Sample records for access control communications

  1. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    PubMed

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  2. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    PubMed Central

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  3. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 1: Communication Aids. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on communication aids. The book's six chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  4. Access Control and Processing Studies for Ground Satellite Mobile Communications/Surveillance Systems

    DOT National Transportation Integrated Search

    1974-06-01

    The report synthesizes a set of satellite communications systems configurations to provide services to aircraft flying oceanic routes. These configurations are combined with access control methods to form complete systems. These systems are analyzed ...

  5. AEROSAT Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  6. Aerosat Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  7. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  8. Detection and response to unauthorized access to a communication device

    DOEpatents

    Smith, Rhett; Gordon, Colin

    2015-09-08

    A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.

  9. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 2: Switches and Environmental Controls. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on switches and environmental controls. The book's three chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by…

  10. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    PubMed Central

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  11. An internet of things example: classrooms access control over near field communication.

    PubMed

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  12. Role-based access control permissions

    DOEpatents

    Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander

    2017-04-25

    Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.

  13. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  14. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  15. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  16. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  17. Trends in communicative access solutions for children with cerebral palsy.

    PubMed

    Myrden, Andrew; Schudlo, Larissa; Weyand, Sabine; Zeyl, Timothy; Chau, Tom

    2014-08-01

    Access solutions may facilitate communication in children with limited functional speech and motor control. This study reviews current trends in access solution development for children with cerebral palsy, with particular emphasis on the access technology that harnesses a control signal from the user (eg, movement or physiological change) and the output device (eg, augmentative and alternative communication system) whose behavior is modulated by the user's control signal. Access technologies have advanced from simple mechanical switches to machine vision (eg, eye-gaze trackers), inertial sensing, and emerging physiological interfaces that require minimal physical effort. Similarly, output devices have evolved from bulky, dedicated hardware with limited configurability, to platform-agnostic, highly personalized mobile applications. Emerging case studies encourage the consideration of access technology for all nonverbal children with cerebral palsy with at least nascent contingency awareness. However, establishing robust evidence of the effectiveness of the aforementioned advances will require more expansive studies. © The Author(s) 2014.

  18. Communication access to businesses and organizations for people with complex communication needs.

    PubMed

    Collier, Barbara; Blackstone, Sarah W; Taylor, Andrew

    2012-12-01

    Human rights legislation and anti-discrimination and accessibility laws exist in many countries and through international conventions and treaties. To varying degrees, these laws protect the rights of people with disabilities to full and equal access to goods and services. Yet, the accessibility requirements of people with complex communication needs (CCN) are not well represented in the existing accessibility literature. This article describes the results of surveys completed by disability service providers and individuals with CCN due to cerebral palsy, developmental delay, and acquired disabilities. It identifies accessibility requirements for people with CCN for face-to-face communication; comprehension of spoken language; telephone communication; text and print-based communication; Internet, email, and social media interactions; and written communication. Recommendations are made for communication accessibility accommodations in regulations, guidelines, and practices.

  19. Access to augmentative and alternative communication: new technologies and clinical decision-making.

    PubMed

    Fager, Susan; Bardach, Lisa; Russell, Susanne; Higginbotham, Jeff

    2012-01-01

    Children with severe physical impairments require a variety of access options to augmentative and alternative communication (AAC) and computer technology. Access technologies have continued to develop, allowing children with severe motor control impairments greater independence and access to communication. This article will highlight new advances in access technology, including eye and head tracking, scanning, and access to mainstream technology, as well as discuss future advances. Considerations for clinical decision-making and implementation of these technologies will be presented along with case illustrations.

  20. Public Access Policy and Communications | DOE PAGES

    Science.gov Websites

    Close Clear All Find DOE PAGES Public Access Policy and Communications Public Access Policy and Communications 7/24/14 Department of Energy Public Access Plan DOE Public Access Plan 2/22/13 White House Office Information (ICSTI) Insights article Public Access at the United States Department of Energy (1,011 KB), by

  1. Programmable data communications controller requirements

    NASA Technical Reports Server (NTRS)

    1977-01-01

    The design requirements for a Programmable Data Communications Controller (PDCC) that reduces the difficulties in attaching data terminal equipment to a computer are presented. The PDCC is an interface between the computer I/O channel and the bit serial communication lines. Each communication line is supported by a communication port that handles all line control functions and performs most terminal control functions. The port is fabricated on a printed circuit board that plugs into a card chassis, mating with a connector that is joined to all other card stations by a data bus. Ports are individually programmable; each includes a microprocessor, a programmable read-only memory for instruction storage, and a random access memory for data storage.

  2. LTE-advanced random access mechanism for M2M communication: A review

    NASA Astrophysics Data System (ADS)

    Mustafa, Rashid; Sarowa, Sandeep; Jaglan, Reena Rathee; Khan, Mohammad Junaid; Agrawal, Sunil

    2016-03-01

    Machine Type Communications (MTC) enables one or more self-sufficient machines to communicate directly with one another without human interference. MTC applications include smart grid, security, e-Health and intelligent automation system. To support huge numbers of MTC devices, one of the challenging issues is to provide a competent way for numerous access in the network and to minimize network overload. In this article, the different control mechanisms for overload random access are reviewed to avoid congestion caused by random access channel (RACH) of MTC devices. However, past and present wireless technologies have been engineered for Human-to-Human (H2H) communications, in particular, for transmission of voice. Consequently the Long Term Evolution (LTE) -Advanced is expected to play a central role in communicating Machine to Machine (M2M) and are very optimistic about H2H communications. Distinct and unique characteristics of M2M communications create new challenges from those in H2H communications. In this article, we investigate the impact of massive M2M terminals attempting random access to LTE-Advanced all at once. We discuss and review the solutions to alleviate the overload problem by Third Generation Partnership Project (3GPP). As a result, we evaluate and compare these solutions that can effectively eliminate the congestion on the random access channel for M2M communications without affecting H2H communications.

  3. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  4. Developing Communication Access Standards to Maximize Community Inclusion for People with Communication Support Needs

    ERIC Educational Resources Information Center

    Solarsh, Barbara; Johnson, Hilary

    2017-01-01

    People with communication support needs experience barriers that limit their social inclusion in society. A community approach such as "communication access" that targets changing attitudes, skills, and resources may assist in facilitating community participation. The authors describe the development of communication access from 2008 in…

  5. 40 CFR 264.34 - Access to communications or alarm system.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm... FACILITIES Preparedness and Prevention § 264.34 Access to communications or alarm system. (a) Whenever... operation must have immediate access to an internal alarm or emergency communication device, either directly...

  6. 40 CFR 265.34 - Access to communications or alarm system.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm..., STORAGE, AND DISPOSAL FACILITIES Preparedness and Prevention § 265.34 Access to communications or alarm... involved in the operation must have immediate access to an internal alarm or emergency communication device...

  7. Accessible information for people with complex communication needs.

    PubMed

    Owens, Janet S

    2006-09-01

    Information can be empowering if it is accessible. While a number of known information access barriers have been reported for the broader group of people with disabilities, specific information issues for people with complex communication needs have not been previously reported. In this consumer-focused study, the accessibility of information design and dissemination practices were discussed by 17 people with complex communication needs; by eight parents, advocates, therapists, and agency representatives in focus groups; and by seven individuals in individual interviews. Participants explored issues and made recommendations for content, including language, visual and audio supports; print accessibility; physical access; and human support for information access. Consumer-generated accessibility guidelines were an outcome of this study.

  8. Multi-access laser communications terminal

    NASA Technical Reports Server (NTRS)

    1992-01-01

    The Optical Multi-Access (OMA) Terminal is capable of establishing up to six simultaneous high-data-rate communication links between low-Earth-orbit satellites and a host satellite at synchronous orbit with only one 16-inch-diameter antenna on the synchronous satellite. The advantage over equivalent RF systems in space weight, power, and swept volume is great when applied to NASA satellite communications networks. A photograph of the 3-channel prototype constructed under the present contract to demonstrate the feasibility of the concept is presented. The telescope has a 10-inch clear aperture and a 22 deg full field of view. It consists of 4 refractive elements to achieve a telecentric focus, i.e., the focused beam is normal to the focal plane at all field angles. This feature permits image pick-up optics in the focal plane to track satellite images without tilting their optic axes to accommodate field angle. The geometry of the imager-pick-up concept and the coordinate system of the swinging arm and disk mechanism for image pick-up are shown. Optics in the arm relay the telescope focus to a communications and tracking receiver and introduce the transmitted beacon beam on a path collinear with the receive path. The electronic circuits for the communications and tracking receivers are contained on the arm and disk assemblies and relay signals to an associated PC-based operator's console for control of the arm and disk motor drive through a flexible cable which permits +/- 240 deg travel for each arm and disk assembly. Power supplies and laser transmitters are mounted in the cradle for the telescope. A single-mode fiber in the cable is used to carry the laser transmitter signal to the arm optics. The promise of the optical multi-access terminal towards which the prototype effort worked is shown. The emphasis in the prototype development was the demonstration of the unique aspect of the concept, and where possible, cost avoidance compromises were implemented in areas

  9. 22 CFR 203.11 - Access to records and communications.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Access to records and communications. 203.11 Section 203.11 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT REGISTRATION OF PRIVATE VOLUNTARY ORGANIZATIONS (PVOs) § 203.11 Access to records and communications. (a) All records, reports, and other...

  10. Static-dynamic hybrid communication scheduling and control co-design for networked control systems.

    PubMed

    Wen, Shixi; Guo, Ge

    2017-11-01

    In this paper, the static-dynamic hybrid communication scheduling and control co-design is proposed for the networked control systems (NCSs) to solve the capacity limitation of the wireless communication network. The analytical most regular binary sequences (MRBSs) are used as the communication scheduling function for NCSs. When the communication conflicts yielded in the binary sequence MRBSs, a dynamic scheduling strategy is proposed to on-line reallocate the medium access status for each plant. Under such static-dynamic hybrid scheduling policy, plants in NCSs are described as the non-uniform sampled-control systems, whose controller have a group of controller gains and switch according to the sampling interval yielded by the binary sequence. A useful communication scheduling and control co-design framework is proposed for the NCSs to simultaneously decide the controller gains and the parameters used to generate the communication sequences MRBS. Numerical example and realistic example are respectively given to demonstrate the effectiveness of the proposed co-design method. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  11. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  12. Adaptive Power Control for Space Communications

    NASA Technical Reports Server (NTRS)

    Thompson, Willie L., II; Israel, David J.

    2008-01-01

    This paper investigates the implementation of power control techniques for crosslinks communications during a rendezvous scenario of the Crew Exploration Vehicle (CEV) and the Lunar Surface Access Module (LSAM). During the rendezvous, NASA requires that the CEV supports two communication links: space-to-ground and crosslink simultaneously. The crosslink will generate excess interference to the space-to-ground link as the distances between the two vehicles decreases, if the output power is fixed and optimized for the worst-case link analysis at the maximum distance range. As a result, power control is required to maintain the optimal power level for the crosslink without interfering with the space-to-ground link. A proof-of-concept will be described and implemented with Goddard Space Flight Center (GSFC) Communications, Standard, and Technology Lab (CSTL).

  13. Policy-based secure communication with automatic key management for industrial control and automation systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.

    A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one ormore » more other devices in the industrial process control and automation system in order to control communications to or from the specified device.« less

  14. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  15. A New Signaling Architecture THREP with Autonomous Radio-Link Control for Wireless Communications Systems

    NASA Astrophysics Data System (ADS)

    Hirono, Masahiko; Nojima, Toshio

    This paper presents a new signaling architecture for radio-access control in wireless communications systems. Called THREP (for THREe-phase link set-up Process), it enables systems with low-cost configurations to provide tetherless access and wide-ranging mobility by using autonomous radio-link controls for fast cell searching and distributed call management. A signaling architecture generally consists of a radio-access part and a service-entity-access part. In THREP, the latter part is divided into two steps: preparing a communication channel, and sustaining it. Access control in THREP is thus composed of three separated parts, or protocol phases. The specifications of each phase are determined independently according to system requirements. In the proposed architecture, the first phase uses autonomous radio-link control because we want to construct low-power indoor wireless communications systems. Evaluation of channel usage efficiency and hand-over loss probability in the personal handy-phone system (PHS) shows that THREP makes the radio-access sub-system operations in a practical application model highly efficient, and the results of a field experiment show that THREP provides sufficient protection against severe fast CNR degradation in practical indoor propagation environments.

  16. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  17. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  18. Open Access in the Natural and Social Sciences: The Correspondence of Innovative Moves to Enhance Access, Inclusion and Impact in Scholarly Communication

    ERIC Educational Resources Information Center

    Armbruster, Chris

    2008-01-01

    Online, open access is the superior model for scholarly communication. A variety of scientific communities in physics, the life sciences and economics have gone furthest in innovating their scholarly communication through open access, enhancing accessibility for scientists, students and the interested public. Open access enjoys a comparative…

  19. Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems

    NASA Astrophysics Data System (ADS)

    Kollár, Martin

    2012-05-01

    In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).

  20. Cognitive-communication disorder following right hemisphere stroke: exploring rehabilitation access and outcomes.

    PubMed

    Hewetson, Ronelle; Cornwell, Petrea; Shum, David

    2017-07-01

    Rehabilitation positively influences return to activities and social roles in people with aphasia. The cognitive-communication disorder (CCD) found following a right hemisphere stroke has been less extensively researched with rehabilitation access and outcomes yet to be determined. To document rehabilitation access and outcomes for people with CCD post-stroke; and compare outcomes based on presence (viz CCD; aphasia) or absence of communication impairment. A retrospective chart audit was completed for patients with first onset unilateral stroke, with a hospital length of stay (LOS) of at least two days and a communication assessment by a speech pathologist. Data extracted included presence and severity of communication impairment, access to and LOS in a rehabilitation unit, and functional outcome measures recorded at rehabilitation discharge. The majority of the 115 patients who met inclusion criteria were living independently (n = 112, 97.4%) at the time of stroke. CCD (66%) was diagnosed with similar frequency to aphasia (68%). The presence of communication impairment did not result in significant differences in rehabilitation LOS and discharge destination when compared to hemispheric strokes without communication impairment. Severity of CCD was an independent predictor of functional gain by rehabilitation discharge. People with CCD require comparable access to rehabilitation as people with aphasia, and severity of CCD should be considered in determining rehabilitation LOS. A large number of people are discharged with ongoing CCD which warrants exploration of potential participation restrictions created by the communication impairment.

  1. Multi-access laser communications transceiver system

    NASA Technical Reports Server (NTRS)

    Ross, Monte (Inventor); Lokerson, Donald C. (Inventor); Fitzmaurice, Michael W. (Inventor); Meyer, Daniel D. (Inventor)

    1993-01-01

    A satellite system for optical communications such as a multi-access laser transceiver system. Up to six low Earth orbiting satellites send satellite data to a geosynchronous satellite. The data is relayed to a ground station at the Earth's surface. The earth pointing geosynchronous satellite terminal has no gimbal but has a separate tracking mechanism for tracking each low Earth orbiting satellite. The tracking mechanism has a ring assembly rotatable about an axis coaxial with the axis of the field of view of the geosynchronous satellite and a pivotable arm mounted for pivotal movement on the ring assembly. An optical pickup mechanism at the end of each arm is positioned for optical communication with one of the orbiting satellites by rotation of the ring.

  2. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  3. CART (Communication Access Realtime Translation). PEPNet Tipsheet

    ERIC Educational Resources Information Center

    Larson, Judy, Comp.

    1999-01-01

    Communication Access Realtime Translation--(CART)--is the instant translation of the spoken word into English text performed by a CART reporter using a stenotype machine, notebook computer and realtime software. The text is then displayed on a computer monitor or other display device for the student who is deaf or hard of hearing to read. This…

  4. Integrating Communication, Computer Access, Environmental Control & Mobility.

    ERIC Educational Resources Information Center

    Romich, Barry A.; Vagnini, Carol B.

    Severely physically disabled people can be helped to reach their goals in educational, vocational, and personal pursuits through appropriate use of current technology. The expressive communication needs of people without functional speech can be met through an analysis of selection techniques, processing, and outputs. Examples of new systems…

  5. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  6. Overload Control for Signaling Congestion of Machine Type Communications in 3GPP Networks.

    PubMed

    Lu, Zhaoming; Pan, Qi; Wang, Luhan; Wen, Xiangming

    2016-01-01

    Because of the limited resources on radio access channels of third generation partnership projection (3GPP) network, one of the most challenging tasks posted by 3GPP cellular-based machine type communications (MTC) is congestion due to massive requests for connection to radio access network (RAN). In this paper, an overload control algorithm in 3GPP RAN is proposed, which proactively disperses the simultaneous access attempts in evenly distributed time window. Through periodic reservation strategy, massive access requests of MTC devices are dispersed in time, which reduces the probability of confliction of signaling. By the compensation and prediction mechanism, each device can communicate with MTC server with dynamic load of air interface. Numerical results prove that proposed method makes MTC applications friendly to 3GPP cellular network.

  7. Digital Autonomous Terminal Access Communication (DATAC) system

    NASA Technical Reports Server (NTRS)

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  8. Promoting open access to science through effective communication

    NASA Astrophysics Data System (ADS)

    Egger, A. E.

    2006-12-01

    Geology is a difficult subject to communicate effectively. Many people associate geology with memorizing rock and mineral names and not with dynamic earth processes. Even more challenging for the non-geologist is the concept of deep time, and why processes that happened millions of years ago are important to us today. Additionally, many people view science itself as inaccessible and difficult. And yet, geology is a naturally accessible subject, as it is all around us. In order to communicate effectively, geologists must convince others that their work is both accessible and relevant, even though it may not directly generate economic benefits or lend insight into solutions for our modern problems like climate change. As scientists, we know the connections are there, but convincing others requires creating face-to-face, positive interactions through the use of active techniques to help bring the audience to an understanding of the process of science in addition to the subject matter itself. My overarching motive for creating and participating in communication activities with a broad audience is thus to demonstrate that science is accessible to everyone, that a scientific way of thinking can be both fun and useful, and that a little knowledge about geology can give you a new perspective on the world. Using this motivation as a guiding principle regardless of the specific audience, two techniques are important to make the communication effective. First, whenever possible, I conduct activities in the field (broadly speaking), or at least bring the field into the talk, and model the scientific process by asking for participation. This allows the audience to fully understand how geologic work is done, including the mundane and the mistakes. Second, I take my audience seriously, including all questions and observations, in order to build confidence in everyone that they are able to contribute to and understand both geology and the scientific process in general. Despite the

  9. Session Types for Access and Information Flow Control

    NASA Astrophysics Data System (ADS)

    Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola; Rezk, Tamara

    We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, the type system prevents leaks that could result from an unrestricted use of the control constructs of the calculus, such as session opening, selection, branching and delegation. We illustrate the use of our type system with a number of examples, which reveal an interesting interplay between the constraints used in security type systems and those used in session types to ensure properties like communication safety and session fidelity.

  10. Overload Control for Signaling Congestion of Machine Type Communications in 3GPP Networks

    PubMed Central

    Lu, Zhaoming; Pan, Qi; Wang, Luhan; Wen, Xiangming

    2016-01-01

    Because of the limited resources on radio access channels of third generation partnership projection (3GPP) network, one of the most challenging tasks posted by 3GPP cellular-based machine type communications (MTC) is congestion due to massive requests for connection to radio access network (RAN). In this paper, an overload control algorithm in 3GPP RAN is proposed, which proactively disperses the simultaneous access attempts in evenly distributed time window. Through periodic reservation strategy, massive access requests of MTC devices are dispersed in time, which reduces the probability of confliction of signaling. By the compensation and prediction mechanism, each device can communicate with MTC server with dynamic load of air interface. Numerical results prove that proposed method makes MTC applications friendly to 3GPP cellular network. PMID:27936011

  11. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  12. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  13. A slotted access control protocol for metropolitan WDM ring networks

    NASA Astrophysics Data System (ADS)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  14. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  15. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  16. Empowering citizens with access control mechanisms to their personal health resources.

    PubMed

    Calvillo, J; Román, I; Roa, L M

    2013-01-01

    Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms

  17. Development of a Communication Training Program to Improve Access to Legal Services for People with Complex Communication Needs

    ERIC Educational Resources Information Center

    Togher, Leanne; Balandin, Susan; Young, Katherine; Given, Fiona; Canty, Michael

    2006-01-01

    People with communication disabilities experience problems in accessing the justice system. In this article we describe the development of a multimedia package designed to train legal personnel to identify and reduce communication barriers to their services. The training package is being developed collaboratively by a diverse team that included…

  18. Internet access and electronic communication among families in an urban pediatric emergency department.

    PubMed

    Saidinejad, Mohsen; Teach, Stephen J; Chamberlain, James M

    2012-06-01

    The Internet may represent an opportunity for health care providers in the emergency department (ED) to deliver discharge instructions and after-care educational materials electronically to patients and their caregivers. The objectives of this study were to determine the prevalence of Internet access and use among caregivers of children who visit the ED and to evaluate their interest in receiving after-care communication and educational material electronically. We distributed a self-administered survey to a convenience sample of English-speaking caregivers of children who presented to the ED of an urban, academic, pediatric hospital during November and December 2009. The survey was distributed to and completed by 509 English-speaking respondents. Of the participants, 423 (83.1%) of 509 identified themselves as black/African American, and 397 (77.9%) of 509 were publicly insured. Of the participants, 503 of 509 (98.9%; 95% confidence interval [CI], 97.9%-99.8%) reported that they have access to the Internet. Of the participants with Internet access, 312 of 503 (62.0%; 95% CI, 57.8%-66.3%) have access at home, 166 of 503 (33.0%; 95% CI, 28.9%-33.1%) have access at work, and 112 of 503 (22.3%; 95% CI, 18.6%-25.9%) have access by mobile phone. When asked about electronic communication and social networking, 483 of 503 (96.0%; 95% CI, 94.3%-97.7%) have an e-mail account, and 304 of 503 (60.4%; 95% CI, 56.2%-64.7%) have a Facebook account. Furthermore, 353 of 503 (70.1%; 95% CI, 66.2%-74.2%) reported accessing the Internet daily, whereas 128 of 503 (25.4%; 95% CI, 21.6%-29.3%) access the Internet at least 2 to 6 times per week. Among all respondents, interest in receiving communication from the ED only electronically was expressed by 259 of 509 participants (50.9%; 95% CI, 46.5%-55.2%). Approximately one third of the participants (173/509 [34%; 95% CI, 29.9%-38.1%]) expressed interest in an electronic channel for communication between the ED and their child's patient

  19. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  20. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  1. Digital autonomous terminal access communications

    NASA Technical Reports Server (NTRS)

    Novacki, S.

    1987-01-01

    A significant problem for the Bus Monitor Unit is to identify the source of a given transmission. This problem arises from the fact that the label which identifies the source of the transmission as it is put into the bus is intercepted by the Digital Autonomous Terminal Access Communications (DATAC) terminal and removed from the transmission. Thus, a given subsystem will see only data associated with a label and never the identifying label itself. The Bus Monitor must identify the source of the transmission so as to be able to provide some type of error identification/location in the event that some problem with the data transmission occurs. Steps taken to alleviate this problem by modifications to the DATAC terminal are discussed.

  2. A CDMA system implementation with dimming control for visible light communication

    NASA Astrophysics Data System (ADS)

    Chen, Danyang; Wang, Jianping; Jin, Jianli; Lu, Huimin; Feng, Lifang

    2018-04-01

    Visible light communication (VLC), using solid-state lightings to transmit information, has become a complement technology to wireless radio communication. As a realistic multiple access scheme for VLC system, code division multiple access (CDMA) has attracted more and more attentions in recent years. In this paper, we address and implement an improved CDMA scheme for VLC system. The simulation results reveal that the improved CDMA scheme not only supports multi-users' transmission but also maintains dimming value at about 50% and enhances the system efficiency. It can also realize the flexible dimming control by adjusting some parameters of system structure, which rarely affects the system BER performance. A real-time experimental VLC system with improved CDMA scheme is performed based on field programmable gate array (FPGA), reaching a good BER performance.

  3. Communicative social capital and collective efficacy as determinants of access to health-enhancing resources in residential communities.

    PubMed

    Matsaganis, Matthew D; Wilkin, Holley A

    2015-04-01

    This article contributes to the burgeoning literature on the social determinants of health disparities. The authors investigate how communication resources and collective efficacy, independently and in combination, shape residents' access to health enhancing resources (including healthcare services, sources of healthier food options, and public recreation spaces) in their communities. Using random digit dial telephone survey data from 833 residents of South Los Angeles communities the authors show that communicative social capital-that is, an information and problem-solving resource that accrues to residents as they become more integrated into their local communication network of neighbors, community organizations, and local media-plays a significant role in access to health resources. This relationship is complicated by individuals' health insurance and health status, as communicative social capital magnifies the sense of absence of resources for those who are in worse health and lack insurance. Communicative social capital builds collective efficacy, which is positively related to access to health-enhancing resources, but it also mediates the negative relationship between communicative social capital and access to health resources. Residents with richer stores of communicative social capital and collective efficacy report better access to health resources. The authors conclude with a discussion of implications of these findings and suggestions for future research.

  4. 76 FR 21741 - Twenty-First Century Communications and Video Programming Accessibility Act; Announcement of Town...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-18

    ... FEDERAL COMMUNICATIONS COMMISSION [DA 11-428] Twenty-First Century Communications and Video... The Twenty-First Century Communications and Video Programming Accessibility Act (the Act or CVAA... orientation to the Act, and discussed the advanced communications and video programming changes required by...

  5. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  6. Strategic use of communication to market cancer prevention and control to vulnerable populations.

    PubMed

    Kreps, Gary L

    2008-01-01

    There are significant challenges to communicating relevant cancer prevention and control information to health care consumers due both to the complexities of the health information to be communicated and the complexities of health communication, especially with vulnerable populations. The need for effective communication about cancer risks, early detection, prevention, care, and survivorship is particularly acute, yet also tremendously complex, for reaching vulnerable populations, those groups of people who are most likely to suffer significantly higher levels of morbidity and mortality from cancers than other segments of the population. These vulnerable populations, typically the poorest, lowest educated, and most disenfranchised members of modern society, are heir to serious cancer-related health disparities. Vulnerable populations often have health literacy difficulties, cultural barriers, and economic challenges to accessing and making sense of relevant health information. This paper examines these challenges to communicating relevant information to vulnerable populations and suggests strategies for effectively using different communication media for marketing cancer prevention and control to reduce health disparities and promote public health.

  7. Random-access algorithms for multiuser computer communication networks. Doctoral thesis, 1 September 1986-31 August 1988

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Papantoni-Kazakos, P.; Paterakis, M.

    1988-07-01

    For many communication applications with time constraints (e.g., transmission of packetized voice messages), a critical performance measure is the percentage of messages transmitted within a given amount of time after their generation at the transmitting station. This report presents a random-access algorithm (RAA) suitable for time-constrained applications. Performance analysis demonstrates that significant message-delay improvement is attained at the expense of minimal traffic loss. Also considered is the case of noisy channels. The noise effect appears at erroneously observed channel feedback. Error sensitivity analysis shows that the proposed random-access algorithm is insensitive to feedback channel errors. Window Random-Access Algorithms (RAAs) aremore » considered next. These algorithms constitute an important subclass of Multiple-Access Algorithms (MAAs); they are distributive, and they attain high throughput and low delays by controlling the number of simultaneously transmitting users.« less

  8. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  9. High data rate modem simulation for the space station multiple-access communications system

    NASA Technical Reports Server (NTRS)

    Horan, Stephen

    1987-01-01

    The communications system for the space station will require a space based multiple access component to provide communications between the space based program elements and the station. A study was undertaken to investigate two of the concerns of this multiple access system, namely, the issues related to the frequency spectrum utilization and the possibilities for higher order (than QPSK) modulation schemes for use in possible modulators and demodulators (modems). As a result of the investigation, many key questions about the frequency spectrum utilization were raised. At this point, frequency spectrum utilization is seen as an area requiring further work. Simulations were conducted using a computer aided communications system design package to provide a straw man modem structure to be used for both QPSK and 8-PSK channels.

  10. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  11. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  12. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  13. Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet

    NASA Astrophysics Data System (ADS)

    Kataoka, Haruno; Utsumi, Akira; Hirose, Yuki; Yoshiura, Hiroshi

    Disclosure control of natural language information (DCNL), which we are trying to realize, is described. DCNL will be used for securing human communications over the internet, such as through blogs and social network services. Before sentences in the communications are disclosed, they are checked by DCNL and any phrases that could reveal sensitive information are transformed or omitted so that they are no longer revealing. DCNL checks not only phrases that directly represent sensitive information but also those that indirectly suggest it. Combinations of phrases are also checked. DCNL automatically learns the knowledge of sensitive phrases and the suggestive relations between phrases by using co-occurrence analysis and Web retrieval. The users' burden is therefore minimized, i.e., they do not need to define many disclosure control rules. DCNL complements the traditional access control in the fields where reliability needs to be balanced with enjoyment and objects classes for the access control cannot be predefined.

  14. System access control study

    DOT National Transportation Integrated Search

    1974-06-01

    The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...

  15. Collaboration in Controller-Pilot Communication

    NASA Technical Reports Server (NTRS)

    Morrow, Daniel; Lebacqz, J. Victor (Technical Monitor)

    1994-01-01

    Like other forms of dialogue, air traffic control (ATC) communication is an act of collaboration between two or more people. Collaboration progresses more or less smoothly depending on speaker and listener strategies. For example, we have found that the way controllers organize and deliver messages influences how easily pilots understand these messages, which in turn determines how much time and effort is needed to successfully complete the transaction. In this talk, I will introduce a collaborative framework for investigating controller-pilot communication and then describe a set of studies that investigate ATC communication from two complementary directions. First, we focused on the impact of ATC message factors (e.g., length, speech rate) on the cognitive processes involved in ATC: communication. Second, we examined pilot factors that influence the amount of cognitive resources available for these communication processes. These studies also illustrate how the collaborate framework can help analyze the impact of proposed visual data link systems on ATC communication. Examining the joint effects of communication medium, message factors, and pilot/controller factors on performance should help improve air safety and communication efficiency. Increased efficiency is important for meeting the growing demands on the National Air System.

  16. Current Hale ROA Voice and Control Communication Practices and Performance: White Paper

    NASA Technical Reports Server (NTRS)

    2007-01-01

    The objective of this white paper is to help achieve the ACCESS 5 goal by sharing the UNITE members knowledge of current HALE ROA communication systems with other ACCESS 5 participants so that all interested parties start from a common understanding as we begin the clarification of requirements for voice and C2 communication. This white paper is also intended to describe the point of departure for any future developments that need to be realized to achieve the long term ACCESS 5 goal. Although this white paper describes the current systems, the functional and performance requirements that are also being developed under ACCESS 5 may not require the same levels of functionality and performance as currently exist. The paper addresses the following: 1) A description of a typical current HALE ROA communications system, 2) HALE ROA communications systems performance metrics, 3) HALE ROA communications systems performance, and 5) A comparison of current HALE ROA communications systems with current regulations.

  17. Access Control in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela

    Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.

  18. Analysis of Controller Communication in En Route Air Traffic Control.

    ERIC Educational Resources Information Center

    Seamster, Thomas L.; And Others

    To contribute to an understanding of the elements of good air traffic controller communication with the objective of providing recommendations to improve controller communication training, two studies analyzed team communication, ground-air communication, and ground-line communication. The simulated and live traffic analyses examined established…

  19. Interference-Assisted Techniques for Transmission and Multiple Access in Optical Communications

    NASA Astrophysics Data System (ADS)

    Guan, Xun

    Optical communications can be in wired or wireless form. Fiber optics communication (FOC) connects transmitters and receivers with optical fiber. Benefiting from its high bandwidth, low cost per volume and stability, it gains a significant market share in long-haul networks, access networks and data centers. Meanwhile, optical wireless communication (OWC) is also emerging as a crucial player in the communication market. In OWC, free-space optical communication (FSO) and visible light communication (VLC) are being studied and commercially deployed extensively. Interference is a common phenomenon in multi-user communication systems. In both FOC and OWC, interference has long been treated as a detrimental effect. However, it could also be beneficial to system applications. The effort of harnessing interference has spurred numerous innovations. Interesting examples are physical-layer network coding (PNC) and non-orthogonal multiple access (NOMA). The first part of this thesis in on the topic of PNC. PNC was firstly proposed in wireless communication to improve the throughput of a two-way relay network (TWRN). As a variation of network coding (NC), PNC turns the common channel interference (CCI) as a natural network coding operation. In this thesis, PNC is introduced into optical communication. Three schemes are proposed in different scenarios. Firstly, PNC is applied to a coherent optical orthogonal frequency division multiplexing (CO-OFDM) system so as to improve the throughput of the multicast network. The optical signal to noise ratio (OSNR) penalty is quite low. Secondly, we investigate the application of PNC in an OFDM passive optical network (OFDM-PON) supporting heterogeneous services. It is found that only minor receiver power penalties are observed to realize PNC-based virtual private networks (VPN), both in the wired service part and the wireless service part in an OFDM-PON with heterogeneous services. Thirdly, we innovate relay-based visible light

  20. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  1. Control and Non-Payload Communications Generation 1 Prototype Radio Flight Test Report

    NASA Technical Reports Server (NTRS)

    Shalkhauser, Kurt A.; Young, Daniel P.; Bretmersky, Steven C.; Ishac, Joseph A.; Walker, Steven H.; Griner, James H.; Kachmar, Brian A.

