "guests" than as "customers." These programs, which have particular applications for security personnel, are also seeking to improve communications and relationships among the hospital's medical staff and other employees. In this report, we'll describe some of these efforts in which hospitals are turning to hoteliers, consultants, and others for advice in the area of customer service, and the role seen for hospital security.

  17. Report to the Congress on the need for, and the feasibility of, establishing a security agency within the Office of Nuclear Material Safety and Safeguards

    International Nuclear Information System (INIS)

    1976-08-01

    In response to the Congressional mandate Section 204(b)-(2) (C) of the Energy Reorganization Act of 1974, the Director of the Office of Nuclear Material Safety and Safeguards, U.S. Nuclear Regulatory Commission (NRC) has assessed the need for and the feasibility of establishing a security agency within that office for the performance of safeguards functions. The study assessed guard force effectiveness, and addressed public policy, administrative and legal issues. The study concluded that creation of a special security force within NRC would not result in a higher degree of guard force effectiveness than can be achieved through the use of private guards who have been properly trained and certified. Disparate gun laws in various states, it concluded, restrict arms possessed by both private and federal guards and private and federal transportation guards would require legislation authorizing them to bear the necessary weapons to protect nuclear material in transit. The role of reaction forces was also addressed and it was concluded that primary reliance at fixed sites should be placed on onsite protection systems; for material in transit, on invulnerability of vehicles and containers and on guard forces accompanying shipments

  18. Emotional Exhaustion and Job Satisfaction in Airport Security Officers − Work−Family Conflict as Mediator in the Job Demands–Resources Model

    Directory of Open Access Journals (Sweden)

    Sophie eBaeriswyl

    2016-05-01

    Full Text Available The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners. Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD−R model and using work–family conflict (WFC as an intervening variable to study relationships between work characteristics (workload and supervisor support, emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a supervisor support as a major job resource predicted job satisfaction among screeners; (b workload as a major job demand predicted their emotional exhaustion; and (c WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  19. Emotional Exhaustion and Job Satisfaction in Airport Security Officers – Work–Family Conflict as Mediator in the Job Demands–Resources Model

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD–R) model and using work–family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed. PMID:27242581

  20. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  1. Research vessels

    Digital Repository Service at National Institute of Oceanography (India)

    Rao, P.S.

    The role of the research vessels as a tool for marine research and exploration is very important. Technical requirements of a suitable vessel and the laboratories needed on board are discussed. The history and the research work carried out...

  2. 287(g): Cross-Delegating State and Local Law Enforcement Officers with Federal Immigration Authority - Homeland Security Remedy or Rue?

    Science.gov (United States)

    2008-12-01

    illegal foreign nationals have killed over 43,000 Americans on U.S. soil since 9/11.28 The website “immigrationshumancost.org” is dedicated to the...enforcement officers face as they work in areas with a high ratio of Latino residents. How they must walk on proverbial eggshells to avoid even the...trailblazer in instituting programs to foster exactly what the 9/11 commission advocated to decrease opportunities for foreign strikes on U.S. soil . As

  3. Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)

    International Nuclear Information System (INIS)

    Jesse Schreiber

    2008-01-01

    In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet America's nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization and improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in 'green' technology

  4. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  5. 77 FR 4573 - Maritime Security Directive 104-6 (Rev 6); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2012-01-30

    ... political complexity. Despite these efforts, piracy persists and the combination of piracy and weak rule of... Development, Naval Criminal Investigative Service, Customs and Border Protection, Transportation Security...

  6. Office of Personnel Management Catch 62 Match

    Data.gov (United States)

    Social Security Administration — SSA provides the Office of Personnel Management (OPM) with tax returns, Social Security benefits, and military retirement information for the purpose of correctly...

  7. 75 FR 29358 - Maritime Security Directive 104-6 (Rev 2 and 3); Guidelines for U.S. Vessels Operating in High...

    Science.gov (United States)

    2010-05-25

    ... designated high risk waters, and provides additional anti-piracy guidance and mandatory measures for these vessels operating in these areas where acts of piracy and armed robbery against ships are prevalent... piratical activities. The combination of piracy and weak rule of law in the region offers a potential...

  8. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  9. 76 FR 67472 - Order of Succession for the Office of the Chief Information Officer

    Science.gov (United States)

    2011-11-01

    ...: Juanita Galbreath, Deputy Chief Information Officer for Cyber Security and Privacy, Office of the Chief...) Deputy Chief Information Officer, for IT Operations; (3) Deputy Chief Information Officer, for Cyber Security and Privacy; (4) Deputy Chief Information Officer, for Business and IT Modernization. These...

  10. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  11. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  12. Over-the-horizon, connected home/office (OCHO): situation management of environmental, medical, and security conditions at remote premises via broadband wireless access

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    Broadband wireless access standards, together with advances in the development of commercial sensing and actuator devices, enable the feasibility of a consumer service for a multi-sensor system that monitors the conditions within a residence or office: the environment/infrastructure, patient-occupant health, and physical security. The proposed service is a broadband reimplementation and combination of existing services to allow on-demand reports on and management of the conditions by remote subscribers. The flow of on-demand reports to subscribers and to specialists contracted to mitigate out-of-tolerance conditions is the foreground process. Service subscribers for an over-the-horizon connected home/office (OCHO) monitoring system are the occupant of the premises and agencies, contracted by the service provider, to mitigate or resolve any observed out-of-tolerance condition(s) at the premises. Collectively, these parties are the foreground users of the OCHO system; the implemented wireless standards allow the foreground users to be mobile as they request situation reports on demand from the subsystems on remote conditions that comprise OCHO via wireless devices. An OCHO subscriber, i.e., a foreground user, may select the level of detail found in on-demand reports, i.e., the amount of information displayed in the report of monitored conditions at the premises. This is one context of system operations. While foreground reports are sent only periodically to subscribers, the information generated by the monitored conditions at the premises is continuous and is transferred to a background configuration of servers on which databases reside. These databases are each used, generally, in non-real time, for the assessment and management of situations defined by attributes like those being monitored in the foreground by OCHO. This is the second context of system operations. Context awareness and management of conditions at the premises by a second group of analysts and

  13. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  14. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.240 Maritime Security (MARSEC) Level coordination and implementation. (a) The vessel owner or...

  15. 33 CFR 157.450 - Maneuvering and vessel status information.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) POLLUTION RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Interim Measures for Certain Tank Vessels Without Double Hulls Carrying Petroleum Oils...

  16. 37 CFR 212.5 - Recordation of distinctive identification of vessel hull designer.

    Science.gov (United States)

    2010-07-01

    ... identification of vessel hull designer. 212.5 Section 212.5 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT OFFICE AND PROCEDURES PROTECTION OF VESSEL HULL DESIGNS § 212.5 Recordation of distinctive identification of vessel hull designer. (a) General. Any owner of a vessel hull may...

  17. 75 FR 56015 - Vessel Inspection Alternatives

    Science.gov (United States)

    2010-09-15

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 46 CFR Part 8 Vessel Inspection Alternatives CFR... Certificate; (ii) International Tonnage Certificate; (iii) Cargo Ship Safety Construction Certificate; (iv) Cargo Ship Safety Equipment Certificate; and (v) International Oil Pollution Prevention Certificate; and...

  18. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  19. 75 FR 33885 - Office of International Affairs; Survey of Foreign Ownership of U.S. Securities as of June 30, 2010

    Science.gov (United States)

    2010-06-15

    ... any agency, corporation, financial institution, or other entity or instrumentality thereof, including... equities, short-term debt securities (including selected money market instruments), and long-term debt...

  20. Containment vessel

    International Nuclear Information System (INIS)

    Zbirohowski-Koscia, K.F.; Roberts, A.C.

    1980-01-01

    A concrete containment vessel for nuclear reactors is disclosed that is spherical and that has prestressing tendons disposed in first, second and third sets, the tendons of each set being all substantially concentric and centred around a respective one of the three orthogonal axes of the sphere; the tendons of the first set being anchored at each end at a first anchor rib running around a circumference of the vessel, the tendons of the second set being anchored at each end at a second anchor rib running around a circumference of the sphere and disposed at 90 0 to the first rib, and the tendons of the third set being anchored some to the first rib and the remainder to the second rib. (author)

  1. Vacuum vessel for thermonuclear device

    International Nuclear Information System (INIS)

    Kikuchi, Mitsuru; Nagashima, Keisuke; Suzuki, Masaru; Onozuka, Masaki.

    1997-01-01

    A vacuum vessel main body and structural members at the inside and the outside of the vacuum vessel main body are constituted by structural materials activated by irradiation of neutrons from plasmas such as stainless steels. Shielding members comprising tungsten or molybdenum are disposed on the surface of the vacuum vessel main body and the structural members of the inside and the outside of the main body. The shielding members have a function also as first walls or a seat member for the first walls. Armor tiles may be disposed to the shielding members. The shielding members and the armor tiles are secured to a securing seat member disposed, for example, to an inner plate of the vacuum vessel main body by bolts. Since the shielding members are disposed, it is not necessary to constitute the vacuum vessel main body and the structural members at the inside and the outside thereof by using a low activation material which is less activated, such as a titanium alloy. (I.N.)

  2. Vacuum vessel for thermonuclear device

    Energy Technology Data Exchange (ETDEWEB)

    Kikuchi, Mitsuru; Nagashima, Keisuke [Japan Atomic Energy Research Inst., Tokyo (Japan); Suzuki, Masaru; Onozuka, Masaki

    1997-07-11

    A vacuum vessel main body and structural members at the inside and the outside of the vacuum vessel main body are constituted by structural materials activated by irradiation of neutrons from plasmas such as stainless steels. Shielding members comprising tungsten or molybdenum are disposed on the surface of the vacuum vessel main body and the structural members of the inside and the outside of the main body. The shielding members have a function also as first walls or a seat member for the first walls. Armor tiles may be disposed to the shielding members. The shielding members and the armor tiles are secured to a securing seat member disposed, for example, to an inner plate of the vacuum vessel main body by bolts. Since the shielding members are disposed, it is not necessary to constitute the vacuum vessel main body and the structural members at the inside and the outside thereof by using a low activation material which is less activated, such as a titanium alloy. (I.N.)

  3. Federal Bureau of Investigation (FBI) Field Office Jurisdiction/Divisions

    Data.gov (United States)

    Department of Homeland Security — This dataset represents the FBI (Federal Bureau of Investigations) national field office jurisdiction/divisional boundary locations. The field offices are centrally...

  4. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  5. 32 CFR 700.826 - Physical security.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Physical security. 700.826 Section 700.826... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate... officer shall take action to protect and maintain the security of the command against dangers from fire...

  6. Report to the Congress on the need for, and the feasibility of, establishing a security agency within the Office of Nuclear Material Safety and Safeguards. Executive summary

    International Nuclear Information System (INIS)

    1976-08-01

    The Executive Summary of a report written in response to the Congressional mandate Section 204(b)-(2) (c) of the Energy Reorganization Act of 1974, by the Director of the Office of Nuclear Material Safety and Safeguards, U.S. Nuclear Regulatory Commission (NRC) is given. It summarizes the main report, which assessed guard force effectiveness, and addressed public policy, administration and legal issues

  7. Field Office Contact Information for Application Developers

    Data.gov (United States)

    Social Security Administration — SSA provides a web service and downloadable file for SSA Field Office locations, telephone numbers, and hours of operation. (Note: If you think an office might be...

  8. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  9. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  10. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  11. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  12. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  13. Apparatus for carrying out ultrasonic inspection of pressure vessels

    International Nuclear Information System (INIS)

    Dent, K.H.; Greenhalgh, F.G.

    1975-01-01

    An apparatus is described for moving an ultrasonic scanning mechanism over the interior surface of a pressure vessel and comprising a mast for supporting the scanning mechanism inside the vessel and a carriage for traversing the mast within the vessel, the mast being pivotably secured to the carriage so that when the ultrasonic scanning mechanism contacts the interior surface of the pressure vessel the mast is caused to pivot. (auth)

  14. 76 FR 34761 - Classified National Security Information

    Science.gov (United States)

    2011-06-14

    ... MARINE MAMMAL COMMISSION Classified National Security Information [Directive 11-01] AGENCY: Marine... Commission's (MMC) policy on classified information, as directed by Information Security Oversight Office... of Executive Order 13526, ``Classified National Security Information,'' and 32 CFR part 2001...

  15. Vacuum vessel for plasma devices

    International Nuclear Information System (INIS)

    Yamada, Masao; Taguchi, Masami.

    1975-01-01

    Object: To permit effective utility of the space in the inner and outer sides of the container wall and also permit repeated assembly for use. Structure: Vacuum vessel wall sections are sealed together by means of welding bellows, and also flange portions formed at the end of the wall sections are coupled together by bolts and are sealed together with a seal ring and a seal cap secured by welding. (Nakamura, S.)

  16. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  17. Office of Personnel Management (OPM)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for the Office of Personnel Management. OPM will use the SSN verifications in its investigative...

  18. 17 CFR 200.26a - Office of Information Technology.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible...

  19. Vessel Operator System

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Operator cards are required for any operator of a charter/party boat and or a commercial vessel (including carrier and processor vessels) issued a vessel permit from...

  20. Results of special security inspection on improvement of security management setup in Head Office and Tsuruga Nuclear Power Station of the Japan Atomic Power Company and improvement of facilities in Tsuruga Nuclear Power Station

    International Nuclear Information System (INIS)

    1982-01-01

    In connection with the series of accidents in the Tsuruga Nuclear Power Station, the Agency of Natural Resources and Energy had instructed JAPC to make comprehensive inspection on the security management setup and to take improvement measures in the nuclear power station. The results of the subsequent inspection by ANRE confirmed that the improvements made by JAPC are adequate, and the following items are described: improvement of security management setup - communication and reporting in emergency, the management of inspection and maintenance records, work control and supervision in repair, improvement, etc., functional authority and responsibility in maintenance management, operation management, radiation control, personnel education; improvement of facilities - feed water heaters, laundry waste-water filter room, radioactive waste treatment facility, general drainage, concentrated waste liquid storage tanks in newly-built waste treatment building, etc. (J.P.N.)

  1. 76 FR 54197 - Membership of the Office of the Secretary Performance Review Board

    Science.gov (United States)

    2011-08-31

    ..., Director, Office of Executive Resources, Office of Human Resources Management, Office of the Director, 14th..., Office of Information Technology, Security, Infrastructure, and Technology. Ellen Herbst, Senior Advisor..., Director, Office of Civil Rights. Alfred J. Broadbent, Director, Office of Security. Economic Development...

  2. Metallurgy of steels for PWR pressure vessels

    International Nuclear Information System (INIS)

    Kepka, M.; Mocek, J.; Barackova, L.

    1980-01-01

    A survey and the chemical compositions are presented of reactor pressure vessel steels. The metallurgy is described of steel making for pressure vessels in Japan and the USSR. Both acidic and alkaline open-hearth steel is used for the manufacture of ingots. The leading world manufacturers of forging ingots for pressure vessels, however, exclusively use electric steel. Vacuum casting techniques are exclusively used. Experience is shown gained with the introduction of the manufacture of forging ingots for pressure vessels at SKODA, Plzen. The metallurgical procedure was tested utilizing alkaline open hearths, electric arc furnaces and facilities for vacuum casting of steel. Pure charge raw materials should be used for securing high steel purity. Prior to forging pressure vessel rings, not only should sufficiently big bottoms and heads be removed but also the ingot middle part should be scrapped showing higher contents of impurities and nonhomogeneous structure. (B.S.)

  3. Metallurgy of steels for PWR pressure vessels

    Energy Technology Data Exchange (ETDEWEB)

    Kepka, M; Mocek, J; Barackova, L [Skoda, Plzen (Czechoslovakia)

    1980-09-01

    A survey and the chemical compositions are presented of reactor pressure vessel steels. The metallurgy is described of steel making for pressure vessels in Japan and the USSR. Both acidic and alkaline open-hearth steel is used for the manufacture of ingots. The leading world manufacturers of forging ingots for pressure vessels, however, exclusively use electric steel. Vacuum casting techniques are exclusively used. Experience is shown gained with the introduction of the manufacture of forging ingots for pressure vessels at SKODA, Plzen. The metallurgical procedure was tested utilizing alkaline open hearths, electric arc furnaces and facilities for vacuum casting of steel. Pure charge raw materials should be used for securing high steel purity. Prior to forging pressure vessel rings, not only should sufficiently big bottoms and heads be removed but also the ingot middle part should be scrapped showing higher contents of impurities and nonhomogeneous structure.

  4. Security Clearances and the Protection of National Security Information: Law and Procedures

    National Research Council Canada - National Science Library

    Cohen, Sheldon

    2000-01-01

    ... designed to protect National Security information. The report provides an authoritative compendium for lawyers, security officers and for managers of corporations who must deal with the legal and procedural aspects of security clearances...

  5. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  6. 33 CFR 157.420 - Vessel specific watch policy and procedures.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) POLLUTION RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Interim Measures for Certain Tank Vessels Without Double Hulls Carrying Petroleum Oils...

  7. 76 FR 57749 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-09-16

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... FOR FURTHER INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone... reception facility standards. Advance notice information from vessels ensures effective management of...

