World Library  



Finance (262,514 Books)


 
  • Cover Image

Guidelines for Compliance with the National Environmental Policy A...

By: Federal Aviation Administration

Excerpt: 49 U.S.C. Subtitle IX, ch. 701, the Commercial Space Launch Act of 1984, recodified at Commercial Space Launch Activities, 49 U.S.C. 70101 et seq., (formerly referred to herein as the CSLA or the Act), [implemented by the Commercial Space Transportation Licensing Regulations, 14 C.F.R. Ch. III], authorizes the Secretary of Transportation to license, oversee and coordinate the operation of commercial launch sites in the United States or those operated by U.S. cit...

Read More
  • Cover Image

Guidelines for Compliance with the National Environmental Policy A...

By: Federal Aviation Administration

Excerpt: 49 U.S.C. Subtitle IX, ch. 701, the Commercial Space Launch Act of 1984, recodified at Commercial Space Launch Activities, 49 U.S.C. 70101 et seq., (formerly referred to herein as the CSLA or the Act), [implemented by the Commercial Space Transportation Licensing Regulations, 14 C.F.R. Ch. III], authorizes the Secretary of Transportation to license, oversee and coordinate the operation of commercial launch sites in the United States or those operated by U.S. cit...

Read More
  • Cover Image

Platsim: An Efficient Linear Simulation and Analysis Package for L...

Description: This document contains information regarding topics such as Number of Modes Slider, Clip Window Slider/Range of Disturbance Events, and Command-Driven Execution Mode...

Read More
  • Cover Image

Heta98-0173-2782 Colorado Department of Public Health and Environment

By: Jane Brown Mccammon, M. S.

This report was prepared by Jane McCammon of HETAB, Division of Surveillance, Hazard Evaluations and Field Studies (DSHEFS) with extensive assistance from Lyle McKenzie of the Colorado Department of Public Health and Environment. Tim Reinhardt of Radian International provided draft materials and technical assistance that were invaluable in project development. Desktop publishing of this report was performed by Joyce Woody. Review and preparation for printing were performed by Penny Arthur.

Read More
  • Cover Image

Heta98–0224–2714 the Trane Company Ft. Smith, Arkansas

By: C. Eugene Moss and Nancy Clark Burton

The Hazard Evaluations and Technical Assistance Branch also provides, upon request, technical and consultative assistance to federal, state, and local agencies; labor; industry; and other groups or individuals to control occupational health hazards and to prevent related trauma and disease. Mention of company names or products does not constitute endorsement by the National Institute for Occupational Safety and Health.

Read More
  • Cover Image

Programmable Electronic Mining Systems : Best Practice Recommendat...

By: John J. Sammarco

ABSTRACT: This report (System Safety 2.1) is the second in a nine-part series of recommendations addressing the functional safety of processor-controlled mining equipment. It is part of a riskbased system safety process encompassing hardware, software, humans, and the operating environment for the equipment’s life cycle. Figure 1 shows a safety framework containing these recommendations. The reports in this series address the various life cycle stages of inception, desig...

Read More
  • Cover Image

Compendium of Niosh Health Care Worker Research

By: Bill Eschenbacher

The end of the document, projects that are focused on a specific health care worker population (e.g., home health care worker) or a particular workplace setting (e.g., dental office) are listed for ease in identifying projects related to specific interests. NIOSH-funded health care worker projects are either conducted by NIOSH researchers or cooperation with outside research institutions, or through research grants. Those projects being conducted through the NIOSH grant ...

Read More
  • Cover Image

Ergonomic Assessment of Musculoskeletal Risk Factors at Four Mine ...

By: William J. Wiehagen

ABSTRACT: This study examined musculoskeletal injury risk at four mining sites: underground coal, underground limestone, surface copper, and surface phosphate. Each site offered opportunities to investigate musculoskeletal disorder (MSD) injury risks and how those risks might be identified and categorized. The National Institute for Occupational Safety and Health (NIOSH) worked with these sites to (1) identify work activities that showed evidence of MSD injury risk, (2) ...