    2014-01-01

    Unmanned aircraft (UA) represent a new capability that will provide a variety of services in the Government (public) and commercial (civil) aviation sectors. The growth of this potential industry has not yet been realized because of the lack of a common understanding of what is required to safely operate Unmanned Aircraft Systems in the National Airspace System (UAS in the NAS). The desire and ability to fly UA is of increasing urgency. The application of UA to perform national security, defense, scientific, and emergency management are driving the critical need for less restrictive access by UA to the NAS. Existing Federal Aviation Regulations, procedures, and technologies do not allow routine UA access to the NAS. Access to the NAS is hampered by challenges such as the lack of an onboard pilot to see and avoid other aircraft; the ability of a single pilot or operator to control multiple UA; the reliance on command and control (C2) links; the altitudes, speeds, and duration at which the aircraft fly; and the wide variation in UA size and performance. NASA is working with other Government agencies to provide solutions that reduce technical barriers and make access to the NAS routine. This goal will be accomplished through system-level integration of key concepts, technologies, or procedures and through demonstrations of these integrated capabilities in an operationally relevant environment. This project provides an opportunity to transition the acquired empirical data and knowledge to the Federal Aviation Administration and other stakeholders to help them define the requirements for routine UA access to the NAS.Radio communications channels for UA are currently managed through exceptions and use either Department of Defense frequencies for line-of-sight (LOS) and satellite-based communications links, low-power LOS links in amateur bands, or unlicensed Industrial/Scientific/Medical (ISM) frequencies. None of these frequency bands are designated for safety and

  2. Analysis of routine pilot-controller communication

    NASA Technical Reports Server (NTRS)

    Morrow, Daniel G.; Lee, Alfred; Rodvold, Michelle

    1990-01-01

    Although pilot-controller communication is central to aviation safety, this area of aviation human factors has not been extensively researched. Most research has focused on what kinds of communication problems occur. A more complete picture of communication problems requires understanding how communication usually works in routine operations. A sample of routine pilot-controller communication in the TRACON environment is described. After describing several dimensions of routine communication, three kinds of communication problems are treated: inaccuracies such as incorrect readbacks, procedural deviations such as missing callsigns and readbacks, and nonroutine transactions where pilot and controller must deal with misunderstandings or other communication problems. Preliminary results suggest these problems are not frequent events in daily operations. However, analysis of the problems that do occur suggest some factors that may cause them.

  3. Power adaptive multi-filter carrierless amplitude and phase access scheme for visible light communication network

    NASA Astrophysics Data System (ADS)

    Li, Wei; Huang, Zhitong; Li, Haoyue; Ji, Yuefeng

    2018-04-01

    Visible light communication (VLC) is a promising candidate for short-range broadband access due to its integration of advantages for both optical communication and wireless communication, whereas multi-user access is a key problem because of the intra-cell and inter-cell interferences. In addition, the non-flat channel effect results in higher losses for users in high frequency bands, which leads to unfair qualities. To solve those issues, we propose a power adaptive multi-filter carrierless amplitude and phase access (PA-MF-CAPA) scheme, and in the first step of this scheme, the MF-CAPA scheme utilizing multiple filters as different CAP dimensions is used to realize multi-user access. The character of orthogonality among the filters in different dimensions can mitigate the effect of intra-cell and inter-cell interferences. Moreover, the MF-CAPA scheme provides different channels modulated on the same frequency bands, which further increases the transmission rate. Then, the power adaptive procedure based on MF-CAPA scheme is presented to realize quality fairness. As demonstrated in our experiments, the MF-CAPA scheme yields an improved throughput compared with multi-band CAP access scheme, and the PA-MF-CAPA scheme enhances the quality fairness and further improves the throughput compared with the MF-CAPA scheme.

  4. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    PubMed

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  5. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    PubMed

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  6. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

    PubMed Central

    Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban

    2017-01-01

    An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This

  7. CAS. Controlled Access Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  8. 40 CFR 267.34 - When must personnel have access to communication equipment or an alarm system?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... to an internal alarm or emergency communication device, either directly or through visual or voice... communication equipment or an alarm system? 267.34 Section 267.34 Protection of Environment ENVIRONMENTAL... have access to communication equipment or an alarm system? (a) Whenever hazardous waste is being poured...

  9. Learners on the Superhighway? Access to Learning via Electronic Communications. Winston Churchill Fellowship Report.

    ERIC Educational Resources Information Center

    Yeomans, Keith

    Policymakers and practitioners in electronic communication and education in the United States and Canada were interviewed to identify those policies, strategies, and models of good practice used to increase access to learning via electronic communications that are relevant to the United Kingdom and Europe. Information was gathered from 5 experts…

  10. An Attribute Based Access Control Framework for Healthcare System

    NASA Astrophysics Data System (ADS)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  11. Access control for electronic patient records.

    PubMed

    Glagola, M J

    1998-01-01

    The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.

  12. Design of the Wind Tunnel Model Communication Controller Board. Degree awarded by Christopher Newport Univ. on Dec. 1998

    NASA Technical Reports Server (NTRS)

    Wilson, William C.

    1999-01-01

    The NASA Langley Research Center's Wind Tunnel Reinvestment project plans to shrink the existing data acquisition electronics to fit inside a wind tunnel model. Space limitations within a model necessitate a distributed system of Application Specific Integrated Circuits (ASICs) rather than a centralized system based on PC boards. This thesis will focus on the design of the prototype of the communication Controller board. A portion of the communication Controller board is to be used as the basis of an ASIC design. The communication Controller board will communicate between the internal model modules and the external data acquisition computer. This board is based around an Field Programmable Gate Array (FPGA), to allow for reconfigurability. In addition to the FPGA, this board contains buffer Random Access Memory (RAM), configuration memory (EEPROM), drivers for the communications ports, and passive components.

  13. Integrated command, control, communications and computation system functional architecture

    NASA Technical Reports Server (NTRS)

    Cooley, C. G.; Gilbert, L. E.

    1981-01-01

    The functional architecture for an integrated command, control, communications, and computation system applicable to the command and control portion of the NASA End-to-End Data. System is described including the downlink data processing and analysis functions required to support the uplink processes. The functional architecture is composed of four elements: (1) the functional hierarchy which provides the decomposition and allocation of the command and control functions to the system elements; (2) the key system features which summarize the major system capabilities; (3) the operational activity threads which illustrate the interrelationahip between the system elements; and (4) the interfaces which illustrate those elements that originate or generate data and those elements that use the data. The interfaces also provide a description of the data and the data utilization and access techniques.

  14. Development of an instrument to measure Faculty's information and communication technology access (FICTA).

    PubMed

    Soomro, Kamal Ahmed; Kale, Ugur; Curtis, Reagan; Akcaoglu, Mete; Bernstein, Malayna

    2018-01-01

    The phenomenon of "digital divide" is complex and multidimensional, extending beyond issues of physical access. The purpose of this study was to develop a scale to measure a range of factors related to digital divide among higher education faculty and to evaluate its reliability and validity. Faculty's Information and Communication Technology Access (FICTA) scale was tested and validated with 322 faculty teaching in public and private sector universities. Principal components analysis with varimax rotation confirmed an 8-factor solution corresponding to various dimensions of ICT access. The 57-item FICTA scale demonstrated good psychometric properties and offers researchers a tool to examine faculty's access to ICT at four levels - motivational, physical, skills, and usage access.

  15. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  16. Promotion of access to essential medicines for non-communicable diseases: practical implications of the UN political declaration.

    PubMed

    Hogerzeil, Hans V; Liberman, Jonathan; Wirtz, Veronika J; Kishore, Sandeep P; Selvaraj, Sakthi; Kiddell-Monroe, Rachel; Mwangi-Powell, Faith N; von Schoen-Angerer, Tido

    2013-02-23

    Access to medicines and vaccines to prevent and treat non-communicable diseases (NCDs) is unacceptably low worldwide. In the 2011 UN political declaration on the prevention and control of NCDs, heads of government made several commitments related to access to essential medicines, technologies, and vaccines for such diseases. 30 years of experience with policies for essential medicines and 10 years of scaling up of HIV treatment have provided the knowledge needed to address barriers to long-term effective treatment and prevention of NCDs. More medicines can be acquired within existing budgets with efficient selection, procurement, and use of generic medicines. Furthermore, low-income and middle-income countries need to increase mobilisation of domestic resources to cater for the many patients with NCDs who do not have access to treatment. Existing initiatives for HIV treatment offer useful lessons that can enhance access to pharmaceutical management of NCDs and improve adherence to long-term treatment of chronic illness; policy makers should also address unacceptable inequities in access to controlled opioid analgesics. In addition to off-patent medicines, governments can promote access to new and future on-patent medicinal products through coherent and equitable health and trade policies, particularly those for intellectual property. Frequent conflicts of interest need to be identified and managed, and indicators and targets for access to NCD medicines should be used to monitor progress. Only with these approaches can a difference be made to the lives of hundreds of millions of current and future patients with NCDs. Copyright © 2013 Elsevier Ltd. All rights reserved.

  17. Study of spread spectrum multiple access systems for satellite communications with overlay on current services

    NASA Technical Reports Server (NTRS)

    Ha, Tri T.; Pratt, Timothy

    1989-01-01

    The feasibility of using spread spectrum techniques to provide a low-cost multiple access system for a very large number of low data terminals was investigated. Two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks are presented. Two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation are described and the throughput analyzed. The analysis considers such factors as satellite power constraints and adjacent satellite interference. Also considered is the effect of on-board processing on the multiple access efficiency and the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse is investigated. The use of chirp is examined for spread spectrum communications. In a chirp communication system, each data bit is converted into one or more up or down sweeps of frequency, which spread the RF energy across a broad range of frequencies. Several different forms of chirp communication systems are considered, and a multiple-chirp coded system is proposed for overlay service. The mutual interference problem is examined in detail and a performance analysis undertaken for the case of a chirp data channel overlaid on a video channel.

  18. Next generation communications satellites: Multiple access and network studies

    NASA Technical Reports Server (NTRS)

    Stern, T. E.; Schwartz, M.; Meadows, H. E.; Ahmadi, H. K.; Gadre, J. G.; Gopal, I. S.; Matsmo, K.

    1980-01-01

    Following an overview of issues involved in the choice of promising system architectures for efficient communication with multiple small inexpensive Earth stations serving hetergeneous user populations, performance evaluation via analysis and simulation for six SS/TDMA (satellite-switched/time-division multiple access) system architectures is discussed. These configurations are chosen to exemplify the essential alternatives available in system design. Although the performance evaluation analyses are of fairly general applicability, whenever possible they are considered in the context of NASA's 30/20 GHz studies. Packet switched systems are considered, with the assumption that only a part of transponder capacit is devoted to packets, the integration of circuit and packet switched traffic being reserved for further study. Three types of station access are distinguished: fixed (FA), demand (DA), and random access (RA). Similarly, switching in the satellite can be assigned on a fixed (FS) or demand (DS) basis, or replaced by a buffered store-and-forward system (SF) onboard the satellite. Since not all access/switching combinations are practical, six systems are analyzed in detail: three FS SYSTEMS, FA/FS, DA/ES, RA/FS; one DS system, DA/DS; and two SF systems, FA/SF, DA/SF. Results are presented primarily in terms of delay-throughput characteristics.

  19. On Channel Sharing in Discrete-Time, Multi-Access Broadcast Communications,

    DTIC Science & Technology

    1980-09-01

    towards a physical intepretation . of the solutions. 1.4.3 THE PROBLEM OF CAPACITY Our discussion of capacity has two objectives. First, to explore...8021 (DARPA). Yemnii, Y., "On Channel Sharing in Discrete-Time, Multi-Access Broadcast Communication," Sep- tember 1980, UCLA-ENG-8061. (DARPA). 280 FILMED 9-83 DTIC 𔃾’W 9111 ’K4VFClMlP-- Om mFoca 1,00,

  20. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  1. Broadband and scalable mobile satellite communication system for future access networks

    NASA Astrophysics Data System (ADS)

    Ohata, Kohei; Kobayashi, Kiyoshi; Nakahira, Katsuya; Ueba, Masazumi

    2005-07-01

    Due to the recent market trends, NTT has begun research into next generation satellite communication systems, such as broadband and scalable mobile communication systems. One service application objective is to provide broadband Internet access for transportation systems, temporal broadband access networks and telemetries to remote areas. While these are niche markets the total amount of capacity should be significant. We set a 1-Gb/s total transmission capacity as our goal. Our key concern is the system cost, which means that the system should be unified system with diversified services and not tailored for each application. As satellites account for a large portion of the total system cost, we set the target satellite size as a small, one-ton class dry mass with a 2-kW class payload power. In addition to the payload power and weight, the mobile satellite's frequency band is extremely limited. Therefore, we need to develop innovative technologies that will reduce the weight and maximize spectrum and power efficiency. Another challenge is the need for the system to handle up to 50 dB and a wide data rate range of other applications. This paper describes the key communication system technologies; the frequency reuse strategy, multiplexing scheme, resource allocation scheme, and QoS management algorithm to ensure excellent spectrum efficiency and support a variety of services and quality requirements in the mobile environment.

  2. An experimental distributed microprocessor implementation with a shared memory communications and control medium

    NASA Technical Reports Server (NTRS)

    Mejzak, R. S.

    1980-01-01

    The distributed processing concept is defined in terms of control primitives, variables, and structures and their use in performing a decomposed discrete Fourier transform (DET) application function. The design assumes interprocessor communications to be anonymous. In this scheme, all processors can access an entire common database by employing control primitives. Access to selected areas within the common database is random, enforced by a hardware lock, and determined by task and subtask pointers. This enables the number of processors to be varied in the configuration without any modifications to the control structure. Decompositional elements of the DFT application function in terms of tasks and subtasks are also described. The experimental hardware configuration consists of IMSAI 8080 chassis which are independent, 8 bit microcomputer units. These chassis are linked together to form a multiple processing system by means of a shared memory facility. This facility consists of hardware which provides a bus structure to enable up to six microcomputers to be interconnected. It provides polling and arbitration logic so that only one processor has access to shared memory at any one time.

  3. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  4. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  5. Pregnant women's use of information and communications technologies to access pregnancy-related health information in South Australia.

    PubMed

    Rodger, D; Skuse, A; Wilmore, M; Humphreys, S; Dalton, J; Flabouris, M; Clifton, V L

    2013-01-01

    This paper examines how pregnant women living in South Australia use information and communication technologies (ICTs), principally Internet and mobile phones, to access pregnancy-related information. It draws on 35 semistructured interviews conducted as part of the 'Health-e Baby' project, a qualitative study designed to assess the information needs and ICT preferences of pregnant women cared for at a South Australian metropolitan teaching hospital. Our research shows that although ICTs offer exciting possibilities for health promotion and the potential for new forms of communication, networking and connection, we cannot assume the effectiveness of communicating through such channels, despite near universal levels of ICT access. In turn, this highlights that if e-mediated health promotion is to be effective, health promoters and practitioners need to better understand ICT access, usage and content preferences of their clients.

  6. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  7. Dynamic Resource Allocation and Access Class Barring Scheme for Delay-Sensitive Devices in Machine to Machine (M2M) Communications.

    PubMed

    Li, Ning; Cao, Chao; Wang, Cong

    2017-06-15

    Supporting simultaneous access of machine-type devices is a critical challenge in machine-to-machine (M2M) communications. In this paper, we propose an optimal scheme to dynamically adjust the Access Class Barring (ACB) factor and the number of random access channel (RACH) resources for clustered machine-to-machine (M2M) communications, in which Delay-Sensitive (DS) devices coexist with Delay-Tolerant (DT) ones. In M2M communications, since delay-sensitive devices share random access resources with delay-tolerant devices, reducing the resources consumed by delay-sensitive devices means that there will be more resources available to delay-tolerant ones. Our goal is to optimize the random access scheme, which can not only satisfy the requirements of delay-sensitive devices, but also take the communication quality of delay-tolerant ones into consideration. We discuss this problem from the perspective of delay-sensitive services by adjusting the resource allocation and ACB scheme for these devices dynamically. Simulation results show that our proposed scheme realizes good performance in satisfying the delay-sensitive services as well as increasing the utilization rate of the random access resources allocated to them.

  8. Ver-i-Fus: an integrated access control and information monitoring and management system

    NASA Astrophysics Data System (ADS)

    Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.

    1997-01-01

    This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.

  9. Access control mechanism of wireless gateway based on open flow

    NASA Astrophysics Data System (ADS)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  10. Cancer control and the communication innovation in South Korea: implications for cancer disparities.

    PubMed

    Jung, Minsoo

    2013-01-01

    Over the last 10 years, the number of cancer survivors in South Korea has reached nearly one million with a survival rate of 49.4%. However, integrated supportive care for cancer survivors is lagging. One area in which the current cancer control policy needs updating is in the utilization of information and communication technology (ICT). The remarkable progress in the field of ICT over the past 10 years presents exciting new opportunities for health promotion. Recent communication innovations are conducive to the exchange of meta-information, giving rise to a new service area and transforming patients into active medical consumers. Consequently, such innovations encourage active participation in the mutual utilization and sharing of high-quality information. However, these benefits from new ICTs will almost certainly not be equally available to all, leading to so-called communication inequalities where cancer survivors from lower socioeconomic classes will likely have more limited access to the best means of making use of the health information. Therefore, most essentially, emphasis must be placed on helping cancer survivors and their caregivers utilize such advances in ICT to create a more efficient flow of health information, thereby reducing communication inequalities and expanding social support. Once we enhance access to health information and better manage the quality of information, as a matter of fact, we can expect an alleviation of the health inequalities faced by cancer survivors.

  11. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  12. Institutional Repositories, Open Access, and Scholarly Communication: A Study of Conflicting Paradigms

    ERIC Educational Resources Information Center

    Cullen, Rowena; Chawner, Brenda

    2011-01-01

    The Open Access movement of the past decade, and institutional repositories developed by universities and academic libraries as a part of that movement, have openly challenged the traditional scholarly communication system. This article examines the growth of repositories around the world, and summarizes a growing body of evidence of the response…

  13. [Ethics in pediatric emergencies: Care access, communication, and confidentiality].

    PubMed

    Benoit, J; Berdah, L; Carlier-Gonod, A; Guillou, T; Kouche, C; Patte, M; Schneider, M; Talcone, S; Chappuy, H

    2015-05-01

    Children suffer most from today's increasing precariousness. In France, access to care is available for all children through various structures and existing measures. The support for foreign children is overseen by specific legislation often unfamiliar to caregivers. Pediatric emergencies, their location, organization, actors, and patient flow are a particular environment that is not always suitable to communication and may lead to situations of abuse. Communication should not be forgotten because of the urgency of the situation. The place of the child in the dialogue is often forgotten. Considering the triangular relationship, listening to the child and involving the parents in care are the basis for a good therapeutic alliance. Privacy and medical confidentiality in pediatric emergencies are governed by law. However, changes in treatments and medical practices along with the variety of actors involved imply both individual and collective limitations, to the detriment of medical confidentiality. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  14. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  15. 48 CFR 311.7001 - Section 508 accessibility standards for HHS Web site content and communications materials.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... standards, and resolve any related issues. (c) Based on those discussions, the Project Officer shall provide... communication must meet the accessibility standards in 36 CFR 1194.22, “Web-based intranet and Internet... standards for HHS Web site content and communications materials. 311.7001 Section 311.7001 Federal...

  16. 48 CFR 311.7001 - Section 508 accessibility standards for HHS Web site content and communications materials.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... standards, and resolve any related issues. (c) Based on those discussions, the Project Officer shall provide... communication must meet the accessibility standards in 36 CFR 1194.22, “Web-based intranet and Internet... standards for HHS Web site content and communications materials. 311.7001 Section 311.7001 Federal...

  17. 48 CFR 311.7001 - Section 508 accessibility standards for HHS Web site content and communications materials.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... standards, and resolve any related issues. (c) Based on those discussions, the Project Officer shall provide... communication must meet the accessibility standards in 36 CFR 1194.22, “Web-based intranet and Internet... standards for HHS Web site content and communications materials. 311.7001 Section 311.7001 Federal...

  18. 48 CFR 311.7001 - Section 508 accessibility standards for HHS Web site content and communications materials.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... standards, and resolve any related issues. (c) Based on those discussions, the Project Officer shall provide... communication must meet the accessibility standards in 36 CFR 1194.22, “Web-based intranet and Internet... standards for HHS Web site content and communications materials. 311.7001 Section 311.7001 Federal...

  19. Communication technology access, use, and preferences among primary care patients: from the Residency Research Network of Texas (RRNeT).

    PubMed

    Hill, Jason H; Burge, Sandra; Haring, Anna; Young, Richard A

    2012-01-01

    The digital revolution is changing the manner in which patients communicate with their health care providers, yet many patients still lack access to communication technology. We conducted this study to evaluate access to, use of, and preferences for using communication technology among a predominantly low-income patient population. We determined whether access, use, and preferences were associated with type of health insurance, sex, age, and ethnicity. In 2011, medical student researchers administered questionnaires to patients of randomly selected physicians within 9 primary care clinics in the Residency Research Network of Texas. Surveys addressed access to and use of cell phones and home computers and preferences for communicating with health care providers. In this sample of 533 patients (77% response rate), 448 (84%) owned a cell phone and 325 (62%) owned computers. Only 48% reported conducting Internet searches, sending and receiving E-mails, and looking up health information on the Internet. Older individuals, those in government sponsored insurance programs, and individuals from racial/ethnic minority groups had the lowest levels of technology adoption. In addition, more than 60% of patients preferred not to send and receive health information over the Internet, by instant messaging, or by text messaging. Many patients in this sample did not seek health information electronically nor did they want to communicate electronically with their physicians. This finding raises concerns about the vision of the patient-centered medical home to enhance the doctor-patient relationship through communication technology. Our patients represent some of the more vulnerable populations in the United States and, as such, deserve attention from health care policymakers who are promoting widespread use of communication technology.

  20. An Ecological Perspective on U.S. Latinos' Health Communication Behaviors, Access, and Outcomes

    ERIC Educational Resources Information Center

    Katz, Vikki S.; Ang, Alfonso; Suro, Roberto

    2012-01-01

    U.S. Latinos experience constrained access to formal health care resources, contributing to higher incidence of preventable diseases and chronic health conditions than the general population. The authors explore whether a rich set of informal health communication connections--to friends, family, radio, television, Internet, newspapers, magazines,…

  1. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  2. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  3. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  4. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  5. Echolocation calls and communication calls are controlled differentially in the brainstem of the bat Phyllostomus discolor

    PubMed Central

    Fenzl, Thomas; Schuller, Gerd

    2005-01-01

    Background Echolocating bats emit vocalizations that can be classified either as echolocation calls or communication calls. Neural control of both types of calls must govern the same pool of motoneurons responsible for vocalizations. Electrical microstimulation in the periaqueductal gray matter (PAG) elicits both communication and echolocation calls, whereas stimulation of the paralemniscal area (PLA) induces only echolocation calls. In both the PAG and the PLA, the current thresholds for triggering natural vocalizations do not habituate to stimuli and remain low even for long stimulation periods, indicating that these structures have relative direct access to the final common pathway for vocalization. This study intended to clarify whether echolocation calls and communication calls are controlled differentially below the level of the PAG via separate vocal pathways before converging on the motoneurons used in vocalization. Results Both structures were probed simultaneously in a single experimental approach. Two stimulation electrodes were chronically implanted within the PAG in order to elicit either echolocation or communication calls. Blockade of the ipsilateral PLA site with iontophoretically application of the glutamate antagonist kynurenic acid did not impede either echolocation or communication calls elicited from the PAG. However, blockade of the contralateral PLA suppresses PAG-elicited echolocation calls but not communication calls. In both cases the blockade was reversible. Conclusion The neural control of echolocation and communication calls seems to be differentially organized below the level of the PAG. The PLA is an essential functional unit for echolocation call control before the descending pathways share again the final common pathway for vocalization. PMID:16053533

  6. Communicative Access Measures for Stroke: Development and Evaluation of a Quality Improvement Tool.

    PubMed

    Kagan, Aura; Simmons-Mackie, Nina; Victor, J Charles; Chan, Melodie T

    2017-11-01

    To (1) develop a systems-level quality improvement tool targeting communicative access to information and decision-making for stroke patients with language disorders; and (2) evaluate the resulting tool-the Communicative Access Measures for Stroke (CAMS). Survey development and evaluation was in line with accepted guidelines and included item generation and reduction, survey formatting and composition, pretesting, pilot testing, and reliability assessment. Development and evaluation were carried out in hospital and community agency settings. The project used a convenience sample of 31 participants for the survey development, and 63 participants for the CAMS reliability study (broken down into 6 administrators/managers, 32 frontline staff, 25 participants with aphasia). Eligible participants invited to the reliability study included individuals from 45 community-based organizations in Ontario as well as 4400 individuals from communities of practice. Not applicable. Data were analyzed using kappa statistics and intraclass correlations for each item score on all surveys. A tool, the CAMS, comprising 3 surveys, was developed for health facilities from the perspectives of (1) administrators/policymakers, (2) staff/frontline health care providers, and (3) patients with aphasia (using a communicatively accessible version). Reliability for items on the CAMS-Administrator and CAMS-Staff surveys was moderate to high (kappa/intraclass correlation coefficients [ICCs], .54-1.00). As expected, reliability was lower for the CAMS-Patient survey, with most items having ICCs between 0.4 and 0.6. These findings suggest that CAMS may provide useful quality improvement information for health care facilities with an interest in improving care for patients with stroke and aphasia. Copyright © 2017 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  7. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  8. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  9. Using Twitter to access the human right of communication for people who use Augmentative and Alternative Communication (AAC).

    PubMed

    Hemsley, Bronwyn; Palmer, Stuart; Dann, Stephen; Balandin, Susan

    2018-02-01

    Articles 19, 26 and 27 of the Universal Declaration of Human Rights and Articles 4, 9 and 21 of the Convention on the Rights of Persons with Disabilities promote the human rights of communication, education, use of technology and access to information. Social media is an important form of online communication, and Twitter increases users' visibility, influence and reach online. The aim of this sociotechnical research was to determine the impact of teaching three people who use Augmentative and Alternative Communication (AAC) to use Twitter. Three participants were trained in ways of using Twitter strategically. Data collected from participants' Twitter profiles were examined to determine the impact of training on Twitter follower count, frequency of tweeting, tweet content and the development of social networks. Data were also examined using (1) KH Coder software analysis and visualisation of co-occurring networks in the text data, based on word frequencies; and (2) Gephi software analysis to show the Twitter network for each participant. Two participants showed an improvement in Twitter skills and strategies. Twitter can be used to improve social connectedness of people who use AAC, and should not be overlooked in relation to communication rights.

  10. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  11. Communications Handbook for Traffic Control Systems

    DOT National Transportation Integrated Search

    1993-04-01

    The communications system generally proves the most critical and expensive element of a traffic control system/IVHS. Therefore the successful design, implementation, and operation of the communications system become key to the effectiveness of the ov...

  12. Review of SDDOT's highway access control process

    DOT National Transportation Integrated Search

    2000-02-01

    This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...

  13. Typing for Conflict Detection in Access Control Policies

    NASA Astrophysics Data System (ADS)

    Adi, Kamel; Bouzida, Yacine; Hattak, Ikhlass; Logrippo, Luigi; Mankovskii, Serge

    In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.

  14. Formation Control over Delayed Communication Network

    NASA Astrophysics Data System (ADS)

    Secchi, Cristian; Fantuzzi, Cesare

    In this Chapter we address the problem of formation control of a group of robots that exchange information over a communication network characterized by a non negligible delay. We consider the Virtual Body Artificial Potential approach for stabilizing a group of robots at a desired formation. We show that it is possible to model the controlled group of robots as a port-Hamiltonian system and we exploit the scattering framework to achieve a passive behavior of the controlled system and to stabilize the robots in the desired formation independently of any communication delay.

  15. 47 CFR 90.465 - Control of systems of communication.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control of systems of communication. 90.465 Section 90.465 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PRIVATE LAND MOBILE RADIO SERVICES Transmitter Control § 90.465 Control of systems of communication. (a) Depending on design considerations...

  16. Access to hands-on mathematics measurement activities using robots controlled via speech generating devices: three case studies.

    PubMed

    Adams, Kim; Cook, Al

    2014-07-01

    To examine how using a robot controlled via a speech generating device (SGD) influences the ways students with physical and communication limitations can demonstrate their knowledge in math measurement activities. Three children with severe physical disabilities and complex communication needs used the robot and SGD system to perform four math measurement lessons in comparing, sorting and ordering objects. The performance of the participants was measured and the process of using the system was described in terms of manipulation and communication events. Stakeholder opinions were solicited regarding robot use. Robot use revealed some gaps in the procedural knowledge of the participants. Access to both the robot and SGD was shown to provide several benefits. Stakeholders thought the intervention was important and feasible for a classroom environment. The participants were able to participate actively in the hands-on and communicative measurement activities and thus meet the demands of current math instruction methods. Current mathematics pedagogy encourages doing hands-on activities while communicating about concepts. Adapted Lego robots enabled children with severe physical disabilities to perform hands-on length measurement activities. Controlling the robots from speech generating devices (SGD) enabled the children, who also had complex communication needs, to reflect and report on results during the activities. By using the robots combined with SGDs, children both exhibited their knowledge of and experienced the concepts of mathematical measurements.

  17. Videophone Technology and Students with Deaf-Blindness: A Method for Increasing Access and Communication

    ERIC Educational Resources Information Center

    Emerson, Judith; Bishop, John

    2012-01-01

    Introduction: Seeing the Possibilities with Videophone Technology began as research project funded by the National Center for Technology Innovation. The project implemented a face-to-face social networking program for students with deaf-blindness to investigate the potential for increasing access and communication using videophone technology.…

  18. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  19. Towards an Approach of Semantic Access Control for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  20. Bibliography on Ground Vehicle Communications & Control : A KWIC Index

    DOT National Transportation Integrated Search

    1971-08-01

    This bibliography, or the subject of communication and control of ground vehicles, covers the fields of land-mobile communication, computer-aided traffic control, communication with high speed ground vehicles and radio frequency noise. Emphasis is pl...

  1. An Analysis of TRACON (Terminal Radar Approach Control) Controller-Pilot Voice Communication

    DOT National Transportation Integrated Search

    1996-06-01

    The purpose of this analysis was to examine pilot-controller communication practices in the TRACONI (Terminal Radar Approach : Control) environment. Forty-eight hours of communications recorded on the voice tapes from eight TRACONs were analyzed. : T...

  2. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  3. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  4. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  5. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  6. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  7. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  8. Improving access to medicines for non-communicable diseases in rural India: a mixed methods study protocol using quasi-experimental design.

    PubMed

    Prashanth, N S; Elias, Maya Annie; Pati, Manoj Kumar; Aivalli, Praveenkumar; Munegowda, C M; Bhanuprakash, Srinath; Sadhana, S M; Criel, Bart; Bigdeli, Maryam; Devadasan, Narayanan

    2016-08-22

    India has the distinction of financing its healthcare mainly through out-of-pocket expenses by individual families contributing to catastrophic health expenditure and impoverishment. Nearly 70 % of the expenditure is on medicines purchased at private pharmacies. Patients with chronic ailments are especially affected, as they often need lifelong medicines. Over the past years in India, there have been several efforts to improve drug availability at government primary health centres. In this study, we aim to understand health system factors that affect utilisation and access to generic medicines for people with non-communicable diseases. This study aims to understand if (and how) a package of interventions targeting primary health centres and community participation platforms affect utilisation and access to generic medicines for people with non-communicable diseases in the current district context in India. This study will employ a quasi-experimental design and a qualitative theory-driven approach. PHCs will be randomly assigned to one of three arms of the intervention. In one arm, PHCs will receive inputs to optimise service delivery for non-communicable diseases, while the second arm will receive an additional package of interventions to strengthen community participation platforms for improving non-communicable disease care. The third arm will be the control. We will conduct household and facility surveys, before and after the intervention and will estimate the effect of the intervention by difference-in-difference analysis. Sample size for measuring effects was calculated based on obtaining at least 30 households for each primary health centre spread across three distance-based clusters. Primary outcomes include availability and utilisation of medicines at primary health centres and out-of-pocket expenditure for medicines by non-communicable disease households. Focus group discussions with patients and in-depth interviews with health workers will also be

  9. UNificatins and Extensions of the Multiple Access Communications Problem,

    DTIC Science & Technology

    1981-07-01

    Control , Stability and Waiting Time in a Slotted ALOHA Random Access System ," IEEE...quceing, them, the control procedure must tolerate a larger average number of’ messages in the system if it is to limit the number of times that the system ...running fas- ter than real time to provide some flow control for that class . The virtual clocks for every other class merely act as a "gate" which

  10. Evaluating the effectiveness of biometric access control systems

    NASA Astrophysics Data System (ADS)

    Lively, Valerie M.

    2005-05-01

    This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.

  11. Rapidly deployable emergency communication system

    DOEpatents

    Gladden, Charles A.; Parelman, Martin H.

    1979-01-01

    A highly versatile, highly portable emergency communication system which permits deployment in a very short time to cover both wide areas and distant isolated areas depending upon mission requirements. The system employs a plurality of lightweight, fully self-contained repeaters which are deployed within the mission area to provide communication between field teams, and between each field team and a mobile communication control center. Each repeater contains a microcomputer controller, the program for which may be changed from the control center by the transmission of digital data within the audible range (300-3,000 Hz). Repeaters are accessed by portable/mobile transceivers, other repeaters, and the control center through the transmission and recognition of digital data code words in the subaudible range.

  12. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  13. Distributed clinical data sharing via dynamic access-control policy transformation.

    PubMed

    Rezaeibagha, Fatemeh; Mu, Yi

    2016-05-01

    Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  14. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    NASA Technical Reports Server (NTRS)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  15. SpaceOps 2012 Plus 2: Social Tools to Simplify ISS Flight Control Communications and Log Keeping

    NASA Technical Reports Server (NTRS)

    Cowart, Hugh S.; Scott, David W.