  8. Reactor vessel head permanent shield

    International Nuclear Information System (INIS)

    Hankinson, M.F.; Leduc, R.J.; Richard, J.W.; Malandra, L.J.

    1989-01-01

    A nuclear reactor is described comprising: a nuclear reactor pressure vessel closure head; control rod drive mechanisms (CRDMs) disposed within the closure head so as to project vertically above the closure head; cooling air baffle means surrounding the control rod drive mechanisms for defining cooling air paths relative to the control rod drive mechanisms; means defined within the periphery of the closure head for accommodating fastening means for securing the closure head to its associated pressure vessel; lifting lugs fixedly secured to the closure head for facilitating lifting and lowering movements of the closure head relative to the pressure vessel; lift rods respectively operatively associated with the plurality of lifting lugs for transmitting load forces, developed during the lifting and lowering movements of the closure head, to the lifting lugs; upstanding radiation shield means interposed between the cooling air baffle means and the periphery of the enclosure head of shielding maintenance personnel operatively working upon the closure head fastening means from the effects of radiation which may emanate from the control rod drive mechanisms and the cooling air baffle means; and connecting systems respectively associated with each one of the lifting lugs and each one of the lifting rods for connecting each one of the lifting rods to a respective one of each one of the lifting lugs, and for simultaneously connecting a lower end portion of the upstanding radiation shield means to each one of the respective lifting lugs

  9. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  10. Multiple shell pressure vessel

    International Nuclear Information System (INIS)

    Wedellsborg, B.W.

    1988-01-01

    A method is described of fabricating a pressure vessel comprising the steps of: attaching a first inner pressure vessel having means defining inlet and outlet openings to a top flange, placing a second inner pressure vessel, having means defining inlet and outlet opening, concentric with and spaced about the first inner pressure vessel and attaching the second inner pressure vessel to the top flange, placing an outer pressure vessel, having inlet and outlet openings, concentric with and spaced apart about the second inner pressure vessel and attaching the outer pressure vessel to the top flange, attaching a generally cylindrical inner inlet conduit and a generally cylindrical inner outlet conduit respectively to the inlet and outlet openings in the first inner pressure vessel, attaching a generally cylindrical outer inlet conduit and a generally cylindrical outer outlet conduit respectively to the inlet and outlet opening in the second inner pressure vessel, heating the assembled pressure vessel to a temperature above the melting point of a material selected from the group, lead, tin, antimony, bismuth, potassium, sodium, boron and mixtures thereof, filling the space between the first inner pressure vessel and the second inner pressure vessel with material selected from the group, filling the space between the second inner pressure vessel and the outer pressure vessel with material selected from the group, and pressurizing the material filling the spaces between the pressure vessels to a predetermined pressure, the step comprising: pressurizing the spaces to a pressure whereby the wall of the first inner pressure vessel is maintained in compression during steady state operation of the pressure vessel

  11. 33 CFR 135.401 - Access to vessel, Certificates of Financial Responsibility.

    Science.gov (United States)

    2010-07-01

    ... HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Access, Denial, and Detention § 135.401 Access to vessel, Certificates of...

  12. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization... National Security Personnel System (NSPS) in regulations jointly prescribed by DOD and OPM (Office of...

  13. 17 CFR 140.1 - Headquarters office.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Headquarters office. 140.1..., FUNCTIONS, AND PROCEDURES OF THE COMMISSION Organization § 140.1 Headquarters office. (a) General. The headquarters office of the Commission is located at Three Lafayette Centre, 1155 21st Street, NW., Washington...

  14. Littoral Combat Vessels: Analysis and Comparison of Designs

    National Research Council Canada - National Science Library

    Christiansen, Bryan J

    2008-01-01

    .... The candidates are a Littoral Combat Ship with a surface warfare module, a National Security Cutter augmented with offensive and defensive weaponry, a "Sea Lance" inshore combat vessel, and a Combat...

  15. 75 FR 9415 - Notice of Hearing Schedule; Passenger Vessel Financial Responsibility

    Science.gov (United States)

    2010-03-02

    ... Inc...... Charles A. Robertson, 15 Chairman & Chief Executive Officer. Carnival Corporation & PLC..... David Bernstein, Senior 15 Vice President & Chief Financial Officer. Crystal Cruises, Inc Ann G. Miller... FEDERAL MARITIME COMMISSION Notice of Hearing Schedule; Passenger Vessel Financial Responsibility...

  16. 78 FR 63235 - Tank Vessel Oil Transfers

    Science.gov (United States)

    2013-10-23

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2013-0522] Tank Vessel Oil Transfers... that it is considering new measures to reduce the risks of oil spills in oil transfer operations from...), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200 New Jersey Avenue...

  17. Office Hysteroscopy

    OpenAIRE

    Hikmet Hassa; Basar Tekin; H. Mete Tanir; Bulent Cakmak

    2007-01-01

    Although hysteroscopy has evolved in recent years, its use in the office setting was not made practical until early 1980s with the introduction of small caliber hysteroscopes of less than 5- mm outer diameter.This innovation simplifies ambulatory uterine exploration and the office evaluation of patients with abnormal uterine bleeding. This article reviews current trends in office hysteroscopy and its areas of application in different forms of gynecological problems.

  18. Office Hysteroscopy

    Directory of Open Access Journals (Sweden)

    Hikmet Hassa

    2007-06-01

    Full Text Available Although hysteroscopy has evolved in recent years, its use in the office setting was not made practical until early 1980s with the introduction of small caliber hysteroscopes of less than 5- mm outer diameter.This innovation simplifies ambulatory uterine exploration and the office evaluation of patients with abnormal uterine bleeding. This article reviews current trends in office hysteroscopy and its areas of application in different forms of gynecological problems.

  19. Report on the behalf of the Parliamentary Office of assessment of scientific and technological choices on the control of nuclear pressurized equipment: the case of the EPR vessel. Report of the public hearing of 25 June 2015, and of the presentation of conclusions on the 8 July 2015 - National Assembly Nr 2968, Senate Nr 613

    International Nuclear Information System (INIS)

    Le Deaut, Jean-Yves; Bataille, Christian; Sido, Bruno

    2015-01-01

    After introducing speeches by the president and vice-presidents of the OPECST (the French Parliamentary Office of assessment of scientific and technological choices), this document reports the content of a public hearing which comprised two round tables gathering representatives of the CEA, of the ASN, of the Ministry of Energy, of the IAEA, of the AFCEN (a professional body on rules of design, fabrication and control of electro-nuclear boiler equipment), of the AQUAP (a professional body on the quality of pressurized equipment), of the Louvain University, of Areva, of the Flamanville 3 project, of the IRSN. The first round table more particularly addressed issues related to modalities of control of nuclear pressurized equipment, and the second one the case of the EPR vessel. A debate which followed these round tables is reported, as well as a meeting during which the OPECST presented its conclusions after this public hearing

  20. Probabilistic retinal vessel segmentation

    Science.gov (United States)

    Wu, Chang-Hua; Agam, Gady

    2007-03-01

    Optic fundus assessment is widely used for diagnosing vascular and non-vascular pathology. Inspection of the retinal vasculature may reveal hypertension, diabetes, arteriosclerosis, cardiovascular disease and stroke. Due to various imaging conditions retinal images may be degraded. Consequently, the enhancement of such images and vessels in them is an important task with direct clinical applications. We propose a novel technique for vessel enhancement in retinal images that is capable of enhancing vessel junctions in addition to linear vessel segments. This is an extension of vessel filters we have previously developed for vessel enhancement in thoracic CT scans. The proposed approach is based on probabilistic models which can discern vessels and junctions. Evaluation shows the proposed filter is better than several known techniques and is comparable to the state of the art when evaluated on a standard dataset. A ridge-based vessel tracking process is applied on the enhanced image to demonstrate the effectiveness of the enhancement filter.

  1. 46 CFR 185.340 - Vessels carrying vehicles.

    Science.gov (United States)

    2010-10-01

    ... and away from the vehicles freely in the event of fire or other disaster. The decks, where necessary... motors turned off and their emergency brakes set when the vessel is underway, and that the motors are not... vehicles or next to a loading ramp must have its wheels securely blocked, while the vessel is being...

  2. 46 CFR 122.340 - Vessels carrying vehicles.

    Science.gov (United States)

    2010-10-01

    ... vehicles freely in the event of fire or other disaster. The decks, where necessary, must be distinctly... their emergency brakes set when the vessel is underway, and that the motors are not started until the... loading ramp must have its wheels securely blocked, while the vessel is being navigated. (c) The master...

  3. Improvement to reactor vessel

    International Nuclear Information System (INIS)

    1974-01-01

    The vessel described includes a prestressed concrete vessel containing a chamber and a removable cover closing this chamber. The cover is in concrete and is kept in its closed position by main and auxiliary retainers, comprising fittings integral with the concrete of the vessel. The auxiliary retainers pass through the concrete of the cover. This improvement may be applied to BWR, PWR and LMFBR type reactor vessel [fr

  4. 75 FR 65511 - Employee Benefits Security Administration; Submission for OMB Review

    Science.gov (United States)

    2010-10-25

    ... DEPARTMENT OF LABOR Office of the Secretary Employee Benefits Security Administration; Submission...--Employee Benefits Security Administration (EBSA), Office of Management and Budget, Room 10235, Washington...: Employee Benefits Security Administration. Type of Review: Extension without change of a currently approved...

  5. ALICE HMPID Radiator Vessel

    CERN Document Server

    2003-01-01

    View of the radiator vessels of the ALICE/HMPID mounted on the support frame. Each HMPID module is equipped with 3 indipendent radiator vessels made out of neoceram and fused silica (quartz) windows glued together. The spacers inside the vessel are needed to stand the hydrostatic pressure. http://alice-hmpid.web.cern.ch/alice-hmpid

  6. 33 CFR 104.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 104.145 Section 104.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.145 Maritime Security (MARSEC...

  7. On the Adequacy of API 521 Relief-Valve Sizing Method for Gas-Filled Pressure Vessels Exposed to Fire

    DEFF Research Database (Denmark)

    Andreasen, Anders; Nieto, Marcos Zan; Borroni, Filippo

    2018-01-01

    sense of security. Often the vessel wall will be weakened by high temperatures, before the PRV relieving pressure is reached. In this article, a multiparameter study has been performed taking into consideration various vessel sizes, design pressures (implicitly vessel wall thickness), vessel operating...

  8. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Alternative security program. 27.235 Section 27.235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered...

  9. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must... chemical facility security. (b) Except as provided in § 27.235, a covered facility must complete the Site...

  10. 6 CFR 27.215 - Security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215 Section 27.215 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...

  11. 76 FR 68772 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-11-07

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... CONTACT: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone (202) 475-3652, or fax... vessel to provide information that details the vessel operator's ballast water management efforts. Need...

  12. 33 CFR 101.125 - Approved Alternative Security Programs.

    Science.gov (United States)

    2010-07-01

    ... 106 of this subchapter, as applicable: (a) American Gaming Association Alternative Security Program..., and Towboats and Barges, dated September 24, 2003. (c) Passenger Vessel Association Industry Standards...

  13. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  14. 22 CFR 8.7 - Security.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the committee...

  15. 12 CFR 568.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...

  16. 12 CFR 326.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...

  17. 28 CFR 700.24 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...

  18. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  19. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  20. 76 FR 30227 - On behalf of the Accessibility Committee of the Federal Chief Information Officers Council...

    Science.gov (United States)

    2011-05-24

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0041] On behalf of the Accessibility Committee of the Federal Chief Information Officers Council; Listening Session Regarding Improving the Accessibility of Government Information AGENCY: Federal Chief Information Officers Council, Social Security...

  1. 46 CFR 15.915 - Engineer Officer Endorsements.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Engineer Officer Endorsements. 15.915 Section 15.915... REQUIREMENTS Equivalents § 15.915 Engineer Officer Endorsements. The following licenses and MMC officer... designated duty engineer license or endorsement authorizes service as chief or assistant engineer on vessels...

  2. Pressure vessel design manual

    CERN Document Server

    Moss, Dennis R

    2013-01-01

    Pressure vessels are closed containers designed to hold gases or liquids at a pressure substantially different from the ambient pressure. They have a variety of applications in industry, including in oil refineries, nuclear reactors, vehicle airbrake reservoirs, and more. The pressure differential with such vessels is dangerous, and due to the risk of accident and fatality around their use, the design, manufacture, operation and inspection of pressure vessels is regulated by engineering authorities and guided by legal codes and standards. Pressure Vessel Design Manual is a solutions-focused guide to the many problems and technical challenges involved in the design of pressure vessels to match stringent standards and codes. It brings together otherwise scattered information and explanations into one easy-to-use resource to minimize research and take readers from problem to solution in the most direct manner possible. * Covers almost all problems that a working pressure vessel designer can expect to face, with ...

  3. Tumor Blood Vessel Dynamics

    Science.gov (United States)

    Munn, Lance

    2009-11-01

    ``Normalization'' of tumor blood vessels has shown promise to improve the efficacy of chemotherapeutics. In theory, anti-angiogenic drugs targeting endothelial VEGF signaling can improve vessel network structure and function, enhancing the transport of subsequent cytotoxic drugs to cancer cells. In practice, the effects are unpredictable, with varying levels of success. The predominant effects of anti-VEGF therapies are decreased vessel leakiness (hydraulic conductivity), decreased vessel diameters and pruning of the immature vessel network. It is thought that each of these can influence perfusion of the vessel network, inducing flow in regions that were previously sluggish or stagnant. Unfortunately, when anti-VEGF therapies affect vessel structure and function, the changes are dynamic and overlapping in time, and it has been difficult to identify a consistent and predictable normalization ``window'' during which perfusion and subsequent drug delivery is optimal. This is largely due to the non-linearity in the system, and the inability to distinguish the effects of decreased vessel leakiness from those due to network structural changes in clinical trials or animal studies. We have developed a mathematical model to calculate blood flow in complex tumor networks imaged by two-photon microscopy. The model incorporates the necessary and sufficient components for addressing the problem of normalization of tumor vasculature: i) lattice-Boltzmann calculations of the full flow field within the vasculature and within the tissue, ii) diffusion and convection of soluble species such as oxygen or drugs within vessels and the tissue domain, iii) distinct and spatially-resolved vessel hydraulic conductivities and permeabilities for each species, iv) erythrocyte particles advecting in the flow and delivering oxygen with real oxygen release kinetics, v) shear stress-mediated vascular remodeling. This model, guided by multi-parameter intravital imaging of tumor vessel structure

  4. 33 CFR 105.210 - Facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and... effects, baggage, cargo, and vessel stores; and (m) The meaning and the consequential requirements of the...

  5. Maury Journals - German Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — German vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  6. 46 CFR 4.03-55 - Law enforcement officer.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Law enforcement officer. 4.03-55 Section 4.03-55 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC MARINE CASUALTIES AND INVESTIGATIONS Definitions § 4.03-55 Law enforcement officer. Law enforcement officer means a Coast Guard commissioned, warrant or petty officer...

  7. 8 CFR 3.0 - Executive Office for Immigration Review

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Executive Office for Immigration Review 3.0 Section 3.0 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY GENERAL PROVISIONS EXECUTIVE OFFICE FOR IMMIGRATION REVIEW § 3.0 Executive Office for Immigration Review Regulations of the Executive Office for...

  8. Structuring the Chief Information Security Officer Organization

    Science.gov (United States)

    2015-09-07

    production. Identity Management Identity and access management Define and manage identities and access controls based on identities ( password ...management, single sign on, two-factor authentication, PIN management, digital signatures, smart cards, biometrics , Active Directory, etc.) Application...access controls based on these identities and their rights. Methods used for identity and access management include Active Directory, passwords , PINs

  9. Homeland Security Office: Issues and Options

    National Research Council Canada - National Science Library

    Lee, Rensselaer

    2002-01-01

    ... attacks as a federal focal point for coordinating domestic efforts against terrorism. Former Governor Tom Ridge of Pennsylvania, a close friend and political ally of the President, was appointed to head the OHS...

  10. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  11. Office of Personnel Management (OPM) Earnings

    Data.gov (United States)

    Social Security Administration — Each year the Office of Personnel Management (OPM) sends SSA a file to be verified and matched against the Master Earnings File (MEF) and Employer Information File...

  12. 77 FR 15114 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2012-03-14

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice...

  13. 75 FR 2556 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2010-01-15

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day notice. SUMMARY: This notice...

  14. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  15. Reactor vessel sealing plug

    International Nuclear Information System (INIS)

    Dooley, R.A.

    1986-01-01

    This invention relates to an apparatus and method for sealing the cold leg nozzles of a nuclear reactor pressure vessel from a remote location during maintenance and inspection of associated steam generators and pumps while the pressure vessel and refueling canal are filled with water. The apparatus includes a sealing plug for mechanically sealing the cold leg nozzle from the inside of a reactor pressure vessel. The sealing plugs include a primary and a secondary O-ring. An installation tool is suspended within the reactor vessel and carries the sealing plug. The tool telescopes to insert the sealing plug within the cold leg nozzle, and to subsequently remove the plug. Hydraulic means are used to activate the sealing plug, and support means serve to suspend the installation tool within the reactor vessel during installation and removal of the sealing plug

  16. Containment vessel drain system

    Science.gov (United States)

    Harris, Scott G.