Read More
  • Cover Image

Agenda for Hhs Public Health Activities (For Fiscal Years 2003–200...

By: Department of Health and Human Services

U.S. Department of Health and Human Services Agency for Toxic Substances and Disease Registry Centers for Disease Control and Prevention National Center for Environmental Health National Institute for Occupational Safety and Health...

Read More
  • Cover Image

Programmable Electronic Mining Systems : Best Practice Recommendat...

By: Gary L. Mowrey

ABSTRACT This report (Safety File 3.0) is the fourth in a nine-part series of recommendations addressing the functional safety of processor-controlled mining equipment. It is part of a risk-based system safety process encompassing hardware, software, humans, and the operating environment for the equipment’s life cycle. Figure 1 shows a safety framework containing these recommendations. The reports in this series address the various life cycle stages of inception, design,...

Read More
  • Cover Image

Programmable Electronic Mining Systems : Best Practice Recommendat...

By: John J. Sammarco

ABSTRACT: This report (Independent Functional Safety Assessment 4.0) is the fifth in a nine-part series of recommendations addressing the functional safety of processor-controlled mining equipment. It is part of a risk-based system safety process encompassing hardware, software, humans, and the operating environment for the equipment’s life cycle. Figure 1 shows a safety framework containing these recommendations. The reports in this series address the various life cycle...

Read More
  • Cover Image

Characterization and Effectiveness of Remining Abandoned Coal Mine...

By: Jay W. Hawkins

ABSTRACT: Under an approved remining program, mine operators can remine abandoned coal mines without assuming legal responsibility for treatment of the previously degraded water, as long as the discharging waters are not further degraded and other regulatory requirements are satisfied. A U.S. Bureau of Mines review of 105 remining permits in Pennsylvania indicates that remining results in substantial reclamation of abandoned mine lands, utilization of significant quantit...

Read More
  • Cover Image

System Safety and Risk Managemant

By: Rodney J. Simmons

We wish to thank professor robert mc clay indiana university of pennsyvania and professors robert thomas tony smith and susan hankins auburn university for their review of this document we also thank the following national institute for occuptional safety and fealth personnel for their review of this document: dr rebecca Giorcelli.

Read More
  • Cover Image

The Personalization Challenge in Public Libraries : Perspectives a...

By: Dr. Christopher Chia

Professional Publication

Abstract: When we think of personalization or personalized Web content, most of us think of home pages like My Yahoo! or My AltaVista. However, those personalized pages are usually only additional features limited to the content offered on that particular site. This research goes beyond understanding personalization to an examination of different perspectives in view of which personalization should be applied to the library environment. It also provides concrete examples...

Read More
  • Cover Image

Ncsc-Tg-022 Library No. 5-236,061 Version 1

By: Patrick R. Gallagher, Jr.

Technical Reference Publication

Introduction: The principal goal of the National Computer Security Center (NCSC) is to encourage the widespread availability of trusted computer systems. In support of this goal the NCSC created a metric, the DoD Trusted Computer System Evaluation Criteria (TCSEC) [17], against which computer systems could be evaluated. The TCSEC was originally published on 15 August 1983 as CSC-STD-001-83. In December 1985 the Department of Defense adopted it, with a few changes, as a D...

Read More
  • Cover Image

Ncsc-Tg-029 Library No. S-239,954 Version 1

By: Patrick R. Gallagher, Jr.

Technical Reference Publication

Introduction: In recent years, there has been a shift in perspective of information systems security (INFOSEC) from viewing it as a number of independent, loosely coupled disciplines to a more cohesive, interdependent collection of security solutions. The current environment of declining resources and the rapid advances in technology have demanded changes in assessing the security posture of systems and implementing an INFOSEC systems engineering process. These changes a...

Read More
 
Records: 262501 - 262514 of 262,514 - Pages: 



Copyright © World Library Foundation. All rights reserved. eBooks from iCloud eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.