    2014-01-01

    A paper written for the SpaceOps 2012 Conference (Simplify ISS Flight Control Communications and Log Keeping via Social Tools and Techniques) identified three innovative concepts for real time flight control communications tools based on social mechanisms: a) Console Log Tool (CoLT) - A log keeping application at Marshall Space Flight Center's (MSFC) Payload Operations Integration Center (POIC) that provides "anywhere" access, comment and notifications features similar to those found in Social Networking Systems (SNS), b) Cross-Log Communication via Social Techniques - A concept from Johnsson Space Center's (JSC) Mission Control Center Houston (MCC-H) that would use microblogging's @tag and #tag protocols to make information/requests visible and/or discoverable in logs owned by @Destination addressees, and c) Communications Dashboard (CommDash) - A MSFC concept for a Facebook-like interface to visually integrate and manage basic console log content, text chat streams analogous to voice loops, text chat streams dedicated to particular conversations, generic and position-specific status displays/streams, and a graphically based hailing display. CoLT was deployed operationally at nearly the same time as SpaceOps 2012, the Cross- Log Communications idea is currently waiting for a champion to carry it forward, and CommDash was approved as a NASA Iinformation Technoloby (IT) Labs project. This paper discusses lessons learned from two years of actual CoLT operations, updates CommDash prototype development status, and discusses potential for using Cross-Log Communications in both MCC-H and/or POIC environments, and considers other ways for synergizing console applcations.

  16. Orthogonal frequency-division multiplexing access (OFDMA) based wireless visible light communication (VLC) system

    NASA Astrophysics Data System (ADS)

    Sung, Jiun-Yu; Yeh, Chien-Hung; Chow, Chi-Wai; Lin, Wan-Feng; Liu, Yang

    2015-11-01

    An orthogonal frequency-division multiplexing access (OFDMA) based visible light communication (VLC) system is proposed in this paper. The architecture of the proposed system is divided into several VLC cells, which is defined in this paper. The deployment and upgrade of the system involve only simple combination of the VLC cells. Hence it is economically advantageous. To guarantee smooth communication, nearly equal data rate is provided at every location within the system with no concern on the system scale. The user location monitor strategy is also discussed to solve the region division issues. The characteristics of the proposed system are analyzed in detail in this paper. A one-dimensional experiment was demonstrated with 13.6 Mb/s data rate.

  17. The Integrated Safety-Critical Advanced Avionics Communication and Control (ISAACC) System Concept: Infrastructure for ISHM

    NASA Technical Reports Server (NTRS)

    Gwaltney, David A.; Briscoe, Jeri M.

    2005-01-01

    Integrated System Health Management (ISHM) architectures for spacecraft will include hard real-time, critical subsystems and soft real-time monitoring subsystems. Interaction between these subsystems will be necessary and an architecture supporting multiple criticality levels will be required. Demonstration hardware for the Integrated Safety-Critical Advanced Avionics Communication & Control (ISAACC) system has been developed at NASA Marshall Space Flight Center. It is a modular system using a commercially available time-triggered protocol, ?Tp/C, that supports hard real-time distributed control systems independent of the data transmission medium. The protocol is implemented in hardware and provides guaranteed low-latency messaging with inherent fault-tolerance and fault-containment. Interoperability between modules and systems of modules using the TTP/C is guaranteed through definition of messages and the precise message schedule implemented by the master-less Time Division Multiple Access (TDMA) communications protocol. "Plug-and-play" capability for sensors and actuators provides automatically configurable modules supporting sensor recalibration and control algorithm re-tuning without software modification. Modular components of controlled physical system(s) critical to control algorithm tuning, such as pumps or valve components in an engine, can be replaced or upgraded as "plug and play" components without modification to the ISAACC module hardware or software. ISAACC modules can communicate with other vehicle subsystems through time-triggered protocols or other communications protocols implemented over Ethernet, MIL-STD- 1553 and RS-485/422. Other communication bus physical layers and protocols can be included as required. In this way, the ISAACC modules can be part of a system-of-systems in a vehicle with multi-tier subsystems of varying criticality. The goal of the ISAACC architecture development is control and monitoring of safety critical systems of a

  18. How Drug Control Policy and Practice Undermine Access to Controlled Medicines

    PubMed Central

    Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.

    2017-01-01

    Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556

  19. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    PubMed

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  20. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Communications and control facilities. 1726.176... SERVICE, DEPARTMENT OF AGRICULTURE ELECTRIC SYSTEM CONSTRUCTION POLICIES AND PROCEDURES General Plant § 1726.176 Communications and control facilities. This section covers the purchase of microwave and power...

  1. Programmable Direct-Memory-Access Controller

    NASA Technical Reports Server (NTRS)

    Hendry, David F.

    1990-01-01

    Proposed programmable direct-memory-access controller (DMAC) operates with computer systems of 32000 series, which have 32-bit data buses and use addresses of 24 (or potentially 32) bits. Controller functions with or without help of central processing unit (CPU) and starts itself. Includes such advanced features as ability to compare two blocks of memory for equality and to search block of memory for specific value. Made as single very-large-scale integrated-circuit chip.

  2. Comparison of two underwater acoustic communications techniques for multi-user access

    NASA Astrophysics Data System (ADS)

    Hursky, Paul; Siderius, T. Martin; Kauaiex Group

    2004-05-01

    Frequency hopped frequency shift keying (FHFSK) and code division multiple access (CDMA) are two different modulation techniques for multiple users to communicate with a single receiver simultaneously. In July 2003, these two techniques were tested alongside each other in a shallow water coastal environment off the coast of Kauai. A variety of instruments were used to measure the prevailing oceanography, enabling detailed modeling of the channel. The channel was acoustically probed using LFM waveforms and m-sequences as well. We will present the results of demodulating the FHFSK and CDMA waveforms and discuss modeling the channel for the purpose of predicting multi-user communications performance. a)Michael B. Porter, Paul Hursky, Martin Siderius (SAIC), Mohsen Badiey (UD), Jerald Caruthers (USM), William S. Hodgkiss, Kaustubha Raghukumar (SIO), Dan Rouseff, Warren Fox (APL-UW), Christian de Moustier, Brian Calder, Barbara J. Kraft (UNH), Keyko McDonald (SPAWARSSC), Peter Stein, James K. Lewis, and Subramaniam Rajan (SSI).

  3. Willingness to Communicate and Action Control

    ERIC Educational Resources Information Center

    MacIntyre, Peter D.; Doucette, Jesslyn

    2010-01-01

    Being willing to communicate is part of becoming fluent in a second language, which often is the ultimate goal of L2 learners. Julius Kuhl's theory of action control is introduced as an expansion of the conceptual framework for the study of Willingness to Communicate. Kuhl proposed three key concepts, preoccupation, volatility, and hesitation,…

  4. p-BioSPRE—an information and communication technology framework for transnational biomaterial sharing and access

    PubMed Central

    Weiler, Gabriele; Schröder, Christina; Schera, Fatima; Dobkowicz, Matthias; Kiefer, Stephan; Heidtke, Karsten R; Hänold, Stefanie; Nwankwo, Iheanyi; Forgó, Nikolaus; Stanulla, Martin; Eckert, Cornelia; Graf, Norbert

    2014-01-01

    Biobanks represent key resources for clinico-genomic research and are needed to pave the way to personalised medicine. To achieve this goal, it is crucial that scientists can securely access and share high-quality biomaterial and related data. Therefore, there is a growing interest in integrating biobanks into larger biomedical information and communication technology (ICT) infrastructures. The European project p-medicine is currently building an innovative ICT infrastructure to meet this need. This platform provides tools and services for conducting research and clinical trials in personalised medicine. In this paper, we describe one of its main components, the biobank access framework p-BioSPRE (p-medicine Biospecimen Search and Project Request Engine). This generic framework enables and simplifies access to existing biobanks, but also to offer own biomaterial collections to research communities, and to manage biobank specimens and related clinical data over the ObTiMA Trial Biomaterial Manager. p-BioSPRE takes into consideration all relevant ethical and legal standards, e.g., safeguarding donors’ personal rights and enabling biobanks to keep control over the donated material and related data. The framework thus enables secure sharing of biomaterial within open and closed research communities, while flexibly integrating related clinical and omics data. Although the development of the framework is mainly driven by user scenarios from the cancer domain, in this case, acute lymphoblastic leukaemia and Wilms tumour, it can be extended to further disease entities. PMID:24567758

  5. Information and communication technology needs for distributed communication and coordination during expedition-class spaceflight.

    PubMed

    Caldwell, B S

    2000-09-01

    AO-lU. Expedition-class missions are distinct from historical human presence in space in ways that significantly affect information flow and information technology designs for such missions. The centrality of Mission Control in these missions is challenged by the distances, associated communication delays, and durations of expeditions, all of which require crews to have more local resources available to manage on-board situations. The author's current research investigates how ground controllers effectively allocate communications bandwidth, cognitive resources, and knowledge sharing skills during time critical routine and non-routine situations. The research focus is on team-based information and communication technology (ICT) use to provide recommendations for improvements to support adaptive bandwidth allocations and improved sharing of data and knowledge in Mission Control contexts. In order to further improve communication and coordination between controllers and crew, additional ICT support resources will be needed to provide shared context knowledge and dynamic assessment of costs and benefits for accessing local information vs. remote expertise. Crew members will have critical needs to understand the goals, intentions, and situational constraints associated with mission information resources in order to use them most effectively in conditions where ground-based expertise is insufficient or requires more time to access and coordinate than local task demands permit. Results of this research will serve to improve the design and implementation of ICT systems to improve human performance capabilities and system operating tolerances for exploration missions. (Specific research data were not available at the time of publication.)

  6. Unmanned Aircraft System Control and ATC Communications Bandwidth Requirements

    NASA Technical Reports Server (NTRS)

    Henriksen, Steve

    2008-01-01

    There are significant activities taking place to establish the procedures and requirements for safe and routine operation of unmanned aircraft systems (UAS) in the National Airspace System (NAS). Among the barriers to overcome in achieving this goal is the lack of sufficient frequency spectrum necessary for the UAS control and air traffic control (ATC) communications links. This shortcoming is compounded by the fact that the UAS control communications links will likely be required to operate in protected frequency spectrum, just as ATC communications links are, because they relate to "safety and regularity of flight." To support future International Telecommunications Union (ITU) World Radio Conference (WRC) agenda items concerning new frequency allocations for UAS communications links, and to augment the Future Communications Study (FCS) Technology Evaluation Group efforts, NASA Glenn Research Center has sponsored a task to estimate the UAS control and ATC communications bandwidth requirements for safe, reliable, and routine operation of UAS in the NAS. This report describes the process and results of that task. The study focused on long-term bandwidth requirements for UAS approximately through 2030.

  7. Performance management of multiple access communication networks

    NASA Astrophysics Data System (ADS)

    Lee, Suk; Ray, Asok

    1993-12-01

    This paper focuses on conceptual design, development, and implementation of a performance management tool for computer communication networks to serve large-scale integrated systems. The objective is to improve the network performance in handling various types of messages by on-line adjustment of protocol parameters. The techniques of perturbation analysis of Discrete Event Dynamic Systems (DEDS), stochastic approximation (SA), and learning automata have been used in formulating the algorithm of performance management. The efficacy of the performance management tool has been demonstrated on a network testbed. The conceptual design presented in this paper offers a step forward to bridging the gap between management standards and users' demands for efficient network operations since most standards such as ISO (International Standards Organization) and IEEE address only the architecture, services, and interfaces for network management. The proposed concept of performance management can also be used as a general framework to assist design, operation, and management of various DEDS such as computer integrated manufacturing and battlefield C(sup 3) (Command, Control, and Communications).

  8. Application of Information and Communication Technology (ICT) in Health Information Access and Dissemination in Uganda

    ERIC Educational Resources Information Center

    Omona, Walter; Ikoja-Odongo, Robert

    2006-01-01

    This paper reports on a study which assessed the application of information and communication technologies (ICT) in health information access and dissemination in Uganda. The project focused not only on information obtainable through libraries for research, teaching, learning and practice, but also on ICT applications concerned with the…

  9. Analysis of routine communication in the air traffic control system

    NASA Technical Reports Server (NTRS)

    Clark, Herbert H.; Morrow, Daniel; Rodvoid, Michelle

    1990-01-01

    The present project has three related goals. The first is to describe the organization of routine controller-pilot communication. This includes identifying the basic units of communication and how they are organized into discourse, how controllers and pilots use language to achieve their goals, and what topics they discuss. The second goal is to identify the type and frequency of problems that interrupt routine information transfer and prompt pilots and controllers to focus on the communication itself. The authors analyze the costs of these problems in terms of communication efficiency, and the techniques used to resolve these problems. Third, the authors hope to identify factors associated with communication problems, such as deviations from conventional air traffic control procedures.

  10. Analysis and Simulation of Traffic Control for Resource Management in DVB-Based Broadband Satellite Access Networks

    NASA Astrophysics Data System (ADS)

    Impemba, Ernesto; Inzerilli, Tiziano

    2003-07-01

    Integration of satellite access networks with the Internet is seen as a strategic goal to achieve in order to provide ubiquitous broadband access to Internet services in Next Generation Networks (NGNs). One of the main interworking aspects which has been most studied is an efficient management of satellite resources, i.e. bandwidth and buffer space, in order to satisfy most demanding application requirements as to delay control and bandwidth assurance. In this context, resource management in DVB-S/DVB-RCS satellite technologies, emerging technologies for broadband satellite access and transport of IP applications, is a research issue largely investigated as a means to provide efficient bi-directional communications across satellites. This is in particular one of the principal goals of the SATIP6 project, sponsored within the 5th EU Research Programme Framework, i.e. IST. In this paper we present a possible approach to efficiently exploit bandwidth, the most critical resource in a broadband satellite access network, while pursuing satisfaction of delay and bandwidth requirements for applications with guaranteed QoS through a traffic control architecture to be implemented in ground terminals. Performance of this approach is assessed in terms of efficient exploitation of the uplink bandwidth and differentiation and minimization of queuing delays for most demanding applications over a time-varying capacity. Opnet simulations is used as analysis tool.

  11. Inter-Vehicle Communication System Utilizing Autonomous Distributed Transmit Power Control

    NASA Astrophysics Data System (ADS)

    Hamada, Yuji; Sawa, Yoshitsugu; Goto, Yukio; Kumazawa, Hiroyuki

    In ad-hoc network such as inter-vehicle communication (IVC) system, safety applications that vehicles broadcast the information such as car velocity, position and so on periodically are considered. In these applications, if there are many vehicles broadcast data in a communication area, congestion incurs a problem decreasing communication reliability. We propose autonomous distributed transmit power control method to keep high communication reliability. In this method, each vehicle controls its transmit power using feed back control. Furthermore, we design a communication protocol to realize the proposed method, and we evaluate the effectiveness of proposed method using computer simulation.

  12. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    NASA Astrophysics Data System (ADS)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  13. Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks

    DTIC Science & Technology

    2013-09-16

    fOR OFFICL’tb HSE OtuN Contents Introduction Objective 1 Background 1 Review of Internal Controls 4 Finding A. NCACS Did Not Effectively...8fHh’ DODIC.-20 13·134 I v FOR OFFICL’tb HSE ONI-X Introduction Objective The objective of the audit was to determine whether the Navy... HSE ONb\\’ authorized a Common Access Card. In order to avoid the appearance of endorsing Rapidgate, Eid Passport’s trademarked product, in May 2011

  14. 48 CFR 311.7001 - Section 508 accessibility standards for HHS Web site content and communications materials.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Section 508 accessibility... Acquisition Regulations System HEALTH AND HUMAN SERVICES COMPETITION AND ACQUISITION PLANNING DESCRIBING... acquisition of communications products and services, including content in any format, such as reports...

  15. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    NASA Astrophysics Data System (ADS)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  16. Development of a generic system for real-time data access and remote control of multiple in-situ water quality monitoring instruments

    NASA Astrophysics Data System (ADS)

    Wright, S. A.; Bennett, G. E.; Andrews, T.; Melis, T. S.; Topping, D. J.

    2005-05-01

    Currently, in-situ monitoring of water quality parameters (e.g. water temperature, conductivity, turbidity) in the Colorado River ecosystem typically consists of deploying instruments in the river, retrieving them at a later date, downloading the datalogger, then examining the data; an arduous process in the remote settings of Grand Canyon. Under this protocol, data is not available real-time and there is no way to detect problems with the instrumentation until after retrieval. The next obvious stage in the development of in-situ monitoring in Grand Canyon was the advent of one-way telemetry, i.e. streaming data in real-time from the instrument to the office and/or the world-wide-web. This protocol allows for real-time access to data and the identification of instrumentation problems, but still requires a site visit to address instrument malfunctions, i.e. the user does not have the ability to remotely control the instrument. At some field sites, such as the Colorado River in Grand Canyon, site visitation is restricted by remoteness and lack of traditional access routes (i.e. roads). Even at less remote sites, it may still be desirable to have two-way communication with instruments in order to, for example, diagnose and potentially fix instrumentation problems, change sampling parameters to save battery power, etc., without having to visit the site. To this end, the U.S. Geological Survey, Grand Canyon Monitoring and Research Center, is currently developing and testing a high-speed, two-way communication system that allows for real-time data access and remote control of instrumentation. The approach tested relies on internet access and may be especially useful in areas where land-line or cellular connections are unavailable. The system is composed of off-the-shelf products, uses a commercial broadband satellite service, and is designed in a generic way such that any instrument that communicates through RS-232 communication (i.e. a serial port) is compatible with

  17. NASA Unmanned Aircraft (UA) Control and Non-Payload Communication (CNPC) System Waveform Trade Studies

    NASA Technical Reports Server (NTRS)

    Chavez, Carlos; Hammel, Bruce; Hammel, Allan; Moore, John R.

    2014-01-01

    Unmanned Aircraft Systems (UAS) represent a new capability that will provide a variety of services in the government (public) and commercial (civil) aviation sectors. The growth of this potential industry has not yet been realized due to the lack of a common understanding of what is required to safely operate UAS in the National Airspace System (NAS). To address this deficiency, NASA has established a project called UAS Integration in the NAS (UAS in the NAS), under the Integrated Systems Research Program (ISRP) of the Aeronautics Research Mission Directorate (ARMD). This project provides an opportunity to transition concepts, technology, algorithms, and knowledge to the Federal Aviation Administration (FAA) and other stakeholders to help them define the requirements, regulations, and issues for routine UAS access to the NAS. The safe, routine, and efficient integration of UAS into the NAS requires new radio frequency (RF) spectrum allocations and a new data communications system which is both secure and scalable with increasing UAS traffic without adversely impacting the Air Traffic Control (ATC) communication system. These data communications, referred to as Control and Non-Payload Communications (CNPC), whose purpose is to exchange information between the unmanned aircraft and the ground control station to ensure safe, reliable, and effective unmanned aircraft flight operation. A Communications Subproject within the UAS in the NAS Project has been established to address issues related to CNPC development, certification and fielding. The focus of the Communications Subproject is on validating and allocating new RF spectrum and data link communications to enable civil UAS integration into the NAS. The goal is to validate secure, robust data links within the allocated frequency spectrum for UAS. A vision, architectural concepts, and seed requirements for the future commercial UAS CNPC system have been developed by RTCA Special Committee 203 (SC-203) in the process

  18. Experience with ActiveX control for simple channel access

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-05-15

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.

  19. AAL Platform with a "De Facto" Standard Communication Interface (TICO): Training in Home Control in Special Education.

    PubMed

    Guillomía San Bartolomé, Miguel A; Falcó Boudet, Jorge L; Artigas Maestre, José Ignacio; Sánchez Agustín, Ana

    2017-10-12

    Framed within a long-term cooperation between university and special education teachers, training in alternative communication skills and home control was realized using the "TICO" interface, a communication panel editor extensively used in special education schools. From a technological view we follow AAL technology trends by integrating a successful interface in a heterogeneous services AAL platform, focusing on a functional view. Educationally, a very flexible interface in line with communication training allows dynamic adjustment of complexity, enhanced by an accessible mindset and virtual elements significance already in use, offers specific interaction feedback, adapts to the evolving needs and capacities and improves the personal autonomy and self-confidence of children at school and home. TICO-home-control was installed during the last school year in the library of a special education school to study adaptations and training strategies to enhance the autonomy opportunities of its pupils. The methodology involved a case study and structured and semi-structured observations. Five children, considered unable to use commercial home control systems were trained obtaining good results in enabling them to use an open home control system. Moreover this AAL platform has proved efficient in training children in previous cognitive steps like virtual representation and cause-effect interaction.

  20. Speed control system for an access gate

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bzorgi, Fariborz M

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the outputmore » element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.« less

  1. Pharma Pricing & Market Access Europe 2016--Health Network Communications' Tenth Annual Conference (February 23-25, 2016--London, UK).

    PubMed

    D'Souza, P

    2016-03-01

    Tighter national budgets and escalating drug prices continue to present challenges for pharmaceutical market access strategies and societal cost of care. As pharmaceutical companies and medical governmental advisory organizations enter tougher negotiations, hospital trusts and other dispensary firms face barriers to receiving the best medical treatment, and as a result patient access is limited. The 2016 HealthNetwork Communications' Pharma Pricing & Market Access Europe meeting brought together pharmaceutical, medical governmental advisory and stakeholders and market access/pricing consultants, to encourage discussions and negotiations into how to improve the drug pricing system and consequential market access strategies while achieving the respective reimbursement and affordability objectives. Copyright 2016 Prous Science, S.A.U. or its licensors. All rights reserved.

  2. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  3. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  4. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  5. Miniature Transportable Communications Central (MTCC): answering law enforcement needs for worldwide access to command, control, communications, and intelligence (C3I)

    NASA Astrophysics Data System (ADS)

    Maxey, W. John

    1997-02-01

    The Mini-Transportable Communications Central (MTCC), developed by Rome Laboratories C3 Directorate, provides the U.S. Coast Guard (USCG) with a transportable, fast reaction communications terminal. The MTCC is capable of operating as a self-contained miniature command center supporting efforts such as the President's War on Drugs, or the rescue services necessary in the wake of man-made or natural disasters. The MTCC is capable of communicating with field elements including ships, small water-craft, aircraft, other elements of the USCG law enforcement agencies (LEAs), the FAA, and a wide range of U.S. and foreign armed forces. The MTCC terminal is contained in a trailer-mounted shelter suitable for towing by a 3/4 ton truck or for transport by C-130 aircraft. The MTCC provides simultaneous one-way and two-way communications in the HF, VHF, and UHF frequency bands, as well as the INMARSAT international satellite band. The MTCC also offers communications through subscriber and trunk telephone connectivity via ISDN compatible PABX. The MTCC's three channel operations personnel cellular telephone system provides self-contained cellular telephone operations in the vicinity of the deployed shelter. In the USCG application, an operator console inside the air-conditioned shelter serves as the source and destination for voice, data, and fax traffic, by means of secure fax telephone, operator headsets, and a powerful computer workstation that provides word processing, e-mail, and data communications capabilities. The communications operator may reconfigure the system for a specific mission by means of patchfields that enable the selection of radios, encrypted or clear-text operations, audio termination, and antennas.

  6. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  7. Communication Needs Assessment for Distributed Turbine Engine Control

    NASA Technical Reports Server (NTRS)

    Culley, Dennis E.; Behbahani, Alireza R.

    2008-01-01

    Control system architecture is a major contributor to future propulsion engine performance enhancement and life cycle cost reduction. The control system architecture can be a means to effect net weight reduction in future engine systems, provide a streamlined approach to system design and implementation, and enable new opportunities for performance optimization and increased awareness about system health. The transition from a centralized, point-to-point analog control topology to a modular, networked, distributed system is paramount to extracting these system improvements. However, distributed engine control systems are only possible through the successful design and implementation of a suitable communication system. In a networked system, understanding the data flow between control elements is a fundamental requirement for specifying the communication architecture which, itself, is dependent on the functional capability of electronics in the engine environment. This paper presents an assessment of the communication needs for distributed control using strawman designs and relates how system design decisions relate to overall goals as we progress from the baseline centralized architecture, through partially distributed and fully distributed control systems.

  8. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  9. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  10. 46 CFR 185.320 - Steering gear, controls, and communication system tests.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 7 2012-10-01 2012-10-01 false Steering gear, controls, and communication system tests... gear, controls, and communication system tests. The master of a vessel shall have examined and tested the steering gear, signaling whistle, propulsion controls, and communication systems of the vessel...

  11. 46 CFR 185.320 - Steering gear, controls, and communication system tests.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 7 2014-10-01 2014-10-01 false Steering gear, controls, and communication system tests... gear, controls, and communication system tests. The master of a vessel shall have examined and tested the steering gear, signaling whistle, propulsion controls, and communication systems of the vessel...

  12. 46 CFR 185.320 - Steering gear, controls, and communication system tests.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Steering gear, controls, and communication system tests... gear, controls, and communication system tests. The master of a vessel shall have examined and tested the steering gear, signaling whistle, propulsion controls, and communication systems of the vessel...

  13. Fine pointing control for free-space optical communication

    NASA Technical Reports Server (NTRS)

    Portillo, A. A.; Ortiz, G. G.; Racho, C.

    2000-01-01

    Free-Space Optical Communications requires precise, stable laser pointing to maintain operating conditions. This paper also describes the software and hardware implementation of Fine Pointing Control based on the Optical Communications Demonstrator architecture.

  14. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  15. Development of a coding form for approach control/pilot voice communications.

    DOT National Transportation Integrated Search

    1995-05-01

    The Aviation Topics Speech Acts Taxonomy (ATSAT) is a tool for categorizing pilot/controller communications according to their purpose and for classifying communication errors. Air traffic controller communications that deviate from FAA Air Traffic C...

  16. Controlled Bidirectional Quantum Secure Direct Communication

    PubMed Central

    Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan

    2014-01-01

    We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages. PMID:25006596

  17. AAL Platform with a “De Facto” Standard Communication Interface (TICO): Training in Home Control in Special Education

    PubMed Central

    Guillomía San Bartolomé, Miguel A.; Artigas Maestre, José Ignacio; Sánchez Agustín, Ana

    2017-01-01

    Framed within a long-term cooperation between university and special education teachers, training in alternative communication skills and home control was realized using the “TICO” interface, a communication panel editor extensively used in special education schools. From a technological view we follow AAL technology trends by integrating a successful interface in a heterogeneous services AAL platform, focusing on a functional view. Educationally, a very flexible interface in line with communication training allows dynamic adjustment of complexity, enhanced by an accessible mindset and virtual elements significance already in use, offers specific interaction feedback, adapts to the evolving needs and capacities and improves the personal autonomy and self-confidence of children at school and home. TICO-home-control was installed during the last school year in the library of a special education school to study adaptations and training strategies to enhance the autonomy opportunities of its pupils. The methodology involved a case study and structured and semi-structured observations. Five children, considered unable to use commercial home control systems were trained obtaining good results in enabling them to use an open home control system. Moreover this AAL platform has proved efficient in training children in previous cognitive steps like virtual representation and cause-effect interaction. PMID:29023383

  18. Access control and privilege management in electronic health record: a systematic literature review.

    PubMed

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  19. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  20. Therapists' Perspectives: Supporting Children to Use Switches and Technology for Accessing Their Environment, Leisure, and Communication

    ERIC Educational Resources Information Center

    Beauchamp, Fiona; Bourke-Taylor, Helen; Brown, Ted

    2018-01-01

    Background: Many children with cerebral palsy learn to use technology to access their environments and communicate; however, minimal research informs practice. Methods: A descriptive qualitative study with purposive sampling recruited 10 therapists (occupational, speech, and physiotherapists) from one early intervention service. Data were…

  1. Distributed observing facility for remote access to multiple telescopes

    NASA Astrophysics Data System (ADS)

    Callegari, Massimo; Panciatici, Antonio; Pasian, Fabio; Pucillo, Mauro; Santin, Paolo; Aro, Simo; Linde, Peter; Duran, Maria A.; Rodriguez, Jose A.; Genova, Francoise; Ochsenbein, Francois; Ponz, J. D.; Talavera, Antonio

    2000-06-01

    The REMOT (Remote Experiment Monitoring and conTrol) project was financed by 1996 by the European Community in order to investigate the possibility of generalizing the remote access to scientific instruments. After the feasibility of this idea was demonstrated, the DYNACORE (DYNAmically, COnfigurable Remote Experiment monitoring and control) project was initiated as a REMOT follow-up. Its purpose is to develop software technology to support scientists in two different domains, astronomy and plasma physics. The resulting system allows (1) simultaneous multiple user access to different experimental facilities, (2) dynamic adaptability to different kinds of real instruments, (3) exploitation of the communication infrastructures features, (4) ease of use through intuitive graphical interfaces, and (5) additional inter-user communication using off-the-shelf projects such as video-conference tools, chat programs and shared blackboards.

  2. Ad Hoc Access Gateway Selection Algorithm

    NASA Astrophysics Data System (ADS)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  3. [Style of communication between mission control centers and space crews].

    PubMed

    Iusupova, A K; Gushchin, V I; Shved, D M; Cheveleva, L M

    2011-01-01

    The article deals with a pilot investigation into the audio communication of cosmonauts with ground controllers. The purpose was to verify in space flight the patterns and trends revealed in model tests of intergroup communication, and to pinpoint the signature of multinational crew communication with 2 national mission control centers (MCCs). The investigation employed authors' content-analysis adapted to the scenario of long-duration mission. The investigation resulted in a phenomenon of double-loop ground-orbit communication, divergence, difference in opinion predictable from the concept formulated by G.T.Beregovoi. Also, there was a notable difference of expressions used by controllers of 2 MCCs.

  4. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  5. The Dissemination and Accessibility of Canadian Government Information.

    ERIC Educational Resources Information Center

    Morton, Bruce; Zink, Steven D.

    1992-01-01

    Discusses information agencies and issues that affect the dissemination and accessibility of Canadian government information, including the Canada Communication Group, depository libraries, the National Library, bibliographic control of government information, the Canada Institute for Scientific and Technical Information, Statistics Canada,…

  6. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  7. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  8. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  9. Hormone-dependent control of developmental timing through regulation of chromatin accessibility

    PubMed Central

    Uyehara, Christopher M.; Nystrom, Spencer L.; Niederhuber, Matthew J.; Leatham-Jensen, Mary; Ma, Yiqin; Buttitta, Laura A.

    2017-01-01

    Specification of tissue identity during development requires precise coordination of gene expression in both space and time. Spatially, master regulatory transcription factors are required to control tissue-specific gene expression programs. However, the mechanisms controlling how tissue-specific gene expression changes over time are less well understood. Here, we show that hormone-induced transcription factors control temporal gene expression by regulating the accessibility of DNA regulatory elements. Using the Drosophila wing, we demonstrate that temporal changes in gene expression are accompanied by genome-wide changes in chromatin accessibility at temporal-specific enhancers. We also uncover a temporal cascade of transcription factors following a pulse of the steroid hormone ecdysone such that different times in wing development can be defined by distinct combinations of hormone-induced transcription factors. Finally, we show that the ecdysone-induced transcription factor E93 controls temporal identity by directly regulating chromatin accessibility across the genome. Notably, we found that E93 controls enhancer activity through three different modalities, including promoting accessibility of late-acting enhancers and decreasing accessibility of early-acting enhancers. Together, this work supports a model in which an extrinsic signal triggers an intrinsic transcription factor cascade that drives development forward in time through regulation of chromatin accessibility. PMID:28536147

  10. SAFE: SPARQL Federation over RDF Data Cubes with Access Control.

    PubMed

    Khan, Yasar; Saleem, Muhammad; Mehdi, Muntazir; Hogan, Aidan; Mehmood, Qaiser; Rebholz-Schuhmann, Dietrich; Sahay, Ratnesh

    2017-02-01

    Several query federation engines have been proposed for accessing public Linked Open Data sources. However, in many domains, resources are sensitive and access to these resources is tightly controlled by stakeholders; consequently, privacy is a major concern when federating queries over such datasets. In the Healthcare and Life Sciences (HCLS) domain real-world datasets contain sensitive statistical information: strict ownership is granted to individuals working in hospitals, research labs, clinical trial organisers, etc. Therefore, the legal and ethical concerns on (i) preserving the anonymity of patients (or clinical subjects); and (ii) respecting data ownership through access control; are key challenges faced by the data analytics community working within the HCLS domain. Likewise statistical data play a key role in the domain, where the RDF Data Cube Vocabulary has been proposed as a standard format to enable the exchange of such data. However, to the best of our knowledge, no existing approach has looked to optimise federated queries over such statistical data. We present SAFE: a query federation engine that enables policy-aware access to sensitive statistical datasets represented as RDF data cubes. SAFE is designed specifically to query statistical RDF data cubes in a distributed setting, where access control is coupled with source selection, user profiles and their access rights. SAFE proposes a join-aware source selection method that avoids wasteful requests to irrelevant and unauthorised data sources. In order to preserve anonymity and enforce stricter access control, SAFE's indexing system does not hold any data instances-it stores only predicates and endpoints. The resulting data summary has a significantly lower index generation time and size compared to existing engines, which allows for faster updates when sources change. We validate the performance of the system with experiments over real-world datasets provided by three clinical organisations as

  11. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  12. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  13. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  14. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  15. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  16. Information-Flow-Based Access Control for Web Browsers

    NASA Astrophysics Data System (ADS)

    Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu

    The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.

  17. The effects of hands-free communication device systems: communication changes in hospital organizations.

    PubMed

    Richardson, Joshua E; Ash, Joan S

    2010-01-01

    To analyze the effects that hands-free communication device (HCD) systems have on healthcare organizations from multiple user perspectives. This exploratory qualitative study recruited 26 subjects from multiple departments in two research sites located in Portland, Oregon: an academic medical center and a community hospital. Interview and observation data were gathered January through March, 2007. Data were analyzed using a grounded theory approach. Because this study was exploratory, data were coded and patterns identified until overall themes 'emerged'. Five themes arose: (1) Communication access-the perception that HCD systems provide fast and efficient communication that supports workflow; (2) Control-social and technical considerations associated with use of an HCD system; (3) Training-processes that should be used to improve use of the HCD system; (4) Organizational change-changes to organizational design and behavior caused by HCD system implementation; and (5) Environment and infrastructure-HCD system use within the context of physical workspaces. HCD systems improve communication access but users experience challenges integrating the system into workflow. Effective HCD use depends on how well organizations train users, adapt to changes brought about by HCD systems, and integrate HCD systems into physical surroundings.