    2018-01-30

    A system for draining a containment vessel may include a drain inlet located in a lower portion of the containment vessel. The containment vessel may be at least partially filled with a liquid, and the drain inlet may be located below a surface of the liquid. The system may further comprise an inlet located in an upper portion of the containment vessel. The inlet may be configured to insert pressurized gas into the containment vessel to form a pressurized region above the surface of the liquid, and the pressurized region may operate to apply a surface pressure that forces the liquid into the drain inlet. Additionally, a fluid separation device may be operatively connected to the drain inlet. The fluid separation device may be configured to separate the liquid from the pressurized gas that enters the drain inlet after the surface of the liquid falls below the drain inlet.

  17. Armed guards on vessels : insurance and liability

    Directory of Open Access Journals (Sweden)

    Mišo Mudrić

    2011-12-01

    Full Text Available The Paper examines the insurance and liability issues resulting from the use of armed guards on board vessels. The study begins with an overview of the available data on key economic fi gures representing the projected overall annual costs of modern piracy. The focus is then shifted to the issue of public versus private security, where possible dangers of private-based security options are discussed in general. After explaining why the Somalia region deserves a closer attention when compared to other pirate-infested waters, a brief summary of the international effort to combat piracy threat is presented, followed by a structured overview of the use of private maritime security options in the maritime sector in general. One security option is the use of armed guards on board vessels. This option is explored both from the political (the acceptance by stakeholders and legal standpoint (legal issues arising from the use of armed guards. An important remedy for the shipping companies/ operators threatened by the piracy hazard is the existence of affordable and effective (specialized marine insurance. A study of available piracy insurance policies is presented, followed by an analysis of case law and other legal issues arising from piracy attacks, which could prove important when considering the legal implications of armed guards employment. Finally, a simplifi ed economic analysis of available security options is presented, followed by the final assessment of benefi ts derived from the use of armed guards.

  18. Vacuum vessel for a nuclear fusion device

    International Nuclear Information System (INIS)

    Watanabe, Takashi; Sato, Hiroshi; Owada, Koro.

    1976-01-01

    Object: To provide a reinforcing member on a bellows portion to reduce a stress at the bellows portion thereby increasing the strength of a vessel. Structure: A vacuum vessel for a nuclear fusion device has a bellows portion and a wall thick portion. A support extended toward the bellows portion is secured inside of a toroidal section in order to reduce the stress at the bellows portion. An insulator is interposed between the support and the bellows portion and is retained on the support by a bolt. Since the stress may be reduced by the support, the wall thick of the bellows portion may be decreased to sufficiently secure the low electric resistance value. (Yoshihara, H.)

  19. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Ship Security Alert System (SSAS). 80.277... Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety..., “RTCM Standard 11020.0—Ship Security Alert Systems (SSAS) using the Cospas-Sarsat System,” Version 1.0...

  20. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  1. Solar Energy Technologies Office Fact Sheet

    Energy Technology Data Exchange (ETDEWEB)

    Solar Energy Technologies Office

    2018-03-13

    The U.S. Department of Energy Solar Energy Technologies Office (SETO) supports early-stage research and development to improve the affordability, reliability, and performance of solar technologies on the grid. The office invests in innovative research efforts that securely integrate more solar energy into the grid, enhance the use and storage of solar energy, and lower solar electricity costs.

  2. NCSX Vacuum Vessel Fabrication

    International Nuclear Information System (INIS)

    Viola ME; Brown T; Heitzenroeder P; Malinowski F; Reiersen W; Sutton L; Goranson P; Nelson B; Cole M; Manuel M; McCorkle D.

    2005-01-01

    The National Compact Stellarator Experiment (NCSX) is being constructed at the Princeton Plasma Physics Laboratory (PPPL) in conjunction with the Oak Ridge National Laboratory (ORNL). The goal of this experiment is to develop a device which has the steady state properties of a traditional stellarator along with the high performance characteristics of a tokamak. A key element of this device is its highly shaped Inconel 625 vacuum vessel. This paper describes the manufacturing of the vessel. The vessel is being fabricated by Major Tool and Machine, Inc. (MTM) in three identical 120 o vessel segments, corresponding to the three NCSX field periods, in order to accommodate assembly of the device. The port extensions are welded on, leak checked, cut off within 1-inch of the vessel surface at MTM and then reattached at PPPL, to accommodate assembly of the close-fitting modular coils that surround the vessel. The 120 o vessel segments are formed by welding two 60 o segments together. Each 60 o segment is fabricated by welding ten press-formed panels together over a collapsible welding fixture which is needed to precisely position the panels. The vessel is joined at assembly by welding via custom machined 8-inch (20.3 cm) wide spacer ''spool pieces''. The vessel must have a total leak rate less than 5 X 10 -6 t-l/s, magnetic permeability less than 1.02(micro), and its contours must be within 0.188-inch (4.76 mm). It is scheduled for completion in January 2006

  3. 75 FR 8489 - Security Zone; Freeport Channel Entrance, Freeport, TX

    Science.gov (United States)

    2010-02-25

    ... environmental risk to health or risk to safety that may disproportionately affect children. Indian Tribal... Captain of the Port, Houston-Galveston deems enhanced security measures necessary on a case-by-case basis... vessels. The moving security zone may commence at any point after certain vessels bound for the Port of...

  4. Radioactive waste processing vessel

    International Nuclear Information System (INIS)

    Hayashi, Masaru; Suzuki, Osamu; Ishizaki, Kanjiro.

    1987-01-01

    Purpose: To obtain a vessel of a reduced weight and with no external leaching of radioactive materials. Constitution: The vessel main body is constituted, for example, with light weight concretes or foamed concretes, particularly, foamed concretes containing fine closed bubbles in the inside. Then, layers having dense texture made of synthetic resin such as polystylene, vinylchloride resin, etc. or metal plate such as stainless plate are integrally disposed to the inner surface of the vessel main body. The cover member also has the same structure. (Sekiya, K.)

  5. Tempest in a vessel

    International Nuclear Information System (INIS)

    Barre, Bertrand

    2015-01-01

    As the ASN made some statements about anomalies of carbon content in the EPR vessel bottom and top, the author recalls and comments some technical issues to better understand the information published on this topic. He notably addresses the role of the vessel, briefly indicates its operating conditions, shape and structure, and mechanical components for the top, its material and mechanical properties, and test samples used to assess mechanical properties. He also comments the phenomenon of radio-induced embrittlement, the vessel manufacturing process, and evokes the applicable regulations. He quotes and comments statements made by the ASN and Areva which evoke further assessments of the concerned components

  6. 6 CFR 5.31 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security of systems of records. 5.31 Section 5.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.31 Security of systems of records. (a) In general. Each component...

  7. Mail Office

    CERN Multimedia

    GS Department

    2009-01-01

    The Mail Office wishes to remind users that the CERN mail service is exclusively reserved for official CERN mail. All external official mail must be sent to the Mail Office in an unstamped envelope on which your name and Department must be clearly indicated below the official CERN address (see example) to help us to find you in the event that it cannot be delivered. If you wish to send private mail from the CERN site you must use the post offices at Meyrin (63-R-011) or Prévessin (866-R-C02). Please use "PRIORITY" envelopes only in the case of urgent mail. Any mail containing merchandise (i.e. anything other than documents) must be sent using an EDH shipping request form. INTERNAL MAIL Please remember to include the recipient’s MAILBOX number on the internal mail envelopes, either in the relevant box (new envelopes) or next to the name (old envelopes). This information, which can be found in the CERN PHONEBOOK, simplifies our t...

  8. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  9. Reactor vessel supported by flexure member

    International Nuclear Information System (INIS)

    Crawford, J.D.; Pankow, B.

    1977-01-01

    According to the present invention there is provided an improved arrangement for supporting a reactor vessel within a containment structure against static and dynamic vertical loadings capable of being imposed as a result of a serious accident as well as during periods of normal plant operation. The support arrangement of the invention is, at the same time, capable of accommodating radial displacements that normally occur between the reactor vessel and the containment structure due to operational transients. The arrangement comprises a plurality of vertical columns connected between the reactor vessel and a support base within the containment structure. The columns are designed to accommodate relative displacements between the vessel and the containment structure by flexing. This eliminates the need for relative sliding movements and thus enables the columns to be securely fixed to the vessel. This elimination of a provision for relative sliding movements avoids the spaces or gaps between the retention members and the retained elements as occurred in prior art arrangements and, concomitantly, the danger of establishing impact forces on the retention members in the event of an accident is reduced. (author)

  10. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  11. Cheboygan Vessel Base

    Data.gov (United States)

    Federal Laboratory Consortium — Cheboygan Vessel Base (CVB), located in Cheboygan, Michigan, is a field station of the USGS Great Lakes Science Center (GLSC). CVB was established by congressional...

  12. High Performance Marine Vessels

    CERN Document Server

    Yun, Liang

    2012-01-01

    High Performance Marine Vessels (HPMVs) range from the Fast Ferries to the latest high speed Navy Craft, including competition power boats and hydroplanes, hydrofoils, hovercraft, catamarans and other multi-hull craft. High Performance Marine Vessels covers the main concepts of HPMVs and discusses historical background, design features, services that have been successful and not so successful, and some sample data of the range of HPMVs to date. Included is a comparison of all HPMVs craft and the differences between them and descriptions of performance (hydrodynamics and aerodynamics). Readers will find a comprehensive overview of the design, development and building of HPMVs. In summary, this book: Focuses on technology at the aero-marine interface Covers the full range of high performance marine vessel concepts Explains the historical development of various HPMVs Discusses ferries, racing and pleasure craft, as well as utility and military missions High Performance Marine Vessels is an ideal book for student...

  13. 2011 Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  14. 2011 Fishing Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  15. Pressurized Vessel Slurry Pumping

    International Nuclear Information System (INIS)

    Pound, C.R.

    2001-01-01

    This report summarizes testing of an alternate ''pressurized vessel slurry pumping'' apparatus. The principle is similar to rural domestic water systems and ''acid eggs'' used in chemical laboratories in that material is extruded by displacement with compressed air

  16. 2013 Tanker Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  17. Maury Journals - US Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — U.S. vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  18. Coastal Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains catch (landed catch) and effort for fishing trips made by vessels that have been issued a Federal permit for the Gulf of Mexico reef fish,...

  19. In-vessel tritium

    International Nuclear Information System (INIS)

    Ueda, Yoshio; Ohya, Kaoru; Ashikawa, Naoko; Ito, Atsushi M.; Kato, Daiji; Kawamura, Gakushi; Takayama, Arimichi; Tomita, Yukihiro; Nakamura, Hiroaki; Ono, Tadayoshi; Kawashima, Hisato; Shimizu, Katsuhiro; Takizuka, Tomonori; Nakano, Tomohide; Nakamura, Makoto; Hoshino, Kazuo; Kenmotsu, Takahiro; Wada, Motoi; Saito, Seiki; Takagi, Ikuji; Tanaka, Yasunori; Tanabe, Tetsuo; Yoshida, Masafumi; Toma, Mitsunori; Hatayama, Akiyoshi; Homma, Yuki; Tolstikhina, Inga Yu.

    2012-01-01

    The in-vessel tritium research is closely related to the plasma-materials interaction. It deals with the edge-plasma-wall interaction, the wall erosion, transport and re-deposition of neutral particles and the effect of neutral particles on the fuel recycling. Since the in-vessel tritium shows a complex nonlinear behavior, there remain many unsolved problems. So far, behaviors of in-vessel tritium have been investigated by two groups A01 and A02. The A01 group performed experiments on accumulation and recovery of tritium in thermonuclear fusion reactors and the A02 group studied theory and simulation on the in-vessel tritium behavior. In the present article, outcomes of the research are reviewed. (author)

  20. Reactor pressure vessel support

    International Nuclear Information System (INIS)

    Butti, J.P.

    1977-01-01

    A link and pin support system provides the primary vertical and lateral support for a nuclear reactor pressure vessel without restricting thermally induced radial and vertical expansion and contraction. (Auth.)

  1. 2013 Cargo Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  2. 2013 Fishing Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  3. 2013 Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  4. Ocean Station Vessel

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Ocean Station Vessels (OSV) or Weather Ships captured atmospheric conditions while being stationed continuously in a single location. While While most of the...

  5. Vessel Sewage Discharges

    Science.gov (United States)

    Vessel sewage discharges are regulated under Section 312 of the Clean Water Act, which is jointly implemented by the EPA and Coast Guard. This homepage links to information on marine sanitation devices and no discharge zones.

  6. Reactor pressure vessel design

    International Nuclear Information System (INIS)

    Foehl, J.

    1998-01-01

    As a result of the popularity of the Agencies report 'Neutron Irradiation Embrittlement of Reactor Pressure Vessel Steels' of 1975, it was decided that another report on this broad subject would be of use. In this report, background and contemporary views on specially identified areas of the subject are considered as self-contained chapters, written by experts. In chapter 2, the general principles of reactor pressure vessel design are elaborated. Crack and fracture initiation and propagation are treated in some detail

  7. Graywater Discharges from Vessels

    Science.gov (United States)

    2011-11-01

    metals (e.g., cadmium, chromium, lead, copper , zinc, silver, nickel, and mercury), solids, and nutrients (USEPA, 2008b; USEPA 2010). Wastewater from... flotation ), and disinfection (using ultraviolet light) as compared to traditional Type II MSDs that use either simple maceration and chlorination, or...Coliform Naval Vessels Oceanographic Vessels Small Cruise Ships 25a Vendor 2 Hamann AG Biological Treatment with Dissolved Air Flotation and

  8. LANL Robotic Vessel Scanning

    Energy Technology Data Exchange (ETDEWEB)

    Webber, Nels W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-11-25

    Los Alamos National Laboratory in J-1 DARHT Operations Group uses 6ft spherical vessels to contain hazardous materials produced in a hydrodynamic experiment. These contaminated vessels must be analyzed by means of a worker entering the vessel to locate, measure, and document every penetration mark on the vessel. If the worker can be replaced by a highly automated robotic system with a high precision scanner, it will eliminate the risks to the worker and provide management with an accurate 3D model of the vessel presenting the existing damage with the flexibility to manipulate the model for better and more in-depth assessment.The project was successful in meeting the primary goal of installing an automated system which scanned a 6ft vessel with an elapsed time of 45 minutes. This robotic system reduces the total time for the original scope of work by 75 minutes and results in excellent data accumulation and transmission to the 3D model imaging program.

  9. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  10. FFTF and CRBRP reactor vessels

    International Nuclear Information System (INIS)

    Morgan, R.E.

    1977-01-01

    The Fast Flux Test Facility (FFTF) reactor vessel and the Clinch River Breeder Reactor Plant (CRBRP) reactor vessel each serve to enclose a fast spectrum reactor core, contain the sodium coolant, and provide support and positioning for the closure head and internal structure. Each vessel is located in its reactor cavity and is protected by a guard vessel which would ensure continued decay heat removal capability should a major system leak develop. Although the two plants have significantly different thermal power ratings, 400 megawatts for FFTF and 975 megawatts for CRBRP, the two reactor vessels are comparable in size, the CRBRP vessel being approximately 28% longer than the FFTF vessel. The FFTF vessel diameter was controlled by the space required for the three individual In-Vessel Handling Machines and Instrument Trees. Utilization of the triple rotating plug scheme for CRBRP refueling enables packaging of the larger CRBRP core in a vessel the same diameter as the FFTF vessel

  11. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  12. 46 CFR 10.214 - Security Check.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Security Check. 10.214 Section 10.214 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MERCHANT MARINER CREDENTIAL General Requirements for All Merchant Mariner Credentials § 10.214 Security Check. Until April 15, 2009...

  13. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  14. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  15. 12 CFR 563g.20 - Form for securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Form for securities sale report. 563g.20 Section 563g.20 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.20 Form for securities sale report. Office of Thrift Supervision, 1700 G Street, NW...

  16. 77 FR 9214 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-02-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... meeting of the National Security Education Board. The purpose of the meeting is to review and make... p.m. ADDRESSES: Defense Language and National Security Education Office, 1101 Wilson Boulevard...

  17. Assessment of the integrity of WWER type reactor pressure vessels

    International Nuclear Information System (INIS)

    Brumovsky, M.

    1995-01-01

    Procedures are given for the assessment of the residual lifetime of reactor pressure vessels with respect to a sudden failure, the lifetime of vessels with defects disclosed during in-service inspections, and the fatigue or corrosion-mechanical lifetime. Also outlined are the ways of assessing the effects of major degradation mechanisms, i.e. radiation embrittlement, thermal aging, and fatigue damage, including the use of calculated values and experimental examination, by means of surveillance specimens in particular. All results of assessment performed so far indicate that the life of reactor pressure vessels at the Dukovany, Jaslovske Bohunice, and Temelin nuclear power plants is well secured. 7 figs., 3 refs

  18. Passport officers' errors in face matching.

    Science.gov (United States)

    White, David; Kemp, Richard I; Jenkins, Rob; Matheson, Michael; Burton, A Mike

    2014-01-01

    Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of 'fraudulent' photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately--though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection.

  19. Passport officers' errors in face matching.

    Directory of Open Access Journals (Sweden)

    David White

    Full Text Available Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of 'fraudulent' photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately--though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection.

  20. Acrylic vessel cleaning tests

    International Nuclear Information System (INIS)

    Earle, D.; Hahn, R.L.; Boger, J.; Bonvin, E.

    1997-01-01

    The acrylic vessel as constructed is dirty. The dirt includes blue tape, Al tape, grease pencil, gemak, the glue or residue form these tapes, finger prints and dust of an unknown composition but probably mostly acrylic dust. This dirt has to be removed and once removed, the vessel has to be kept clean or at least to be easily cleanable at some future stage when access becomes much more difficult. The authors report on the results of a series of tests designed: (a) to prepare typical dirty samples of acrylic; (b) to remove dirt stuck to the acrylic surface; and (c) to measure the optical quality and Th concentration after cleaning. Specifications of the vessel call for very low levels of Th which could come from tape residues, the grease pencil, or other sources of dirt. This report does not address the concerns of how to keep the vessel clean after an initial cleaning and during the removal of the scaffolding. Alconox is recommended as the cleaner of choice. This acrylic vessel will be used in the Sudbury Neutrino Observatory

  1. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2010-05-19

    ..., VA 20598-6036 or [email protected] . For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0013] Privacy Act of..., Transportation Security Enforcement Record System, System of Records AGENCY: Privacy Office, DHS. ACTION: Notice...

  2. 33 CFR 96.370 - What are the requirements for vessels of countries not party to Chapter IX of SOLAS?

    Science.gov (United States)

    2010-07-01

    ... vessel, or self-propelled mobile offshore drilling unit of 500 gross tons or more, operated in U.S... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS How Will Safety Management Systems Be Certificated and...

  3. 46 CFR 2.01-50 - Persons other than crew on towing, oyster, or fishing steam vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Persons other than crew on towing, oyster, or fishing steam vessels. 2.01-50 Section 2.01-50 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES... than crew on towing, oyster, or fishing steam vessels. (a) A steam vessel engaged in towing, oyster...

  4. Back office to box office

    DEFF Research Database (Denmark)

    Haigh, Matthew

    Consider the representation of value in the organizations we rely on for our long retirements. Social security has been symbolized by private mechanisms such as the employment-related pension scheme, yet, reporting requirement would impute its fitness for financial trading. A scheme's financier...... of the pension scheme would challenge the most ardent advocate of agency theory; its market rationality enfeebles stewardship theory; while resource dependency and stakeholder analysis shrug off the complexity of substitutable interests. A dialectical reconstruction of network theory allows comprehension...

  5. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  6. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  7. Radioactive liquid containing vessel

    International Nuclear Information System (INIS)

    Sakurada, Tetsuo; Kawamura, Hironobu.

    1993-01-01

    Cooling jackets are coiled around the outer circumference of a container vessel, and the outer circumference thereof is covered with a surrounding plate. A liquid of good conductivity (for example, water) is filled between the cooling jackets and the surrounding plate. A radioactive liquid is supplied to the container vessel passing through a supply pipe and discharged passing through a discharge pipe. Cooling water at high pressure is passed through the cooling water jackets in order to remove the heat generated from the radioactive liquid. Since cooling water at high pressure is thus passed through the coiled pipes, the wall thickness of the container vessel and the cooling water jackets can be reduced, thereby enabling to reduce the cost. Further, even if the radioactive liquid is leaked, there is no worry of contaminating cooling water, to prevent contamination. (I.N.)

  8. 20 CFR 404.1212 - Police officers and firefighters.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Police officers and firefighters. 404.1212... May Be Covered § 404.1212 Police officers and firefighters. (a) General. For Social Security coverage purposes under section 218 of the Act, a police officer's or firefighter's position is any position so...

  9. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  10. Office of Child Care

    Science.gov (United States)

    ... for Children & Families Office of Child Care By Office Administration for Native Americans (ANA) Administration on Children, ... about the Child Care Rule > What is the Office of Child Care (OCC)? The Office of Child ...

  11. 78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-09-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), Office of the Secretary, DoD. ACTION: Meeting notice... committee working group meeting of the National Security Education Board will take place. DATES: Monday...

  12. Multi-Level Secure Local Area Network

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)

    2011-01-01

    Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...

  13. Pressure vessel integrity 1991

    International Nuclear Information System (INIS)

    Bhandari, S.; Doney, R.O.; McDonald, M.S.; Jones, D.P.; Wilson, W.K.; Pennell, W.E.

    1991-01-01

    This volume contains papers relating to the structural integrity assessment of pressure vessels and piping, with special emphasis on nuclear industry applications. The papers were prepared for technical sessions developed under the sponsorship of the ASME Pressure Vessels and Piping Division Committees for Codes and Standards, Computer Technology, Design and Analysis, and Materials Fabrication. They were presented at the 1991 Pressure Vessels and Piping Division Conference in San Diego, California, June 23-27. The primary objective of the sponsoring organization is to provide a forum for the dissemination and discussion of information on development and application of technology for the structural integrity assessment of pressure vessels and piping. This publication includes contributions from authors from Australia, France, Japan, Sweden, Switzerland, the United Kingdom, and the United States. The papers here are organized in six sections, each with a particular emphasis as indicated in the following section titles: Fracture Technology Status and Application Experience; Crack Initiation, Propagation and Arrest; Ductile Tearing; Constraint, Stress State, and Local-Brittle-Zones Effects; Computational Techniques for Fracture and Corrosion Fatigue; and Codes and Standards for Fatigue, Fracture and Erosion/Corrosion

  14. The reactor vessel steels

    International Nuclear Information System (INIS)

    Bilous, W.; Hajewska, E.; Szteke, W.; Przyborska, M.; Wasiak, J.; Wieczorkowski, M.

    2005-01-01

    In the paper the fundamental steels using in the construction of pressure vessel water reactor are discussed. The properties of these steels as well as the influence of neutron irradiation on its degradation in the time of exploitation are also done. (authors)

  15. Vacuum distilling vessel

    Energy Technology Data Exchange (ETDEWEB)

    Reik, H

    1928-12-27

    Vacuum distilling vessel for mineral oil and the like, characterized by the ring-form or polyconal stiffeners arranged inside, suitably eccentric to the casing, being held at a distance from the casing by connecting members of such a height that in the resulting space if necessary can be arranged vapor-distributing pipes and a complete removal of the residue is possible.

  16. Visualization of vessel traffic

    NARCIS (Netherlands)

    Willems, C.M.E.

    2011-01-01

    Moving objects are captured in multivariate trajectories, often large data with multiple attributes. We focus on vessel traffic as a source of such data. Patterns appearing from visually analyzing attributes are used to explain why certain movements have occurred. In this research, we have developed

  17. GOLD PRESSURE VESSEL SEAL

    Science.gov (United States)

    Smith, A.E.

    1963-11-26

    An improved seal between the piston and die member of a piston-cylinder type pressure vessel is presented. A layer of gold, of sufficient thickness to provide an interference fit between the piston and die member, is plated on the contacting surface of at least one of the members. (AEC)

  18. Reactor vessel stud tensioner

    International Nuclear Information System (INIS)

    Malandra, L.J.; Beer, R.W.; Salton, R.B.; Spiegelman, S.R.; Cognevich, M.L.

    1982-01-01

    A quick-acting stud tensioner, for facilitating the loosening or tightening of a stud nut on a reactor vessel stud, has gripper jaws which when the tensioner is lowered into engagement with the upper end of the stud are moved inwards to grip the upper end and which when the tensioner is lifted move outward to release the upper end. (author)

  19. 8111/8116 Security Police Staff Officers 8121/8124 Security Police Officers AFSC: 81XX

    Science.gov (United States)

    1992-02-01

    c 6I4 .1 4 6 5 . 5 6 -6 0 m 0 60 . 0.. C afa 0 -6 0 1 0 .4 L 0 CL & f6 C 6.4 6%. 4 040E .~ ~ a 0 0.41.ft i 0 a 0w m a 2m 2 0 0. Mv 0U 4 0. L.~ 0 0ty...m ~ SC 6& Ct D0 CC Z~C)d Ř-66 64 I Ř.64C0 Ř E~ L 𔄀 6660 LO U64 W . .0 C 𔄀 -4 0L 6 0 L 1- 4 0ŘC C #.4 f6 ൶ 0 151 6W ~ )d6I.ILC E 11 .4 6.4...L - - R~ . ( *U # ACCa .4 % 40 a - 4- 1 4 4-L 0 *-46.40 50 a .40C CL 0 Ŕ 1 0. 0 OUUCC>CU.U0C4-LSa LC .CaC CW~ift-4C .4,4f L .4 -S(( a-..CA a COC *-. 4

  20. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  1. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  2. Report: Fiscal Year 2010 Federal Information Security Management Act Report

    Science.gov (United States)

    Report #11-P-0017, November 16, 2010. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2010 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  3. PDX vacuum vessel stress analysis

    International Nuclear Information System (INIS)

    Nikodem, Z.D.

    1975-01-01

    A stress analysis of PDX vacuum vessel is described and the summary of results is presented. The vacuum vessel is treated as a toroidal shell of revolution subjected to an internal vacuum. The critical buckling pressure is calculated. The effects of the geometrical discontinuity at the juncture of toroidal shell head and cylindrical outside wall, and the concavity of the cylindrical wall are examined. An effect of the poloidal field coil supports and the vessel outside supports on the stress distribution in the vacuum vessel is determined. A method evaluating the influence of circular ports in the vessel wall on the stress level in the vessel is outlined

  4. Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety

    Science.gov (United States)

    1998-05-01

    Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...

  5. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  6. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  7. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  8. Maritime Training Serbian Autonomous Vessel Protection Detachment

    Directory of Open Access Journals (Sweden)

    Šoškić Svetislav D.

    2014-06-01

    Full Text Available The crisis in Somalia has caused appearance of piracy at sea in the Gulf of Aden and the Western Indian Ocean. Somali pirates have become a threat to economic security of the world because almost 30 percent of world oil and 20 percent of global trade passes through the Gulf of Aden. Solving the problem of piracy in this part of the world have included international organizations, institutions, military alliances and the states, acting in accordance with international law and UN Security Council resolutions. The European Union will demonstrate the application of a comprehensive approach to solving the problem of piracy at sea and the crisis in Somalia conducting naval operation — EU NAVFOR Atalanta and operation EUTM under the Common Security and Defense Policy. The paper discusses approaches to solving the problem of piracy in the Gulf of Aden and the crisis in Somalia. Also, the paper points to the complexity of the crisis in Somalia and dilemmas correctness principles that are applied to solve the problem piracy at sea. One of goals is protections of vessels of the World Food Programme (WFP delivering food aid to displaced persons in Somalia. Republic of Serbia joined in this mission and trained and sent one a autonomous team in this military operation for protection WFP. This paper consist the problem of modern piracy, particularly in the area of the Horn of Africa became a real threat for the safety of maritime ships and educational process of Serbian Autonomous vessel protection detachment. Serbian Military Academy adopted and developed educational a training program against piracy applying all the provisions and recommendations of the IMO conventions and IMO model courses for Serbian Autonomous vessel protection detachment.

  9. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    Science.gov (United States)

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  10. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45... SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45 Information Security Program Review. (a) The Director, OSTP, shall require an annual formal review of the OSTP...

  11. 12 CFR 563g.19 - Approval of the security.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Approval of the security. 563g.19 Section 563g.19 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.19 Approval of the security. Any securities of a savings association which are not exempt under...

  12. 12 CFR 563g.12 - Securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Securities sale report. 563g.12 Section 563g.12 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.12 Securities sale report. (a) Within 30 days after the first sale of the securities, every six...

  13. 6 CFR 27.204 - Minimum concentration by security issue.

    Science.gov (United States)

    2010-01-01

    ... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...

  14. The office based CHIVA

    Directory of Open Access Journals (Sweden)

    Passariello F

    2013-09-01

    Full Text Available Fausto Passariello,1 Stefano Ermini,2 Massimo Cappelli,3 Roberto Delfrate,4 Claude Franceschi5 1Centro Diagnostico Aquarius, Napoli, Italy; 2Private Practice, Grassina, Italy; 3Private Practice, Firenze, Italy; 4Casa di Cure Figlie di Maria, Cremona, Italy; 5Hospital St Joseph, Service d'Explorations Vasculaires, Paris, France Abstract: The cure Conservatrice Hémodynamique de l'Insuffisance Veineuse en Ambulatoire (CHIVA can be office based (OB. The OB-CHIVA protocol is aimed at transferring CHIVA procedures to specialists rooms. The protocol will check the feasibility of OB-CHIVA, data pertaining to recurrence, and will offer the opportunity to study saphenous femoral junction (SFJ stump evolution, the role of the washing vessels and the arch recanalization rate, and gather new data about the effect of the length of the treated saphenous vein. A simplified diagnostic procedure will allow an essential ultrasound examination of the venous net while a schematic and easily readable algorithm guides therapeutic choices. The Riobamba draining crossotomy (RDC tactic is composed of a set of OB procedures. While some of these procedures are, at the moment, only proposals, others are already applied. Devices generally used in ablative procedures such as Light Amplification by Stimulated Emission of Radiation (LASER, radio frequency, steam, and mechanical devices are used in this context to serve to conservative interventions for CHIVA. New techniques have also been proposed for devalvulation and tributary disconnection. Detailed follow-up is necessary in order to determine the effects of therapy and possible disease evolution. Finally, information is added about the informed consent and the ethical considerations of OB-CHIVA research. Keywords: CHIVA, office based procedures, LASER, RF, steam

  15. 46 CFR 190.07-90 - Vessels contracted for prior to March 1, 1968.

    Science.gov (United States)

    2010-10-01

    ... considered satisfactory so long as they are maintained in good condition to the satisfaction of the Officer in Charge, Marine Inspection. Minor repairs and alterations may be made to the same standards as the... VESSELS CONSTRUCTION AND ARRANGEMENT Structural Fire Protection § 190.07-90 Vessels contracted for prior...

  16. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  17. 76 FR 7757 - Hull Identification Numbers for Recreational Vessels

    Science.gov (United States)

    2011-02-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 181 [Docket No. USCG-2007-29236] Hull Identification Numbers for Recreational Vessels AGENCY: Coast Guard, DHS. ACTION: Follow-up to request for... expanded hull identification number (HIN). The Coast Guard's decision-making process included consideration...

  18. 77 FR 59575 - Hull Identification Numbers for Recreational Vessels

    Science.gov (United States)

    2012-09-28

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 181 [Docket No. USCG-2012-0843] Hull Identification Numbers for Recreational Vessels AGENCY: Coast Guard, DHS. ACTION: Request for public comments... requirement to indicate a boat's model year as part of the 12-character Hull Identification Number (HIN...

  19. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Science.gov (United States)

    2010-08-16

    ... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security... Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... System Operator Security Information. Type of Request: New collection. OMB Control Number: Not yet...

  20. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  1. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  2. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  3. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  4. 76 FR 51358 - National Nuclear Security Administration Amended Record of Decision: Disposition of Surplus...

    Science.gov (United States)

    2011-08-18

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Amended Record of Decision... National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of... Manager, Office of Fissile Materials Disposition, National Nuclear Security Administration, U.S...

  5. US statutes for enforcement by security inspectors

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  6. Vessels in Transit - Web Tool

    Data.gov (United States)

    Department of Transportation — A web tool that provides real-time information on vessels transiting the Saint Lawrence Seaway. Visitors may sort by order of turn, vessel name, or last location in...

  7. Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course

    Directory of Open Access Journals (Sweden)

    Marcin Zyczkowski

    2017-06-01

    Full Text Available In this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that we can obtain quite acceptable results.

  8. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  9. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  10. 46 CFR 178.340 - Stability standards for pontoon vessels on protected waters.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Stability standards for pontoon vessels on protected waters. 178.340 Section 178.340 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL....340 Stability standards for pontoon vessels on protected waters. (a) The portion of the deck...

  11. 46 CFR 42.09-35 - Additional survey requirements for wood-hull vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Additional survey requirements for wood-hull vessels. 42.09-35 Section 42.09-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) LOAD LINES... Additional survey requirements for wood-hull vessels. (a) In addition to the requirements in § 42.09-25, the...

  12. 46 CFR 180.204 - Survival craft-vessels operating on coastwise routes.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Survival craft-vessels operating on coastwise routes. 180.204 Section 180.204 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL... Craft § 180.204 Survival craft—vessels operating on coastwise routes. (a) Except as allowed by paragraph...

  13. 78 FR 47716 - Final Guidance Regarding Voluntary Inspection of Vessels for Compliance With the Maritime Labour...

    Science.gov (United States)

    2013-08-06

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-1066] Final Guidance Regarding Voluntary Inspection of Vessels for Compliance With the Maritime Labour Convention, 2006 AGENCY: Coast Guard... procedures regarding the inspection of U.S. vessels for voluntary compliance with the Maritime Labour...

  14. Reactor vessel sealing plug

    International Nuclear Information System (INIS)

    Dooley, R.A.