  18. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    PubMed Central

    Guo, Yunchuan; Yin, Lihua; Li, Chao

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  19. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    PubMed

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  20. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  1. Communication and the Control Revolution.

    ERIC Educational Resources Information Center

    Beniger, James R.

    1992-01-01

    Describes the efforts of Henry Crowell, developer of Quaker Oats, to develop a market for breakfast cereals using market research and advertising. Examines how innovations in communications technology have been brought about by the struggle to control the material economy in the face of industrialization. Traces the development of the information…

  2. Minimizing communication cost among distributed controllers in software defined networks

    NASA Astrophysics Data System (ADS)

    Arlimatti, Shivaleela; Elbreiki, Walid; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Software Defined Networking (SDN) is a new paradigm to increase the flexibility of today's network by promising for a programmable network. The fundamental idea behind this new architecture is to simplify network complexity by decoupling control plane and data plane of the network devices, and by making the control plane centralized. Recently controllers have distributed to solve the problem of single point of failure, and to increase scalability and flexibility during workload distribution. Even though, controllers are flexible and scalable to accommodate more number of network switches, yet the problem of intercommunication cost between distributed controllers is still challenging issue in the Software Defined Network environment. This paper, aims to fill the gap by proposing a new mechanism, which minimizes intercommunication cost with graph partitioning algorithm, an NP hard problem. The methodology proposed in this paper is, swapping of network elements between controller domains to minimize communication cost by calculating communication gain. The swapping of elements minimizes inter and intra communication cost among network domains. We validate our work with the OMNeT++ simulation environment tool. Simulation results show that the proposed mechanism minimizes the inter domain communication cost among controllers compared to traditional distributed controllers.

  3. Distributed synchronization control of complex networks with communication constraints.

    PubMed

    Xu, Zhenhua; Zhang, Dan; Song, Hongbo

    2016-11-01

    This paper is concerned with the distributed synchronization control of complex networks with communication constraints. In this work, the controllers communicate with each other through the wireless network, acting as a controller network. Due to the constrained transmission power, techniques such as the packet size reduction and transmission rate reduction schemes are proposed which could help reduce communication load of the controller network. The packet dropout problem is also considered in the controller design since it is often encountered in networked control systems. We show that the closed-loop system can be modeled as a switched system with uncertainties and random variables. By resorting to the switched system approach and some stochastic system analysis method, a new sufficient condition is firstly proposed such that the exponential synchronization is guaranteed in the mean-square sense. The controller gains are determined by using the well-known cone complementarity linearization (CCL) algorithm. Finally, a simulation study is performed, which demonstrates the effectiveness of the proposed design algorithm. Copyright © 2016 ISA. Published by Elsevier Ltd. All rights reserved.

  4. Mapping communicable disease control in the European union.

    PubMed

    Elliott, Heather A; Jones, David K; Greer, Scott L

    2012-12-01

    Understanding both the current performance of communicable disease control in Europe and the scale of the differences among systems is crucial to understanding its present performance and possible Europeanization. We attempt to identify the structure of authority in communicable disease control in each European Union (EU) member state. The primary sources of information were the competent bodies list posted on the European Centre for Disease Prevention and Control website and the Health in Transition reports produced by the European Observatory on Health Systems and Policies. Three key patterns emerge to answer the question of who does what. First, the landscape is full and crowded, with many actors involved. Second, the landscape is highly fragmented, with many organizations performing overlapping functions in each country. Third, regional patterns describe which types of organizations are assigned which functions. These full, fragmented, and regionally disparate systems show no signs of constituting a shared model. As a result, if there is an EU model of communicable disease control today, it is at most an aspiration.

  5. Implementation of emergency department transfer communication measures in Minnesota critical access hospitals.

    PubMed

    Klingner, Jill; Moscovice, Ira; Casey, Michelle; McEllistrem Evenson, Alex

    2015-01-01

    Previously published findings based on field tests indicated that emergency department patient transfer communication measures are feasible and worthwhile to implement in rural hospitals. This study aims to expand those findings by focusing on the wide-scale implementation of these measures in the 79 Critical Access Hospitals (CAHs) in Minnesota from 2011 to 2013. Information was obtained from interviews with key informants involved in implementing the emergency department patient transfer communication measures in Minnesota as part of required statewide quality reporting. The first set of interviews targeted state-level organizations regarding their experiences working with providers. A second set of interviews targeted quality and administrative staff from CAHs regarding their experiences implementing measures. Implementing the measures in Minnesota CAHs proved to be successful in a number of respects, but informants also faced new challenges. Our recommendations, addressed to those seeking to successfully implement these measures in other states, take these challenges into account. Field-testing new quality measure implementations with volunteers may not be indicative of a full-scale implementation that requires facilities to participate. The implementation team's composition, communication efforts, prior relationships with facilities and providers, and experience with data collection and abstraction tools are critical factors in successfully implementing required reporting of quality measures on a wide scale. © 2014 National Rural Health Association.

  6. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  7. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  8. Access Control for Mobile Assessment Systems Using ID.

    PubMed

    Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma

    2015-01-01

    The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.

  9. Scholarly Publishing's Evolving Landscape: Impact Metrics, Electronic-Only Journals, and Open Access in Journalism and Communication Research

    ERIC Educational Resources Information Center

    Antell, Karen; Foote, Joe S.; Foote, Jody Bales

    2016-01-01

    This study surveys the landscape of scholarly publishing, with particular emphasis on scholarly journals in the communication discipline, measuring the shift to electronic publishing in six selected disciplines and exploring two other important emerging topics: open-access publishing and new journal citation metrics. The goals are to inform…

  10. [Scientific writing, scientific communication and open access: an international, multidisciplinary project--NECOBELAC].

    PubMed

    Pulido, Diony; Robledo, Rocío; Agudelo, Carlos A

    2009-01-01

    A collaboration network involving 6 countries in Europe, Latin-America and the Caribbean has embarked on a project (Network of Collaboration Between Europe and Latin American Caribbean Countries-NECOBELAC; www.necobelac.eu) aimed at improving scientific writing open access and scholarly communication to spread know-how regarding current and future issues and information related to health. The NECOBELAC project is sponsored by the European Community (7th Framework Programme) and will last for 3 years. The project recognises the challenge arising from socio-cultural differences between the participating countries and will deal with generating networks involving institutions working in close collaboration for carrying out training and know-how exchange programmes aimed at producing open access information and spreading it (including technical and ethical aspects). The NECOBELAC project currently involves the Istituto Superiore di Sanità - ISS from Italy (coordinating the project), the Consejo Superior de Investigaciones Científicas (CSIC) from Spain, the University of Nottingham (SHERPA) from the United Kingdom, BIREME from Brazil, the Instituto de Salud Pública (ISP) from Colombia and the Universidade de Minho from Portugal.

  11. The views of stakeholders on controlled access schemes for high-cost antirheumatic biological medicines in Australia

    PubMed Central

    Lu, Christine Y; Ritchie, Jan; Williams, Ken; Day, Ric

    2007-01-01

    Background In Australia, government-subsidised access to high-cost medicines is "targeted" to particular sub-sets of patients under the Pharmaceutical Benefits Scheme to achieve cost-effective use. In order to determine how this access system could be improved, the opinions of key stakeholders on access to biological agents for rheumatoid arthritis were explored. Methods Thirty-six semi-structured interviews were conducted with persons from relevant stakeholder groups. These were transcribed verbatim, and analysed thematically. Results Controlled access to expensive medicines was considered to be equitable and practical; however, there was disagreement as to the method of defining the target patient populations. Other concerns included timeliness of access, excessive bureaucracy, and the need for additional resources to facilitate the scheme. Collaboration between stakeholders was deemed important because it allows more equitable distribution of limited resources. The majority considered that stakeholder consultation should have been broader. Most wanted increased transparency of the decision-making process, ongoing and timely review of access criteria, and an increased provision of information for patients. More structured communication between stakeholders was proposed. Conclusion The Pharmaceutical Benefit Scheme is adapting to meet the changing needs of patients. Provision of subsidised access to high-cost medicines in a manner that is affordable for individuals and society, and that is equitable and efficiently managed is challenging. The views of stakeholders on targeted access to anti-rheumatic biological medicines in Australia acknowledged this challenge and provided a number of suggestions for modifications. These could serve as a basis to inform the debate on how to change the processes and policies so as to improve the scheme. PMID:18096055

  12. The National Action Plan for the Prevention and Control of Non-communicable Diseases and Health Promotion in Pakistan--Cardiovascular diseases.

    PubMed

    Nishtar, Sania; Faruqui, Azhar M A; Mattu, Mohamad A; Mohamud, Khalif Bile; Ahmed, Ashfaq

    2004-12-01

    The National Action Plan for Non-Communicable Disease Prevention, Control and Health Promotion in Pakistan (NAP-NCD) incorporates prevention and control of cardiovascular diseases (CVD) as part of a comprehensive and integrated non-communicable Disease (NCD) prevention effort. In this programme, surveillance of cardiovascular risk factors is part of an integrated population-based NCD surveillance system. The population approach to CVD prevention is a priority area in this programme with a focus on broad policy measures and behavioural change communication. The former include revision of the current policy on diet and nutrition to expand its focus on under-nutrition; the development of a physical activity policy; strategies to limit the production of, and access to, ghee as a medium for cooking and agricultural and fiscal policies that increase the demand for, and make healthy food more accessible. The programme focuses attention on improving the quality of prevention programmes within primary and basic health sites and integrates concerted primary and secondary prevention programmes into health services as part of a comprehensive and sustainable, scientifically valid, and resource-sensitive programme for all categories of healthcare providers. It promotes screening for raised blood pressure at the population level and screening for dyslipidaemia and diabetes in high-risk groups only. It highlights the need to ensure the availability of aspirin, beta blockers, thiazides, ACE inhibitors, statins and penicillin at all levels of healthcare. The programme points out the need to conduct clinical end-point trials in the native Pakistani setting to define cost-effective therapeutic strategies for primary and secondary prevention of CVDs. Emphasis is laid on building capacity of health systems in support of CVD prevention and control and building a coalition or network of organizations to add momentum to CVD prevention and control efforts.

  13. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  14. Open access publishing, article downloads, and citations: randomised controlled trial

    PubMed Central

    Lewenstein, Bruce V; Simon, Daniel H; Booth, James G; Connolly, Mathew J L

    2008-01-01

    Objective To measure the effect of free access to the scientific literature on article downloads and citations. Design Randomised controlled trial. Setting 11 journals published by the American Physiological Society. Participants 1619 research articles and reviews. Main outcome measures Article readership (measured as downloads of full text, PDFs, and abstracts) and number of unique visitors (internet protocol addresses). Citations to articles were gathered from the Institute for Scientific Information after one year. Interventions Random assignment on online publication of articles published in 11 scientific journals to open access (treatment) or subscription access (control). Results Articles assigned to open access were associated with 89% more full text downloads (95% confidence interval 76% to 103%), 42% more PDF downloads (32% to 52%), and 23% more unique visitors (16% to 30%), but 24% fewer abstract downloads (−29% to −19%) than subscription access articles in the first six months after publication. Open access articles were no more likely to be cited than subscription access articles in the first year after publication. Fifty nine per cent of open access articles (146 of 247) were cited nine to 12 months after publication compared with 63% (859 of 1372) of subscription access articles. Logistic and negative binomial regression analysis of article citation counts confirmed no citation advantage for open access articles. Conclusions Open access publishing may reach more readers than subscription access publishing. No evidence was found of a citation advantage for open access articles in the first year after publication. The citation advantage from open access reported widely in the literature may be an artefact of other causes. PMID:18669565

  15. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon.

    PubMed

    de Brito, Silvana Rossy; da Silva, Aleksandra do Socorro; Cruz, Adejard Gaia; Monteiro, Maurílio de Abreu; Vijaykumar, Nandamudi Lankalapalli; da Silva, Marcelino Silva; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa

    2016-01-01

    This study fills demand for data on access and use of information and communication technologies (ICT) in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i) with computers and Internet access, (ii) with mobile phones, and (iii) with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with other regions of Brazil, we use a concentration index to quantify the concentration of households in the following classes: with computers and Internet access, with mobile phones, with fixed phones, and no access. These data are analyzed along with municipal indicators on income, education, electricity, and population size. The results show that for urban households, the average concentration in the municipalities of the Amazon for computers and Internet access and for fixed phones is lower than in other regions of the country; meanwhile, that for no access and mobile phones is higher than in any other region. For rural households, the average concentration in the municipalities of the Amazon for computers and Internet access, mobile phones, and fixed phones is lower than in any other region of the country; meanwhile, that for no access is higher than in any other region. In addition, the study shows that education and income are determinants of inequality in accessing ICT in Brazilian municipalities and that the existence of electricity in rural households is directly associated with the ownership of ICT resources.

  16. Concentration of Access to Information and Communication Technologies in the Municipalities of the Brazilian Legal Amazon

    PubMed Central

    de Brito, Silvana Rossy; da Silva, Aleksandra do Socorro; Cruz, Adejard Gaia; Monteiro, Maurílio de Abreu; Vijaykumar, Nandamudi Lankalapalli; da Silva, Marcelino Silva; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa

    2016-01-01

    This study fills demand for data on access and use of information and communication technologies (ICT) in the Brazilian legal Amazon, a region of localities with identical economic, political, and social problems. We use the 2010 Brazilian Demographic Census to compile data on urban and rural households (i) with computers and Internet access, (ii) with mobile phones, and (iii) with fixed phones. To compare the concentration of access to ICT in the municipalities of the Brazilian Amazon with other regions of Brazil, we use a concentration index to quantify the concentration of households in the following classes: with computers and Internet access, with mobile phones, with fixed phones, and no access. These data are analyzed along with municipal indicators on income, education, electricity, and population size. The results show that for urban households, the average concentration in the municipalities of the Amazon for computers and Internet access and for fixed phones is lower than in other regions of the country; meanwhile, that for no access and mobile phones is higher than in any other region. For rural households, the average concentration in the municipalities of the Amazon for computers and Internet access, mobile phones, and fixed phones is lower than in any other region of the country; meanwhile, that for no access is higher than in any other region. In addition, the study shows that education and income are determinants of inequality in accessing ICT in Brazilian municipalities and that the existence of electricity in rural households is directly associated with the ownership of ICT resources. PMID:27035577

  17. A federated capability-based access control mechanism for internet of things (IoTs)

    NASA Astrophysics Data System (ADS)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  18. Fertility Effects of Abortion and Birth Control Pill Access for Minors

    PubMed Central

    GULDI, MELANIE

    2008-01-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor’s legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women’s birthrates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birthrates among whites. PMID:19110899

  19. Fertility effects of abortion and birth control pill access for minors.

    PubMed

    Guldi, Melanie

    2008-11-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.

  20. 11. CENTRAL ATLAS CONTROL CONSOLE IN SLC3W CONTROL ROOM. COMMUNICATIONS ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    11. CENTRAL ATLAS CONTROL CONSOLE IN SLC-3W CONTROL ROOM. COMMUNICATIONS HEADSETS IN FOREGROUND. - Vandenberg Air Force Base, Space Launch Complex 3, Launch Operations Building, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  1. Reputation, relationships, risk communication, and the role of trust in the prevention and control of communicable disease: a review.

    PubMed

    Cairns, Georgina; de Andrade, Marisa; MacDonald, Laura

    2013-01-01

    Population-level compliance with health protective behavioral advice to prevent and control communicable disease is essential to optimal effectiveness. Multiple factors affect perceptions of trustworthiness, and trust in advice providers is a significant predeterminant of compliance. While competency in assessment and management of communicable disease risks is critical, communications competency may be equally important. Organizational reputation, quality of stakeholder relationships and risk information provision strategies are trust moderating factors, whose impact is strongly influenced by the content, timing and coordination of communications. This article synthesizes the findings of 2 literature reviews on trust moderating communications and communicable disease prevention and control. We find a substantial evidence base on risk communication, but limited research on other trust building communications. We note that awareness of good practice historically has been limited although interest and the availability of supporting resources is growing. Good practice and policy elements are identified: recognition that crisis and risk communications require different strategies; preemptive dialogue and planning; evidence-based approaches to media relations and messaging; and building credibility for information sources. Priority areas for future research include process and cost-effectiveness evaluation and the development of frameworks that integrate communication and biomedical disease control and prevention functions, conceptually and at scale.

  2. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  3. Evaluation of modified work zone traffic control devices at business accesses

    DOT National Transportation Integrated Search

    2001-01-01

    Modified work zone traffic control devices at business accesses were evaluated on two Oregon Department of Transportation (ODOT) projects in 1999 and 2000. On one section project, blue Temporary Business Access" signs were used at business accesses d...

  4. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  5. Communication Dependent Control of Multi-Vehicle Formations

    DTIC Science & Technology

    2016-05-11

    On Maximizing the Second Smallest Eigen- value of a State-Dependent Graph Laplacian,” IEEE Transactions on Au- tomatic Control, vol. 51, no. 1, pp...Collective Motion With Limited Communication,” IEEE Transactions on Au- tomatic Control, vol. 53, no. 3, pp. 706–719, 2008. [Online]. Available: http

  6. A novel asynchronous access method with binary interfaces

    PubMed Central

    2008-01-01

    Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches). Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation. PMID:18959797

  7. Access Control for Cooperation Systems Based on Group Situation

    NASA Astrophysics Data System (ADS)

    Kim, Minsoo; Joshi, James B. D.; Kim, Minkoo

    Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While individual agent context is important, the overall cooperation behavior is more driven by the group context because of relationships and interactions between agents. Dynamic access control based on group situation is a crucial challenge in such cooperation systems. In this paper we propose a dynamic role based access control model for cooperation systems based on group situation. The model emphasizes capability based agent to role mapping and group situation based permission assignment to allow capturing dynamic access policies that evolve continuously.

  8. The effect of patient race and blood pressure control on patient-physician communication.

    PubMed

    Cené, Crystal W; Roter, Debra; Carson, Kathryn A; Miller, Edgar R; Cooper, Lisa A

    2009-09-01

    Racial disparities in hypertension control contribute to higher rates of cardiovascular mortality among blacks. Patient-physician communication quality is associated with better health outcomes, including blood pressure (BP) control. Both race/ethnicity and BP control may adversely affect communication. To determine whether being black and having poor BP control interact to adversely affect patient-physician communication more than either condition alone, a situation referred to as "double jeopardy." Cross-sectional study of enrollment data from a randomized controlled trial of interventions to enhance patient adherence to therapy for hypertension. Participants included 226 hypertensive patients and 39 physicians from 15 primary care practices in Baltimore, MD. Communication behaviors and visit length from coding of audiotapes. After controlling for patient and physician characteristics, blacks with uncontrolled BP have shorter visits (B = -3.9 min, p < 0.01) with less biomedical (B = -24.0, p = 0.05), psychosocial (B = -19.4, p < 0.01), and rapport-building (B = -19.5, p = 0.01) statements than whites with controlled BP. Of all communication outcomes, blacks with uncontrolled BP are only in "double jeopardy" for a patient positive affect-coders give them lower ratings than all other patients. Blacks with controlled BP also experience shorter visits and less communication with physicians than whites with controlled BP. There are no significant communication differences between the visits of whites with uncontrolled versus controlled BP. This study reveals that patient race is associated with the quality of patient-physician communication to a greater extent than BP control. Interventions that improve patient-physician communication should be tested as a strategy to reduce racial disparities in hypertension care and outcomes.

  9. 47 CFR 1.1849 - Program accessibility: Discrimination prohibited.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... prohibited. 1.1849 Section 1.1849 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND... the Federal Communications Commission § 1.1849 Program accessibility: Discrimination prohibited. (a... interpreters, communication access realtime translation (CART) providers, transcribers, captioners, and readers...

  10. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  11. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    NASA Astrophysics Data System (ADS)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  12. [Public control and equity of access to hospitals under non-State public administration].

    PubMed

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  13. Toward Privacy-preserving Content Access Control for Information Centric Networking

    DTIC Science & Technology

    2014-03-01

    REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting

  14. Technology-based intervention programs to promote stimulation control and communication in post-coma persons with different levels of disability

    PubMed Central

    Lancioni, Giulio E.; Bosco, Andrea; Olivetti Belardinelli, Marta; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Oliva, Doretta

    2013-01-01

    Post-coma persons in a minimally conscious state and with extensive motor impairment or emerging/emerged from such a state, but affected by lack of speech and motor impairment, tend to be passive and isolated. A way to help them develop functional responding to control environmental events and communication involves the use of intervention programs relying on assistive technology. This paper provides an overview of technology-based intervention programs for enabling the participants to (a) access brief periods of stimulation through one or two microswitches, (b) pursue stimulation and social contact through the combination of a microswitch and a sensor connected to a speech generating device (SGD) or through two SGD-related sensors, (c) control stimulation options through computer or radio systems and a microswitch, (d) communicate through modified messaging or telephone systems operated via microswitch, and (e) control combinations of leisure and communication options through computer systems operated via microswitch. Twenty-six studies, involving a total of 52 participants, were included in this paper. The intervention programs were carried out using single-subject methodology, and their outcomes were generally considered positive from the standpoint of the participants and their context. Practical implications of the programs are discussed. PMID:24574992

  15. Public Access; Public Interest. The Network Project. Notebook Number 11.

    ERIC Educational Resources Information Center

    Columbia Univ., New York, NY. Network Project.

    The transcript of a panel discussion and an essay on public access to and control of society's information resources are presented. It is contended that the electronic Media--including radio, television, and communication satellites--are controlled by a select group of individuals and corporations and that they are not meeting the public interest.…

  16. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  17. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  18. Perceived control and communication about sex: a study of South African families.

    PubMed

    Goodnight, Bradley; Salama, Christina; Grim, Elizabeth C; Anthony, Elizabeth R; Armistead, Lisa; Cook, Sarah L; Skinner, Donald; Toefy, Yoesrie

    2014-01-01

    Caregiver-youth communication about sex protects youth against HIV/AIDS, and caregivers who believe that sex knowledge is important are more likely to talk to their youth about sex. However, caregivers who experience barriers to communication about sex may not talk to their youth about sex even if the caregiver believes that sex education is important. The Theory of Planned Behaviour predicts that an actor has perceived control is necessary for behavioural change. This study therefore hypothesised that caregivers' perceived control moderates the relationship between caregiver attitudes about youth sex knowledge and caregiver-youth communication about sex. Results from a sample of 99 female South African caregivers of adolescent (10-14 year old) youth supported our hypothesis, indicating that caregiver attitudes about providing youth with sex knowledge positively predict communication about sex only when caregivers have perceived control. This finding illustrates the importance of perceived control in predicting caregiver-youth communication, and therefore has implications for family-based interventions aimed at improving caregiver-youth communication about sex.

  19. Airborne wireless communication systems, airborne communication methods, and communication methods

    DOEpatents

    Deaton, Juan D [Menan, ID; Schmitt, Michael J [Idaho Falls, ID; Jones, Warren F [Idaho Falls, ID

    2011-12-13

    An airborne wireless communication system includes circuitry configured to access information describing a configuration of a terrestrial wireless communication base station that has become disabled. The terrestrial base station is configured to implement wireless communication between wireless devices located within a geographical area and a network when the terrestrial base station is not disabled. The circuitry is further configured, based on the information, to configure the airborne station to have the configuration of the terrestrial base station. An airborne communication method includes answering a 911 call from a terrestrial cellular wireless phone using an airborne wireless communication system.

  20. An Analysis of Tower (Ground) Controller - Pilot Voice Communications

    DOT National Transportation Integrated Search

    1995-11-01

    This report is based on an analysis of over 48 hours of pilot-controller communications recorded from the ground-control : frequency at twelve air traffic control towers. The analysis examined the complexity of controller instructions, that : is, how...

  1. Nonverbal Social Communication and Gesture Control in Schizophrenia

    PubMed Central

    Walther, Sebastian; Stegmayer, Katharina; Sulzbacher, Jeanne; Vanbellingen, Tim; Müri, René; Strik, Werner; Bohlhalter, Stephan

    2015-01-01

    Schizophrenia patients are severely impaired in nonverbal communication, including social perception and gesture production. However, the impact of nonverbal social perception on gestural behavior remains unknown, as is the contribution of negative symptoms, working memory, and abnormal motor behavior. Thus, the study tested whether poor nonverbal social perception was related to impaired gesture performance, gestural knowledge, or motor abnormalities. Forty-six patients with schizophrenia (80%), schizophreniform (15%), or schizoaffective disorder (5%) and 44 healthy controls matched for age, gender, and education were included. Participants completed 4 tasks on nonverbal communication including nonverbal social perception, gesture performance, gesture recognition, and tool use. In addition, they underwent comprehensive clinical and motor assessments. Patients presented impaired nonverbal communication in all tasks compared with controls. Furthermore, in contrast to controls, performance in patients was highly correlated between tasks, not explained by supramodal cognitive deficits such as working memory. Schizophrenia patients with impaired gesture performance also demonstrated poor nonverbal social perception, gestural knowledge, and tool use. Importantly, motor/frontal abnormalities negatively mediated the strong association between nonverbal social perception and gesture performance. The factors negative symptoms and antipsychotic dosage were unrelated to the nonverbal tasks. The study confirmed a generalized nonverbal communication deficit in schizophrenia. Specifically, the findings suggested that nonverbal social perception in schizophrenia has a relevant impact on gestural impairment beyond the negative influence of motor/frontal abnormalities. PMID:25646526

  2. End-to-End Flow Control for Visual-Haptic Communication under Bandwidth Change

    NASA Astrophysics Data System (ADS)

    Yashiro, Daisuke; Tian, Dapeng; Yakoh, Takahiro

    This paper proposes an end-to-end flow controller for visual-haptic communication. A visual-haptic communication system transmits non-real-time packets, which contain large-size visual data, and real-time packets, which contain small-size haptic data. When the transmission rate of visual data exceeds the communication bandwidth, the visual-haptic communication system becomes unstable owing to buffer overflow. To solve this problem, an end-to-end flow controller is proposed. This controller determines the optimal transmission rate of visual data on the basis of the traffic conditions, which are estimated by the packets for haptic communication. Experimental results confirm that in the proposed method, a short packet-sending interval and a short delay are achieved under bandwidth change, and thus, high-precision visual-haptic communication is realized.

  3. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  4. Intelligent communication assistant for databases

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jakobson, G.; Shaked, V.; Rowley, S.

    1983-01-01

    An intelligent communication assistant for databases, called FRED (front end for databases) is explored. FRED is designed to facilitate access to database systems by users of varying levels of experience. FRED is a second generation of natural language front-ends for databases and intends to solve two critical interface problems existing between end-users and databases: connectivity and communication problems. The authors report their experiences in developing software for natural language query processing, dialog control, and knowledge representation, as well as the direction of future work. 10 references.

  5. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  6. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  7. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  8. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  9. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  10. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  11. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  12. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  13. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  14. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  15. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  16. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  17. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  18. Access to mobile communications by older people.

    PubMed

    Nguyen, Toan; Irizarry, Carol; Garrett, Rob; Downing, Andrew

    2015-06-01

    To investigate how older people effectively identify, select and learn to use mobile communications technologies to enhance communication and safety, and support independent living. One hundred and fifty-three older South Australians participated in a purpose-designed survey questionnaire. Older people relied on family and friends for information and advice (76%), and their children's assistance with buying (45%) and learning to use (48%) new technology. The most preferred learning method was face-to-face training (56%). Less than half (44%) were interested in trying out new designs/applications, functions and capabilities that could assist with independent living. The highest need was for personal security and emergencies (88%). Findings suggest that the family and friends of older people play an important role in identifying, selecting and learning to use mobile communication technologies. The safety and emergency capabilities of mobile communications technologies were more important than having functions that could assist with independent living. © 2014 ACOTA.

  19. Automating Access Control Logics in Simple Type Theory with LEO-II

    NASA Astrophysics Data System (ADS)

    Benzmüller, Christoph

    Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory and we have demonstrated that the higher-order theorem prover LEO-II can automate reasoning in and about them. In this paper we combine these results and describe a sound (and complete) embedding of different access control logics in simple type theory. Employing this framework we show that the off the shelf theorem prover LEO-II can be applied to automate reasoning in and about prominent access control logics.

  20. ROBUS-2: A Fault-Tolerant Broadcast Communication System

    NASA Technical Reports Server (NTRS)

    Torres-Pomales, Wilfredo; Malekpour, Mahyar R.; Miner, Paul S.

    2005-01-01

    The Reliable Optical Bus (ROBUS) is the core communication system of the Scalable Processor-Independent Design for Enhanced Reliability (SPIDER), a general-purpose fault-tolerant integrated modular architecture currently under development at NASA Langley Research Center. The ROBUS is a time-division multiple access (TDMA) broadcast communication system with medium access control by means of time-indexed communication schedule. ROBUS-2 is a developmental version of the ROBUS providing guaranteed fault-tolerant services to the attached processing elements (PEs), in the presence of a bounded number of faults. These services include message broadcast (Byzantine Agreement), dynamic communication schedule update, clock synchronization, and distributed diagnosis (group membership). The ROBUS also features fault-tolerant startup and restart capabilities. ROBUS-2 is tolerant to internal as well as PE faults, and incorporates a dynamic self-reconfiguration capability driven by the internal diagnostic system. This version of the ROBUS is intended for laboratory experimentation and demonstrations of the capability to reintegrate failed nodes, dynamically update the communication schedule, and tolerate and recover from correlated transient faults.

  1. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  2. Improving nurse-patient communication with patients with communication impairments: hospital nurses' views on the feasibility of using mobile communication technologies.

    PubMed

    Sharpe, Bridget; Hemsley, Bronwyn

    2016-05-01

    Nurses communicating with patients who are unable to speak often lack access to tools and technologies to support communication. Although mobile communication technologies are ubiquitous, it is not known whether their use to support communication is feasible on a busy hospital ward. The aim of this study was to determine the views of hospital nurses on the feasibility of using mobile communication technologies to support nurse-patient communication with individuals who have communication impairments. This study involved an online survey followed by a focus group, with findings analyzed across the two data sources. Nurses expected that mobile communication devices could benefit patient care but lacked access to these devices, encountered policies against use, and held concerns over privacy and confidentiality. The use of mobile communication technologies with patients who have communication difficulties is feasible and may lead to improvements in communication and care, provided environmental barriers are removed and facilitators enhanced. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  4. Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOEpatents

    Blocksome, Michael A.; Mamidala, Amith R.

    2013-09-03

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segment of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  5. Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOEpatents

    Blocksome, Michael A; Mamidala, Amith R

    2014-02-11

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segment of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  6. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    PubMed

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  7. Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.

    PubMed

    Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel

    2016-12-01

    Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.

  8. Formalization of the Access Control on ARM-Android Platform with the B Method

    NASA Astrophysics Data System (ADS)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  9. Leader-following control of multiple nonholonomic systems over directed communication graphs

    NASA Astrophysics Data System (ADS)

    Dong, Wenjie; Djapic, Vladimir

    2016-06-01

    This paper considers the leader-following control problem of multiple nonlinear systems with directed communication topology and a leader. If the state of each system is measurable, distributed state feedback controllers are proposed using neighbours' state information with the aid of Lyapunov techniques and properties of Laplacian matrix for time-invariant communication graph and time-varying communication graph. It is shown that the state of each system exponentially converges to the state of a leader. If the state of each system is not measurable, distributed observer-based output feedback control laws are proposed. As an application of the proposed results, formation control of wheeled mobile robots is studied. The simulation results show the effectiveness of the proposed results.

  10. Use of a web 2.0 portal to improve education and communication in young patients with families: randomized controlled trial.

    PubMed

    Hanberger, Lena; Ludvigsson, Johnny; Nordfeldt, Sam

    2013-08-23

    Diabetes requires extensive self-care and comprehensive knowledge, making patient education central to diabetes self-management. Web 2.0 systems have great potential to enhance health information and open new ways for patients and practitioners to communicate. To develop a Web portal designed to facilitate self-management, including diabetes-related information and social networking functions, and to study its use and effects in pediatric patients with diabetes. A Web 2.0 portal was developed in collaboration with patients, parents, and practitioners. It offered communication with local practitioners, interaction with peers, and access to relevant information and services. Children and adolescents with diabetes in a geographic population of two pediatric clinics in Sweden were randomized to a group receiving passwords for access to the portal or a control group with no access (n=230) for 1 year. All subjects had access during a second study year. Users' activity was logged by site and page visits. Health-related quality of life (HRQOL), empowerment (DES), and quality of information (QPP) questionnaires were given at baseline and after 1 and 2 study years. Clinical data came from the Swedish pediatric diabetes quality registry SWEDIABKIDS. There was a continuous flow of site visits, decreasing in summer and Christmas periods. In 119/233 families (51%), someone visited the portal the first study year and 169/484 (35%) the second study year. The outcome variables did not differ between intervention and control group. No adverse treatment or self-care effects were identified. A higher proportion of mothers compared to fathers visited once or more the first year (P<.001) and the second year (P<.001). The patients who had someone in the family visiting the portal 5 times or more, had shorter diabetes duration (P=.006), were younger (P=.008), had lower HbA1c after 1 year of access (P=.010), and were more often girls (P<.001). Peer interaction seems to be a valued aspect

  11. Controlled English for Effective Communication during Coalition Operations

    DTIC Science & Technology

    2013-06-01

    Linguistic variations and cultural differences often create unexpected challenges for effective communication and thus for Command and Control (C2...CE), and CE-based tools to improve cross- linguistic /cross-cultural communication. We will discuss various types of linguistic variations and cultural...human-computer interaction, reasoning, and explanation CE and CE-based tools can play an important role in facilitating cross- linguistic and cross

  12. Effectiveness of home blood pressure monitoring, Web communication, and pharmacist care on hypertension control: a randomized controlled trial.