    1986-01-01

    An apparatus is described for sealing a cold leg nozzle of a nuclear reactor pressure vessel from a remote location comprising: at least one sealing plug for mechanically sealing the nozzle from the inside of the reactor pressure vessel. The sealing plug includes a plate and a cone assembly having an end part receptive in the nozzle, the plate being axially moveable relative to the cone assembly. The plate and cone assembly have confronting bevelled edges defining an opening therebetween. A primary O-ring is disposed about the opening and is supported on the bevelled edges, the plate being guidably mounted to the cone assembly for movement toward the cone assembly to radially expand the primary O-ring into sealing engagement with the nozzle. A means is included for providing relative movement between the outer plate and the cone assembly

  15. Mobile nuclear reactor containment vessel

    International Nuclear Information System (INIS)

    Thompson, R.E.; Spurrier, F.R.; Jones, A.R.

    1978-01-01

    A containment vessel for use in mobile nuclear reactor installations is described. The containment vessel completely surrounds the entire primary system, and is located as close to the reactor primary system components as is possible in order to minimize weight. In addition to being designed to withstand a specified internal pressure, the containment vessel is also designed to maintain integrity as a containment vessel in case of a possible collision accident

  16. Nuclear reactor vessel inspection apparatus

    International Nuclear Information System (INIS)

    Blackstone, E.G.; Lofy, R.A.; Williams, L.P.

    1979-01-01

    Apparatus for the in situ inspection of a nuclear reactor vessel to detect the location and character of flaws in the walls of the vessel, in the welds joining the various sections of the vessel, in the welds joining attachments such as nozzles, elbows and the like to the reactor vessel and in such attachments wherein an inspection head carrying one or more ultrasonic transducers follows predetermined paths in scanning the various reactor sections, welds and attachments

  17. Reactor vessel stud closure system

    International Nuclear Information System (INIS)

    Spiegelman, S.R.; Salton, R.B.; Beer, R.W.; Malandra, L.J.; Cognevich, M.L.

    1982-01-01

    A quick-acting stud tensioner apparatus for enabling the loosening or tightening of a stud nut on a reactor vessel stud. The apparatus is adapted to engage the vessel stud by closing a gripper around an upper end of the vessel stud when the apparatus is seated on the stud. Upon lifting the apparatus, the gripper releases the vessel stud so that the apparatus can be removed

  18. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  19. Reactor pressure vessel steels

    International Nuclear Information System (INIS)

    Van De Velde, J.; Fabry, A.; Van Walle, E.; Chaouuadi, R.

    1998-01-01

    Research and development activities related to reactor pressure vessel steels during 1997 are reported. The objectives of activities of the Belgian Nuclear Research Centre SCK/CEN in this domain are: (1) to develop enhanced surveillance concepts by applying micromechanics and fracture-toughness tests to small specimens, and by performing damage modelling and microstructure characterization; (2) to demonstrate a methodology on a broad database; (3) to achieve regulatory acceptance and industrial use

  20. Reactor Pressure Vessel Steels

    Energy Technology Data Exchange (ETDEWEB)

    Van de Velde, J.; Fabry, A.; Van Walle, E.; Chaoudi, R

    1998-07-01

    SCK-CEN's R and D programme on Reactor Pressure Vessel (RPV) Steels in performed in support of the RVP integrity assessment. Its main objectives are: (1) to develop enhanced surveillance concepts by applying micromechanics and fracture-toughness tests to small specimens, and by performing damage modelling and microstructure characterization; (2) to demonstrate the applied methodology on a broad database; (3) to achieve regulatory acceptance and industrial use. Progress and achievements in 1999 are reported.

  1. Phenomenological vessel burst investigations

    International Nuclear Information System (INIS)

    Hippelein, K.W.; Julisch, P.; Muz, J.; Schiedermaier, J.

    1985-07-01

    Fourteen burst experiments have been carried out using vessels with circumferential and longitudinal flaws, for investigation of the fracture behaviour, i.e. the time-related fracture opening. The vessels had dimensions (outer diameter x wall thickness = 800 x 47 mm) which correspond to the dimensions of the main coolant piping of a 1300 MW e PWR. The test specimens had been made of the base-safe material 20 MnMoNi 55 and of a special, 22 NiMoCr 37 base alloy. The experimental conditions with regard to pressure and temperature have been chosen so as to correspond to normal operating conditions of a PWR (p∝17.5 MPa, T∝300 0 C), i.e. the flaws have been so dimensioned that failure was to be expected at a pressure of p∝17.5 MPa. As a rule, water has been used as the pressure medium, or in some cases air, in order to influence the time-dependent pressure decrease. Fluid and structural dynamics calculations have also been made. In order to determine the impact of a fast propagating crack on the leak-to-fracture curve, which normally is defined by quasistationary experiments, suitable tests have been made with large-volume, cylindrical vessels (outer diameter x wall thickness x length = 3000 x 21 x 14000 mm) made of the material WSt E 43. The leak-before-fracture criterion has been confirmed. (orig./HP) [de

  2. Blood Vessels in Allotransplantation.

    Science.gov (United States)

    Abrahimi, P; Liu, R; Pober, J S

    2015-07-01

    Human vascularized allografts are perfused through blood vessels composed of cells (endothelium, pericytes, and smooth muscle cells) that remain largely of graft origin and are thus subject to host alloimmune responses. Graft vessels must be healthy to maintain homeostatic functions including control of perfusion, maintenance of permselectivity, prevention of thrombosis, and participation in immune surveillance. Vascular cell injury can cause dysfunction that interferes with these processes. Graft vascular cells can be activated by mediators of innate and adaptive immunity to participate in graft inflammation contributing to both ischemia/reperfusion injury and allograft rejection. Different forms of rejection may affect graft vessels in different ways, ranging from thrombosis and neutrophilic inflammation in hyperacute rejection, to endothelialitis/intimal arteritis and fibrinoid necrosis in acute cell-mediated or antibody-mediated rejection, respectively, and to diffuse luminal stenosis in chronic rejection. While some current therapies targeting the host immune system do affect graft vascular cells, direct targeting of the graft vasculature may create new opportunities for preventing allograft injury and loss. © Copyright 2015 The American Society of Transplantation and the American Society of Transplant Surgeons.

  3. Ionizing radiations and blood vessels

    International Nuclear Information System (INIS)

    Vorob'ev, E.I.; Stepanov, R.P.

    1985-01-01

    Data on phenomenology of radiation-induced changes in blood vessels are systematized and authors' experience is generalized. Modern concepts about processes leading to vessel structure injury after irradiation is critically analyzed. Special attention is paid to reparation and compensation of X-ray vessel injury, consideration of which is not yet sufficiently elucidated in literature

  4. Ionizing radiations and blood vessels

    International Nuclear Information System (INIS)

    Vorob'ev, E.I.; Stepanov, R.P.

    1985-01-01

    Data on phenomeology of radiation changes of blood vessels are systemized and the authors' experience is generalyzed. A critical analysis of modern conceptions on processes resulting in vessel structure damage after irradiation, is given. Special attention is paid to reparation and compensation of radiation injury of vessels

  5. Maritime Security Fleet: Factors to Consider before Deciding to Select Participants Competitively

    National Research Council Canada - National Science Library

    1997-01-01

    The Maritime Security Act established the Maritime Security Fleet (MSF) program, authorizing MARAD to enter into agreements with maritime shipping companies to provide DOD access to commercial vessels operating under U.S...

  6. The Impact of Leadership Styles and Knowledge Sharing on Police Officers' Willingness to Exert Extra Effort to Provide Better Security: A Study in the Riot Unit of the Turkish National Police

    Science.gov (United States)

    Tombul, Fatih

    2011-01-01

    The motivation for this study is to understand the factors affecting police officers' willingness to exert extra effort for providing better service through knowledge sharing in different working environments such as riots. Since managers' leadership styles may be important factors affecting subordinates' willingness to exert extra effort, this…

  7. Weatherization and Intergovernmental Programs Office Fact Sheet

    Energy Technology Data Exchange (ETDEWEB)

    None

    2018-02-01

    One of the Department of Energy’s (DOE) primary forums for helping state and local governments implement costeffective and productive energy systems for American homes, communities, businesses, and industries is the Weatherization and Intergovernmental Programs Office (WIP). WIP is part of DOE’s Office of Energy Efficiency and Renewable Energy’s “all of the above” national energy strategy to create greater energy affordability, security and resiliency.

  8. Device for supporting the vacuum vessel of a thermonuclear device

    International Nuclear Information System (INIS)

    Sato, Hiroshi.

    1980-01-01

    Purpose: To hold a vacuum vessel securely at a predetermined position. Constitution: A vacuum vessel is supported on its one side to the standard mounting location of a support frame by way of a pin junction. The vacuum vessel is provided at its upper and lower positions with movable mounting portions, which are connected by way of connecting rods to fixed mounting locations on the upper and lower frames. The fixed mounting locations are disposed on a vertical plane including the axis of the torus center. This arrangement enables to hold even a large vacuum vessel at an exact predetermined position even under high temperature conditions without limiting the container's thermal expansion relative to the changes in temperature, thereby providing an extremely high rigidity against electromagnetic forces, earthquakes, etc. (Furukawa, Y.)

  9. The Analysis of the Causes of Emergencies on the Vessels

    Directory of Open Access Journals (Sweden)

    Alicja Mrozowska

    2017-12-01

    Full Text Available The article discusses the results of research conducted on the vessels, covering a wide spectrum of issues relating to the exploitation of vessels of various flags, as well as operating security and safety systems on board. The main aim of the study was to collect numbers of data directly from the crew, for examples: indicate by the crew marine areas with the greatest probability of occurrence of casualties and incidents, trying to the definition the causes of their occurrence, prevention actions used on board and analyses operating safety systems used on the various type of vessels. The analysis of research became the basis to identify strengths and weaknesses areas of the vessel operation. The author proposes a solution to be implemented on board and emphasizes meaning of safety management system.

  10. Amplifying Security Education in the Laboratory

    National Research Council Canada - National Science Library

    Irvine, Cynthia

    1999-01-01

    Computer and network security have become concerns for enterprises ranging from sole proprietorships run from home offices to global corporations and government agencies with hundred of thousands of employees...

  11. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Office of Personnel Management (OPM). Additionally, due to the dynamic and evolving nature of the government's homeland security activities, some of our work described in this report has already appeared in congressional testimony...

  12. Spent nuclear fuel assembly storage vessel

    International Nuclear Information System (INIS)

    Yagishita, Takuya

    1998-01-01

    The vessel of the present invention promotes an effect of removing after heat of spent nuclear fuel assemblies so as not to give force to the storage vessel caused by expansion of heat removing partitioning plates. Namely, the vessel of the present invention comprises a cylinder body having closed upper and lower portions and a plurality of heat removing partitioning cylinders disposed each at a predetermined interval in the circumferential direction of the above-mentioned cylinder body. The heat removing partitioning cylinders comprises (1) first heat removing partitioning plates extended in the radial direction of the cylinder body and opposed at a predetermined gap in the circumferential direction of the cylinder body, and having the base ends on the side of the inner wall of the cylinder body being secured to the inner wall of the cylinder body and (2) a second heat removing plate for connecting the top ends of both opposed heat removing partitioning plates on the central side of the cylinder body with each other. Spent nuclear fuel assemblies are contained in a plurality of closed spaces surrounded by the first heat removing partitioning plates and the second heat removing partitioning plate. With such constitution, since after heat is partially transferred from the heat removing partitioning plates to the cylindrical body directly by heat conduction, the heat removing effect can be promoted compared with the prior art. (I.S.)

  13. Pressure vessel lid

    International Nuclear Information System (INIS)

    Schoening, J.; Elter, C.; Becker, G.; Pertiller, S.

    1986-01-01

    The invention concerns a lid for closing openings in reactor pressure vessels containing helium, which is made as a circular casting with hollow spaces and a flat floor and is set on the opening and kept down. It consists of helium-tight metal cast material with sufficient temperature resistance. There are at least two concentric heat resistant seals let into the bottom of the lid. The bottom is in immediate contact with the container atmosphere and has hollow spaces in its inside in the area opposite to the opening. (orig./HP) [de

  14. [Small vessel cerebrovascular disease].

    Science.gov (United States)

    Cardona Portela, P; Escrig Avellaneda, A

    2018-05-09

    Small vessel vascular disease is a spectrum of different conditions that includes lacunar infarction, alteration of deep white matter, or microbleeds. Hypertension is the main risk factor, although the atherothrombotic lesion may be present, particularly in large-sized lacunar infarctions along with other vascular risk factors. MRI findings are characteristic and the lesions authentic biomarkers that allow differentiating the value of risk factors and defining their prognostic value. Copyright © 2018 SEH-LELHA. Publicado por Elsevier España, S.L.U. All rights reserved.

  15. 75 FR 67989 - Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure...

    Science.gov (United States)

    2010-11-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0084] Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure Protection Stakeholder Input Project--Generic... comments; New Information Collection Request: 1670-NEW. SUMMARY: The Department of Homeland Security...

  16. 12 CFR 1700.2 - Organization of the Office of Federal Housing Enterprise Oversight.

    Science.gov (United States)

    2010-01-01

    ... regulatory issues, securities and corporate law principles, and administrative and general legal matters... developments in Enterprise activities, housing finance and financial regulation. The Office also prepares data...

  17. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  18. 49 CFR 1544.221 - Carriage of prisoners under the control of armed law enforcement officers.

    Science.gov (United States)

    2010-10-01

    ... Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.221 Carriage... custody of an armed law enforcement officer aboard an aircraft for which screening is required unless, in...

  19. An automated vessel segmentation of retinal images using multiscale vesselness

    International Nuclear Information System (INIS)

    Ben Abdallah, M.; Malek, J.; Tourki, R.; Krissian, K.

    2011-01-01

    The ocular fundus image can provide information on pathological changes caused by local ocular diseases and early signs of certain systemic diseases, such as diabetes and hypertension. Automated analysis and interpretation of fundus images has become a necessary and important diagnostic procedure in ophthalmology. The extraction of blood vessels from retinal images is an important and challenging task in medical analysis and diagnosis. In this paper, we introduce an implementation of the anisotropic diffusion which allows reducing the noise and better preserving small structures like vessels in 2D images. A vessel detection filter, based on a multi-scale vesselness function, is then applied to enhance vascular structures.

  20. Hearing Office Dispositions Per ALJ Per Day Rate Ranking Report

    Data.gov (United States)

    Social Security Administration — A ranking of ODAR hearing offices by the average number of hearings dispositions per ALJ per day. The average shown will be a combined average for all ALJs working...

  1. Office of Child Support and Enforcement (OCSE) State Wage Alerts

    Data.gov (United States)

    Social Security Administration — The OCSE State Wage Alert is a quarterly match which detects SSI overpayments by identifying unreported wage and unemployment data provided to the Office of Child...

  2. Professionalization of the Senior Chinese Officer Corps Trends and Implications

    National Research Council Canada - National Science Library

    Mulvenon, James

    1997-01-01

    ... consequences for longer-term U.S. national security interests. Specifically, this report evaluates demographic and cohort changes in the officer corps of the Chinese People's Liberation Army (PLA...

  3. Renovation of the sealing planes of WWER-400 reactors pressure vessel

    International Nuclear Information System (INIS)

    Jablonicky, P.; Pilat, P.

    2007-01-01

    An article describes technical solution for renovation of the sealing planes of WWER-440 reactor's pressure vessel. Four nickel sealing rings placed in four concentric grooves are providing hermetic sealing between the vessel and the lid of this type of the reactor. Impeccable seal of the reactor's pressure vessel, where the fission reaction takes place, represents a basic security factor for safe electric energy production. Principle of renovation of the reactor's pressure vessel and lid sealing planes is based on mechanical enlargement of defective grooves and following cladding of the new material by TIG welding. Final step for renovation includes machining of new grooves according to geometrical and surface quality requirements (Authors)

  4. Efficient Vessel Tracking  with Accuracy Guarantees

    DEFF Research Database (Denmark)

    Redoutey, Martin; Scotti, Eric; Jensen, Christian Søndergaard

    2008-01-01

    Safety and security are top concerns in maritime navigation, particularly as maritime traffic continues to grow and as crew sizes are reduced. The Automatic Identification System (AIS) plays a key role in regard to these concerns. This system, whose objective is in part to identify and locate ves...... accuracies at lower communication costs. The techniques employ movement predictions that are shared between vessels and the VTS. Empirical studies with a prototype implementation and real vessel data demonstrate that the techniques are capable of significantly improving the AIS....

  5. 46 CFR 35.25-5 - Repairs of boilers and unfired pressure vessels and reports of repairs or accidents by chief...

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Repairs of boilers and unfired pressure vessels and..., DEPARTMENT OF HOMELAND SECURITY TANK VESSELS OPERATIONS Engine Department § 35.25-5 Repairs of boilers and... any repairs to boilers or unfired pressure vessels, the chief engineer shall submit a report covering...

  6. 46 CFR 32.50-25 - Cargo pumps and piping on tank vessels constructed prior to November 10, 1936-TB/ALL.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Cargo pumps and piping on tank vessels constructed prior... SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL REQUIREMENTS Pumps, Piping, and Hose for Cargo Handling § 32.50-25 Cargo pumps and piping on tank vessels constructed prior to November 10, 1936—TB/ALL...

  7. Fermilab Education Office - FAQ

    Science.gov (United States)

    Search The Education Office FAQ - Frequently Asked Questions Click on the question to see the answer and the difference between the Education Office and the Lederman Science Center? The Education Office is store selling logo items and science toys. The Education Office staff works on both the 15th floor of

  8. Targeting Therapy Resistant Tumor Vessels

    Science.gov (United States)

    2008-08-01

    Morris LS. Hysterectomy vs. resectoscopic endometrial ablation for the control of abnormal uterine bleeding . A cost-comparative study. J Reprod Med 1994;39...after the antibody treatment contain a pericyte coat, vessel architecture is normal, the diameter of the vessels is smaller (dilated, abnormal vessels...involvement of proteases from inflammatory mast cells and functionally abnormal (Carmeliet and Jain, 2000; Pasqualini (Coussens et al., 1999) and other bone

  9. The vessel fluence; Fluence cuve

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This book presents the proceedings of the technical meeting on the reactors vessels fluence. They are grouped in eight sessions: the industrial context and the stakes of the vessels control; the organization and the methodology for the fluence computation; the concerned physical properties; the reference computation methods; the fluence monitoring in an industrial context; vessels monitoring under irradiation; others methods in the world; the research and development programs. (A.L.B.)

  10. 6 CFR 27.245 - Review and approval of site security plans.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  11. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Science.gov (United States)

    2010-01-01

    ... chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information regarding security risk for a chemical facility. (a) Information to determine security risk. In order to...

  12. 6 CFR 27.240 - Review and approval of security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of security vulnerability assessments. 27.240 Section 27.240 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval...

  13. Office 365 For Dummies

    CERN Document Server

    Withee, Ken

    2012-01-01

    The information you need to create a virtual office that can be accessed anywhere Microsoft Office 365 is a revolutionary technology that allows individuals and companies of all sizes to create and maintain a virtual office in the cloud. Featuring familiar Office Professional applications, web apps, Exchange Online, and Lync Online, Office 365 offers business professionals added flexibility and an easy way to work on the go. This friendly guide explains the cloud, how Office 365 takes advantage of it, how to use the various components, and the many possibilities offered by Office 365. It provi

  14. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  15. Americium behaviour in plastic vessels

    International Nuclear Information System (INIS)

    Legarda, F.; Herranz, M.; Idoeta, R.; Abelairas, A.

    2010-01-01

    The adsorption of 241 Am dissolved in water in different plastic storage vessels was determined. Three different plastics were investigated with natural and distilled waters and the retention of 241 Am by these plastics was studied. The same was done by varying vessel agitation time, vessel agitation speed, surface/volume ratio of water in the vessels and water pH. Adsorptions were measured to be between 0% and 70%. The adsorption of 241 Am is minimized with no water agitation, with PET or PVC plastics, and by water acidification.

  16. Americium behaviour in plastic vessels

    Energy Technology Data Exchange (ETDEWEB)

    Legarda, F.; Herranz, M. [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain); Idoeta, R., E-mail: raquel.idoeta@ehu.e [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain); Abelairas, A. [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain)

    2010-07-15

    The adsorption of {sup 241}Am dissolved in water in different plastic storage vessels was determined. Three different plastics were investigated with natural and distilled waters and the retention of {sup 241}Am by these plastics was studied. The same was done by varying vessel agitation time, vessel agitation speed, surface/volume ratio of water in the vessels and water pH. Adsorptions were measured to be between 0% and 70%. The adsorption of {sup 241}Am is minimized with no water agitation, with PET or PVC plastics, and by water acidification.

  17. Americium behaviour in plastic vessels.

    Science.gov (United States)

    Legarda, F; Herranz, M; Idoeta, R; Abelairas, A

    2010-01-01

    The adsorption of (241)Am dissolved in water in different plastic storage vessels was determined. Three different plastics were investigated with natural and distilled waters and the retention of (241)Am by these plastics was studied. The same was done by varying vessel agitation time, vessel agitation speed, surface/volume ratio of water in the vessels and water pH. Adsorptions were measured to be between 0% and 70%. The adsorption of (241)Am is minimized with no water agitation, with PET or PVC plastics, and by water acidification. Copyright 2009 Elsevier Ltd. All rights reserved.

  18. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  19. [Large vessel vasculitides].

    Science.gov (United States)

    Morović-Vergles, Jadranka; Puksić, Silva; Gracanin, Ana Gudelj

    2013-01-01

    Large vessel vasculitis includes Giant cell arteritis and Takayasu arteritis. Giant cell arteritis is the most common form of vasculitis affect patients aged 50 years or over. The diagnosis should be considered in older patients who present with new onset of headache, visual disturbance, polymyalgia rheumatica and/or fever unknown cause. Glucocorticoides remain the cornerstone of therapy. Takayasu arteritis is a chronic panarteritis of the aorta ant its major branches presenting commonly in young ages. Although all large arteries can be affected, the aorta, subclavian and carotid arteries are most commonly involved. The most common symptoms included upper extremity claudication, hypertension, pain over the carotid arteries (carotidynia), dizziness and visual disturbances. Early diagnosis and treatment has improved the outcome in patients with TA.

  20. Reactor pressure vessel embrittlement

    International Nuclear Information System (INIS)

    1992-07-01

    Within the framework of the IAEA extrabudgetary programme on the Safety of WWER-440/230 NPPs, a list of safety issues requiring broad studies of generic interest have been agreed upon by an Advisory Group who met in Vienna in September 1990. The list was later revised in the light of the programme findings. The information on the status of the issues, and on the amount of work already completed and under way in the various countries, needs to be compiled. Moreover, an evaluation of what further work is required to resolve each one of the issues is also necessary. In view of this, the IAEA has started the preparation of a series of status reports on the various issues. This report on the generic safety issue ''Reactor Pressure Vessel Embrittlement'' presents a comprehensive survey of technical information available in the field and identifies those aspects which require further investigation. 39 refs, 21 figs, 4 tabs

  1. Reactor containment vessel

    International Nuclear Information System (INIS)

    Ochiai, Kanehiro; Hayagumo, Sunao; Morikawa, Matsuo.

    1981-01-01

    Purpose: To safety and simplify the structure in a reactor containment vessel. Constitution: Steam flow channels with steam jetting ports communicating to coolants are provided between a communication channel and coolants in a pressure suppression chamber. Upon loss of coolant accidents, pressure in a dry well will increase, then force downwards water in an annulus portion and further flow out the water through steam jetting ports into a suppression pool. Thus, the steam flow channel is filled with steams or airs present in the dry well, which are released through the steam jetting ports into the pressure suppression chamber. Even though water is violently vibrated owing to the upward movement of air bubbles and condensation of steam bubbles, the annular portion and the steam jetting ports are filled with steams or the like, direct dynamic loads onto the structures such as communication channels can be avoided. (J.P.N.)

  2. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    Science.gov (United States)

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  3. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  4. The Land Component Role in Maritime Security

    Science.gov (United States)

    2016-12-31

    nations for resources. They must also confront maritime threats, which include piracy , armed robbery, damage to the marine environment (i.e. pollution...such as an armed attack from a military vessel. Most definitions also usually include security from crimes at sea, such as piracy , armed robbery...security through stability operations, one must accept that any effective government must focus on basic governmental functions – providing for the

  5. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  6. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  7. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  8. 19 CFR 12.62 - Enforcement; duties of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Enforcement; duties of Customs officers. 12.62 Section 12.62 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...; duties of Customs officers. (a) In accordance with the authority contained in sections 10 and 12 of the...

  9. 19 CFR 101.2 - Authority of Customs officers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Authority of Customs officers. 101.2 Section 101.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL PROVISIONS § 101.2 Authority of Customs officers. (a) Supremacy of delegated authority...

  10. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    Science.gov (United States)

    2012-01-01

    tenfold to account for uninsured and other costs unaccounted for, the result would be in the low billions of dollars rather than tens of billions...Aviation Security GAO—See U.S. Government Accountability Office or, prior to 2004, U.S. General Accounting Office. Ghylin, K. M., C. G . Drury , and A...outweigh their costs . This document seeks to contribute to the national debate on avia- tion security by examining a set of issues that are either

  11. 20 CFR 416.1443 - Responsibilities of the adjudication officer.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Responsibilities of the adjudication officer. 416.1443 Section 416.1443 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... disagreement and refer the claim to the administrative law judge for further proceedings. At this point, the...

  12. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  13. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  14. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  15. Twilight Policing. Private Security in Durban, South Africa

    NARCIS (Netherlands)

    Diphoorn, T.G.

    2013-01-01

    This ethnography analyses the everyday policing practices of armed response officers in Durban, South Africa. Armed response officers are private security officers who patrol communities in vehicles and respond to distress calls from clients. This study considers their interactions with other

  16. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Science.gov (United States)

    2010-03-10

    ... 20472. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management Agency System of Records AGENCY: Privacy Office...

  17. Pressure vessel for nuclear reactors

    International Nuclear Information System (INIS)

    1975-01-01

    The invention applies to a pressure vessel for nuclear reactors whose shell, made of cast metal segments, has a steel liner. This liner must be constructed to withstand all operational stresses and to be easily repairable. The invention solves this problem by installing the liner at a certain distance from the inner wall of the pressure vessel shell and by filling this clearance with supporting concrete. Both the concrete and the steel liner must have a lower prestress than the pressure vessel shell. In order to avoid damage to the liner when prestressing the pressure vessel shell, special connecting elements are provided which consist of welded-on fastening elements projecting into recesses in the cast metal segments of the pressure vessel. Their design is described in detail. (TK) [de

  18. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  19. 48 CFR 1339.107-70 - Information security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information security. 1339... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... coordinate with the designated Contracting Officer Representative (COR) to complete the Information Security...

  20. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...

  1. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  2. 76 FR 15368 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-03-21

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures... concerning the following information collection. Title of Proposal: Minimum Security Devices and Procedures... security devices and procedures to discourage robberies, burglaries, and larcenies, and to assist in the...

  3. 76 FR 30243 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-05-24

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures.... Title of Proposal: Minimum Security Devices and Procedures. OMB Number: 1550-0062. Form Number: N/A... respect to the installation, maintenance, and operation of security devices and procedures to discourage...

  4. 4 CFR 83.9 - Social Security number.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Social Security number. 83.9 Section 83.9 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PRIVACY PROCEDURES FOR PERSONNEL RECORDS § 83.9 Social Security number. (a) GAO may not require individuals to disclose their Social Security Number (SSN) unless...

  5. 76 FR 28960 - National Security Education Board Members Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  6. 77 FR 49439 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-08-16

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Secretary of Defense concerning requirements established by the David L. Boren National Security Education...

  7. 77 FR 27739 - National Security Education Board Members Meeting

    Science.gov (United States)

    2012-05-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting...: Pursuant to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act, Title...

  8. 15 CFR 4a.2 - Deputy Assistant Secretary for Security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Deputy Assistant Secretary for Security. 4a.2 Section 4a.2 Commerce and Foreign Trade Office of the Secretary of Commerce CLASSIFICATION... Security. The Deputy Assistant Secretary for Security (DAS) is responsible for implementing E.O. 12958 and...

  9. 12 CFR 208.61 - Bank security procedures.

    Science.gov (United States)

    2010-01-01

    ... procedures for opening and closing for business and for the safekeeping of all currency, negotiable...; the cost of the security devices; other security measures in effect at the banking office; and the... directors on the implementation, administration, and effectiveness of the security program. (e) Reserve...

  10. 77 FR 34029 - National Security Education Board Members Meeting; Cancellation of Meeting

    Science.gov (United States)

    2012-06-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... of the National Security Education Board. This meeting was to be held on June 20, 2012, from 8:30 a.m. to 2 p.m. at Defense Language and National Security Education Office, 1101 Wilson Boulevard, Suite...

  11. 75 FR 25844 - Federal Advisory Committee; National Security Education Board Members Meeting

    Science.gov (United States)

    2010-05-10

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; National Security... June 23, 2010, from 8 a.m. to 12:30 p.m. ADDRESSES: The meeting will be held at the National Security.... Kevin Gormley, Program Officer, National Security Education Program, 1101 Wilson Boulevard, Suite 1210...

  12. 78 FR 31525 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-05-24

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), DoD. ACTION: Meeting notice. SUMMARY: Under the... announces that the following Federal advisory committee meeting of the National Security Education Board...

  13. 78 FR 69861 - Privacy Act of 1974; Department of Homeland Security, Federal Emergency Management Agency...

    Science.gov (United States)

    2013-11-21

    ... Homeland Security, Washington, DC 20478. For privacy issues, please contact: Karen L. Neuman, (202) 343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [DHS-2013-0073] Privacy Act of 1974... Defense Executive Reserve System of Records AGENCY: Department of Homeland Security, Privacy Office...

  14. Repairing method for shroud in reactor pressure vessel

    International Nuclear Information System (INIS)

    Watanabe, Yusuke.

    1996-01-01

    The present invention provides a method of repairing a shroud disposed in a pressure vessel of a BWR type reactor. Namely, a baffle plate is disposed on the outer surface of the lower portion of the shroud supported by a shroud support of the pressure vessel. The baffle plate is connected with a lug for securing a shroud head bolt disposed on the outer surface of an upper portion of the shroud by reinforcing members. With such a constitution, when crackings are caused in the shroud, the development of the crackings can be prevented without losing the function of securing the shroud head bolt. Further, if a material having thermal expansion coefficient lower than that of austenite stainless steel is used for the material of the reinforcing member, clamping load to be applied upon attaching the auxiliary member can be reduced. As a result, operation for the attachment is facilitated. (I.S.)

  15. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  16. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  17. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  18. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  19. Containment vessel stability analysis

    International Nuclear Information System (INIS)

    Harstead, G.A.; Morris, N.F.; Unsal, A.I.

    1983-01-01

    The stability analysis for a steel containment shell is presented herein. The containment is a freestanding shell consisting of a vertical cylinder with a hemispherical dome. It is stiffened by large ring stiffeners and relatively small longitudinal stiffeners. The containment vessel is subjected to both static and dynamic loads which can cause buckling. These loads must be combined prior to their use in a stability analysis. The buckling loads were computed with the aid of the ASME Code case N-284 used in conjunction with general purpose computer codes and in-house programs. The equations contained in the Code case were used to compute the knockdown factors due to shell imperfections. After these knockdown factors were applied to the critical stress states determined by freezing the maximum dynamic stresses and combining them with other static stresses, a linear bifurcation analysis was carried out with the aid of the BOSOR4 program. Since the containment shell contained large penetrations, the Code case had to be supplemented by a local buckling analysis of the shell area surrounding the largest penetration. This analysis was carried out with the aid of the NASTRAN program. Although the factor of safety against buckling obtained in this analysis was satisfactory, it is claimed that the use of the Code case knockdown factors are unduly conservative when applied to the analysis of buckling around penetrations. (orig.)

  20. Pressure vessel design

    International Nuclear Information System (INIS)

    Annaratone, D.

    2007-01-01

    This book guides through general and fundamental problems of pressure vessel design. It moreover considers problems which seem to be of lower importance but which turn out to be crucial in the design phase. The basic approach is rigorously scientific with a complete theoretical development of the topics treated, but the analysis is always pushed so far as to offer concrete and precise calculation criteria that can be immediately applied to actual designs. This is accomplished through appropriate algorithms that lead to final equations or to characteristic parameters defined through mathematical equations. The first chapter describes how to achieve verification criteria, the second analyzes a few general problems, such as stresses of the membrane in revolution solids and edge effects. The third chapter deals with cylinders under pressure from the inside, while the fourth focuses on cylinders under pressure from the outside. The fifth chapter covers spheres, and the sixth is about all types of heads. Chapter seven discusses different components of particular shape as well as pipes, with special attention to flanges. The eighth chapter discusses the influence of holes, while the ninth is devoted to the influence of supports. Finally, chapter ten illustrates the fundamental criteria regarding fatigue analysis. Besides the unique approach to the entire work, original contributions can be found in most chapters, thanks to the author's numerous publications on the topic and to studies performed ad hoc for this book. (orig.)

  1. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  2. 46 CFR 11.522 - Service requirements for assistant engineer (limited oceans) of steam and/or motor vessels.

    Science.gov (United States)

    2010-10-01

    ... oceans) of steam and/or motor vessels. 11.522 Section 11.522 Shipping COAST GUARD, DEPARTMENT OF HOMELAND... Requirements for Engineer Officer § 11.522 Service requirements for assistant engineer (limited oceans) of... assistant engineer (limited oceans) of steam and/or motor vessels is three years of service in the...

  3. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  4. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  5. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  6. 33 CFR 165.1409 - Security Zones; Hawaii, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Hawaii, HI. 165... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1409 Security Zones; Hawaii..., Hawaii. All waters extending 100 yards in all directions from each large passenger vessel in Hilo Harbor...

  7. 49 CFR 176.4 - Port security and safety regulations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Port security and safety regulations. 176.4... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS REGULATIONS CARRIAGE BY VESSEL General § 176.4 Port security and safety regulations. (a) Each carrier, master, agent, and charterer of a...