    PubMed

    Green, Beverly B; Cook, Andrea J; Ralston, James D; Fishman, Paul A; Catz, Sheryl L; Carlson, James; Carrell, David; Tyll, Lynda; Larson, Eric B; Thompson, Robert S

    2008-06-25

    Treating hypertension decreases mortality and disability from cardiovascular disease, but most hypertension remains inadequately controlled. To determine if a new model of care that uses patient Web services, home blood pressure (BP) monitoring, and pharmacist-assisted care improves BP control. A 3-group randomized controlled trial, the Electronic Communications and Home Blood Pressure Monitoring study was based on the Chronic Care Model. The trial was conducted at an integrated group practice in Washington state, enrolling 778 participants aged 25 to 75 years with uncontrolled essential hypertension and Internet access. Care was delivered over a secure patient Web site from June 2005 to December 2007. Participants were randomly assigned to usual care, home BP monitoring and secure patient Web site training only, or home BP monitoring and secure patient Web site training plus pharmacist care management delivered through Web communications. Percentage of patients with controlled BP (<140/90 mm Hg) and changes in systolic and diastolic BP at 12 months. Of 778 patients, 730 (94%) completed the 1-year follow-up visit. Patients assigned to the home BP monitoring and Web training only group had a nonsignificant increase in the percentage of patients with controlled BP (<140/90 mm Hg) compared with usual care (36% [95% confidence interval {CI}, 30%-42%] vs 31% [95% CI, 25%-37%]; P = .21). Adding Web-based pharmacist care to home BP monitoring and Web training significantly increased the percentage of patients with controlled BP (56%; 95% CI, 49%-62%) compared with usual care (P < .001) and home BP monitoring and Web training only (P < .001). Systolic BP was decreased stepwise from usual care to home BP monitoring and Web training only to home BP monitoring and Web training plus pharmacist care. Diastolic BP was decreased only in the pharmacist care group compared with both the usual care and home BP monitoring and Web training only groups. Compared with usual care, the

  13. Improving Hypertension Control in Diabetes Mellitus The Effects of Collaborative and Proactive Health Communication

    PubMed Central

    Naik, Aanand D.; Kallen, Michael A.; Walder, Annette; Street, Richard L.

    2013-01-01

    Background Communication between patients and clinicians using collaborative goals and treatment plans may overcome barriers to achieving hypertension control in routine diabetes mellitus care. We assessed the interrelation of patient–clinician communication factors to determine their independent associations with hypertension control in diabetes care. Methods and Results We identified 566 older adults with diabetes mellitus and hypertension at the DeBakey VA Medical Center in Houston, Tex. Clinical and pharmacy data were collected, and a patient questionnaire was sent to all participants. A total of 212 individuals returned surveys. Logistic regression analyses were performed to assess the effect of patient characteristics, self-management behaviors, and communication factors on hypertension control. Three communication factors had significant associations with hypertension control. Two factors, patients' endorsement of a shared decision-making style (odds ratio 1.61, 95% confidence interval 1.01 to 2.57) and proactive communication with one's clinician about abnormal results of blood pressure self-monitoring (odds ratio 1.89, 95% confidence interval 1.10 to 3.26), had direct, independent associations in multivariate regression. Path analysis was used to investigate the direct and indirect effects of communication factors and hypertension control. Decision-making style (β=0.20, P<0.01) and proactive communication (β=0.50, P<0.0001) again demonstrated direct effects on hypertension control. A third factor, clinicians' use of collaborative communication when setting treatment goals, had a total effect on hypertension control of 0.16 (P<0.05) through its direct effects on decision-making style (β=0.28, P<0.001) and proactive communication (β=0.22, P<0.01). Conclusions Three communication factors were found to have significant associations with hypertension control. Patient–clinician communication that facilitates collaborative blood pressure goals and

  14. Global Access-controlled Transfer e-frame (GATe)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  15. Research into command, control, and communications in space construction

    NASA Technical Reports Server (NTRS)

    Davis, Randal

    1990-01-01

    Coordinating and controlling large numbers of autonomous or semi-autonomous robot elements in a space construction activity will present problems that are very different from most command and control problems encountered in the space business. As part of our research into the feasibility of robot constructors in space, the CSC Operations Group is examining a variety of command, control, and communications (C3) issues. Two major questions being asked are: can we apply C3 techniques and technologies already developed for use in space; and are there suitable terrestrial solutions for extraterrestrial C3 problems? An overview of the control architectures, command strategies, and communications technologies that we are examining is provided and plans for simulations and demonstrations of our concepts are described.

  16. Comparison of Communication Architectures and Network Topologies for Distributed Propulsion Controls (Preprint)

    DTIC Science & Technology

    2013-05-01

    logic to perform control function computations and are connected to the full authority digital engine control ( FADEC ) via a high-speed data...Digital Engine Control ( FADEC ) via a high speed data communication bus. The short term distributed engine control configu- rations will be core...concen- trator; and high temperature electronics, high speed communication bus between the data concentrator and the control law processor master FADEC

  17. Performance Analysis of Direct-Sequence Code-Division Multiple-Access Communications with Asymmetric Quadrature Phase-Shift-Keying Modulation

    NASA Technical Reports Server (NTRS)

    Wang, C.-W.; Stark, W.

    2005-01-01

    This article considers a quaternary direct-sequence code-division multiple-access (DS-CDMA) communication system with asymmetric quadrature phase-shift-keying (AQPSK) modulation for unequal error protection (UEP) capability. Both time synchronous and asynchronous cases are investigated. An expression for the probability distribution of the multiple-access interference is derived. The exact bit-error performance and the approximate performance using a Gaussian approximation and random signature sequences are evaluated by extending the techniques used for uniform quadrature phase-shift-keying (QPSK) and binary phase-shift-keying (BPSK) DS-CDMA systems. Finally, a general system model with unequal user power and the near-far problem is considered and analyzed. The results show that, for a system with UEP capability, the less protected data bits are more sensitive to the near-far effect that occurs in a multiple-access environment than are the more protected bits.

  18. 46 CFR 185.320 - Steering gear, controls, and communication system tests.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 7 2013-10-01 2013-10-01 false Steering gear, controls, and communication system tests. 185.320 Section 185.320 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) OPERATIONS Miscellaneous Operating Requirements § 185.320 Steering gear, controls, and communication system...

  19. FD/DAMA Scheme For Mobile/Satellite Communications

    NASA Technical Reports Server (NTRS)

    Yan, Tsun-Yee; Wang, Charles C.; Cheng, Unjeng; Rafferty, William; Dessouky, Khaled I.

    1992-01-01

    Integrated-Adaptive Mobile Access Protocol (I-AMAP) proposed to allocate communication channels to subscribers in first-generation MSAT-X mobile/satellite communication network. Based on concept of frequency-division/demand-assigned multiple access (FD/DAMA) where partition of available spectrum adapted to subscribers' demands for service. Requests processed, and competing requests resolved according to channel-access protocol, or free-access tree algorithm described in "Connection Protocol for Mobile/Satellite Communications" (NPO-17735). Assigned spectrum utilized efficiently.

  20. The Five S’s: A Communication Tool for Child Psychiatric Access Projects

    PubMed Central

    Harrison, Joyce; Wasserman, Kate; Steinberg, Janna; Platt, Rheanna; Coble, Kelly; Bower, Kelly

    2017-01-01

    Given the gap in child psychiatric services available to meet existing pediatric behavioral health needs, children and families are increasingly seeking behavioral health services from their primary care clinicians (PCCs). However, many pediatricians report not feeling adequately trained to meet these needs. As a result, child psychiatric access projects (CPAPs) are being developed around the country to support the integration of care for children. Despite the promise and success of these programs, there are barriers, including the challenge of effective communication between PCCs and child psychiatrists. Consultants from the Maryland CPAP, the Behavioral Health Integration in Pediatric Primary Care (BHIPP) project, have developed a framework called the Five S’s. The Five S’s are Safety, Specific Behaviors, Setting, Scary Things, and Screening/Services. It is a tool that can be used to help PCCs and child psychiatrists communicate and collaborate to formulate pediatric behavioral health cases for consultation or referral requests. Each of these components and its importance to the case consultation are described. Two case studies are presented that illustrate how the Five S’s tool can be used in clinical consultation between PCC and child psychiatrist. We also describe the utility of the tool beyond its use in behavioral health consultation. PMID:27919566

  1. Modelling high data rate communication network access protocol

    NASA Technical Reports Server (NTRS)

    Khanna, S.; Foudriat, E. C.; Paterra, Frank; Maly, Kurt J.; Overstreet, C. Michael

    1990-01-01

    Modeling of high data rate communication systems is different from the low data rate systems. Three simulations were built during the development phase of Carrier Sensed Multiple Access/Ring Network (CSMA/RN) modeling. The first was a model using SIMCRIPT based upon the determination and processing of each event at each node. The second simulation was developed in C based upon isolating the distinct object that can be identified as the ring, the message, the node, and the set of critical events. The third model further identified the basic network functionality by creating a single object, the node which includes the set of critical events which occur at the node. The ring structure is implicit in the node structure. This model was also built in C. Each model is discussed and their features compared. It should be stated that the language used was mainly selected by the model developer because of his past familiarity. Further the models were not built with the intent to compare either structure or language but because the complexity of the problem and initial results contained obvious errors, so alternative models were built to isolate, determine, and correct programming and modeling errors. The CSMA/RN protocol is discussed in sufficient detail to understand modeling complexities. Each model is described along with its features and problems. The models are compared and concluding observations and remarks are presented.

  2. An improved cooperative adaptive cruise control (CACC) algorithm considering invalid communication

    NASA Astrophysics Data System (ADS)

    Wang, Pangwei; Wang, Yunpeng; Yu, Guizhen; Tang, Tieqiao

    2014-05-01

    For the Cooperative Adaptive Cruise Control (CACC) Algorithm, existing research studies mainly focus on how inter-vehicle communication can be used to develop CACC controller, the influence of the communication delays and lags of the actuators to the string stability. However, whether the string stability can be guaranteed when inter-vehicle communication is invalid partially has hardly been considered. This paper presents an improved CACC algorithm based on the sliding mode control theory and analyses the range of CACC controller parameters to maintain string stability. A dynamic model of vehicle spacing deviation in a platoon is then established, and the string stability conditions under improved CACC are analyzed. Unlike the traditional CACC algorithms, the proposed algorithm can ensure the functionality of the CACC system even if inter-vehicle communication is partially invalid. Finally, this paper establishes a platoon of five vehicles to simulate the improved CACC algorithm in MATLAB/Simulink, and the simulation results demonstrate that the improved CACC algorithm can maintain the string stability of a CACC platoon through adjusting the controller parameters and enlarging the spacing to prevent accidents. With guaranteed string stability, the proposed CACC algorithm can prevent oscillation of vehicle spacing and reduce chain collision accidents under real-world circumstances. This research proposes an improved CACC algorithm, which can guarantee the string stability when inter-vehicle communication is invalid.

  3. Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blocksome, Michael A.; Mamidala, Amith R.

    2013-09-03

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segmentmore » of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.« less

  4. An improved task-role-based access control model for G-CSCW applications

    NASA Astrophysics Data System (ADS)

    He, Chaoying; Chen, Jun; Jiang, Jie; Han, Gang

    2005-10-01

    Access control is an important and popular security mechanism for multi-user applications. GIS-based Computer Supported Cooperative Work (G-CSCW) application is one of such applications. This paper presents an improved Task-Role-Based Access Control (X-TRBAC) model for G-CSCW applications. The new model inherits the basic concepts of the old ones, such as role and task. Moreover, it has introduced two concepts, i.e. object hierarchy and operation hierarchy, and the corresponding rules to improve the efficiency of permission definition in access control models. The experiments show that the method can simplify the definition of permissions, and it is more applicable for G-CSCW applications.

  5. Access, interest, and attitudes toward electronic communication for health care among patients in the medical safety net.

    PubMed

    Schickedanz, Adam; Huang, David; Lopez, Andrea; Cheung, Edna; Lyles, C R; Bodenheimer, Tom; Sarkar, Urmimala

    2013-07-01

    Electronic and internet-based tools for patient-provider communication are becoming the standard of care, but disparities exist in their adoption among patients. The reasons for these disparities are unclear, and few studies have looked at the potential communication technologies have to benefit vulnerable patient populations. To characterize access to, interest in, and attitudes toward internet-based communication in an ethnically, economically, and linguistically diverse group of patients from a large urban safety net clinic network. Observational, cross-sectional study Adult patients (≥ 18 years) in six resource-limited community clinics in the San Francisco Department of Public Health (SFDPH) MAIN MEASURES: Current email use, interest in communicating electronically with health care professionals, barriers to and facilitators of electronic health-related communication, and demographic data-all self-reported via survey. Sixty percent of patients used email, 71 % were interested in using electronic communication with health care providers, and 19 % reported currently using email informally with these providers for health care. Those already using any email were more likely to express interest in using it for health matters. Most patients agreed electronic communication would improve clinic efficiency and overall communication with clinicians. A significant majority of safety net patients currently use email, text messaging, and the internet, and they expressed an interest in using these tools for electronic communication with their medical providers. This interest is currently unmet within safety net clinics that do not offer a patient portal or secure messaging. Tools such as email encounters and electronic patient portals should be implemented and supported to a greater extent in resource-poor settings, but this will require tailoring these tools to patients' language, literacy level, and experience with communication technology.

  6. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  7. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  8. Communication and control in an integrated manufacturing system

    NASA Technical Reports Server (NTRS)

    Shin, Kang G.; Throne, Robert D.; Muthuswamy, Yogesh K.

    1987-01-01

    Typically, components in a manufacturing system are all centrally controlled. Due to possible communication bottlenecking, unreliability, and inflexibility caused by using a centralized controller, a new concept of system integration called an Integrated Multi-Robot System (IMRS) was developed. The IMRS can be viewed as a distributed real time system. Some of the current research issues being examined to extend the framework of the IMRS to meet its performance goals are presented. These issues include the use of communication coprocessors to enhance performance, the distribution of tasks and the methods of providing fault tolerance in the IMRS. An application example of real time collision detection, as it relates to the IMRS concept, is also presented and discussed.

  9. Intersections between the Autism Spectrum and the Internet: Perceived Benefits and Preferred Functions of Computer-Mediated Communication

    ERIC Educational Resources Information Center

    Gillespie-Lynch, Kristen; Kapp, Steven K.; Shane-Simpson, Christina; Smith, David Shane; Hutman, Ted

    2014-01-01

    An online survey compared the perceived benefits and preferred functions of computer-mediated communication of participants with (N = 291) and without ASD (N = 311). Participants with autism spectrum disorder (ASD) perceived benefits of computer-mediated communication in terms of increased comprehension and control over communication, access to…

  10. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  11. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  12. Reflector control technology in space laser communication

    NASA Astrophysics Data System (ADS)

    Xie, Meilin; Ma, Caiwen; Yao, Cheng; Huang, Wei; Lian, Xuezheng; Feng, Xubin; Jing, Feng

    2017-11-01

    The optical frequencies band is used as information carrier to realize laser communication between two low-orbit micro-satellites in space which equipped with inter-satellite laser communication terminals, optical switches, space routers and other payload. The laser communication terminal adopts a two-dimensional turntable with a single mirror structure. In this paper, the perturbation model of satellite platform is established in this paper. The relationship between the coupling and coordinate transformation of satellite disturbance is analyzed and the laser pointing vector is deduced. Using the tracking differentiator to speed up the circular grating angle information constitute speed loop feedback, which avoids the problem of error amplification caused by the high frequency of the conventional difference algorithm. Finally, the suppression ability of the satellite platform disturbance and the tracking accuracy of the tracking system are simulated and analyzed. The results show that the tracking accuracy of the whole system is 10μrad in the case of satellite vibration, which provides the basis for the optimization of the performance of the space-borne laser communication control system.

  13. Directional antenna array (DAA) for communications, control, and data link protection

    NASA Astrophysics Data System (ADS)

    Molchanov, Pavlo A.; Contarino, Vincent M.

    2013-06-01

    A next generation of Smart antennas with point-to-point communication and jam, spoof protection capability by verification of spatial position is offered. A directional antenna array (DAA) with narrow irradiation beam provides counter terrorism protection for communications, data link, control and GPS. Communications are "invisible" to guided missiles because of 20 dB smaller irradiation outside the beam and spatial separation. This solution can be implemented with current technology. Directional antennas have higher gain and can be multi-frequency or have wide frequency band in contrast to phase antenna arrays. This multi-directional antenna array provides a multi-functional communication network and simultaneously can be used for command control, data link and GPS.

  14. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    NASA Astrophysics Data System (ADS)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  15. LSST communications middleware implementation

    NASA Astrophysics Data System (ADS)

    Mills, Dave; Schumacher, German; Lotz, Paul

    2016-07-01

    The LSST communications middleware is based on a set of software abstractions; which provide standard interfaces for common communications services. The observatory requires communication between diverse subsystems, implemented by different contractors, and comprehensive archiving of subsystem status data. The Service Abstraction Layer (SAL) is implemented using open source packages that implement open standards of DDS (Data Distribution Service1) for data communication, and SQL (Standard Query Language) for database access. For every subsystem, abstractions for each of the Telemetry datastreams, along with Command/Response and Events, have been agreed with the appropriate component vendor (such as Dome, TMA, Hexapod), and captured in ICD's (Interface Control Documents).The OpenSplice (Prismtech) Community Edition of DDS provides an LGPL licensed distribution which may be freely redistributed. The availability of the full source code provides assurances that the project will be able to maintain it over the full 10 year survey, independent of the fortunes of the original providers.

  16. Simple measurement-based admission control for DiffServ access networks

    NASA Astrophysics Data System (ADS)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  17. Group consensus control for networked multi-agent systems with communication delays.

    PubMed

    An, Bao-Ran; Liu, Guo-Ping; Tan, Chong

    2018-05-01

    This paper investigates group consensus problems in networked multi-agent systems (NMAS) with communication delays. Based on the sed state prediction scheme, the group consensus control protocol is designed to compensate the communication delay actively. In light of algebraic graph theories and matrix theories, necessary and(or) sufficient conditions of group consensus with respect to a given admissible control set are obtained for the NMAS with communication delays under mild assumptions. Finally, simulations are performed to demonstrate the effectiveness of the theoretical results. Copyright © 2018 ISA. All rights reserved.

  18. Impact of postgraduate training on communication skills teaching: a controlled study.

    PubMed

    Junod Perron, Noelle; Nendaz, Mathieu; Louis-Simonet, Martine; Sommer, Johanna; Gut, Anne; Cerutti, Bernard; van der Vleuten, Cees P; Dolmans, Diana

    2014-04-14

    Observation of performance followed by feedback is the key to good teaching of communication skills in clinical practice. The fact that it occurs rarely is probably due to clinical supervisors' perceived lack of competence to identify communication skills and give effective feedback. We evaluated the impact of a faculty development programme on communication skills teaching on clinical supervisors' ability to identify residents' good and poor communication skills and to discuss them interactively during feedback. We conducted a pre-post controlled study in which clinical supervisors took part to a faculty development program on teaching communication skills in clinical practice. Outcome measures were the number and type of residents' communication skills identified by supervisors in three videotaped simulated resident-patient encounters and the number and type of communication skills discussed interactively with residents during three feedback sessions. 48 clinical supervisors (28 intervention group; 20 control group) participated. After the intervention, the number and type of communication skills identified did not differ between both groups. There was substantial heterogeneity in the number and type of communication skills identified. However, trained participants engaged in interactive discussions with residents on a significantly higher number of communication items (effect sizes 0.53 to 1.77); communication skills items discussed interactively included both structural and patient-centered elements that were considered important to be observed by expert teachers. The faculty development programme did not increase the number of communication skills recognised by supervisors but was effective in increasing the number of communication issues discussed interactively in feedback sessions. Further research should explore the respective impact of accurate identification of communication skills and effective teaching skills on achieving more effective communication

  19. Nurse practitioners and controlled substances prescriptive authority: improving access to care.

    PubMed

    Ambrose, Michelle A; Tarlier, Denise S

    2013-03-01

    In 2007, Health Canada proposed a new framework to regulate prescriptive authority for controlled substances, titled New Classes of Practitioners Regulations (NCPR). The new regulatory framework was passed in November 2012; it gives nurse practitioners (NPs), midwives and podiatrists the authority to prescribe controlled medications under the Controlled Drugs and Substances Act. It is expected that authorizing NPs to write prescriptions for certain controlled substances commonly used in primary care will enhance flexibility and timeliness in primary care service delivery. Studies from the United States have shown positive outcomes in primary care access, decreased healthcare costs and the evolution and advancement of the NP role when prescriptive authority was expanded to include controlled substances. The purpose of this paper is to examine how NPs' prescriptive authority for controlled substances affects access to primary care and NP role development. Three key issues identified from the experience of one group of NPs in the United States (access to care, professional autonomy and prescriber knowledge) offer insight into the practice changes that may be anticipated for NPs in Canada now that they have acquired prescriptive authority for controlled substances. Recommendations are offered to assist nurse leaders and educators to best support NPs as they take on this new and important role responsibility.

  20. An Analysis of En Route Controller-Pilot Voice Communications

    DOT National Transportation Integrated Search

    1993-03-01

    The purposes of this analysis were to examine current pilot-controller communication practices in the en route : environment. Forty-eight hours of voice tapes from eight different Air Route Traffic Control Centers (ARTCCs) were : examined. There were...

  1. Baseband-processed SS-TDMA communication system architecture and design concepts

    NASA Technical Reports Server (NTRS)

    Attwood, S.; Sabourin, D.

    1982-01-01

    The architecture and system design for a commercial satellite communications system planned for the 1990's was developed by Motorola for NASA's Lewis Research Center. The system provides data communications between individual users via trunking and customer premises service terminals utilizing a central switching satellite operating in a time-division multiple-access (TDMA) mode. The major elements of the design incorporating baseband processing include: demand-assigned multiple access reservation protocol, spectral utilization, system synchronization, modulation technique and forward error control implementation. Motorola's baseband processor design, which is being proven in a proof-of-concept advanced technology development, will perform data regeneration and message routing for individual users on-board the spacecraft.

  2. Design of a command, communications, and control van (surrogate)

    NASA Astrophysics Data System (ADS)

    Holder, J. Darryl; Fishback, Jerome

    1989-03-01

    This report describes the design, construction, and checkout of a radio and telephone multi-mode communications hub. This unit is to serve as a surrogate for a command, control, and communications van which is to be used in support of a special series of testing at a remote site. This unit is assembled in a military four-wheel van and has a crew of a commander and three operators. Radio communications monitoring can be performed in all popular modes of transmission from 50 KHz to 2 GHz and transmission can be performed on selected frequencies in the 40-meter, 6-meter, and 2-meter bands. Both voice and digital (teletype, packet, facsimile, etc.) communications are supported.

  3. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  4. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  5. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  6. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  7. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    -synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737

  8. Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems.

    PubMed

    Martins, Goncalo; Moondra, Arul; Dubey, Abhishek; Bhattacharjee, Anirban; Koutsoukos, Xenofon D

    2016-07-25

    In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems.

  9. An Analysis of Tower (Local) Controller - Pilot Voice Communications

    DOT National Transportation Integrated Search

    1994-06-01

    The purposes of this analysis were to examine current pilot-controller communication practices in the terminal environment. Forty-nine hours of voice tapes from local positions in ten Air Traffic Control Towers (ATCTs) were examined. There were 8,444...

  10. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...

  11. Impact of postgraduate training on communication skills teaching: a controlled study

    PubMed Central

    2014-01-01

    Background Observation of performance followed by feedback is the key to good teaching of communication skills in clinical practice. The fact that it occurs rarely is probably due to clinical supervisors’ perceived lack of competence to identify communication skills and give effective feedback. We evaluated the impact of a faculty development programme on communication skills teaching on clinical supervisors’ ability to identify residents’ good and poor communication skills and to discuss them interactively during feedback. Methods We conducted a pre-post controlled study in which clinical supervisors took part to a faculty development program on teaching communication skills in clinical practice. Outcome measures were the number and type of residents’ communication skills identified by supervisors in three videotaped simulated resident-patient encounters and the number and type of communication skills discussed interactively with residents during three feedback sessions. Results 48 clinical supervisors (28 intervention group; 20 control group) participated. After the intervention, the number and type of communication skills identified did not differ between both groups. There was substantial heterogeneity in the number and type of communication skills identified. However, trained participants engaged in interactive discussions with residents on a significantly higher number of communication items (effect sizes 0.53 to 1.77); communication skills items discussed interactively included both structural and patient-centered elements that were considered important to be observed by expert teachers. Conclusions The faculty development programme did not increase the number of communication skills recognised by supervisors but was effective in increasing the number of communication issues discussed interactively in feedback sessions. Further research should explore the respective impact of accurate identification of communication skills and effective teaching

  12. Leader-Follower Formation Control of UUVs with Model Uncertainties, Current Disturbances, and Unstable Communication

    PubMed Central

    Yan, Zheping; Xu, Da; Chen, Tao; Zhang, Wei; Liu, Yibo

    2018-01-01

    Unmanned underwater vehicles (UUVs) have rapidly developed as mobile sensor networks recently in the investigation, survey, and exploration of the underwater environment. The goal of this paper is to develop a practical and efficient formation control method to improve work efficiency of multi-UUV sensor networks. Distributed leader-follower formation controllers are designed based on a state feedback and consensus algorithm. Considering that each vehicle is subject to model uncertainties and current disturbances, a second-order integral UUV model with a nonlinear function is established using the state feedback linearized method under current disturbances. For unstable communication among UUVs, communication failure and acoustic link noise interference are considered. Two-layer random switching communication topologies are proposed to solve the problem of communication failure. For acoustic link noise interference, accurate representation of valid communication information and noise stripping when designing controllers is necessary. Effective communication topology weights are designed to represent the validity of communication information interfered by noise. Utilizing state feedback and noise stripping, sufficient conditions for design formation controllers are proposed to ensure UUV formation achieves consensus under model uncertainties, current disturbances, and unstable communication. The stability of formation controllers is proven by the Lyapunov-Razumikhin theorem, and the validity is verified by simulation results. PMID:29473919

  13. Communication Among Melanoma Family Members.

    PubMed

    Bowen, Deborah J; Albrecht, Terrance; Hay, Jennifer; Eggly, Susan; Harris-Wei, Julie; Meischke, Hendrika; Burke, Wylie

    2017-03-01

    Interventions to improve communication among family members may facilitate information flow about familial risk and preventive health behaviors. This is a secondary analysis of the effects of an interactive website intervention aimed at increasing communication frequency and agreement about health risk among melanoma families. Participants were family units, consisting of one family member with melanoma identified from a previous research study (the Case) and an additional first degree relative and a parent of a child 0-17. Family triads were randomized to receive access to the website intervention or to serve as control families. Family communication frequency and agreement about melanoma prevention behaviors and beliefs were measured at baseline and again at 1 year post randomization. Intervention participants of all three types significantly increased the frequency of communication to their first degree relatives (Parents, siblings, children; range = 14-18 percentage points; all p < .05). At baseline, approximately two-thirds of all three family members talked with at least some member of the family about cancer risk. Agreement between Cases and First Degree Relatives and between Cases and Parents increased from pre to post intervention in the intervention participants compared to the control participants (p < .05). These findings provide support for interventions to improve family communication about cancer risk.

  14. Communication Among Melanoma Family Members

    PubMed Central

    Bowen, Deborah J; Albrecht, Terrance; Hay, Jennifer; Eggly, Susan; Harris-Wei, Julie; Meischke, Hendrika; Burke, Wylie

    2017-01-01

    Interventions to improve communication among family members may facilitate information flow about familial risk and preventive health behaviors. This is a secondary analysis of the effects of an interactive website intervention aimed at increasing communication frequency and agreement about health risk among melanoma families. Participants were family units, consisting of one family member with melanoma identified from a previous research study (the case) and an additional first degree relative and a parent of a child 0–17. Family triads were randomized to receive access to the website intervention or to serve as control families. Family communication frequency and agreement about melanoma prevention behaviors and beliefs were measured at baseline and again at one year post randomization. Intervention participants of all three types significantly increased the frequency of communication to their first degree relatives (Parents, siblings, children; range =14–18 percentage points; all p<0.05). At baseline approximately two-thirds of all three family members talked with at least some member of the family about cancer risk. Agreement between Cases and First Degree Relatives and between Cases and Parents increased from pre to post intervention in the intervention participants compared to the control participants (p<0.05). These findings provide support for interventions to improve family communication about cancer risk. PMID:28248624

  15. Utilization of the Multiple Access Communications Satellite (Macsat) in support of tactical communications

    NASA Astrophysics Data System (ADS)

    Steele, B.; McCormick, C.; Brandt, K.; Fornwalt, W.; Bonometti, R.

    1992-03-01

    After a brief on-orbit checkout, the two Macsats launched into 90-deg, near-circular, 400-n. mi. altitude polar orbits on May 9, 1990 began to furnish operational communications support to USMC aircraft involved in Operations Desert Shield and Desert Storm. These operations of the Macsats furnished numerous lessons applicable to prospective design and deployment of small tactical-communications satellites. Macsats proved their ability to support quick-reaction requirements through reschedulings within 2-10 hrs. Their user communications terminal is portable, and easily relocated with changing requirements.

  16. International Dengue Vaccine Communication and Advocacy: Challenges and Way Forward.

    PubMed

    Carvalho, Ana; Van Roy, Rebecca; Andrus, Jon

    2016-01-01

    Dengue vaccine introduction will likely occur soon. However, little has been published on international dengue vaccine communication and advocacy. More effort at the international level is required to review, unify and strategically disseminate dengue vaccine knowledge to endemic countries' decision makers and potential donors. Waiting to plan for the introduction of new vaccines until licensure may delay access in developing countries. Concerted efforts to communicate and advocate for vaccines prior to licensure are likely challenged by unknowns of the use of dengue vaccines and the disease, including uncertainties of vaccine impact, vaccine access and dengue's complex pathogenesis and epidemiology. Nevertheless, the international community has the opportunity to apply previous best practices for vaccine communication and advocacy. The following key strategies will strengthen international dengue vaccine communication and advocacy: consolidating existing coalitions under one strategic umbrella, urgently convening stakeholders to formulate the roadmap for integrated dengue prevention and control, and improving the dissemination of dengue scientific knowledge.

  17. Access Control for Home Data Sharing: Attitudes, Needs and Practices

    DTIC Science & Technology

    2009-10-01

    cameras, mobile phones and portable music players make creating and interacting with this content easy. Home users are increasingly interested in...messages, photos, home videos, journal files and home musical recordings. Many participants considered unauthorized access by strangers, acquaintances...configuration does not allow users to share different subsets of music with different people. Facebook supplies rich, customizable access controls for

  18. Demand access communications for TDRSS users

    NASA Technical Reports Server (NTRS)

    Zillig, David; Weinberg, Aaron; Mcomber, Robert

    1994-01-01

    The Tracking and Data Relay Satellite System (TDRSS) has long been used to provide reliable low and high-data rate relay services between user spacecraft in Earth orbit and the ground. To date, these TDRSS services have been implemented via prior scheduling based upon estimates of user needs and mission event timelines. While this approach may be necessary for large users that require greater amounts of TDRSS resources, TDRSS can potentially offer the planned community of smaller science missions (e.g., the small explorer missions), and other emerging users, the unique opportunity for services on demand. In particular, innovative application of the existing TDRSS Multiple Access (MA) subsystem, with its phased array antenna, could be used to implement true demand access services without modification to either the TDRSS satellites or the user transponder, thereby introducing operational and performance benefits to both the user community and the Space Network. In this paper, candidate implementations of demand access service via the TDRSS MA subsystem are examined in detail. Both forward and return link services are addressed and a combination of qualitative and quantitative assessments are provided. The paper also identifies further areas for investigation in this ongoing activity that is being conducted by GSFC/Code 531 under the NASA Code O Advanced Systems Program.

  19. Integrated multi-channel vehicle-vehicle and vehicle-roadside communications for ITS

    DOT National Transportation Integrated Search

    2008-12-01

    This research describes a medium access control (MAC) protocol to Enable multi-channel operation for dedicated short-range communication (DSRC). In particular, we focus on the challenge of supporting potentially high-bandwidth commercial or infotainm...

  20. Typography for Graphic Communication [and] Typographic Access Structures for Educational Texts [and] Graphic Aspects of Complex Texts: Typography as Macropunctuation.

    ERIC Educational Resources Information Center

    Waller, Robert

    The three papers included in this report address typography for graphic communication, typographic access structures for educational texts, and typography as macropunctuation. The first paper considers the consequences of an aesthetic bias in the literature of typography, and identifies two misleading assumptions about textbooks; i.e., that print…

  1. Early Communication System (ECOMM) for ISS

    NASA Technical Reports Server (NTRS)

    Gaylor, Kent; Tu, Kwei

    1999-01-01

    The International Space Station (ISS) Early Communications System (ECOMM) was a Johnson Space Center (JSC) Avionic Systems Division (ASD) in-house developed communication system to provide early communications between the ISS and the Mission Control Center-Houston (MCC-H). This system allows for low rate commands (link rate of 6 kbps) to be transmitted through the Tracking and Data Relay Satellite System (TDRSS) from MCC-H to the ISS using TDRSS's S-band Single Access Forward (SSA/) link service. This system also allows for low rate telemetry (link rate of 20.48 kbps) to be transmitted from ISS to MCC-H through the TDRSS using TDRSS's S-band Single Access Return (SSAR) link service. In addition this system supports a JSC developed Onboard Communications Adapter (OCA) that allows for a two-way data exchange of 128 kbps between MCC-H and the ISS through TDRSS. This OCA data can be digital video/audio (two-way videoconference), and/or file transfers, and/or "white board". The key components of the system, the data formats used by the system to insure compatibility with the future ISS S-Band System, as well as how other vehicles may be able to use this system for their needs are discussed in this paper.

  2. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420...

  3. Some Protocols For Optical-Fiber Digital Communications

    NASA Technical Reports Server (NTRS)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  4. Interface Provides Standard-Bus Communication

    NASA Technical Reports Server (NTRS)

    Culliton, William G.

    1995-01-01

    Microprocessor-controlled interface (IEEE-488/LVABI) incorporates service-request and direct-memory-access features. Is circuit card enabling digital communication between system called "laser auto-covariance buffer interface" (LVABI) and compatible personal computer via general-purpose interface bus (GPIB) conforming to Institute for Electrical and Electronics Engineers (IEEE) Standard 488. Interface serves as second interface enabling first interface to exploit advantages of GPIB, via utility software written specifically for GPIB. Advantages include compatibility with multitasking and support of communication among multiple computers. Basic concept also applied in designing interfaces for circuits other than LVABI for unidirectional or bidirectional handling of parallel data up to 16 bits wide.

  5. EPICS Channel Access Server for LabVIEW

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhukov, Alexander P.

    It can be challenging to interface National Instruments LabVIEW (http://www.ni.com/labview/) with EPICS (http://www.aps.anl.gov/epics/). Such interface is required when an instrument control program was developed in LabVIEW but it also has to be part of global control system. This is frequently useful in big accelerator facilities. The Channel Access Server is written in LabVIEW, so it works on any hardware/software platform where LabVIEW is available. It provides full server functionality, so any EPICS client can communicate with it.

  6. Controlling Communication: A Prescriptive Approach to Communication Studies.

    ERIC Educational Resources Information Center

    Garner, Mark; Johnson, Edward

    If the discussions of communication can be divided into those concerned with a description or theory and those concerned with prescription, then it must be understood that the former can never by itself improve communication. As a field, communication studies does not yet know enough about prescriptive language theory; that is, theory concerned…

  7. A simulation study of the effects of communication delay on air traffic control

    DOT National Transportation Integrated Search

    1990-09-01

    This study was conducted to examine the impacts of voice communications delays : characteristic of Voice Switching and Control System (VSCS) and satellite : communications systems on air traffic system performance, controller stress : and workload, a...

  8. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  9. NASA/DOD Aerospace Knowledge Diffusion Research Project. Paper 37: The impact of political control on technical communications: A comparative study of Russian and US aerospace engineers and scientists

    NASA Technical Reports Server (NTRS)

    Barclay, Rebecca O.; Pinelli, Thomas E.; Flammia, Madelyn; Kennedy, John M.

    1994-01-01

    Until the recent dissolution of the Soviet Union, the Communist Party exerted a strict control of access to and dissemination of scientific and technical information (STI). This article presents models of the Soviet-style information society and the Western-style information society and discusses the effects of centralized governmental control of information on Russian technical communication practices. The effects of political control on technical communication are then used to interpret the results of a survey of Russian and U.S. aerospace engineers and scientists concerning the time devoted to technical communication, their collaborative writing practices and their attitudes toward collaboration, the kinds of technical documents they produce and use, and their use of computer technology, and their use of and the importance to them of libraries and technical information centers. The data are discussed in terms of tentative conclusions drawn from the literature. Finally, we conclude with four questions concerning government policy, collaboration, and the flow of STI between Russian and U.S. aerospace engineers and scientists.

  10. Loss of controller-pilot voice communications in domestic en route airspace

    DOT National Transportation Integrated Search

    2017-02-10

    With the planned implementation of ControllerPilot Data Link Communications (CPDLC) in en route airspace, information on voice communication performance in this airspace can help to predict specific benefits associated with CPDLC, identify adjustm...

  11. Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems

    PubMed Central

    Martins, Goncalo; Moondra, Arul; Dubey, Abhishek; Bhattacharjee, Anirban; Koutsoukos, Xenofon D.

    2016-01-01

    In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems. PMID:27463718

  12. The OPL Access Control Policy Language

    NASA Astrophysics Data System (ADS)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  13. On modeling of integrated communication and control systems

    NASA Technical Reports Server (NTRS)

    Liou, Luen-Woei; Ray, Asok

    1990-01-01

    The mathematical modeling scheme proposed by Ray and Halevi (1988) for integrated communication and control systems is considered analytically, with an emphasis on the effect of introducing varying and distributed time delays to account for asynchronous time-division multiplexing in the communication part of the system. Ray and Halevi applied a state-transition concept to transform the original continuous-time model into a discrete-time model; the same approach was used by Kalman and Bertram (1959) to model various types of sampled data systems which are not subject to induced delays. The relationship between the two modeling schemes is explored, and it is shown that, although the Kalman-Bertram method has the advantage of a unified approach, it becomes inconvenient when varying delays appear in the control loop.

  14. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... 224, Airport Security Access Control AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The... (Pub. L. 92-463, 5 U.S.C., App.), notice is hereby given for a Special Committee 224, Airport Security...

  15. Railroad communications and train control : report to Congress

    DOT National Transportation Integrated Search

    1994-07-01

    Recent tragedies in the railroad industry have again focused attention on the prospects for : improving railroad safety through enhanced radio communication and implementation of : advanced train control systems (ATCS). ATCS has the potential to prev...

  16. Verbal and Non-Verbal Communication and Coordination in Mission Control

    NASA Technical Reports Server (NTRS)

    Vinkhuyzen, Erik; Norvig, Peter (Technical Monitor)

    1998-01-01

    In this talk I will present some video-materials gathered in Mission Control during simulations. The focus of the presentation will be on verbal and non-verbal communication between the officers in the front and backroom, especially the practices that have evolved around a peculiar communications technology called voice loops.

  17. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  18. Simplified power control method for cellular mobile communication

    NASA Astrophysics Data System (ADS)

    Leung, Y. W.

    1994-04-01

    The centralized power control (CPC) method measures the gain of the communication links between every mobile and every base station in the cochannel cells and determines optimal transmitter power to maximize the minimum carrier-to-interference ratio. The authors propose a simplified power control method which has nearly the same performance as the CPC method but which involves much smaller measurement overhead.

  19. The influence of air traffic control message length and timing on pilot communication

    NASA Technical Reports Server (NTRS)

    Morrow, Daniel; Rodvold, Michelle

    1993-01-01

    The present paper outlines an approach to air traffic control (ATC) communication that is based on theories of dialogue organization and describes several steps or phases in routine controller-pilot communication. The introduction also describes several kinds of communication problems that often disrupt these steps, as well as how these problems may be caused by factors related to ATC messages, the communication medium (radio vs. data link) and task workload. Next, a part-task simulation study is described. This study focused on how problems in radio communication are related to message factors. More specifically, we examined if pilots are more likely to misunderstanding longer ATC messages. A more general goal of the study is to show that communication analysis can help trace where problem occur and why.

  20. Communication competence, self-care behaviors and glucose control in patients with type 2 diabetes.

    PubMed

    Parchman, Michael L; Flannagan, Dorothy; Ferrer, Robert L; Matamoras, Mike

    2009-10-01

    To examine the relationship between physician communication competence and A1c control among Hispanics and non-Hispanics seen in primary care practices. Observational. Direct observation and audio-recording of patient-physician encounters by 155 Hispanic and non-Hispanic white patients seen by 40 physicians in 20 different primary care clinics. Audio-recordings were transcribed and coded to derive an overall communication competence score for the physician. An exit survey was administered to each patient to assess self-care activities and their medical record was abstracted for the most recent glycosylated hemoglobin (A1c) level. Higher levels of communication competence were associated with lower levels of A1c for Hispanics, but not non-Hispanic white patients. Although communication competence was associated with better self-reported diet behaviors, diet was not associated with A1c control. Across all patients, higher levels of communication competence were associated with improved A1c control after controlling for age, ethnicity and diet adherence. Physician's communication competence may be more important for promoting clinical success in disadvantaged patients. Acquisition of communication competence skills may be an important component in interventions to eliminate Hispanic disparities in glucose control. Published by Elsevier Ireland Ltd.

  1. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  2. 50 CFR 648.262 - Effort-control program for red crab limited access vessels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for red crab... UNITED STATES Management Measures for the Atlantic Deep-Sea Red Crab Fishery § 648.262 Effort-control program for red crab limited access vessels. (a) General. A vessel issued a limited access red crab permit...

  3. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  4. Freedom of the Press For Whom? The Right of Access to Mass Media.

    ERIC Educational Resources Information Center

    Barron, Jerome A.

    Freedom of the press has always meant freedom from government control and censorship, but now the communications industry itself is the major censor, with control of access to the media resting in a very few hands. The new effort throughout the country to open up the media by applying citizen group pressure, by bringing court action, and by…

  5. Optical interconnection network for parallel access to multi-rank memory in future computing systems.

    PubMed

    Wang, Kang; Gu, Huaxi; Yang, Yintang; Wang, Kun

    2015-08-10

    With the number of cores increasing, there is an emerging need for a high-bandwidth low-latency interconnection network, serving core-to-memory communication. In this paper, aiming at the goal of simultaneous access to multi-rank memory, we propose an optical interconnection network for core-to-memory communication. In the proposed network, the wavelength usage is delicately arranged so that cores can communicate with different ranks at the same time and broadcast for flow control can be achieved. A distributed memory controller architecture that works in a pipeline mode is also designed for efficient optical communication and transaction address processes. The scaling method and wavelength assignment for the proposed network are investigated. Compared with traditional electronic bus-based core-to-memory communication, the simulation results based on the PARSEC benchmark show that the bandwidth enhancement and latency reduction are apparent.

  6. Bridging the Communication Divide: CMC and Deaf Individuals' Literacy Skills

    ERIC Educational Resources Information Center

    Garberoglio, Carrie Lou; Dickson, Duncan; Cawthon, Stephanie; Bond, Mark

    2015-01-01

    Deaf individuals frequently capitalize upon communication technologies that increase equitable access to communication in an ongoing, effortless manner. Those communication technologies create conditions that increase direct access to language and literacy. It is the lack of direct access to language that has been historically problematic for deaf…

  7. Qualitative study of the communication expectations of clients accessing oncology care at a tertiary referral center for dogs with life-limiting cancer.

    PubMed

    Stoewen, Debbie L; Coe, Jason B; MacMartin, Clare; Stone, Elizabeth A; E Dewey, Catherine

    2014-10-01

    To describe the process aspects (communication) of the information expectations of clients accessing oncology care services at a tertiary referral center for dogs with life-limiting cancer. Qualitative analysis of data acquired during in-person single and dyadic interviews. 43 dog owners participating in 30 interviews. Independent in-person interviews were conducted with standardized open- and closed-ended questions from April to October 2009. Thematic analysis was performed on transcripts of the interview discussions. The participants expected information to be communicated in a forthright manner; in multiple formats; with understandable language; in an unrushed environment wherein staff took the time to listen, answer all questions, and repeat information when necessary; on a continuous basis, with 24-hour access to address questions or concerns; in a timely manner; with positivity; with compassion and empathy; with a nonjudgmental attitude; and through staff with whom they had established relationships. Results indicated that the manner in which information is communicated is vitally important to clients of dogs with life-limiting cancer in that it not only facilitates comprehension but also creates a humanistic environment from which clients derive the psychosocial support needed to successfully cope with their pet's condition.

  8. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    PubMed

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  9. 47 CFR 69.114 - Special access.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES (CONTINUED) ACCESS CHARGES... of equipment or facilities that are assigned to the Special Access element for purposes of... requirement for the Special Access element. (c) Charges for an individual element shall be assessed upon all...

  10. 78 FR 12621 - Control of Communicable Diseases: Interstate; Scope and Definitions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-25

    ... Control of Communicable Diseases: Interstate; Scope and Definitions AGENCY: Centers for Disease Control... effective date of Direct Final Rule. SUMMARY: The Centers for Disease Control and Prevention (CDC) within... Disease [[Page 12622

  11. Attitude Control Subsystem for the Advanced Communications Technology Satellite

    NASA Technical Reports Server (NTRS)

    Hewston, Alan W.; Mitchell, Kent A.; Sawicki, Jerzy T.

    1996-01-01

    This paper provides an overview of the on-orbit operation of the Attitude Control Subsystem (ACS) for the Advanced Communications Technology Satellite (ACTS). The three ACTS control axes are defined, including the means for sensing attitude and determining the pointing errors. The desired pointing requirements for various modes of control as well as the disturbance torques that oppose the control are identified. Finally, the hardware actuators and control loops utilized to reduce the attitude error are described.

  12. Streetlight Control System Based on Wireless Communication over DALI Protocol

    PubMed Central

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  13. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  14. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  15. Telerobotics - Display, control, and communication problems

    NASA Technical Reports Server (NTRS)

    Stark, Lawrence; Kim, Won-Soo; Tendick, Frank; Hannaford, Blake; Ellis, Stephen

    1987-01-01

    An experimental telerobotics simulation is described suitable for studying human operator (HO) performance. Simple manipulator pick-and-place and tracking tasks allowed quantitative comparison of a number of calligraphic display viewing conditions. An enhanced perspective display was effective with a reference line from target to base, with or without a complex three-dimensional grid framing the view. This was true especially if geometrical display parameters such as azimuth and elevation were arranged to be near optimal. Quantitative comparisons were made possible, utilizing control performance measures such as root mean square error. There was a distinct preference for controlling the manipulator in end-effector Cartesian space for the primitive pick-and-place task, rather than controlling joint angles and then, via direct kinematis, the end-effector position. An introduced communication delay was found to produce decrease in performance. In considerable part, this difficulty could be compensated for by preview control information. The fact that neurological control of normal human movement contains a sampled data period of 0.2 s may relate to this robustness of HO control to delay.

  16. 47 CFR 76.702 - Public access.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Public access. 76.702 Section 76.702 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Cable Television Access § 76.702 Public access. A cable operator may refuse to...

  17. Control and Communication for a Secure and Reconfigurable Power Distribution System

    NASA Astrophysics Data System (ADS)

    Giacomoni, Anthony Michael

    A major transformation is taking place throughout the electric power industry to overlay existing electric infrastructure with advanced sensing, communications, and control system technologies. This transformation to a smart grid promises to enhance system efficiency, increase system reliability, support the electrification of transportation, and provide customers with greater control over their electricity consumption. Upgrading control and communication systems for the end-to-end electric power grid, however, will present many new security challenges that must be dealt with before extensive deployment and implementation of these technologies can begin. In this dissertation, a comprehensive systems approach is taken to minimize and prevent cyber-physical disturbances to electric power distribution systems using sensing, communications, and control system technologies. To accomplish this task, an intelligent distributed secure control (IDSC) architecture is presented and validated in silico for distribution systems to provide greater adaptive protection, with the ability to proactively reconfigure, and rapidly respond to disturbances. Detailed descriptions of functionalities at each layer of the architecture as well as the whole system are provided. To compare the performance of the IDSC architecture with that of other control architectures, an original simulation methodology is developed. The simulation model integrates aspects of cyber-physical security, dynamic price and demand response, sensing, communications, intermittent distributed energy resources (DERs), and dynamic optimization and reconfiguration. Applying this comprehensive systems approach, performance results for the IEEE 123 node test feeder are simulated and analyzed. The results show the trade-offs between system reliability, operational constraints, and costs for several control architectures and optimization algorithms. Additional simulation results are also provided. In particular, the

  18. [Communication on health and safety risk control in contemporary society: an interdisciplinary approach].

    PubMed

    Rangel-S, Maria Ligia

    2007-01-01

    This paper discusses communication as a technology for risk control with health and safety protection and promotion, within the context of a "risk society". As a component of Risk Analysis, risk communication is a technology that appears in risk literature, with well defined objectives, principles and models. These aspects are described and the difficulties are stressed, taking into consideration the multiple rationales related to risks in the culture and the many different aspects of risk regulation and control in the so-called "late modernity". Consideration is also given to the complexity of the communications process, guided by theoretical and methodological discussions in the field. In order to understand the true value of the communications field for risk control with health and safety protection and promotion, this paper also offers an overview of communication theories that support discussions of this matter, proposing a critical approach to models that include the dimensions of power and culture in the context of a capitalist society.

  19. Color coded multiple access scheme for bidirectional multiuser visible light communications in smart home technologies

    NASA Astrophysics Data System (ADS)

    Tiwari, Samrat Vikramaditya; Sewaiwar, Atul; Chung, Yeon-Ho

    2015-10-01

    In optical wireless communications, multiple channel transmission is an attractive solution to enhancing capacity and system performance. A new modulation scheme called color coded multiple access (CCMA) for bidirectional multiuser visible light communications (VLC) is presented for smart home applications. The proposed scheme uses red, green and blue (RGB) light emitting diodes (LED) for downlink and phosphor based white LED (P-LED) for uplink to establish a bidirectional VLC and also employs orthogonal codes to support multiple users and devices. The downlink transmission for data user devices and smart home devices is provided using red and green colors from the RGB LEDs, respectively, while uplink transmission from both types of devices is performed using the blue color from P-LEDs. Simulations are conducted to verify the performance of the proposed scheme. It is found that the proposed bidirectional multiuser scheme is efficient in terms of data rate and performance. In addition, since the proposed scheme uses RGB signals for downlink data transmission, it provides flicker-free illumination that would lend itself to multiuser VLC system for smart home applications.

  20. Hermitian symmetry free optical-single-carrier frequency division multiple access for visible light communication

    NASA Astrophysics Data System (ADS)

    Azim, Ali W.; Le Guennec, Yannis; Maury, Ghislaine

    2018-05-01

    Optical-orthogonal frequency division multiplexing (O-OFDM) is an effective scheme for visible light communications (VLC), offering a candid extension to multiple access (MA) scenarios, i.e., O-OFDMA. However, O-OFDMA exhibits high peak-to-average power ratio (PAPR), which exacerbates the non-linear distortions from the light emitting diode (LED). To overcome high PAPR while sustaining MA, optical-single-carrier frequency-division multiple access (O-SCFDMA) is used. For both O-OFDMA and O-SCFDMA, Hermitian symmetry (HS) constraint is imposed in frequency-domain (FD) to obtain a real-valued time-domain (TD) signal for intensity modulation-direct detection (IM-DD) implementation of VLC. Howbeit, HS results in an increase of PAPR for O-SCFDMA. In this regard, we propose HS free (HSF) O-SCFDMA (HSFO-SCFDMA). We compare HSFO-SCFDMA with several approaches in key parameters, such as, bit error rate (BER), optical power penalty, PAPR, quantization, electrical power efficiency and system complexity. BER performance and optical power penalty is evaluated considering multipath VLC channel and taking into account the bandwidth limitation of LED in combination with its optimized driver. It is illustrated that HSFO-SCFDMA outperforms other alternatives.

  1. Effective communication approaches in tuberculosis control: Health workers' perceptions and experiences.

    PubMed

    Arulchelvan, Sriram; Elangovan, Rengan

    2017-10-01

    Health workers' experiences and understanding of the myths, misconceptions, beliefs about TB, and patients in the community (and effective communication methods) can be useful in designing effective IEC materials and strategies. To study the perceptions and experiences of health workers regarding TB disease, patients, and effective communication strategies in TB control. A survey was conducted among health workers involved in Directly Observed Treatment Short (DOTS) course. Data regarding general health beliefs, prevalent myths and misconceptions about TB in their respective localities, knowledge level among patients, and utilization of various communication strategies were collected. There is a significant increase in knowledge about TB during DOTS among patients, as observed by about half of the health workers. TB patients are aware about how TB spreads to others and their responsibilities. Regular interaction with patients is required for treatment adherence. Two thirds of the health workers believe that media-mix strategy can be very effective in creating awareness among the patients as well as the public. Health workers realized that the video player facility on their mobile phones is useful for showing health-related videos. A combination of mass media and interpersonal communication could be effective for TB control. Face-to-face communication with community members, patient-provider discussions, and information through television could be very effective techniques. Exclusive communication materials should be designed for family members of the patients. Smart phones can be used for effective implementation of TB control programs. Copyright © 2016 Tuberculosis Association of India. Published by Elsevier B.V. All rights reserved.

  2. Locating grey literature on communication disorders.

    PubMed

    Shpilko, Inna

    2005-01-01

    This article provides an overview of selected Web-based resources containing grey literature in the area of communication disorders. It is geared to practitioners, researchers, students, and consumers seeking reliable, freely available scientific information. Grey (or gray) literature has been defined as "that which is produced on all levels of government, academics, business, and industry in print and electronic formats, but which is not controlled by commercial publishers."1 This paper reviews various general reference sources potentially containing grey literature on communication disorders. This review includes identification of the methods specialists in this field use to obtain this valuable, yet often overlooked, literature. Access points and search tools for identifying grey literature on communication disorders are recommended. Commercial databases containing grey literature are not included. Conclusions presented in this article are considered complementary to traditionally published information resources on communication disorders, such as scholarly journals, online databases, etc.

  3. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...

  4. A PARENT–ADOLESCENT INTERVENTION TO INCREASE SEXUAL RISK COMMUNICATION: RESULTS OF A RANDOMIZED CONTROLLED TRIAL

    PubMed Central

    Villarruel, Antonia M.; Cherry, Carol Loveland; Cabriales, Esther Gallegos; Ronis, David L.; Zhou, Yan

    2009-01-01

    This article reports results of a randomized controlled trial designed to test an intervention to increase parent–adolescent sexual risk communication among Mexican parents. Data were analyzed from parents (n = 791) randomly assigned to an HTV risk reduction or health promotion intervention. Measures were administered at pretest, posttest, and 6– and 12–month follow–ups. Generalized estimation equation (GEE) analysis indicates parents in the HIV risk reduction intervention reported significantly more general communication (p < .005), more sexual risk communication (p < .001) and more comfort with communication (p < .001) than parents in the control intervention. Behavioral, normative, and control beliefs significantly mediated the effect of the intervention on all communication outcomes. This study demonstrates the efficacy of an intervention to increase the quality and quantity of parent–adolescent communication related to general and sex–specific communication. PMID:18956979

  5. 78 FR 12702 - Control of Communicable Diseases: Interstate; Scope and Definitions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-25

    ... Control of Communicable Diseases: Interstate; Scope and Definitions AGENCY: Centers for Disease Control... rulemaking; withdrawal. SUMMARY: The Centers for Disease Control and Prevention (CDC) within the Department.... Marrone, JD, Centers for Disease Control and Prevention, 1600 Clifton Road NE., Mailstop E-03, Atlanta...

  6. Health Care Access Among Deaf People.

    PubMed

    Kuenburg, Alexa; Fellinger, Paul; Fellinger, Johannes

    2016-01-01

    Access to health care without barriers is a clearly defined right of people with disabilities as stated by the UN Convention on the Rights of People with Disabilities. The present study reviews literature from 2000 to 2015 on access to health care for deaf people and reveals significant challenges in communication with health providers and gaps in global health knowledge for deaf people including those with even higher risk of marginalization. Examples of approaches to improve access to health care, such as providing powerful and visually accessible communication through the use of sign language, the implementation of important communication technologies, and cultural awareness trainings for health professionals are discussed. Programs that raise health knowledge in Deaf communities and models of primary health care centers for deaf people are also presented. Published documents can empower deaf people to realize their right to enjoy the highest attainable standard of health. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. An Integrated Process and Outcome Evaluation of a Web-Based Communication Tool for Patients With Malignant Lymphoma: Randomized Controlled Trial.

    PubMed

    van Bruinessen, Inge Renske; van Weel-Baumgarten, Evelyn M; Gouw, Hans; Zijlstra, Josée M; van Dulmen, Sandra

    2016-07-29

    ). Ultimately 87/97 (90%) of these patients actually participated in the study, producing 87 datasets for analysis. More than half of the intervention group patients reported that the intervention helped them prepare for a clinical consultation; it created awareness about the importance of communication and reinforced their existing communication skills. In the postvisit test, the control group showed a small, nonsignificant improvement in perceived communication efficacy. The intervention group showed a significant improvement in perceived efficacy. However, the interaction effect was not significant, indicating that the improvement solely as a result of the intervention may not be significant. A considerable number of patients reported that PatientTIME did provide support. We found a trend indicating that in the long run, patients with access to PatientTIME scored better on the perceived efficacy scale than patients without access. However, at this stage we cannot conclude that PatientTIME improves patients' confidence when interacting with HCPs. Netherlands National Trial Register (NTR): 3779; http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=3779 (archived by WebCite at http://www.webcitation.org/6iztxJ5Nt).

  8. Relative position coordinated control for spacecraft formation flying with communication delays

    NASA Astrophysics Data System (ADS)

    Ran, Dechao; Chen, Xiaoqian; Misra, Arun K.; Xiao, Bing

    2017-08-01

    This study addresses a relative position coordinated control problem for spacecraft formation flying subject to directed communication topology. Two different kinds of communication delay cases, including time-varying delays and arbitrarily bounded delays are investigated. Using the backstepping control technique, two virtual velocity control inputs are firstly designed to achieve coordinated position tracking for the kinematic subsystem. Furthermore, a hyperbolic tangent function is introduced to guarantee the boundedness of the virtual controller. Then, a finite-time control algorithm is designed for the dynamic subsystem. It can guarantee that the virtual velocity can be followed by the real velocity after finite time. It is theoretically proved that the proposed control scheme can asymptotically stabilize the closed-loop system. Numerical simulations are further presented that not only highlight closed-loop performance benefiting from the proposed control scheme, but also illustrate its superiority in comparison with conventional formation control schemes.

  9. ACTS TDMA network control. [Advanced Communication Technology Satellite

    NASA Technical Reports Server (NTRS)

    Inukai, T.; Campanella, S. J.

    1984-01-01

    This paper presents basic network control concepts for the Advanced Communications Technology Satellite (ACTS) System. Two experimental systems, called the low-burst-rate and high-burst-rate systems, along with ACTS ground system features, are described. The network control issues addressed include frame structures, acquisition and synchronization procedures, coordinated station burst-time plan and satellite-time plan changes, on-board clock control based on ground drift measurements, rain fade control by means of adaptive forward-error-correction (FEC) coding and transmit power augmentation, and reassignment of channel capacities on demand. The NASA ground system, which includes a primary station, diversity station, and master control station, is also described.

  10. Effects of communication training with the MAAS-Global-D instrument on the antibiotic prescribing for respiratory infections in primary care: study protocol of a randomised controlled trial.

    PubMed

    Hammersen, Friederike; Goetz, Katja; Soennichsen, Andreas; Emcke, Timo; Steinhaeuser, Jost

    2016-04-02

    Primary care physicians account for the majority of antibiotic prescribing in ambulatory care in Germany. Respiratory diseases are, regardless of effectiveness, often treated with antibiotics. Research has found this use without indication to be caused largely by communication problems (e.g. expectations on the patient's part or false assumptions about them by the physician). The present randomised controlled trial (RCT) study evaluates whether communication training for primary care physicians can reduce the antibiotic prescribing rate for respiratory tract infections. The study consists of three groups: group A will receive communication training; group B will be given the same, plus additional, access to an evidence-based point-of-care tool; and group C will function as the control group. The primary endpoint is the difference between intervention and control groups regarding the antibiotic prescribing rate before and after the intervention assessed through routine data. The communication skills are captured with the help of the communication instrument MAAS-Global-D, as well as individual videos of physician-patient consultations recorded by the primary care physicians. These skills will also be regarded with respect to the antibiotic prescribing rate. A process evaluation using qualitative as well as quantitative methods should provide information about barriers and enablers to implementing the communication training. The trial contributes to an insight into the effectiveness of the different components to reduce antibiotic prescribing, which will also be supported by an extensive evaluation. Communication training could be an effective method of reducing antibiotic prescribing in primary care. DRKS00009566 DATE REGISTRATION: 5 November 2015.

  11. 78 FR 12622 - Control of Communicable Diseases: Foreign; Scope and Definitions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-25

    ... Control of Communicable Diseases: Foreign; Scope and Definitions AGENCY: Centers for Disease Control and... of direct final rule. SUMMARY: The Centers for Disease Control and Prevention (CDC) within the... INFORMATION CONTACT: For questions concerning this notice: Ashley A. Marrone, JD, Centers for Disease Control...

  12. 78 FR 12702 - Control of Communicable Diseases: Foreign; Scope and Definitions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-25

    ... Control of Communicable Diseases: Foreign; Scope and Definitions AGENCY: Centers for Disease Control and...; withdrawal. SUMMARY: The Centers for Disease Control and Prevention (CDC) within the Department of Health and... Disease Control and Prevention, 1600 Clifton Road NE., Mailstop E-03, Atlanta, Georgia 30333; telephone...

  13. Device Oriented Project Controller

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dalesio, Leo; Kraimer, Martin

    2013-11-20

    This proposal is directed at the issue of developing control systems for very large HEP projects. A de-facto standard in accelerator control is the Experimental Physics and Industrial Control System (EPICS), which has been applied successfully to many physics projects. EPICS is a channel based system that requires that each channel of each device be configured and controlled. In Phase I, the feasibility of a device oriented extension to the distributed channel database was demonstrated by prototyping a device aware version of an EPICS I/O controller that functions with the current version of the channel access communication protocol. Extensions havemore » been made to the grammar to define the database. Only a multi-stage position controller with limit switches was developed in the demonstration, but the grammar should support a full range of functional record types. In phase II, a full set of record types will be developed to support all existing record types, a set of process control functions for closed loop control, and support for experimental beam line control. A tool to configure these records will be developed. A communication protocol will be developed or extensions will be made to Channel Access to support introspection of components of a device. Performance bench marks will be made on both communication protocol and the database. After these records and performance tests are under way, a second of the grammar will be undertaken.« less

  14. A new communication protocol family for a distributed spacecraft control system

    NASA Technical Reports Server (NTRS)

    Baldi, Andrea; Pace, Marco

    1994-01-01

    In this paper we describe the concepts behind and architecture of a communication protocol family, which was designed to fulfill the communication requirements of ESOC's new distributed spacecraft control system SCOS 2. A distributed spacecraft control system needs a data delivery subsystem to be used for telemetry (TLM) distribution, telecommand (TLC) dispatch and inter-application communication, characterized by the following properties: reliability, so that any operational workstation is guaranteed to receive the data it needs to accomplish its role; efficiency, so that the telemetry distribution, even for missions with high telemetry rates, does not cause a degradation of the overall control system performance; scalability, so that the network is not the bottleneck both in terms of bandwidth and reconfiguration; flexibility, so that it can be efficiently used in many different situations. The new protocol family which satisfies the above requirements is built on top of widely used communication protocols (UDP and TCP), provides reliable point-to-point and broadcast communication (UDP+) and is implemented in C++. Reliability is achieved using a retransmission mechanism based on a sequence numbering scheme. Such a scheme allows to have cost-effective performances compared to the traditional protocols, because retransmission is only triggered by applications which explicitly need reliability. This flexibility enables applications with different profiles to take advantage of the available protocols, so that the best rate between sped and reliability can be achieved case by case.

  15. 27. LAUNCH CONTROL CAPSULE. ACOUSTICAL ENCLOSURE. COMMUNICATIONS CONSOLE AT LEFT; ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    27. LAUNCH CONTROL CAPSULE. ACOUSTICAL ENCLOSURE. COMMUNICATIONS CONSOLE AT LEFT; LAUNCH CONTROL CONSOLE AT RIGHT. PADLOCKED PANEL AT TOP CENTER CONTAINS MISSILE LAUNCH KEYS. SHOCK ISOLATOR AT FAR LEFT. VIEW TO EAST. - Minuteman III ICBM Launch Control Facility November-1, 1.5 miles North of New Raymer & State Highway 14, New Raymer, Weld County, CO

  16. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  17. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  18. An overview of neural function and feedback control in human communication.

    PubMed

    Hood, L J

    1998-01-01

    The speech and hearing mechanisms depend on accurate sensory information and intact feedback mechanisms to facilitate communication. This article provides a brief overview of some components of the nervous system important for human communication and some electrophysiological methods used to measure cortical function in humans. An overview of automatic control and feedback mechanisms in general and as they pertain to the speech motor system and control of the hearing periphery is also presented, along with a discussion of how the speech and auditory systems interact.

  19. Fencing network direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOEpatents

    Blocksome, Michael A.; Mamidala, Amith R.

    2015-07-07

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to a deterministic data communications network through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and the deterministic data communications network; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  20. Fencing network direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOEpatents

    Blocksome, Michael A.; Mamidala, Amith R.

    2015-07-14

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to a deterministic data communications network through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and the deterministic data communications network; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  1. Spectrum for UAS Control and Non-Payload Communications

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.

    2013-01-01

    There is an increasing need to fly UAS in the NAS to perform missions of vital importance to National Security and Defense, Emergency Management, and Science as well as commercial applications (e.g. cargo transport). To enable integration of UAS into the National Airspace System, several critical technical barriers must be eliminated, including: Separation Assurance/Sense and Avoid - the uncertainty surrounding the ability to interoperate in ATC environments and maintain safe separation from other aircraft in the absence of an on-board pilot. Human Systems Integration - lack of standards and guidelines with respect to UAS display information as well as lack of Ground Control Station (GCS) design requirements to operate in the NAS. Certification - lack of airworthiness requirements and safety-related data specific to the full range of UAS, or for their avionics systems or other components. Communications - lack of standard, certifiable data links and aviation safety spectrum to operate such links for civil UAS control communications.

  2. Cost comparison of competing local distribution systems for communication satellite traffic

    NASA Technical Reports Server (NTRS)

    Dopfel, F. E.

    1979-01-01

    The boundaries of market areas which favor various means for distributing communications satellite traffic are considered. The distribution methods considered are: control Earth station with cable access, rooftop Earth stations, Earth station with radio access, and various combinations of these methods. The least cost system for a hypothetical region described by number of users and the average cable access mileage is discussed. The region is characterized by a function which expresses the distribution of users. The results indicate that the least cost distribution is central Earth station with cable access for medium to high density areas of a region combined with rooftop Earth stations or (for higher volumes) radio access for remote users.

  3. Parents and children with cerebral palsy discuss communication needs in hospital.

    PubMed

    Hemsley, Bronwyn; Kuek, Melissa; Bastock, Kaely; Scarinci, Nerina; Davidson, Bronwyn

    2013-12-01

    The aim of this study was to understand the communication needs and experiences of parents and children with cerebral palsy (CP) and complex communication needs (CCN) in hospital. Focus groups with 10 parents and interviews with seven children with CP and CCN were analysed for content themes. Results demonstrated that children often want to communicate directly with hospital staff to: gain attention, answer yes/no, convey basic physical needs, give and receive information, control their environment and participate in preferred activities. Barriers to communication included lack of access to augmentative and alternative communication (AAC), staff preferring to communicate with parents and lack of time to communicate. Results highlight strategies for successful communication, the role of the parents in supporting communication and provision of AAC systems for children in hospital. Policy and practice implications in the preparation of children with CP and CCN for communication in hospital are discussed.

  4. Ethernet access network based on free-space optic deployment technology

    NASA Astrophysics Data System (ADS)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  5. Identification of Communication and Coordination Issues in the US Air Traffic Control System

    NASA Technical Reports Server (NTRS)

    Davison, Hayley J.; Hansman, R. John

    2001-01-01

    Today's air traffic control system is approaching the point of saturation, as evidenced by increasing delays across the National Airspace System (NAS). There exists an opportunity to enhance NAS efficiency and reduce delays by improving strategic communication throughout the ATC system. Although several measures have been taken to improve communication (e.g., Collaborative Decision Making tools), communication issues between ATC facilities remain. It is hypothesized that by identifying the key issues plaguing inter-facility strategic communication, steps can be taken to enhance these communications, and therefore ATC system efficiency. In this report, a series of site visits were performed at Boston and New York ATC facilities as well as at the Air Traffic Control System Command Center. The results from these site visits were used to determine the current communication and coordination structure of Traffic Management Coordinators, who hold a pivotal role in inter-facility communications. Several themes emerged from the study, including: ambiguity of organizational structure in the current ATC system, awkward coordination between ATC facilities, information flow issues, organizational culture issues, and negotiation behaviors used to cope with organizational culture issues.

  6. [Access, use and preferences of Information and Communication Technologies by physicians in a general hospital in Peru].

    PubMed

    Vásquez-Silva, Luis; Ticse, Ray; Alfaro-Carballido, Luz; Guerra-Castañon, Felix

    2015-01-01

    We assessed the access, use and preferences of information and communication technology (ICT) by physicians who practice at Cayetano Heredia National Hospital. The questionnaire explored the availability and skills of ICT, time, educational activities, search engines and technological applications most used as well as ICT preferences in education.211 physicians were surveyed; laptop use was 93%, tablet and smartphone use was 66% and 88%.68% have mobile Internet. Differences were evident in the frequency of use of ICT in 25-34 year old age group as well as a higher level of skills (p<0.05). 86% use PubMed, Facebook and WhatsApp as a means of exchanging images and data related to health, 50% participated in medical blogs, online courses or videoconferences. The use and access of ICT is common among doctors in this hospital and there is positive interest in its use in education.

  7. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  8. Evaluating the MESSAGE Communication Strategies in Dementia training for use with community-based aged care staff working with people with dementia: a controlled pretest-post-test study.

    PubMed

    Conway, Erin R; Chenery, Helen J

    2016-04-01

    The study aims to evaluate the effects of a communication skills training programme on community aged care staff's knowledge of communication support in dementia and on staff's care experience. Dementia can lead to impairments in communication. Therefore, quality community-based dementia care requires that staff be skilled communicators, equipped to facilitate interactions with people with dementia. The current investigation evaluated the effectiveness of the MESSAGE Communication Strategies in Dementia for Care Staff training programme with respect to knowledge of communication support and the staff/caregiver experience. A multi-centre controlled pretest/post-test design with randomised cohort allocation was used. Outcome measures were completed at baseline, immediately after training (training group only), and at three-month follow-up. Thirty-eight care staff working in community aged care participated and completed all outcome measures (training = 22; control = 16).Training and control groups completed the following outcome measures: knowledge of communication support strategies, self-efficacy, preparedness to provide care, strain in nursing care and attitude to dementia care. Staff in the training group provided written feedback on the training. A significant improvement in knowledge scores from baseline was found for the training group both immediately after training and at three-month follow-up. There was also a significant training effect for self-efficacy and preparedness to provide care. No significant difference was found for the control group for any measure. No significant training effects were found for measures of strain or attitudes to dementia care. Feedback from staff suggests that the training was well received. The MESSAGE training was positively received by staff and had a significant effect on care staff knowledge, and confidence to provide care for people with dementia. The easily accessible multimedia training programme is well received by

  9. Retro-detective control structures for free-space optical communication links.

    PubMed

    Jin, Xian; Barg, Jason E; Holzman, Jonathan F

    2009-12-21

    A corner-cube-based retro-detection photocell is introduced. The structure consists of three independent and mutually perpendicular photodiodes (PDs), whose differential photocurrents can be used to probe the alignment state of incident beams. These differential photocurrents are used in an actively-controlled triangulation procedure to optimize the communication channel alignment in a free-space optical (FSO) system. The active downlink and passive uplink communication capabilities of this system are demonstrated.

  10. SCaN Transportable Communication Platform (STCP)

    NASA Technical Reports Server (NTRS)

    Haddad, George; Tanger, Thomas; Pleva, David; Schoenholz, Bryan; Nam, Connor

    2017-01-01

    NASA Glenn Research Center required a satellite communication trailer that served dual purposes; 24/7 Emergency Communication Services (ECS) in the event of a natural or manmade disaster that disrupted conventional communications, and a Ka Band NASA TDRS capability providing a research capability for over the air evaluations/characterizations. The trailer was to be field deployable, environmentally controlled and self-contained providing local area networks (LANs) and Wide Area Networks (WAN's) with user access both wired (Ethernet) and wireless (802.11) supporting VoIP, Internet Web access and Email. The TDRSS terminal included a 200W TWT amplifier mounted on the feed boom, individual up and down converters, and custom integrated waveguide and a supporting feed system. Other features such as a mast, generator, electrical, lighting, surveillance, and storage capabilities were also required. The Trailer was developed and demonstrated these original requested capabilities. New Requirements are defined and the trailer is now being evolved and upgraded to be a backup for the Near- Earth Network (NEN) Stations at KSC that will support the launch phase of EM-1. This paper presents the current and future capabilities of the trailer and additional options that will make it a valuable deployable asset to support remote operations from any launch from location.

  11. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  12. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  13. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  14. Secure access control and large scale robust representation for online multimedia event detection.

    PubMed

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  15. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  16. Control and Non-Payload Communications Links for Integrated Unmanned Aircraft Operations

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Griner, James H.

    2012-01-01

    Technology for unmanned aircraft has advanced so rapidly in recent years that many new applications to public and commercial use are being proposed and implemented. In many countries, emphasis is now being placed on developing the means to allow unmanned aircraft to operate within non-segregated airspace along with commercial, cargo and other piloted and passenger-carrying aircraft.In the U.S., Congress has mandated that the Federal Aviation Administration reduce and remove restrictions on unmanned aircraft operations in a relatively short time frame. To accomplish this, a number of technical and regulatory hurdles must be overcome. A key hurdle involve the communications link connecting the remote pilot located at a ground control station with the aircraft in the airspace, referred to as the Control and Non-Payload Communications (CNPC) link. This link represents a safety critical communications link, and thus requires dedicated and protected aviation spectrum as well as national and international standards defining the operational requirements the CNPC system. The CNPC link must provide line-of-site (LOS) communications, primarily through a ground-based communication system, and beyond-line-of-sight (BLOS) communication achieved using satellite communications. In the U.S., the National Aeronautics and Space Administration (NASA) is charged with providing the technical body of evidence to support spectrum allocation requirements and national and international standards development for the CNPC link. This paper provides a description of the CNPC system, an overview of NASA's CNPC project, and current results in technology assessment, air-ground propagation characterization, and supporting system studies and analyses will be presented.

  17. Different auditory feedback control for echolocation and communication in horseshoe bats.

    PubMed

    Liu, Ying; Feng, Jiang; Metzner, Walter

    2013-01-01

    Auditory feedback from the animal's own voice is essential during bat echolocation: to optimize signal detection, bats continuously adjust various call parameters in response to changing echo signals. Auditory feedback seems also necessary for controlling many bat communication calls, although it remains unclear how auditory feedback control differs in echolocation and communication. We tackled this question by analyzing echolocation and communication in greater horseshoe bats, whose echolocation pulses are dominated by a constant frequency component that matches the frequency range they hear best. To maintain echoes within this "auditory fovea", horseshoe bats constantly adjust their echolocation call frequency depending on the frequency of the returning echo signal. This Doppler-shift compensation (DSC) behavior represents one of the most precise forms of sensory-motor feedback known. We examined the variability of echolocation pulses emitted at rest (resting frequencies, RFs) and one type of communication signal which resembles an echolocation pulse but is much shorter (short constant frequency communication calls, SCFs) and produced only during social interactions. We found that while RFs varied from day to day, corroborating earlier studies in other constant frequency bats, SCF-frequencies remained unchanged. In addition, RFs overlapped for some bats whereas SCF-frequencies were always distinctly different. This indicates that auditory feedback during echolocation changed with varying RFs but remained constant or may have been absent during emission of SCF calls for communication. This fundamentally different feedback mechanism for echolocation and communication may have enabled these bats to use SCF calls for individual recognition whereas they adjusted RF calls to accommodate the daily shifts of their auditory fovea.

  18. Brief Report: Randomized Test of the Efficacy of Picture Exchange Communication System on Highly Generalized Picture Exchanges in Children with ASD

    ERIC Educational Resources Information Center

    Yoder, Paul J.; Lieberman, Rebecca G.

    2010-01-01

    A randomized control trial comparing two social-communication interventions in young children with autism examined far-transfer of the use of picture exchange to communicate. Thirty-six children were randomly assigned to one of two treatment conditions, one of which was the Picture Exchange Communication System (PECS). All children had access to…

  19. 47 CFR 76.701 - Leased access channels.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Leased access channels. 76.701 Section 76.701 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Cable Television Access § 76.701 Leased access channels. (a) Notwithstanding 47...

  20. 29 CFR 1615.160 - Communications.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 4 2012-07-01 2012-07-01 false Communications. 1615.160 Section 1615.160 Labor Regulations... COMMISSION AND IN ACCESSIBILITY OF COMMISSION ELECTRONIC AND INFORMATION TECHNOLOGY § 1615.160 Communications. (a) The Commission shall take appropriate steps to ensure effective communication with applicants...

  1. 29 CFR 1615.160 - Communications.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 4 2011-07-01 2011-07-01 false Communications. 1615.160 Section 1615.160 Labor Regulations... COMMISSION AND IN ACCESSIBILITY OF COMMISSION ELECTRONIC AND INFORMATION TECHNOLOGY § 1615.160 Communications. (a) The Commission shall take appropriate steps to ensure effective communication with applicants...

  2. 29 CFR 1615.160 - Communications.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 4 2013-07-01 2013-07-01 false Communications. 1615.160 Section 1615.160 Labor Regulations... COMMISSION AND IN ACCESSIBILITY OF COMMISSION ELECTRONIC AND INFORMATION TECHNOLOGY § 1615.160 Communications. (a) The Commission shall take appropriate steps to ensure effective communication with applicants...

  3. 29 CFR 1615.160 - Communications.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 4 2014-07-01 2014-07-01 false Communications. 1615.160 Section 1615.160 Labor Regulations... COMMISSION AND IN ACCESSIBILITY OF COMMISSION ELECTRONIC AND INFORMATION TECHNOLOGY § 1615.160 Communications. (a) The Commission shall take appropriate steps to ensure effective communication with applicants...

  4. 29 CFR 1615.160 - Communications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Communications. 1615.160 Section 1615.160 Labor Regulations... COMMISSION AND IN ACCESSIBILITY OF COMMISSION ELECTRONIC AND INFORMATION TECHNOLOGY § 1615.160 Communications. (a) The Commission shall take appropriate steps to ensure effective communication with applicants...

  5. Flightcrew Procedures for Controller Pilot Data Link Communications (CPDLC).

    DOT National Transportation Integrated Search

    2015-09-10

    It is imperative that flightcrew procedures be developed and implemented to capitalize on the strengths of Controller Pilot Data Link Communications (CPDLC) while minimizing the possibility of error. This paper presents a sample of air carrier Standa...

  6. Multiple access techniques and spectrum utilization of the GLOBALSTAR mobile satellite system

    NASA Astrophysics Data System (ADS)

    Louie, Ming; Cohen, Michel; Rouffet, Denis; Gilhousen, Klein S.

    The GLOBALSTAR System is a Low Earth Orbit (LEO) satellite-based mobile communications system that is interoperable with the current and future Public Land Mobile Network (PLMN). The GLOBALSTAR System concept is based upon technological advancement in two key areas: (1) the advancement in LEO satellite technology; (2) the advancement in cellular telephone technology, including the commercial applications of Code Division Multiple Access (CDMA) technologies, and of the most recent progress in Time Division Multiple Access technologies. The GLOBALSTAR System uses elements of CDMA, Frequency Division Multiple Access (FDMA), and Time Division Multiple Access (TDMA) technology, combining with satellite Multiple Beam Antenna (MBA) technology, to arrive at one of the most efficient modulation and multiple access system ever proposed for a satellite communications system. The technology used in GLOBALSTAR exploits the following techniques in obtaining high spectral efficiency and affordable cost per channel, with minimum coordination among different systems: power control, in open and closed loops, voice activation, spot beam satellite antenna for frequency reuse, weighted satellite antenna gain, multiple satellite coverage, and handoff between satellites. The GLOBALSTAR system design will use the following frequency bands: 1610-1626.5 MHz for up-link and 2483.5-2500 MHz for down-link.

  7. 30. LAUNCH CONTROL CAPSULE. ACOUSTICAL ENCLOSURE. OPERATORS' CHAIR AND COMMUNICATIONS ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    30. LAUNCH CONTROL CAPSULE. ACOUSTICAL ENCLOSURE. OPERATORS' CHAIR AND COMMUNICATIONS CONSOLE IN FOREGROUND. ELECTRONIC EQUIPMENT RACK AT LEFT; LAUNCH CONTROL CONSOLE WITH CAPTAIN JAMES L. KING, JR. IN CENTER. LIEUTENANT KEVIN R. MCCLUNEY IN BACKGROUND. VIEW TO SOUTHEAST. - Minuteman III ICBM Launch Control Facility November-1, 1.5 miles North of New Raymer & State Highway 14, New Raymer, Weld County, CO

  8. 30/20 GHz communications systems baseband processor development

    NASA Astrophysics Data System (ADS)

    Brown, L.; Sabourin, D.; Stilwell, J.; McCallister, R.; Borota, M.

    The architecture and system design concepts for a commercial satellite communications system planned for the 1990's has been developed. The system provides data communications between the individual users via trunking and customer premise service terminals utilizing a central switching satellite operating in a time-division multiple-access mode. Baseband processing is employed to route and control traffic on an individual message basis while providing significant advantages in improved link margins and system flexibility. Key technology developments required to prove the flight readiness of the baseband processor design are being verified in the baseband processor proof-of-concept model described herein.

  9. 30/20 GHz communications systems baseband processor development

    NASA Technical Reports Server (NTRS)

    Brown, L.; Sabourin, D.; Stilwell, J.; Mccallister, R.; Borota, M.

    1982-01-01

    The architecture and system design concepts for a commercial satellite communications system planned for the 1990's has been developed. The system provides data communications between the individual users via trunking and customer premise service terminals utilizing a central switching satellite operating in a time-division multiple-access mode. Baseband processing is employed to route and control traffic on an individual message basis while providing significant advantages in improved link margins and system flexibility. Key technology developments required to prove the flight readiness of the baseband processor design are being verified in the baseband processor proof-of-concept model described herein.

  10. Research of remote control for Chinese Antarctica Telescope based on iridium satellite communication

    NASA Astrophysics Data System (ADS)

    Xu, Lingzhe; Yang, Shihai

    2010-07-01

    Astronomers are ever dreaming of sites with best seeing on the Earth surface for celestial observation, and the Antarctica is one of a few such sites only left owing to the global air pollution. However, Antarctica region is largely unaccessible for human being due to lacking of fundamental living conditions, travel facilities and effective ways of communication. Worst of all, the popular internet source as a general way of communication scarcely exists there. Facing such a dilemma and as a solution remote control and data transmission for telescopes through iridium satellite communication has been put forward for the Chinese network Antarctic Schmidt Telescopes 3 (AST3), which is currently under all round research and development. This paper presents iridium satellite-based remote control application adapted to telescope control. The pioneer work in China involves hardware and software configuration utilizing techniques for reliable and secure communication, which is outlined in the paper too.

  11. Communications systems and methods for subsea processors

    DOEpatents

    Gutierrez, Jose; Pereira, Luis

    2016-04-26

    A subsea processor may be located near the seabed of a drilling site and used to coordinate operations of underwater drilling components. The subsea processor may be enclosed in a single interchangeable unit that fits a receptor on an underwater drilling component, such as a blow-out preventer (BOP). The subsea processor may issue commands to control the BOP and receive measurements from sensors located throughout the BOP. A shared communications bus may interconnect the subsea processor and underwater components and the subsea processor and a surface or onshore network. The shared communications bus may be operated according to a time division multiple access (TDMA) scheme.

  12. Assessment method of accessibility conditions: how to make public buildings accessible?

    PubMed

    Andrade, Isabela Fernandes; Ely, e Vera Helena Moro Bins

    2012-01-01

    The enforcement of accessibility today has faced several difficulties, such as intervention in historic buildings that now house public services and cultural activities, such as town halls, museums and theaters and should allow access, on equal terms to all people. The paper presents the application of a method for evaluating the spatial accessibility conditions and their results. For this, we sought to support the theoretical foundation about the main issue involved and legislation. From the method used--guided walks--it was possible to identify the main barriers to accessibility in historic buildings. From the identified barriers, possible solutions are presented according to the four components of accessibility: spatial orientation, displacement, use and communication. It is hoped also that the knowledge gained in this research contributes to an improvement of accessibility legislation in relation to the listed items.

  13. A unique multi-access laser communications transceiver system

    NASA Technical Reports Server (NTRS)

    Ross, Monte

    1990-01-01

    A 'many points in one point' multiaccess laser system has been examined, and results are reported which indicating the feasibility of optical communications multiaccess communications is feasible and that the resultant terminal size and with savings are very substantial compared to the dedicated optical terminals or RF multiaccess approaches. A preliminary design has been accomplished of a package that can weigh less than 150 pounds and which uses a 10-in. effective diameter fixed telescope and requires less than 100 W of regulated power and less than 8 cu ft of space.

  14. Perspectives of a mobile application for people with communication disabilities in the community.

    PubMed

    Crook, Alice; Kenny, Julie; Johnson, Hilary; Davidson, Bronwyn

    2017-02-01

    Purpose To determine the perceptions of people with complex communication needs (CCN) and business staff regarding the uses and functionality of a mobile application to aid communication access. Method A qualitative study using thematic analysis of transcripts and field notes from focus groups and interviews of 19 people with CCN and nine business staff. Results Four themes and 10 subthemes were drawn from the data. Themes highlighted the desire for: increased communication strategies to support customer interactions, increased access to information, functionality of a mobile application to increase its utility, and preferred technical and visual features of mobile applications. Conclusion People with CCN and business staff perceived a mobile application as a useful tool to aid communication access. This research highlighted the importance of facilitating strategies to communicative interactions and information in the community as the fundamental goal of a mobile application developed to support communication access. Implications for Rehabilitation Mobile applications are widely accepted and used in modern customer service industries and have been identified as tools to increase communication access for people with complex communication needs (CCN). People with CCN identified accessibility, presentation, and customisation as important features of mobile applications for communication access. The diversity of user preferences and needs, and the rapid development of new technologies limit the applicability of a single design for mobile applications for people with CCN. People with CCN should be involved in application design and development. A mobile application for communication access would support customer-business interactions as well as enable more accessible information sharing about disability needs and services.

  15. Strategic command, control, communications, and intelligence.

    PubMed

    Zraket, C A

    1984-06-22

    Command, control, communications, and intelligence (C(3)l) for nuclear forces are essential elements in the deterrence of nuclear war. The present C(3)l) system has vulnerabilities associated with its reliability, survivability, and endurance under attack, thereby weakening deterrence by increasing the ambiguity in our capabilities. Development of a reliable and enduring C(3)l) system would reduce this ambiguity. Its reliable, positive control of nuclear forces would give the national leadership more time to assess situations, ensure discriminate retaliation, and improve our ability to manage crises in general. These capabilities could help to stop a war rapidly should one start. A reliable and enduring C(3)1) system will be needed for a long time to come, even if a freeze on strategic nuclear forces is accomplished or other arms control successes achieved. Indeed, C(3)l) may be the best source today of confidence-building measures to reduce tensions and the threat of nuclear catastrophe.

  16. Controlled Secure Direct Communication with Seven-Qubit Entangled States

    NASA Astrophysics Data System (ADS)

    Wang, Shu-Kai; Zha, Xin-Wei; Wu, Hao

    2018-01-01

    In this paper, a new controlled secure direct communication protocol based on a maximally seven-qubit entangled state is proposed. the outcomes of measurement is performed by the sender and the controller, the receiver can obtain different secret messages in a deterministic way with unit successful probability.In this scheme,by using entanglement swapping, no qubits carrying secret messages are transmitted.Therefore, the protocol is completely secure.

  17. Performance analysis of Integrated Communication and Control System networks

    NASA Technical Reports Server (NTRS)

    Halevi, Y.; Ray, A.

    1990-01-01

    This paper presents statistical analysis of delays in Integrated Communication and Control System (ICCS) networks that are based on asynchronous time-division multiplexing. The models are obtained in closed form for analyzing control systems with randomly varying delays. The results of this research are applicable to ICCS design for complex dynamical processes like advanced aircraft and spacecraft, autonomous manufacturing plants, and chemical and processing plants.

  18. Analysis of Controller-Pilot Voice Communications from Kansas City Air Route Traffic Control Center

    DOT National Transportation Integrated Search

    2017-07-01

    The implementation of Controller Pilot Datalink Communications (CPDLC) in domestic en route airspace is a key enabling technology in the Next Generation Air Transportation System. The Federal Aviation Administration plans to implement en route CPDLC ...

  19. Facility for the evaluation of space communications and related systems

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Svoboda, James S.; Kachmar, Brian A.

    1995-01-01

    NASA Lewis Research Center's Communications Projects Branch has developed a facility for the evaluation of space communications systems and related types of systems, called the Advanced Space Communications (ASC) Laboratory. The ASC Lab includes instrumentation, testbed hardware, and experiment control and monitor software for the evaluation of components, subsystems, systems, and networks. The ASC lab has capabilities to perform radiofrequency (RF), microwave, and millimeter-wave characterizations as well as measurements using low, medium, or high data rate digital signals. In addition to laboratory measurements, the ASC Lab also includes integrated satellite ground terminals allowing experimentation and measurements accessing operational satellites through real space links.

  20. Development of a Laboratory for Improving Communication between Air Traffic Controllers and Pilots

    NASA Technical Reports Server (NTRS)

    Brammer, Anthony

    2003-01-01

    Runway incursions and other surface incidents are known to be significant threats to aviation safety and efficiency. Though the number of near mid-air collisions in U.S. air space has remained unchanged during the last five years, the number of runway incursions has increased and they are almost all due to human error. The three most common factors contributing to air traffic controller and pilot error in airport operations include two that involve failed auditory communication. This project addressed the problems of auditory communication in air traffic control from an acoustical standpoint, by establishing an acoustics laboratory designed for this purpose and initiating research into selected topics that show promise for improving voice communications between air traffic controllers and pilots.

  1. 10 CFR 25.9 - Communications.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Communications. 25.9 Section 25.9 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION General Provisions § 25.9 Communications. Except where otherwise specified, communications and reports concerning the regulations in this part should be addressed to the...

  2. 10 CFR 25.9 - Communications.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Communications. 25.9 Section 25.9 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION General Provisions § 25.9 Communications. Except where otherwise specified, communications and reports concerning the regulations in this part should be addressed to the...

  3. Land-mobile satellite communication system

    NASA Technical Reports Server (NTRS)

    Yan, Tsun-Yee (Inventor); Rafferty, William (Inventor); Dessouky, Khaled I. (Inventor); Wang, Charles C. (Inventor); Cheng, Unjeng (Inventor)

    1993-01-01

    A satellite communications system includes an orbiting communications satellite for relaying communications to and from a plurality of ground stations, and a network management center for making connections via the satellite between the ground stations in response to connection requests received via the satellite from the ground stations, the network management center being configured to provide both open-end service and closed-end service. The network management center of one embodiment is configured to provides both types of service according to a predefined channel access protocol that enables the ground stations to request the type of service desired. The channel access protocol may be configured to adaptively allocate channels to open-end service and closed-end service according to changes in the traffic pattern and include a free-access tree algorithm that coordinates collision resolution among the ground stations.

  4. 76 FR 55676 - Emergency Access Advisory Committee; Announcement of Date of Next Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-08

    ... FEDERAL COMMUNICATIONS COMMISSION [DA 11-1473] Emergency Access Advisory Committee; Announcement of Date of Next Meeting AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: This... required in the Twenty-First Century Communications and Video Accessibility Act of 2010 (CVAA). DATES: The...

  5. 76 FR 72704 - Emergency Access Advisory Committee; Announcement of Date of Next Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-25

    ... FEDERAL COMMUNICATIONS COMMISSION [DA 11-1880] Emergency Access Advisory Committee; Announcement of Date of Next Meeting AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: This... required in the Twenty-First Century Communications and Video Accessibility Act of 2010 (CVAA). DATES: The...

  6. 77 FR 55473 - Emergency Access Advisory Committee; Announcement of Date of Next Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-10

    ... required by the Twenty-First Century Communications and Video Accessibility Act (CVAA), Public Law 11-260... FEDERAL COMMUNICATIONS COMMISSION [DA 12-1372] Emergency Access Advisory Committee; Announcement of Date of Next Meeting AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: This...

  7. Active disturbance rejection controller of fine tracking system for free space optical communication

    NASA Astrophysics Data System (ADS)

    Cui, Ning; Liu, Yang; Chen, Xinglin; Wang, Yan

    2013-08-01

    Free space optical communication is one of the best approaches in future communications. Laser beam's acquisition, pointing and tracking are crucial technologies of free space optical communication. Fine tracking system is important component of APT (acquisition, pointing and tracking) system. It cooperates with the coarse pointing system in executing the APT mission. Satellite platform vibration and disturbance, which reduce received optical power, increase bit error rate and affect seriously the natural performance of laser communication. For the characteristic of satellite platform, an active disturbance rejection controller was designed to reduce the vibration and disturbance. There are three major contributions in the paper. Firstly, the effects of vibration on the inter satellite optical communications were analyzed, and the reasons and characters of vibration of the satellite platform were summarized. The amplitude-frequency response of a filter was designed according to the power spectral density of platform vibration of SILEX (Semiconductor Inter-satellite Laser Experiment), and then the signals of platform vibration were generated by filtering white Gaussian noise using the filter. Secondly, the fast steering mirror is a key component of the fine tracking system for optical communication. The mechanical design and model analysis was made to the tip/tilt mirror driven by the piezoelectric actuator and transmitted by the flexure hinge. The transfer function of the fast steering mirror, camera, D/A data acquisition card was established, and the theory model of transfer function of this system was further obtained. Finally, an active disturbance rejection control method is developed, multiple parallel extended state observers were designed for estimation of unknown dynamics and external disturbance, and the estimated states were used for nonlinear feedback control and compensation to improve system performance. The simulation results show that the designed

  8. 12 CFR 606.660 - Communications.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... communicates with applicants and beneficiaries by telephone, telecommunication devices for deaf persons (TDDs... accessibility shall be used at each primary entrance of an accessible facility. (d) This section does not...

  9. 32 CFR 1699.160 - Communications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... communicates with applicants and beneficiaries by telephone, telecommunications devices for deaf persons (TDD's... accessibility shall be used at each primary entrance of an accessible facility. (d) This section does not...

  10. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    PubMed

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  11. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

    PubMed Central

    Huarte, Maider; Romaña, Pedro

    2018-01-01

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model. PMID:29438338

  12. Simulation of Controller Pilot Data Link Communications over VHF Digital Link Mode 3

    NASA Technical Reports Server (NTRS)

    Bretmersky, Steven C.; Murawski, Robert; Nguyen, Thanh C.; Raghavan, Rajesh S.

    2004-01-01

    The Federal Aviation Administration (FAA) has established an operational plan for the future Air Traffic Management (ATM) system, in which the Controller Pilot Data Link Communications (CPDLC) is envisioned to evolve into digital messaging that will take on an ever increasing role in controller to pilot communications, significantly changing the way the National Airspace System (NAS) is operating. According to FAA, CPDLC represents the first phase of the transition from the current analog voice system to an International Civil Aviation Organization (ICAO) compliant system in which digital communication becomes the alternate and perhaps primary method of routine communication. The CPDLC application is an Air Traffic Service (ATS) application in which pilots and controllers exchange messages via an addressed data link. CPDLC includes a set of clearance, information, and request message elements that correspond to existing phraseology employed by current Air Traffic Control (ATC) procedures. These message elements encompass altitude assignments, crossing constraints, lateral deviations, route changes and clearances, speed assignments, radio frequency assignments, and various requests for information. The pilot is provided with the capability to respond to messages, to request clearances and information, to report information, and to declare/rescind an emergency. A 'free text' capability is also provided to exchange information not conforming to defined formats. This paper presents simulated results of the aeronautical telecommunication application Controller Pilot Data Link Communications over VHF Digital Link Mode 3 (VDL Mode 3). The objective of this simulation study was to determine the impact of CPDLC traffic loads, in terms of timely message delivery and capacity of the VDL Mode 3 subnetwork. The traffic model is based on and is used for generating air/ground messages with different priorities. Communication is modeled for the en route domain of the Cleveland

  13. Compliance and Functional Testing of IEEE 1451.1 for NCAP-to-NCAP Communications in a Sensor Network

    NASA Technical Reports Server (NTRS)

    Figueroa, Jorge; Gurkan, Deniz; Yuan, X.; Benhaddou, D.; Liu, H.; Singla, A.; Franzl, R.; Ma, H.; Bhatt, S.; Morris, J.; hide

    2008-01-01

    Distributed control in a networked environment is an irreplaceable feature in systems with remote sensors and actuators. Although distributed control was not originally designed to be networked, usage of off-the-shelf networking technologies has become so prevalent that control systems are desired to have access mechanisms similar to computer networks. However, proprietary transducer interfaces for network communications and distributed control overwhelmingly dominate this industry. Unless the lack of compatibility and interoperability among transducers is resolved, the mature level of access (that computer networking can deliver) will not be achieved in such networked distributed control systems. Standardization of networked transducer interfaces will enable devices from different manufacturers to talk to each other and ensure their plug-and-play capability. One such standard is the suite of IEEE 1451 for sensor network communication and transducer interfaces. The suite not only provides a standard interface for smart transducers, but also outlines the connection of an NCAP (network capable application processor) and transducers (through a transducer interface module TIM). This paper presents the design of the compliance testing of IEEE 1451.1 (referred to as Dot1) compatible NCAP-to-NCAP communications on a link-layer independent medium. The paper also represents the first demonstration of NCAP-to-NCAP communications with Dot1 compatibility: a tester NCAP and an NCAP under test (NUT).

  14. 47 CFR 15.609 - Marketing of Access BPL equipment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Marketing of Access BPL equipment. 15.609 Section 15.609 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Access Broadband Over Power Line (Access BPL) § 15.609 Marketing of Access BPL equipment. The marketing of Access...

  15. 47 CFR 15.609 - Marketing of Access BPL equipment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Marketing of Access BPL equipment. 15.609 Section 15.609 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Access Broadband Over Power Line (Access BPL) § 15.609 Marketing of Access BPL equipment. The marketing of Access...

  16. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    NASA Astrophysics Data System (ADS)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  17. Different Auditory Feedback Control for Echolocation and Communication in Horseshoe Bats

    PubMed Central

    Liu, Ying; Feng, Jiang; Metzner, Walter

    2013-01-01

    Auditory feedback from the animal's own voice is essential during bat echolocation: to optimize signal detection, bats continuously adjust various call parameters in response to changing echo signals. Auditory feedback seems also necessary for controlling many bat communication calls, although it remains unclear how auditory feedback control differs in echolocation and communication. We tackled this question by analyzing echolocation and communication in greater horseshoe bats, whose echolocation pulses are dominated by a constant frequency component that matches the frequency range they hear best. To maintain echoes within this “auditory fovea”, horseshoe bats constantly adjust their echolocation call frequency depending on the frequency of the returning echo signal. This Doppler-shift compensation (DSC) behavior represents one of the most precise forms of sensory-motor feedback known. We examined the variability of echolocation pulses emitted at rest (resting frequencies, RFs) and one type of communication signal which resembles an echolocation pulse but is much shorter (short constant frequency communication calls, SCFs) and produced only during social interactions. We found that while RFs varied from day to day, corroborating earlier studies in other constant frequency bats, SCF-frequencies remained unchanged. In addition, RFs overlapped for some bats whereas SCF-frequencies were always distinctly different. This indicates that auditory feedback during echolocation changed with varying RFs but remained constant or may have been absent during emission of SCF calls for communication. This fundamentally different feedback mechanism for echolocation and communication may have enabled these bats to use SCF calls for individual recognition whereas they adjusted RF calls to accommodate the daily shifts of their auditory fovea. PMID:23638137

  18. Home-based family intervention increases knowledge, communication and living donation rates: a randomized controlled trial.

    PubMed

    Ismail, S Y; Luchtenburg, A E; Timman, R; Zuidema, W C; Boonstra, C; Weimar, W; Busschbach, J J V; Massey, E K

    2014-08-01

    Our aim was to develop and test an educational program to support well-informed decision making among patients and their social network regarding living donor kidney transplantation (LDKT). One hundred sixty-three patients who were unable to find a living donor were randomized to standard care or standard care plus home-based education. In the education condition, patients and members of their social network participated in home-based educational meetings and discussed renal replacement therapy options. Patients and invitees completed pre-post self-report questionnaires measuring knowledge, risk perception, communication, self-efficacy and subjective norm. LDKT activities were observed for 6 months postintervention. Patients in the experimental group showed significantly more improvements in knowledge (p < 0.001) and communication (p = 0.012) compared with the control group. The invitees showed pre-post increases in knowledge (p < 0.001), attitude toward discussing renal replacement therapies (p = 0.020), attitude toward donating a kidney (p = 0.023) and willingness to donate a kidney (p = 0.039) and a decrease in risk perception (p = 0.003). Finally, there were significantly more inquiries (29/39 vs. 13/41, p < 0.001), evaluations (25/39 vs. 7/41, p < 0.001) and actual LDKTs (17/39 vs. 4/41, p = 0.003) in the experimental group compared with the control group. Home-based family education supports well-informed decision making and promotes access to LDKT. © Copyright 2014 The American Society of Transplantation and the American Society of Transplant Surgeons.

  19. Store-directed price promotions and communications strategies improve healthier food supply and demand: impact results from a randomized controlled, Baltimore City store-intervention trial

    PubMed Central

    Budd, Nadine; Jeffries, Jayne K; Jones-Smith, Jessica; Kharmats, Anna; McDermott, Ann Yelmokas; Gittelsohn, Joel

    2017-01-01

    Objective Small food store interventions show promise to increase healthy food access in under-resourced areas. However, none have tested the impact of price discounts on healthy food supply and demand. We tested the impact of store-directed price discounts and communications strategies, separately and combined, on the stocking, sales and prices of healthier foods and on storeowner psychosocial factors. Design Factorial design randomized controlled trial. Setting Twenty-four corner stores in low-income neighbourhoods of Baltimore City, MD, USA. Subjects Stores were randomized to pricing intervention, communications intervention, combined pricing and communications intervention, or control. Stores that received the pricing intervention were given a 10–30% price discount by wholesalers on selected healthier food items during the 6-month trial. Communications stores received visual and interactive materials to promote healthy items, including signage, taste tests and refrigerators. Results All interventions showed significantly increased stock of promoted foods υ. control. There was a significant treatment effect for daily unit sales of healthy snacks (β = 6·4, 95% CI 0·9, 11·9) and prices of healthy staple foods (β = −0·49, 95% CI −0·90, −0·03) for the combined group υ. control, but not for other intervention groups. There were no significant intervention effects on storeowner psychosocial factors. Conclusions All interventions led to increased stock of healthier foods. The combined intervention was effective in increasing sales of healthier snacks, even though discounts on snacks were not passed to the consumer. Experimental research in small stores is needed to understand the mechanisms by which store-directed price promotions can increase healthy food supply and demand. PMID:28222818

  20. Analysis of Timing Control Mechanism of Utterance and Body Motion Using Dialogue between Human and Communication Robot

    NASA Astrophysics Data System (ADS)

    Takasugi, Shoji; Yamamoto, Tomohito; Muto, Yumiko; Abe, Hiroyuki; Miyake, Yoshihiro

    The purpose of this study is to clarify the effects of timing control of utterance and body motion in human-robot interaction. Our previous study has already revealed the correlation of timing of utterance and body motion in human-human communication. Here we proposed a timing control model based on our previous research and estimated its influence to realize human-like communication using a questionnaire method. The results showed that the difference of effectiveness between the communication with the timing control model and that without it was observed. In addition, elderly people evaluated the communication with timing control much higher than younger people. These results show not only the importance of timing control of utterance and body motion in human communication but also its effectiveness for realizing human-like human-robot interaction.

  1. Patients' willingness to pay for electronic communication with their general practitioner.

    PubMed

    Bergmo, Trine Strand; Wangberg, Silje Camilla

    2007-06-01

    Despite the common use of electronic communication in other aspects of everyday life, its use between patients and health care providers has been slow to diffuse. Possible explanations are security issues and lack of payment mechanisms. This study investigated how patients value secure electronic access to their general practitioner (GP). One hundred and ninety-nine patients were asked an open-ended willingness-to-pay (WTP) question as part of a randomised controlled trial. We compared the WTP values between two groups of respondents; one group had had the opportunity to communicate electronically with their GP for a year and the other group had not. Fifty-two percent of the total sample was willing to pay for electronic GP contact. The group of patients with access revealed a significantly lower WTP than the group without such access. Possible explanations are that the system had fewer benefits than expected, a presence of hypothetical bias or simply a preference for face-to-face encounters.

  2. Guidelines for Analysis of Communicable Disease Control Planning in Developing Countries. Volume 1: Communicable Diseases Control Planning. International Health Planning Methods Series.

    ERIC Educational Resources Information Center

    Chin, James

    Intended to assist Agency for International Development (AID) officers, advisors, and health officials in incorporating health planning into national plans for economic development, this first of ten manuals in the International Health Planning Methods Series deals with planning and evaluation of communicable disease control programs. The first…

  3. 76 FR 21741 - Emergency Access Advisory Committee; Announcement of Establishment, and of Members and Co...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-18

    ... FEDERAL COMMUNICATIONS COMMISSION [DA 10-2318 and DA 11-55] Emergency Access Advisory Committee... AGENCY: Federal Communications Commission. ACTION: Notice; correction. SUMMARY: The Federal Communication... The Twenty-First Century Communications and Video Accessibility Act (``CVAA''), the date of the first...

  4. Feasibility Studies of Surveillance, Communication, and Data Processing Subsystems for Advanced Air Traffic Management

    DOT National Transportation Integrated Search

    1972-11-01

    Analyses are made of waveforms, parameters, codes, error rates, and multi-access noise for proposed communications and surveillance subsystems to be useful for air traffic control in the 1990-2000 time period. The systems represented in these analyse...

  5. Boosting a Low-Cost Smart Home Environment with Usage and Access Control Rules.

    PubMed

    Barsocchi, Paolo; Calabrò, Antonello; Ferro, Erina; Gennaro, Claudio; Marchetti, Eda; Vairo, Claudio

    2018-06-08

    Smart Home has gained widespread attention due to its flexible integration into everyday life. Pervasive sensing technologies are used to recognize and track the activities that people perform during the day, and to allow communication and cooperation of physical objects. Usually, the available infrastructures and applications leveraging these smart environments have a critical impact on the overall cost of the Smart Home construction, require to be preferably installed during the home construction and are still not user-centric. In this paper, we propose a low cost, easy to install, user-friendly, dynamic and flexible infrastructure able to perform runtime resources management by decoupling the different levels of control rules. The basic idea relies on the usage of off-the-shelf sensors and technologies to guarantee the regular exchange of critical information, without the necessity from the user to develop accurate models for managing resources or regulating their access/usage. This allows us to simplify the continuous updating and improvement, to reduce the maintenance effort and to improve residents’ living and security. A first validation of the proposed infrastructure on a case study is also presented.

  6. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  7. Communication Security for Control Systems in Smart Grid

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.

  8. Randomized controlled trial of supplemental augmentative and alternative communication versus voice rest alone after phonomicrosurgery.

    PubMed

    Rousseau, Bernard; Gutmann, Michelle L; Mau, Theodore; Francis, David O; Johnson, Jeffrey P; Novaleski, Carolyn K; Vinson, Kimberly N; Garrett, C Gaelyn

    2015-03-01

    This randomized trial investigated voice rest and supplemental text-to-speech communication versus voice rest alone on visual analog scale measures of communication effectiveness and magnitude of voice use. Randomized clinical trial. Multicenter outpatient voice clinics. Thirty-seven patients undergoing phonomicrosurgery. Patients undergoing phonomicrosurgery were randomized to voice rest and supplemental text-to-speech communication or voice rest alone. The primary outcome measure was the impact of voice rest on ability to communicate effectively over a 7-day period. Pre- and postoperative magnitude of voice use was also measured as an observational outcome. Patients randomized to voice rest and supplemental text-to-speech communication reported higher median communication effectiveness on each postoperative day compared to those randomized to voice rest alone, with significantly higher median communication effectiveness on postoperative days 3 (P=.03) and 5 (P=.01). Magnitude of voice use did not differ on any preoperative (P>.05) or postoperative day (P>.05), nor did patients significantly decrease voice use as the surgery date approached (P>.05). However, there was a significant reduction in median voice use pre- to postoperatively across patients (P<.001) with median voice use ranging from 0 to 3 throughout the postoperative week. Supplemental text-to-speech communication increased patient-perceived communication effectiveness on postoperative days 3 and 5 over voice rest alone. With the prevalence of smartphones and the widespread use of text messaging, supplemental text-to-speech communication may provide an accessible and cost-effective communication option for patients on vocal restrictions. © American Academy of Otolaryngology—Head and Neck Surgery Foundation 2015.

  9. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    PubMed

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  10. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    PubMed Central

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  11. Electronic communication improves access, but barriers to its widespread adoption remain.

    PubMed

    Bishop, Tara F; Press, Matthew J; Mendelsohn, Jayme L; Casalino, Lawrence P

    2013-08-01

    Because electronic communication is quick, convenient, and inexpensive for most patients, care that is truly patient centered should promote the use of such communication between patients and providers, even using it as a substitute for office visits when clinically appropriate. Despite the potential benefits of electronic communication, fewer than 7 percent of providers used it in 2008. To learn from the experiences of providers that have widely incorporated electronic communication into patient care, we interviewed leaders of twenty-one medical groups that use it extensively with patients. We also interviewed staff in six of those groups. Electronic communication was widely perceived to be a safe, effective, and efficient means of communication that improves patient satisfaction and saves patients time but that increases the volume of physician work unless office visits are reduced. Practice redesign and new payment methods are likely necessary for electronic communication to be more widely used in patient care.

  12. 10 CFR 725.5 - Communications.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Communications. 725.5 Section 725.5 Energy DEPARTMENT OF ENERGY PERMITS FOR ACCESS TO RESTRICTED DATA General Provisions § 725.5 Communications. All communications concerning this part should be addressed to the Chief Health, Safety and Security Officer, HS-1...

  13. 10 CFR 725.5 - Communications.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Communications. 725.5 Section 725.5 Energy DEPARTMENT OF ENERGY PERMITS FOR ACCESS TO RESTRICTED DATA General Provisions § 725.5 Communications. All communications concerning this part should be addressed to the Chief Health, Safety and Security Officer, HS-1...

  14. 10 CFR 725.5 - Communications.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Communications. 725.5 Section 725.5 Energy DEPARTMENT OF ENERGY PERMITS FOR ACCESS TO RESTRICTED DATA General Provisions § 725.5 Communications. All communications concerning this part should be addressed to the Chief Health, Safety and Security Officer, HS-1...

  15. 10 CFR 725.5 - Communications.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Communications. 725.5 Section 725.5 Energy DEPARTMENT OF ENERGY PERMITS FOR ACCESS TO RESTRICTED DATA General Provisions § 725.5 Communications. All communications concerning this part should be addressed to the Chief Health, Safety and Security Officer, HS-1...

  16. 10 CFR 725.5 - Communications.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Communications. 725.5 Section 725.5 Energy DEPARTMENT OF ENERGY PERMITS FOR ACCESS TO RESTRICTED DATA General Provisions § 725.5 Communications. All communications concerning this part should be addressed to the Chief Health, Safety and Security Officer, HS-1...

  17. 47 CFR 76.701 - Leased access channels.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 4 2013-10-01 2013-10-01 false Leased access channels. 76.701 Section 76.701... CABLE TELEVISION SERVICE Cable Television Access § 76.701 Leased access channels. (a) Notwithstanding 47 U.S.C. 532(b)(2) (Communications Act of 1934, as amended, section 612), a cable operator, in...

  18. Effect of the Sonas Programme on Communication in People with Dementia: A Randomized Controlled Trial

    PubMed Central

    Strøm, Benedicte Sørensen; Engedal, Knut; Benth, Jurate Saltyte; Grov, Ellen-Karine

    2017-01-01

    Background Strategies to improve communication in people with dementia are warranted. We examined the effect of the Sonas programme on communication ability in persons with moderate to severe dementia. Methods A 24-week 3-armed (Sonas, reading, and control group) randomized controlled trial including 120 nursing home residents with dementia was conducted; 105 completed the follow-up assessments. The main outcome was change in communication abilities measured by the Holden Communication Scale (HCS). Results We found no overall significant effect of the Sonas programme with regard to communication ability as measured by the HCS. However, an effect between the Sonas group and the reading group and between the Sonas group and the control group from T0 to T1 and T2 was found, as well as a significant improvement in communication in the Sonas group. Among people with severe dementia, the Sonas group scored significantly better on the HCS compared to the reading group after 12 weeks, but not after 24 weeks. Conclusion This study failed to document an overall effect of the Sonas programme on communication; however, the findings indicate that the Sonas programme has a significant effect on communication among those with severe dementia. PMID:28553314

  19. 77 FR 18814 - Emergency Access Advisory Committee; Announcement of Date of Next Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-28

    ... Communications and Video Accessibility Act (CVAA), Public Law 11-260, for the purpose of achieving equal access... those effective and efficient technologies and methods. Public Law 111-260 Sec. 106(c). During the... FEDERAL COMMUNICATIONS COMMISSION [DA 12-406] Emergency Access Advisory Committee; Announcement of...

  20. Eye Tracking Outcomes in Tobacco Control Regulation and Communication: A Systematic Review.

    PubMed

    Meernik, Clare; Jarman, Kristen; Wright, Sarah Towner; Klein, Elizabeth G; Goldstein, Adam O; Ranney, Leah

    2016-10-01

    In this paper we synthesize the evidence from eye tracking research in tobacco control to inform tobacco regulatory strategies and tobacco communication campaigns. We systematically searched 11 databases for studies that reported eye tracking outcomes in regards to tobacco regulation and communication. Two coders independently reviewed studies for inclusion and abstracted study characteristics and findings. Eighteen studies met full criteria for inclusion. Eye tracking studies on health warnings consistently showed these warnings often were ignored, though eye tracking demonstrated that novel warnings, graphic warnings, and plain packaging can increase attention toward warnings. Eye tracking also revealed that greater visual attention to warnings on advertisements and packages consistently was associated with cognitive processing as measured by warning recall. Eye tracking is a valid indicator of attention, cognitive processing, and memory. The use of this technology in tobacco control research complements existing methods in tobacco regulatory and communication science; it also can be used to examine the effects of health warnings and other tobacco product communications on consumer behavior in experimental settings prior to the implementation of novel health communication policies. However, the utility of eye tracking will be enhanced by the standardization of methodology and reporting metrics.

  1. Enhanced Multi-Modal Access to Planetary Exploration

    NASA Technical Reports Server (NTRS)

    Lamarra, Norm; Doyle, Richard; Wyatt, Jay

    2003-01-01

    Tomorrow's Interplanetary Network (IPN) will evolve from JPL's Deep-Space Network (DSN) and provide key capabilities to future investigators, such as simplified acquisition of higher-quality science at remote sites and enriched access to these sites. These capabilities could also be used to foster public interest, e.g., by making it possible for students to explore these environments personally, eventually perhaps interacting with a virtual world whose models could be populated by data obtained continuously from the IPN. Our paper looks at JPL's approach to making this evolution happen, starting from improved communications. Evolving space protocols (e.g., today's CCSDS proximity and file-transfer protocols) will provide the underpinning of such communications in the next decades, just as today's rich web was enabled by progress in Internet Protocols starting from the early 1970's (ARPAnet research). A key architectural thrust of this effort is to deploy persistent infrastructure incrementally, using a layered service model, where later higher-layer capabilities (such as adaptive science planning) are enabled by earlier lower-layer services (such as automated routing of object-based messages). In practice, there is also a mind shift needed from an engineering culture raised on point-to-point single-function communications (command uplink, telemetry downlink), to one in which assets are only indirectly accessed, via well-defined interfaces. We are aiming to foster a 'community of access' both among space assets and the humans who control them. This enables appropriate (perhaps eventually optimized) sharing of services and resources to the greater benefit of all participants. We envision such usage to be as automated in the future as using a cell phone is today - with all the steps in creating the real-time link being automated.

  2. Lexical access changes in patients with multiple sclerosis: a two-year follow-up study.

    PubMed

    Sepulcre, Jorge; Peraita, Herminia; Goni, Joaquin; Arrondo, Gonzalo; Martincorena, Inigo; Duque, Beatriz; Velez de Mendizabal, Nieves; Masdeu, Joseph C; Villoslada, Pablo

    2011-02-01

    The aim of the study was to analyze lexical access strategies in patients with multiple sclerosis (MS) and their changes over time. We studied lexical access strategies during semantic and phonemic verbal fluency tests and also confrontation naming in a 2-year prospective cohort of 45 MS patients and 20 healthy controls. At baseline, switching lexical access strategy (both in semantic and in phonemic verbal fluency tests) and confrontation naming were significantly impaired in MS patients compared with controls. After 2 years follow-up, switching score decreased, and cluster size increased over time in semantic verbal fluency tasks, suggesting a failure in the retrieval of lexical information rather than an impairment of the lexical pool. In conclusion, these findings underline the significant presence of lexical access problems in patients with MS and could point out their key role in the alterations of high-level communications abilities in MS.

  3. Electronic communication improves access, but barriers to its widespread adoption remain

    PubMed Central

    Bishop, Tara F.; Press, Matthew J.; Mendelsohn, Jayme L.; Casalino, Lawrence P.

    2013-01-01

    Principles of patient-centered care imply that physicians should use electronic communication with patients more extensively, including as a substitute for office visits when clinically appropriate. We interviewed leaders of 21 medical groups that use electronic communication with patients extensively and also interviewed staff in six of these groups. Electronic communication was widely perceived to be a safe, effective and efficient means of communication that improves patient satisfaction and saves patients time, but increases the volume of physician work unless office visits are reduced. Practice redesign and new payment methods are likely necessary for electronic communication to be used more extensively. PMID:23918479

  4. 47 CFR 76.1707 - Leased access.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 4 2011-10-01 2011-10-01 false Leased access. 76.1707 Section 76.1707 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... operator adopts and enforces a written policy regarding indecent leased access programming pursuant to § 76...

  5. 47 CFR 76.1707 - Leased access.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Leased access. 76.1707 Section 76.1707 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... operator adopts and enforces a written policy regarding indecent leased access programming pursuant to § 76...

  6. Collections and Services for the Spanish-Speaking: Accessibility.

    ERIC Educational Resources Information Center

    Marquis, Solina Kasten

    2003-01-01

    Discusses making public library collections accessible to Spanish-speaking users and describes the consequences that can result from inattention to linguistic and cultural accessibility. Topics include cataloging issues and solutions; labeling; shelving; signage; electronic access; Spanish language training for staff; intercultural communication;…

  7. Common Carrier Access to Cable Communications: Regulatory and Economic Issues.

    ERIC Educational Resources Information Center

    Kestenbaum, Lionel

    The implications of cable television (CATV) common carrier access and economic and regulatory issues associated with it are examined in this paper. The first section provides a discussion of the feasibility and legal basis of common carrier access; the next section contrasts common carrier access with existing over-the-air television broadcasting…

  8. Communication interventions to improve adherence to infection control precautions: a randomised crossover trial.

    PubMed

    Ong, Mei-Sing; Magrabi, Farah; Post, Jeffrey; Morris, Sarah; Westbrook, Johanna; Wobcke, Wayne; Calcroft, Ross; Coiera, Enrico

    2013-02-06

    Ineffective communication of infection control requirements during transitions of care is a potential cause of non-compliance with infection control precautions by healthcare personnel. In this study, interventions to enhance communication during inpatient transfers between wards and radiology were implemented, in the attempt to improve adherence to precautions during transfers. Two interventions were implemented, comprising (i) a pre-transfer checklist used by radiology porters to confirm a patient's infectious status; (ii) a coloured cue to highlight written infectious status information in the transfer form. The effectiveness of the interventions in promoting adherence to standard precautions by radiology porters when transporting infectious patients was evaluated using a randomised crossover trial at a teaching hospital in Australia. 300 transfers were observed over a period of 4 months. Compliance with infection control precautions in the intervention groups was significantly improved relative to the control group (p < 0.01). Adherence rate in the control group was 38%. Applying the coloured cue resulted in a compliance rate of 73%. The pre-transfer checklist intervention achieved a comparable compliance rate of 71%. When both interventions were applied, a compliance rate of 74% was attained. Acceptability of the coloured cue was high, but adherence to the checklist was low (40%). Simple measures to enhance communication through the provision of a checklist and the use a coloured cue brought about significant improvement in compliance with infection control precautions by transport personnel during inpatient transfers. The study underscores the importance of effective communication in ensuring compliance with infection control precautions during transitions of care.

  9. Assessing communication accessibility in the university classroom: towards a goal of universal hearing accessibility.

    PubMed

    Cheesman, Margaret F; Jennings, Mary Beth; Klinger, Lisa

    2013-01-01

    Measures of accessibility typically focus on the physical environment and aspects relating to getting into and out of spaces. The transient sound environment is less well characterized in typical accessibility measures. Hearing accessibility measures can be based upon physical indices or functional assessment. The physical measures are indices that use signal-to-noise ratios to evaluate audibility while the functional assessment tool adopts universal design for hearing (UDH) principles derived from principles of universal design. The UDH principles include (1) Optimization of the hearing environment for all; (2) Optimization of interactions between persons and objects to promote better hearing in an environment; (3) Optimization of opportunities for people to have multiple choices of interactions with one another; (4) Optimization of opportunities for people to perform different activities in and across environments; (5) Optimization of opportunities for people to have safe, private, and secure use of the environment while minimizing distraction, interference, or cognitive loading; and (6) Optimization of opportunities for people to use the environment without extra steps for hearing access during preparatory, use and/or after use phases. This paper compares the two approaches using case examples from post-secondary classrooms in order to describe the potential advantages and limitations of each.

  10. Communication skills course in an Indian undergraduate dental curriculum: a randomized controlled trial.

    PubMed

    Sangappa, Sunila B; Tekian, Ara

    2013-08-01

    This study assessed the impact of a course on communication skills for third-year undergraduate dental students at a dental institute in India. A randomized pretest, posttest controlled trial was conducted with all the students from four cohorts of third-year dental undergraduate students, divided into an intervention group (n=30) and a control group (n=30). The course was developed using Kern's six-step approach to curriculum development. Needs assessment was ascertained, and readings, lectures, and role-plays with real and simulated patients were implemented. Encounters of students during two patient interviews (simulated and real) were rated by two raters using a twenty-seven-item dental consultation communication checklist with a rating scale 0 to 3. Students completed a questionnaire regarding their acceptance of the course. A 2×2 (group × time) ANOVA with group as a between-subjects factor (control vs. experimental) and time as a within-subjects factor (pre vs. post) was performed. The two groups did not differ at pretest but differed significantly at posttest. This study showed that simply attending to patients during a clinical course did not improve professional communication skills. In contrast, the implementation of a course on communication skills did improve the students' dentist-patient interactions. Integrating the teaching and development of a relevant, outcome-based course on communication skills provided clear evidence of communication skills acquisition among these dental students. The course could be introduced in other Indian dental schools.

  11. Designing communication and remote controlling of virtual instrument network system

    NASA Astrophysics Data System (ADS)

    Lei, Lin; Wang, Houjun; Zhou, Xue; Zhou, Wenjian

    2005-01-01

    In this paper, a virtual instrument network through the LAN and finally remote control of virtual instruments is realized based on virtual instrument and LabWindows/CVI software platform. The virtual instrument network system is made up of three subsystems. There are server subsystem, telnet client subsystem and local instrument control subsystem. This paper introduced virtual instrument network structure in detail based on LabWindows. Application procedure design of virtual instrument network communication, the Client/the programming mode of the server, remote PC and server communication far realizing, the control power of the workstation is transmitted, server program and so on essential technical were introduced. And virtual instruments network may connect to entire Internet on. Above-mentioned technology, through measuring the application in the electronic measurement virtual instrument network that is already built up, has verified the actual using value of the technology. Experiment and application validate that this design is resultful.

  12. A method to implement fine-grained access control for personal health records through standard relational database queries.

    PubMed

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  13. Improving patient-centered communication: Results of a randomized controlled trial.

    PubMed

    Maatouk-Bürmann, Barbara; Ringel, Nadja; Spang, Jochen; Weiss, Carmen; Möltner, Andreas; Riemann, Urs; Langewitz, Wolf; Schultz, Jobst-Hendrik; Jünger, Jana

    2016-01-01

    Patient-centered communication is a key element for improving the quality of care in terms of therapeutic relationship, patient participation, and treatment process. Postgraduate trainings provide an essential way of promoting patient centeredness on the job where learning opportunities are often limited by time, patient volume, and economic pressure. In the present study, changes in patient centeredness during clinical routines of postgraduate physicians (internal medicine) after a three-day communication training were assessed. A randomized controlled trial was conducted in a primary care clinic. The intervention consisted of a communication training that aimed to enhance patient centeredness in postgraduate physicians. The training was based on a need assessment and the principles of deliberate practice. Workplace-based assessment of physicians' communication behavior was obtained using the Roter Interaction Analysis System. Three months after the intervention, trained physicians showed significantly increased patient centeredness (F=5.36, p=.04; d=0.42). The communication training significantly improved patient centeredness during routine clinical practice. Thus, this training provides a structured and theory-based concept to foster patient centeredness. The results support the implementation of communication trainings as a part of faculty development and medical specialization training. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  14. Resource allocation for multichannel broadcasting visible light communication

    NASA Astrophysics Data System (ADS)

    Le, Nam-Tuan; Jang, Yeong Min

    2015-11-01

    Visible light communication (VLC), which offers the possibility of using light sources for both illumination and data communications simultaneously, will be a promising incorporation technique with lighting applications. However, it still remains some challenges especially coverage because of field-of-view limitation. In this paper, we focus on this issue by suggesting a resource allocation scheme for VLC broadcasting system. By using frame synchronization and a network calculus QoS approximation, as well as diversity technology, the proposed VLC architecture and QoS resource allocation for the multichannel-broadcasting MAC (medium access control) protocol can solve the coverage limitation problem and the link switching problem of exhibition service.

  15. Multicopter control with Navio using REX control system

    NASA Astrophysics Data System (ADS)

    Golembiovsky, Matej; Dedek, Jan; Ozana, Stepan

    2017-06-01

    This article deals with study of possible connection of the REXcontrols platform with Raspberry Pi based control system and Navio2 expansion board. This board is designed for development of autonomous robotic platforms type car, plane or multicopter. In this article, control system REXcontrols is introduced and its integration possibilities for control board Navio2 are discussed. The main discussed aspects are communication possibilities of the REXcontrols system with external scripts which further on allow control of this board. The main reasons for this undertaking are vast possibilities of archiving, visualization, signal processing and control which REXcontrols system allows. The control itself of the navio2 board is done through numerous interfaces. Specifically it is a pair of SPI data buses, an I2C data bus, UART and multiple GPIO pins. However, since REXcontrols control system has only limited access to these data buses, it is necessary to establish the communication through external scripts. For this purpose REXcontrols is equipped with mechanisms; SILO, EPC and REXLANG which are described in the article. Due to its simple implementation into REXcontrols and the option to utilize available libraries for communication with Navio2 board in external script, an EPC block was selected for the final implementation.

  16. Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Yadav, Rajesh; Varma, Shirshu; Malaviya, N.

    2008-05-01

    Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.

  17. A metasynthesis of patient-provider communication in hospital for patients with severe communication disabilities: informing new translational research.

    PubMed

    Hemsley, Bronwyn; Balandin, Susan

    2014-12-01

    Poor patient-provider communication in hospital continues to be cited as a possible causal factor in preventable adverse events for patients with severe communication disabilities. Yet to date there are no reports of empirical interventions that investigate or demonstrate an improvement in communication in hospital for these patients. The aim of this review was to synthesize the findings of research into communication in hospital for people with severe communication disabilities arising from lifelong and acquired stable conditions including cerebral palsy, autism, intellectual disability, aphasia following stroke, but excluding progressive conditions and those solely related to sensory impairments of hearing or vision. Results revealed six core strategies suggested to improve communication in hospital: (a) develop services, systems, and policies that support improved communication, (b) devote enough time to communication, (c) ensure adequate access to communication tools (nurse call systems and communication aids), (d) access personally held written health information, (e) collaborate effectively with carers, spouses, and parents, and (f) increase the communicative competence of hospital staff. Currently there are no reports that trial or validate any of these strategies specifically in hospital settings. Observational and evaluative research is needed to investigate the ecological validity of strategies proposed to improve communication.

  18. Design of the Protocol Processor for the ROBUS-2 Communication System

    NASA Technical Reports Server (NTRS)

    Torres-Pomales, Wilfredo; Malekpour, Mahyar R.; Miner, Paul S.

    2005-01-01

    The ROBUS-2 Protocol Processor (RPP) is a custom-designed hardware component implementing the functionality of the ROBUS-2 fault-tolerant communication system. The Reliable Optical Bus (ROBUS) is the core communication system of the Scalable Processor-Independent Design for Enhanced Reliability (SPIDER), a general-purpose fault tolerant integrated modular architecture currently under development at NASA Langley Research Center. ROBUS is a time-division multiple access (TDMA) broadcast communication system with medium access control by means of time-indexed communication schedule. ROBUS-2 is a developmental version of the ROBUS providing guaranteed fault-tolerant services to the attached processing elements (PEs), in the presence of a bounded number of faults. These services include message broadcast (Byzantine Agreement), dynamic communication schedule update, time reference (clock synchronization), and distributed diagnosis (group membership). ROBUS also features fault-tolerant startup and restart capabilities. ROBUS-2 tolerates internal as well as PE faults, and incorporates a dynamic self-reconfiguration capability driven by the internal diagnostic system. ROBUS consists of RPPs connected to each other by a lower-level physical communication network. The RPP has a pipelined architecture and the design is parameterized in the behavioral and structural domains. The design of the RPP enables the bus to achieve a PE-message throughput that approaches the available bandwidth at the physical layer.

  19. A re-conceptualization of access for 21st century healthcare.

    PubMed

    Fortney, John C; Burgess, James F; Bosworth, Hayden B; Booth, Brenda M; Kaboli, Peter J

    2011-11-01

    Many e-health technologies are available to promote virtual patient-provider communication outside the context of face-to-face clinical encounters. Current digital communication modalities include cell phones, smartphones, interactive voice response, text messages, e-mails, clinic-based interactive video, home-based web-cams, mobile smartphone two-way cameras, personal monitoring devices, kiosks, dashboards, personal health records, web-based portals, social networking sites, secure chat rooms, and on-line forums. Improvements in digital access could drastically diminish the geographical, temporal, and cultural access problems faced by many patients. Conversely, a growing digital divide could create greater access disparities for some populations. As the paradigm of healthcare delivery evolves towards greater reliance on non-encounter-based digital communications between patients and their care teams, it is critical that our theoretical conceptualization of access undergoes a concurrent paradigm shift to make it more relevant for the digital age. The traditional conceptualizations and indicators of access are not well adapted to measure access to health services that are delivered digitally outside the context of face-to-face encounters with providers. This paper provides an overview of digital "encounterless" utilization, discusses the weaknesses of traditional conceptual frameworks of access, presents a new access framework, provides recommendations for how to measure access in the new framework, and discusses future directions for research on access.

  20. Randomized Controlled Trial of Supplemental Augmentative and Alternative Communication versus Voice Rest Alone after Phonomicrosurgery

    PubMed Central

    Rousseau, Bernard; Gutmann, Michelle L.; Mau, I-fan Theodore; Francis, David O.; Johnson, Jeffrey P.; Novaleski, Carolyn K.; Vinson, Kimberly N.; Garrett, C. Gaelyn

    2015-01-01

    Objective This randomized trial investigated voice rest and supplemental text-to-speech communication versus voice rest alone on visual analog scale measures of communication effectiveness and magnitude of voice use. Study Design Randomized clinical trial. Setting Multicenter outpatient voice clinics. Subjects Thirty-seven patients undergoing phonomicrosurgery. Methods Patients undergoing phonomicrosurgery were randomized to voice rest and supplemental text-to-speech communication or voice rest alone. The primary outcome measure was the impact of voice rest on ability to communicate effectively over a seven-day period. Pre- and post-operative magnitude of voice use was also measured as an observational outcome. Results Patients randomized to voice rest and supplemental text-to-speech communication reported higher median communication effectiveness on each post-operative day compared to those randomized to voice rest alone, with significantly higher median communication effectiveness on post-operative day 3 (p = 0.03) and 5 (p = 0.01). Magnitude of voice use did not differ on any pre-operative (p > 0.05) or post-operative day (p > 0.05), nor did patients significantly decrease voice use as the surgery date approached (p > 0.05). However, there was a significant reduction in median voice use pre- to post-operatively across patients (p < 0.001) with median voice use ranging from 0–3 throughout the post-operative week. Conclusion Supplemental text-to-speech communication increased patient perceived communication effectiveness on post-operative days 3 and 5 over voice rest alone. With the prevalence of smartphones and the widespread use of text messaging, supplemental text-to-speech communication may provide an accessible and cost-effective communication option for patients on vocal restrictions. PMID:25605690