  8. NOAA Workforce Management Office

    Science.gov (United States)

    Management Fellows (PMFs) Program Coordination Office - Leadership Development Program (PCO-LDP) Employee (NRAP) Presidential Management Fellows (PMFs) Program Coordination Office - Leadership Development ) NOAA Leadership Seminar (NLS) NOAA Rotational Assignment Program (NRAP) Presidential Management Fellows

  9. HUD's Local Office Directory

    Data.gov (United States)

    Department of Housing and Urban Development — HUD is organized in 10 Regions. Each Region is managed by a Regional Administrator, who also oversees the Regional Office. Each Field Office within a Region is...

  10. Storage vessel for containing radiation contaminated material

    International Nuclear Information System (INIS)

    Ogawa, Kazuya.

    1995-01-01

    A container pipe and an outer pipe are coaxially assembled integrally in a state where securing spacers are disposed between the container pipe and the outer pipe, and an annular flow channel is formed around the container pipe. Radiation contaminated material-containing body (glass solidified package) is contained in the container pipe. The container pipe and the outer pipe in an integrated state are suspended from a ceiling plug of a cell chamber of a storage vessel, and supporting devices are assembled between the pipes and a support structure. A shear/lug mechanism is used for the supporting devices. The combination of the shear/lug allows radial and vertical movement but restrict horizontal movement of the outer tube. The supporting devices are assembled while visually recognizing the state of the shear/lug mechanism between the outer pipe and the support mechanism. Accordingly, operationability upon assembling the container pipe and the outer pipe is improved. (I.N.)

  11. 46 CFR 32.20-1 - Equipment installations on vessels during World War II-TB/ALL.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Equipment installations on vessels during World War II-TB/ALL. 32.20-1 Section 32.20-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL REQUIREMENTS Equipment Installations § 32.20-1 Equipment installations on vessels during World War II—TB/ALL....

  12. PWR vessel flaw distribution development

    International Nuclear Information System (INIS)

    Rosinski, S.T.; Kennedy, E.L.; Foulds, J.R.; Kinsman, K.M.

    1990-01-01

    This paper reports on PWR pressure vessels which operate under NRC rules and regulatory guides intended to prevent failure of the vessels. Plants failing to meet the operating criteria specified under these rules and regulations are required to analytically demonstrate fitness for service in order to continue operation. The initial flaw size or distribution of initial vessel flaws is a key input to the required vessel integrity analyses. However, the flaw distribution assumed in the development of the NRC Regulations and recommended for the plant specific analyses is potentially over-conservative. This is because the distribution is based on the limited amount of vessel inspection data available at the time the criteria were being developed and does not take full advantage of the more recent and reliable domestic vessel inspection results. The U.S. Department of Energy is funding an effort through Sandia National Laboratories to investigate the possibility of developing a new flaw distribution based on the increased amount and improved reliability of domestic vessel inspection data. Results of Phase I of the program indicate that state-of-the-art NDE systems' capabilities are sufficient for development of a new flaw distribution that could ultimately provide life extension benefits over the presently required operating practice

  13. Nuclear reactor vessel decontamination systems

    International Nuclear Information System (INIS)

    McGuire, P. J.

    1985-01-01

    There is disclosed in the present application, a decontamination system for reactor vessels. The system is operatable without entry by personnel into the contaminated vessel before the decontamination operation is carried out and comprises an assembly which is introduced into the vertical cylindrical vessel of the typical boiling water reactor through the open top. The assembly includes a circular track which is centered by guideways permanently installed in the reactor vessel and the track guides opposed pairs of nozzles through which water under very high pressure is directed at the wall for progressively cutting and sweeping a tenacious radioactive coating as the nozzles are driven around the track in close proximity to the vessel wall. The whole assembly is hoisted to a level above the top of the vessel by a crane, outboard slides on the assembly brought into engagement with the permanent guideways and the assembly progressively lowered in the vessel as the decontamination operation progresses. The assembly also includes a low pressure nozzle which forms a spray umbrella above the high pressure nozzles to contain radioactive particles dislodged during the decontamination

  14. 33 CFR Appendix B to Part 155 - Determining and Evaluating Required Response Resources for Vessel Response Plans

    Science.gov (United States)

    2010-07-01

    ... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR VESSELS Pt. 155, App. B Appendix B to Part 155—Determining and... environment. For example, vessels moving from the ocean to a river port must identify appropriate equipment...

  15. 15 CFR 744.7 - Restrictions on certain exports to and for the use of certain foreign vessels or aircraft.

    Science.gov (United States)

    2010-01-01

    ... be registered in the case of a vessel or aircraft under construction, and (3) To the country... Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF... operating vessel or aircraft or one under construction, located in any port including a Canadian port...

  16. 76 FR 13111 - Compassionate Allowances for Autoimmune Disease, Office of the Commissioner; Hearing

    Science.gov (United States)

    2011-03-10

    [email protected] ; or Mail to Jamillah Jackson, Deputy Director, Office of Compassionate Allowances and....gov . You may also mail inquiries about this hearing to Jamillah Jackson, Deputy Director, Office of... Security--Disability Insurance; 96.006, Supplemental Security Income.) Dated: March 3, 2011. Michael J...

  17. 8 CFR 103.1 - Delegations of authority; designation of immigration officers.

    Science.gov (United States)

    2010-01-01

    ... immigration officers. 103.1 Section 103.1 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION... immigration officers. (a) Delegations of authority. Delegations of authority to perform functions and exercise authorities under the immigration laws may be made by the Secretary of Homeland Security as provided by § 2.1...

  18. Gammatography of thick lead vessels

    International Nuclear Information System (INIS)

    Raghunath, V.M.; Bhatnagar, P.K.; Sundaram, V.M.

    1979-01-01

    Radiography, scintillation and GM counting and dose measurements using ionisation chamber equipment are commonly used for detecting flaws/voids in materials. The first method is mostly used for steel vessels and to a lesser extent thin lead vessels also and is essentially qualitative. Dose measuring techniques are used for very thick and large lead vessels for which high strength radioactive sources are required, with its inherent handling problems. For vessels of intermediate thicknesses, it is ideal to use a small strength source and a GM or scintillation counter assembly. At the Reactor Research Centre, Kalpakkam, such a system was used for checking three lead vessels of thicknesses varying from 38mm to 65mm. The tolerances specified were +- 4% variation in lead thickness. The measurements also revealed the non concentricity of one vessel which had a thickness varying from 38mm to 44mm. The second vessel was patently non-concentric and the dimensional variation was truly reproduced in the measurements. A third vessel was fabricated with careful control of dimensions and the measurements exhibited good concentricity. Small deviations were observed, attributable to imperfect bondings between steel and lead. This technique has the following advantages: (a) weaker sources used result in less handling problems reducing the personnel exposures considerably; (b) the sensitivity of the instrument is quite good because of better statistics; (c) the time required for scanning a small vessel is more, but a judicious use of a scintillometer for initial fast scan will help in reducing the total scanning time; (d) this method can take advantage of the dimensional variations themselves to get the calibration and to estimate the deviations from specified tolerances. (auth.)

  19. Fermilab Education Office - Contacts

    Science.gov (United States)

    Search The Office of Education and Public Outreach: Contacts All telephone numbers require area code Presentations for Presenters 840-3094 Office of Education and Public Outreach Spencer Pasero spasero@fnal.gov Education Office 840-3076 Fermilab Friends for Science Education General Questions Susan Dahl sdahl@fnal.gov

  20. Fermilab Education Office - Physicists

    Science.gov (United States)

    on Education Server, but to take full advantage of all of this site's features, you should turn Custom Search Connect with the Fermilab Education Office! Facebook Fermilab Education Office Join these groups: Science Adventures Group Teacher Resource Center Group Twitter Fermilab Education Office For more

  1. Office Computers: Ergonomic Considerations.

    Science.gov (United States)

    Ganus, Susannah

    1984-01-01

    Each new report of the office automation market indicates technology is overrunning the office. The impacts of this technology are described and some ways to manage and physically "soften" the change to a computer-based office environment are suggested. (Author/MLW)

  2. BY FRUSTUM CONFINING VESSEL

    Directory of Open Access Journals (Sweden)

    Javad Khazaei

    2016-09-01

    Full Text Available Helical piles are environmentally friendly and economical deep foundations that, due to environmental considerations, are excellent additions to a variety of deep foundation alternatives available to the practitioner. Helical piles performance depends on soil properties, the pile geometry and soil-pile interaction. Helical piles can be a proper alternative in sensitive environmental sites if their bearing capacity is sufficient to support applied loads. The failure capacity of helical piles in this study was measured via an experimental research program that was carried out by Frustum Confining Vessel (FCV. FCV is a frustum chamber by approximately linear increase in vertical and lateral stresses along depth from top to bottom. Due to special geometry and applied bottom pressure, this apparatus is a proper choice to test small model piles which can simulate field stress conditions. Small scale helical piles are made with either single helix or more helixes and installed in fine grained sand with three various densities. Axial loading tests including compression and tension tests were performed to achieve pile ultimate capacity. The results indicate the helical piles behavior depends essentially on pile geometric characteristics, i.e. helix configuration and soil properties. According to the achievements, axial uplift capacity of helical model piles is about equal to usual steel model piles that have the helixes diameter. Helical pile compression bearing capacity is too sufficient to act as a medium pile, thus it can be substituted other piles in special geoenvironmental conditions. The bearing capacity also depends on spacing ratio, S/D, and helixes diameter.

  3. Vacuum vessel for thermonuclear device

    International Nuclear Information System (INIS)

    Hagiwara, Koji; Imura, Yasuya.

    1979-01-01

    Purpose: To provide constituted method for easily performing baking of vacuum vessel, using short-circuiting segments. Constitution: At the time of baking, one turn circuit is formed by the vacuum vessel and short-circuiting segments, and current transformer converting the one turn circuit into a secondary circuit by the primary coil and iron core is formed, and the vacuum vessel is Joule heated by an induction current from the primary coil. After completion of baking, the short-circuiting segments are removed. (Kamimura, M.)

  4. PWR vessel inspection performance improvements

    International Nuclear Information System (INIS)

    Blair Fairbrother, D.; Bodson, Francis

    1998-01-01

    A compact robot for ultrasonic inspection of reactor vessels has been developed that reduces setup logistics and schedule time for mandatory code inspections. Rather than installing a large structure to access the entire weld inspection area from its flange attachment, the compact robot examines welds in overlapping patches from a suction cup anchor to the shell wall. The compact robot size allows two robots to be operated in the vessel simultaneously. This significantly reduces the time required to complete the inspection. Experience to date indicates that time for vessel examinations can be reduced to fewer than four days. (author)

  5. Private Security Companies (PSCs) as a Piracy Countermeasure

    DEFF Research Database (Denmark)

    Struwe, Lars Bangert

    2012-01-01

    Private Security Companies (PSC) are a part of the Best Management Practice in the shipping industry. The ship owners are using PSCs to protect their vessels against pirates, but protection of the vessels is just a part of the services that PSCs can provide. The services can be divided in four main...... groups: (1) security intelligence, risk assessment and consulting; (2) security services; (3) crisis response; and (4) intervention. While the use of PSCs may offer some deterrent value, the potential costs of hiring these firms would appear to outweigh the benefits. The argument in this article...

  6. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  7. Special enclosure for a pressure vessel

    International Nuclear Information System (INIS)

    Wedellsborg, B.W.; Wedellsborg, U.W.

    1993-01-01

    A pressure vessel enclosure is described comprising a primary pressure vessel, a first pressure vessel containment assembly adapted to enclose said primary pressure vessel and be spaced apart therefrom, a first upper pressure vessel jacket adapted to enclose the upper half of said first pressure vessel containment assembly and be spaced apart therefrom, said upper pressure vessel jacket having an upper rim and a lower rim, each of said rims connected in a slidable relationship to the outer surface of said first pressure vessel containment assembly, mean for connecting in a sealable relationship said upper rim of said first upper pressure vessel jacket to the outer surface of said first pressure vessel containment assembly, means for connecting in a sealable relationship said lower rim of said first upper pressure vessel jacket to the outer surface of said first pressure vessel containment assembly, a first lower pressure vessel jacket adapted to enclose the lower half of said first pressure vessel containment assembly and be spaced apart therefrom, said lower pressure vessel jacket having an upper rim connected in a slidable relationship to the outer surface of said first pressure vessel containment assembly, and means for connecting in a sealable relationship said upper rim of said first lower pressure vessel jacket to the outer surface of said first pressure vessel containment assembly, a second upper pressure vessel jacket adapted to enclose said first upper pressure vessel jacket and be spaced apart therefrom, said second upper pressure vessel jacket having an upper rim and a lower rim, each of said rims adapted to slidably engage the outer surface of said first upper pressure vessel jacket, means for sealing said rims, a second lower pressure vessel jacket adapted to enclose said first lower pressure vessel jacket and be spaced apart therefrom

  8. Office 2013 simplified

    CERN Document Server

    Marmel, Elaine

    2013-01-01

    A basic introduction to learn Office 2013 quickly, easily, and in full color Office 2013 has new features and tools to master, and whether you're upgrading from an earlier version or using the Office applications for the first time, you'll appreciate this simplified approach. Offering a clear, visual style of learning, this book provides you with concise, step-by-step instructions and full-color screen shots that walk you through the applications in the Microsoft Office 2013 suite: Word, Excel, PowerPoint, Outlook, and Publisher.Shows you how to tackle dozens of Office 2013

  9. Office 2013 for dummies

    CERN Document Server

    Wang, Wallace

    2013-01-01

    Office 2013 For Dummies is the key to your brand new Office! Packed with straightforward, friendly instruction, this update to one of the bestselling Office books of all time gets you thoroughly up to speed and helps you learn how to take full advantage of the new features in Office 2013. After coverage of the fundamentals, you'll discover how to spice up your Word documents, edit Excel spreadsheets and create formulas, add pizazz to your PowerPoint presentation, and much more.Helps you harness the power of all five Office 2013 applications: Word, Excel, PowerPoint,

  10. Investigation of vessel exterior air cooling for a HLMC reactor

    International Nuclear Information System (INIS)

    Sienicki, J. J.; Spencer, B. W.

    2000-01-01

    The Secure Transportable Autonomous Reactor (STAR) concept under development at Argonne National Laboratory provides a small (300 MWt) reactor module for steam supply that incorporates design features to attain proliferation resistance, heightened passive safety, and improved cost competitiveness through extreme simplification. Examples are the achievement of 100%+ natural circulation heat removal from the low power density/low pressure drop ultra-long lifetime core and utilization of lead-bismuth eutectic (LBE) coolant enabling elimination of main coolant pumps as well as the need for an intermediate heat transport circuit. It is required to provide a passive means of removing decay heat and effecting reactor cooldown in the event that the normal steam generator heat sink, including its normal shutdown heat removal mode, is postulated to be unavailable. In the present approach, denoted as the Reactor Exterior Cooling System (RECS), passive decay heat removal is provided by cooling the outside of the containment/guard vessel with air. RECS is similar to the Reactor Vessel Auxiliary Cooling System (RVACS) incorporated into the PRISM design. However, to enhance the heat removal, RECS incorporates fins on the containment vessel exterior to enhance heat transfer to air as well as removable steel venetian conductors that provide a conduction heat transfer path across the reactor vessel-containment vessel gap to enhance heat transfer between the vessels. The objective of the present work is to investigate the effectiveness of air cooling in removing heat from the vessel and limiting the coolant temperature increase following a sudden complete loss of the steam generator heat sink

  11. 2013 West Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  12. 2011 West Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  13. 2013 Great Lakes Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  14. 2011 Great Lakes Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  15. 2011 East Coast Vessel Tracklines

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  16. Coastal Discard Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains data on the type and amount of marine resources that are discarded or interacted with by vessels that are selected to report to the Southeast...

  17. SC/OQ Vessel Database

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Data tables holding information for the Surf Clam/Ocean Quahog vessel and dealer/processor logbooks (negative and positive), as well as individual tag information...

  18. Vessel Permit System Data Set

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — GARFO issues federal fishing permits annually to owners of fishing vessels who fish in the Greater Atlantic region, as required by federal regulation. These permits...

  19. Reactor pressure vessel status report

    International Nuclear Information System (INIS)

    Strosnider, J.; Wichman, K.; Elliot, B.

    1994-12-01

    This report gives a brief description of the reactor pressure vessel (RPV), followed by a discussion of the radiation embrittlement of RPV beltline materials and the two indicators for measuring embrittlement, the end-of-license (EOL) reference temperature and the EOL upper-shelf energy. It also summarizes the GL 92-01 effort and presents, for all 37 boiling water reactor plants and 74 pressurized water reactor plants in the United States, the current status of compliance with regulatory requirements related to ensuring RPV integrity. The staff has evaluated the material data needed to predict neutron embrittlement of the reactor vessel beltline materials. These data will be stored in a computer database entitled the reactor vessel integrity database (RVID). This database will be updated annually to reflect the changes made by the licensees in future submittals and will be used by the NRC staff to assess the issues related to vessel structural integrity

  20. Reactor-vessel-sectioning demonstration

    International Nuclear Information System (INIS)

    Lundgren, R.A.

    1981-07-01

    A successful technical demonstration of simulated reactor vessel sectioning was completed using the combined techniques of air arc gouging and flame cutting. A 4-ft x 3-ft x 9-in. thick sample was fabricated of A36 carbon steel to simulate a reactor vessel wall. A 1/4-in layer of stainless steel (SS) was tungsten inert gas (TIG)-welded to the carbon steel. Several techniques were considered to section the simulated reactor vessel: an air arc gouger was chosen to penetrate the stainless steel, and flame cutting was selected to sever the carbon steel. After the simulated vessel was successfully cut from the SS side, another cut was made, starting from the carbon steel side. This cut was also successful. Cutting from the carbon steel side has the advantages of cost reduction since the air arc gouging step is eliminated and contamination controlled because the molten metal is blown inward

  1. Power reactor pressure vessel benchmarks

    International Nuclear Information System (INIS)

    Rahn, F.J.

    1978-01-01

    A review is given of the current status of experimental and calculational benchmarks for use in understanding the radiation embrittlement effects in the pressure vessels of operating light water power reactors. The requirements of such benchmarks for application to pressure vessel dosimetry are stated. Recent developments in active and passive neutron detectors sensitive in the ranges of importance to embrittlement studies are summarized and recommendations for improvements in the benchmark are made. (author)

  2. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  3. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  4. Prosopomorphic vessels from Moesia Superior

    Directory of Open Access Journals (Sweden)

    Nikolić Snežana

    2008-01-01

    Full Text Available The prosopomorphic vessels from Moesia Superior had the form of beakers varying in outline but similar in size. They were wheel-thrown, mould-made or manufactured by using a combination of wheel-throwing and mould-made appliqués. Given that face vessels are considerably scarcer than other kinds of pottery, more than fifty finds from Moesia Superior make an enviable collection. In this and other provinces face vessels have been recovered from military camps, civilian settlements and necropolises, which suggests that they served more than one purpose. It is generally accepted that the faces-masks gave a protective role to the vessels, be it to protect the deceased or the family, their house and possessions. More than forty of all known finds from Moesia Superior come from Viminacium, a half of that number from necropolises. Although tangible evidence is lacking, there must have been several local workshops producing face vessels. The number and technological characteristics of the discovered vessels suggest that one of the workshops is likely to have been at Viminacium, an important pottery-making centre in the second and third centuries.

  5. Vacuum vessel for thermonuclear device

    International Nuclear Information System (INIS)

    Kikuchi, Mitsuru; Kurita, Gen-ichi; Onozuka, Masaki; Suzuki, Masaru.

    1997-01-01

    Heat of inner walls of a vacuum vessel that receive radiation heat from plasmas by way of first walls is removed by a cooling medium flowing in channels for cooling the inner walls. Nuclear heat generation of constitutional materials of the vacuum vessel caused by fast neutrons and γ rays is removed by a cooling medium flowing in cooling channels disposed in the vacuum vessel. Since the heat from plasmas and the nuclear heat generation are removed separately, the amount of the cooling medium flowing in the channels for cooling inner walls is increased for cooling a great amount of heat from plasmas while the amount of the cooling medium flowing in the channels for cooling the inside of the vacuum vessel is reduced for cooling the small amount of nuclear heat generation. Since the amount of the cooling medium can thus be optimized, the capacity of the facilities for circulating the cooling medium can be reduced. In addition, since the channels for cooling the inner walls and the channels of cooling medium formed in the vacuum vessel are disposed to the inner walls of the vacuum vessel on the side opposite to plasmas, integrity of the channels relative to leakage of the cooling medium can be ensured. (N.H.)

  6. Vacuum vessel for thermonuclear device

    Energy Technology Data Exchange (ETDEWEB)

    Kikuchi, Mitsuru; Kurita, Gen-ichi [Japan Atomic Energy Research Inst., Tokyo (Japan); Onozuka, Masaki; Suzuki, Masaru

    1997-07-31

    Heat of inner walls of a vacuum vessel that receive radiation heat from plasmas by way of first walls is removed by a cooling medium flowing in channels for cooling the inner walls. Nuclear heat generation of constitutional materials of the vacuum vessel caused by fast neutrons and {gamma} rays is removed by a cooling medium flowing in cooling channels disposed in the vacuum vessel. Since the heat from plasmas and the nuclear heat generation are removed separately, the amount of the cooling medium flowing in the channels for cooling inner walls is increased for cooling a great amount of heat from plasmas while the amount of the cooling medium flowing in the channels for cooling the inside of the vacuum vessel is reduced for cooling the small amount of nuclear heat generation. Since the amount of the cooling medium can thus be optimized, the capacity of the facilities for circulating the cooling medium can be reduced. In addition, since the channels for cooling the inner walls and the channels of cooling medium formed in the vacuum vessel are disposed to the inner walls of the vacuum vessel on the side opposite to plasmas, integrity of the channels relative to leakage of the cooling medium can be ensured. (N.H.)

  7. Report: FY 2007 FISMA Report: Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2007-S-00003, September 25, 2007. This is the Office of Inspector General’s Fiscal Year 2007 Federal Information Security Management Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  8. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  9. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  10. 76 FR 68809 - Bureau of International Security and Nonproliferation; Termination of Chemical and Biological...

    Science.gov (United States)

    2011-11-07

    ..., Office of Missile, Biological, and Chemical Nonproliferation, Bureau of International Security and... DEPARTMENT OF STATE [Public Notice: 7678] Bureau of International Security and Nonproliferation; Termination of Chemical and Biological Weapons (CBW) Proliferation Sanctions Against a Foreign Person AGENCY...

  11. 78 FR 54666 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-09-05

    ... Information Collection Request (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0782] Information Collection Request to...

  12. 77 FR 16044 - Information Collection Requests to Office of Management and Budget.

    Science.gov (United States)

    2012-03-19

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0149] Information Collection Requests to...

  13. 77 FR 5816 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-02-06

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0016] Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  14. 77 FR 53899 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-09-04

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0733] Information Collection Request to...

  15. 78 FR 77694 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-12-24

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and...-7710. FOR FURTHER INFORMATION: Contact Mr. Anthony Smith, Office of Information Management, telephone... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0949] Information Collection Requests to...

  16. 76 FR 35228 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-06-16

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and..., Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on these... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0494] Information Collection Request to...

  17. 78 FR 19502 - Information Collection Requests to Office of Management and Budget.

    Science.gov (United States)

    2013-04-01

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... FURTHER INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0164] Information Collection Requests to...

  18. 77 FR 17081 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-03-23

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... FOR FURTHER INFORMATION CONTACT: Contact Ms. Kenlinishia Tyler, Office of Information Management... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0082] Information Collection Requests to...

  19. 76 FR 61369 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-10-04

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and..., Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on these... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0914] Information Collection Request to...

  20. 78 FR 12083 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-02-21

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and..., Washington, DC 20593-7101. FOR FURTHER INFORMATION CONTACT: Anthony Smith, Office of Information Management... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0037] Information Collection Request to...

  1. 78 FR 42535 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-07-16

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax 202... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0519] Information Collection Requests to...

  2. 78 FR 65351 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-10-31

    ... Information Collection Request (ICRs) to the Office of Management and Budget (OMB), Office of Information and..., DC 20593-7710. FOR FURTHER INFORMATION CONTACT: Mr. Anthony Smith, Office of Information Management... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0861] Information Collection Request to...

  3. 77 FR 6132 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-02-07

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... Tyler, Office of Information Management, telephone (202) 475-3652, or fax (202) 475- 3929, for questions... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0029] Information Collection Request to...

  4. 78 FR 77693 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-12-24

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Contact Mr. Anthony Smith, Office of Information Management, telephone 202-475-3532, or... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0896] Information Collection Requests to...

  5. 76 FR 46824 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-08-03

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and.... Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0710] Information Collection Requests to...

  6. 76 FR 58529 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-09-21

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0869] Information Collection Requests to...

  7. 77 FR 9951 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-02-21

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0077] Information Collection Requests to...

  8. 76 FR 62426 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-10-07

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0902] Information Collection Request to...

  9. 77 FR 27472 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-05-10

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and... CONTACT: Contact Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0231] Information Collection Request to...

  10. 77 FR 32657 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-06-01

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0472] Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  11. 78 FR 5192 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2013-01-24

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... INFORMATION CONTACT: Ms. Kenlinishia Tyler, Office of Information Management, telephone 202-475-3652, or fax... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-1006] Information Collection Requests to...

  12. 78 FR 19503 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-01

    ... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...: Contact Anthony Smith, Office of Information Management, telephone 202-475-3532, or fax 202-475-3929, for... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0045] Information Collection Request to...

  13. 76 FR 63626 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2011-10-13

    ... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and... Tyler, Office of Information Management, telephone 202-475-3652, or fax 202-475-3929, for questions on... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0955] Information Collection Requests to...

  14. 78 FR 74155 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-12-10

    ... Information Collection Request (ICRs) to the Office of Management and Budget (OMB), Office of Information and... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0950] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments...

  15. 8 CFR 287.5 - Exercise of power by immigration officers.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Exercise of power by immigration officers. 287.5 Section 287.5 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS FIELD OFFICERS; POWERS AND DUTIES § 287.5 Exercise of power by immigration officers. (a) Power and...

  16. 77 FR 40624 - Information Collection Requests to Office of Management and Budget

    Science.gov (United States)

    2012-07-10

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0598] Information Collection Requests to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments... Information Collection Requests (ICRs) to the Office of Management and Budget (OMB), Office of Information and...

  17. 78 FR 19504 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2013-04-01

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2013-0133] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...

  18. 76 FR 5815 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2011-02-02

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0016; OMB Control numbers: 1625-0005, 1625-0024, 1625-0036 and 1625-0061] Information Collection Request to Office of Management and Budget AGENCY... (ICRs) to the Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA...

  19. 77 FR 18253 - Information Collection Request to Office of Management and Budget

    Science.gov (United States)

    2012-03-27

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0173] Information Collection Request to Office of Management and Budget AGENCY: Coast Guard, DHS. ACTION: Sixty-day notice requesting comments... Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and...

  20. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  1. Automated method for identification and artery-venous classification of vessel trees in retinal vessel networks.

    Science.gov (United States)

    Joshi, Vinayak S; Reinhardt, Joseph M; Garvin, Mona K; Abramoff, Michael D

    2014-01-01

    The separation of the retinal vessel network into distinct arterial and venous vessel trees is of high interest. We propose an automated method for identification and separation of retinal vessel trees in a retinal color image by converting a vessel segmentation image into a vessel segment map and identifying the individual vessel trees by graph search. Orientation, width, and intensity of each vessel segment are utilized to find the optimal graph of vessel segments. The separated vessel trees are labeled as primary vessel or branches. We utilize the separated vessel trees for arterial-venous (AV) classification, based on the color properties of the vessels in each tree graph. We applied our approach to a dataset of 50 fundus images from 50 subjects. The proposed method resulted in an accuracy of 91.44% correctly classified vessel pixels as either artery or vein. The accuracy of correctly classified major vessel segments was 96.42%.

  2. 17 CFR 200.19c - Director of the Office of Compliance Inspections and Examinations.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Director of the Office of Compliance Inspections and Examinations. 200.19c Section 200.19c Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General Organizatio...

  3. Analysis of aging mechanism and management for HTR-PM reactor pressure vessel

    International Nuclear Information System (INIS)

    Sun Yunxue; Shao Jin

    2015-01-01

    Reactor pressure vessel is an important part of the reactor pressure boundary, its important degree ranks high in ageing management and life assessment of nuclear power plant. Carrying out systematic aging management to ensure reactor pressure vessel keeping enough safety margins and executing design functions is one of the key factors to guarantee security and stability operation for nuclear power plant during the whole lifetime and prolong life. This paper briefly introduces the structure and aging mechanism of reactor pressure vessel in pressurized water reactor nuclear power plant, and introduces the design principle and structure characteristics of HTR-PM. At the same time, this paper carries out preliminary analysis and exploration. and discusses aging management of HTR-PM reactor pressure vessel. Finally, the advice of carring out aging management for HTR-PM reactor pressure vessel is proposed. (authors)

  4. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  5. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting...

  6. 10 CFR 95.19 - Changes to security practices and procedures.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Changes to security practices and procedures. 95.19 Section 95.19 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND..., also to the Director, Division of Security Operations, Office of Nuclear Security and Incident Response...

  7. 12 CFR 792.68 - Use and collection of Social Security numbers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Use and collection of Social Security numbers... Act § 792.68 Use and collection of Social Security numbers. The head of each NCUA Office shall take... furnish Social Security numbers, and that individuals who are requested to provide Social Security numbers...

  8. 75 FR 733 - Implementation of the Executive Order, ``Classified National Security Information''

    Science.gov (United States)

    2010-01-05

    ... of the Executive Order, ``Classified National Security Information'' Memorandum for the Heads of... Security Information'' (the ``order''), which substantially advances my goals for reforming the security... classified information shall provide the Director of the Information Security Oversight Office (ISOO) a copy...

  9. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Science.gov (United States)

    2010-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of the...

  10. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Science.gov (United States)

    2010-07-01

    ... for National Security, who shall refer such questions to the Office of Legal Counsel, as appropriate... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security...

  11. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  12. The TPX vacuum vessel and in-vessel components

    International Nuclear Information System (INIS)

    Heitzenroeder, P.; Bialek, J.; Ellis, R.; Kessel, C.; Liew, S.

    1994-01-01

    The Tokamak Physics Experiment (TPX) is a superconducting tokamak with double-null diverters. TPX is designed for 1,000-second discharges with the capability of being upgraded to steady state operation. High neutron yields resulting from the long duration discharges require that special consideration be given to materials and maintainability. A unique feature of the TPX is the use of a low activation, titanium alloy vacuum vessel. Double-wall vessel construction is used since it offers an efficient solution for shielding, bakeout and cooling. Contained within the vacuum vessel are the passive coil system, Plasma Facing Components (PFCs), magnetic diagnostics, and the internal control coils. All PFCs utilize carbon-carbon composites for exposed surfaces

  13. Auxiliary office chair

    OpenAIRE

    Pascual Osés, Maite

    2007-01-01

    The aim of this project is to develop an auxiliary office chair, which favorably will compete with the existing chairs on the market. Evolutions of ergonomical survey in the work environment and on the configuration of offices require new products which fulfill the requirements properly. In order to achieve it a survey about office chairs has been carried out: types, characteristics, ways of usage and products on the market besides a large antropometrical study and ergonomics related to work ...

  14. Clay Corner: Recreating Chinese Bronze Vessels.

    Science.gov (United States)

    Gamble, Harriet

    1998-01-01

    Presents a lesson where students make faux Chinese bronze vessels through slab or coil clay construction after they learn about the history, function, and design of these vessels. Utilizes a variety of glaze finishes in order to give the vessels an aged look. Gives detailed guidelines for creating the vessels. (CMK)

  15. Cardiology office computer use: primer, pointers, pitfalls.

    Science.gov (United States)

    Shepard, R B; Blum, R I

    1986-10-01

    An office computer is a utility, like an automobile, with benefits and costs that are both direct and hidden and potential for disaster. For the cardiologist or cardiovascular surgeon, the increasing power and decreasing costs of computer hardware and the availability of software make use of an office computer system an increasingly attractive possibility. Management of office business functions is common; handling and scientific analysis of practice medical information are less common. The cardiologist can also access national medical information systems for literature searches and for interactive further education. Selection and testing of programs and the entire computer system before purchase of computer hardware will reduce the chances of disappointment or serious problems. Personnel pretraining and planning for office information flow and medical information security are necessary. Some cardiologists design their own office systems, buy hardware and software as needed, write programs for themselves and carry out the implementation themselves. For most cardiologists, the better course will be to take advantage of the professional experience of expert advisors. This article provides a starting point from which the practicing cardiologist can approach considering, specifying or implementing an office computer system for business functions and for scientific analysis of practice results.

  16. 75 FR 12250 - Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to the United...

    Science.gov (United States)

    2010-03-15

    ..., 2010. ADDRESSES: This notice will be available for inspection and copying at the Docket Management... conducted pursuant to the provisions of 46 U.S.C. 70108 and the International Ship and Port Facility... five port calls. Vessels must: Implement measures per the ship's security plan equivalent to ``Security...

  17. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  18. Molten material-containing vessel

    International Nuclear Information System (INIS)

    Akagawa, Katsuhiko

    1998-01-01

    The molten material-containing vessel of the present invention comprises a vessel main body having an entrance opened at the upper end, a lid for closing the entrance, an outer tube having an upper end disposed at the lower surface of the lid, extended downwardly and having an closed lower end and an inner tube disposed coaxially with the outer tube. When a molten material is charged from the entrance to the inside of the vessel main body of the molten material-containing vessel and the entrance is closed by the lid, the outer tube and the inner tube are buried in the molten material in the vessel main body, accordingly, a fluid having its temperature elevated by absorption of the heat of the molten material rises along the inner circumferential surface of the outer tube, abuts against the lower surface of the lid and cooled by exchanging heat with the lid and forms a circulating flow. Since the heat in the molten material is continuously absorbed by the fluid, transferred to the lid and released from the lid to the atmospheric air, heat releasing efficiency can be improved compared with conventional cases. (N.H.)

  19. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  20. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected