NASA Astrophysics Data System (ADS)
Keyes, David E.
2007-09-01
archive reflects the philosophy of the SciDAC program, which was introduced as a collaboration of all of the program offices in the Office of Science of the U.S. Department of Energy (DOE) in Fall 2001 and was renewed for a second period of five years in Fall 2006, with additional support in certain areas from the DOE's National Nuclear Security Administration (NNSA) and the U.S. National Science Foundation (NSF). All of the projects in the SciDAC portfolio were represented at the conference and most are captured in this volume. In addition, the Organizing Committee incorporated into the technical program a number of computational science highlights from outside of SciDAC, and, indeed, from outside of the United States. As implied by the title, scientific discovery is the driving deliverable of the SciDAC program, spanning the full range of the DOE Office of Science: accelerator design, astrophysics, chemistry and materials science, climate science, combustion, life science, nuclear physics, plasma physics, and subsurface physics. As articulated in the eponymous report that launched SciDAC, the computational challenges of these diverse areas are remarkably common. Each is profoundly multiscale in space and time and therefore continues to benefit at any margin from access to the largest and fastest computers available. Optimality of representation and execution requires adaptive, scalable mathematical algorithms in both continuous (geometrically complex domain) and discrete (mesh and graph) aspects. Programmability and performance optimality require software environments that both manage the intricate details of the underlying hardware and abstract them for scientific users. Running effectively on remote specialized hardware requires transparent workflow systems. Comprehending the petascale data sets generated in such simulations requires automated tools for data exploration and visualization. Archiving and sharing access to this data within the inevitably distributed
NASA Astrophysics Data System (ADS)
Tang, William M., Dr.
2006-01-01
: `SciDAC has strengthened the role of high-end computing in furthering science. It is defining whole new fields for discovery.' (SciDAC Review, Spring 2006, p8). Application domains within the SciDAC 2006 conference agenda encompassed a broad range of science including: (i) the DOE core mission of energy research involving combustion studies relevant to fuel efficiency and pollution issues faced today and magnetic fusion investigations impacting prospects for future energy sources; (ii) fundamental explorations into the building blocks of matter, ranging from quantum chromodynamics - the basic theory that describes how quarks make up the protons and neutrons of all matter - to the design of modern high-energy accelerators; (iii) the formidable challenges of predicting and controlling the behavior of molecules in quantum chemistry and the complex biomolecules determining the evolution of biological systems; (iv) studies of exploding stars for insights into the nature of the universe; and (v) integrated climate modeling to enable realistic analysis of earth's changing climate. Associated research has made it quite clear that advanced computation is often the only means by which timely progress is feasible when dealing with these complex, multi-component physical, chemical, and biological systems operating over huge ranges of temporal and spatial scales. Working with the domain scientists, applied mathematicians and computer scientists have continued to develop the discretizations of the underlying equations and the complementary algorithms to enable improvements in solutions on modern parallel computing platforms as they evolve from the terascale toward the petascale regime. Moreover, the associated tremendous growth of data generated from the terabyte to the petabyte range demands not only the advanced data analysis and visualization methods to harvest the scientific information but also the development of efficient workflow strategies which can deal with the data input
New User Support in the University Network with DACS Scheme
ERIC Educational Resources Information Center
Odagiri, Kazuya; Yaegashi, Rihito; Tadauchi, Masaharu; Ishii, Naohiro
2007-01-01
Purpose: The purpose of this paper is to propose and examine the new user support in university network. Design/methodology/approach: The new user support is realized by use of DACS (Destination Addressing Control System) Scheme which manages a whole network system through communication control on a client computer. This DACS Scheme has been…
NASA Astrophysics Data System (ADS)
Simon, Horst
2009-07-01
By almost any measure, the SciDAC community has come a long way since DOE launched the SciDAC program back in 2001. At the time, we were grappling with how to efficiently run applications on terascale systems (the November 2001 TOP500 list was led by DOE's ASCI White IBM system at Lawrence Livermore achieving 7.2 teraflop/s). And the results stemming from the first round of SciDAC projects were summed up in two-page reports. The scientific results were presented at annual meetings, which were by invitation only and typically were attended by about 75 researchers. Fast forward to 2009 and we now have SciDAC Review, a quarterly magazine showcasing the scientific computing contributions of SciDAC projects and related programs, all focused on presenting a comprehensive look at Scientific Discovery through Advanced Computing. That is also the motivation behind the annual SciDAC conference that in 2009 was held from June 14-18 in San Diego. The annual conference, which can also be described as a celebration of all things SciDAC, grew out those meetings organized in the early days of the program. In 2005, the meeting was held in San Francisco and attendance was opened up to all members of the SciDAC community. The schedule was also expanded to include a keynote address, plenary speakers and other features found in a conference format. This year marks the fifth such SciDAC conference, which now comprises four days of computational science presentations, multiple poster sessions and, since last year, an evening event showcasing simulations and modeling runs resulting from SciDAC projects. The fifth annual SciDAC conference was remarkable on several levels. The primary purpose, of course, is to showcase the research accomplishments resulting from SciDAC programs in particular and computational science in general. It is these accomplishments, represented in 38 papers and 52 posters, that comprise this set of conference proceedings. These proceedings can stand alone as
NASA Technical Reports Server (NTRS)
Klock, P.; Evans, D.
1979-01-01
The Executive Summary and Proceedings of the Working Group Meeting was analyzed to identify specific projects appropriate for Distribution Automation and Control DAC RD&D. Specific projects that should be undertaken in the DAC RD&D program were recommended. The projects are presented under broad categories of work selected based on ESC's interpretation of the results of the Working Group Meeting. Some of the projects are noted as utility industry projects. The ESC recommendations regarding program management are presented. Utility versus Government management responsibilities are noted.
Security and Privacy in a DACS.
Delgado, Jaime; Llorente, Silvia; Pàmies, Martí; Vilalta, Josep
2016-01-01
The management of electronic health records (EHR), in general, and clinical documents, in particular, is becoming a key issue in the daily work of Healthcare Organizations (HO). The need for providing secure and private access to, and storage for, clinical documents together with the need for HO to interoperate, raises a number of issues difficult to solve. Many systems are in place to manage EHR and documents. Some of these Healthcare Information Systems (HIS) follow standards in their document structure and communications protocols, but many do not. In fact, they are mostly proprietary and do not interoperate. Our proposal to solve the current situation is the use of a DACS (Document Archiving and Communication System) for providing security, privacy and standardized access to clinical documents.
DOE Office of Scientific and Technical Information (OSTI.GOV)
ERMI, A.M.
2000-01-24
This document describes the hardware and software of the computer subsystems for the Data Acquisition and Control System (DACS) used in mitigation tests conducted on waste tank 241-SY-101 at the Hanford Nuclear Reservation.
32 CFR 637.2 - Use of MPI and DAC Detectives/Investigators.
Code of Federal Regulations, 2010 CFR
2010-07-01
.../investigators may be employed in joint MPI/USACIDC drug suppression teams; however, the conduct of such... and DAC detectives/investigators may also be utilized to make controlled buys of suspected controlled...
NASA Astrophysics Data System (ADS)
Mezzacappa, Anthony
2005-01-01
On 26-30 June 2005 at the Grand Hyatt on Union Square in San Francisco several hundred computational scientists from around the world came together for what can certainly be described as a celebration of computational science. Scientists from the SciDAC Program and scientists from other agencies and nations were joined by applied mathematicians and computer scientists to highlight the many successes in the past year where computation has led to scientific discovery in a variety of fields: lattice quantum chromodynamics, accelerator modeling, chemistry, biology, materials science, Earth and climate science, astrophysics, and combustion and fusion energy science. Also highlighted were the advances in numerical methods and computer science, and the multidisciplinary collaboration cutting across science, mathematics, and computer science that enabled these discoveries. The SciDAC Program was conceived and funded by the US Department of Energy Office of Science. It is the Office of Science's premier computational science program founded on what is arguably the perfect formula: the priority and focus is science and scientific discovery, with the understanding that the full arsenal of `enabling technologies' in applied mathematics and computer science must be brought to bear if we are to have any hope of attacking and ultimately solving today's computational Grand Challenge problems. The SciDAC Program has been in existence for four years, and many of the computational scientists funded by this program will tell you that the program has given them the hope of addressing their scientific problems in full realism for the very first time. Many of these scientists will also tell you that SciDAC has also fundamentally changed the way they do computational science. We begin this volume with one of DOE's great traditions, and core missions: energy research. As we will see, computation has been seminal to the critical advances that have been made in this arena. Of course, to
NASA Astrophysics Data System (ADS)
Strayer, Michael
2008-07-01
Welcome to Seattle and the 2008 SciDAC Conference. This conference, the fourth in the series, is a continuation of the PI meetings we first began under SciDAC-1. I would like to start by thanking the organizing committee, and Rick Stevens in particular, for organizing this year's meeting. This morning I would like to look briefly at SciDAC, to give you a brief history of SciDAC and also look ahead to see where we plan to go over the next few years. I think the best description of SciDAC, at least the simulation part, comes from a quote from Dr Ray Orbach, DOE's Under Secretary for Science and Director of the Office of Science. In an interview that appeared in the SciDAC Review magazine, Dr Orbach said, `SciDAC is unique in the world. There isn't any other program like it anywhere else, and it has the remarkable ability to do science by bringing together physical scientists, mathematicians, applied mathematicians, and computer scientists who recognize that computation is not something you do at the end, but rather it needs to be built into the solution of the very problem that one is addressing'. Of course, that is extended not just to physical scientists, but also to biological scientists. This is a theme of computational science, this partnership among disciplines, which goes all the way back to the early 1980s and Ken Wilson. It's a unique thread within the Department of Energy. SciDAC-1, launched around the turn of the millennium, created a new generation of scientific simulation codes. It advocated building out mathematical and computing system software in support of science and a new collaboratory software environment for data. The original concept for SciDAC-1 had topical centers for the execution of the various science codes, but several corrections and adjustments were needed. The ASCR scientific computing infrastructure was also upgraded, providing the hardware facilities for the program. The computing facility that we had at that time was the big 3
Baek, Seungsoo; Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.
Kim, Seungjoo
2014-01-01
There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943
NASA Astrophysics Data System (ADS)
Strayer, Michael
2007-09-01
Good morning. Welcome to Boston, the home of the Red Sox, Celtics and Bruins, baked beans, tea parties, Robert Parker, and SciDAC 2007. A year ago I stood before you to share the legacy of the first SciDAC program and identify the challenges that we must address on the road to petascale computing—a road E E Cummins described as `. . . never traveled, gladly beyond any experience.' Today, I want to explore the preparations for the rapidly approaching extreme scale (X-scale) generation. These preparations are the first step propelling us along the road of burgeoning scientific discovery enabled by the application of X- scale computing. We look to petascale computing and beyond to open up a world of discovery that cuts across scientific fields and leads us to a greater understanding of not only our world, but our universe. As part of the President's America Competitiveness Initiative, the ASCR Office has been preparing a ten year vision for computing. As part of this planning the LBNL together with ORNL and ANL hosted three town hall meetings on Simulation and Modeling at the Exascale for Energy, Ecological Sustainability and Global Security (E3). The proposed E3 initiative is organized around four programmatic themes: Engaging our top scientists, engineers, computer scientists and applied mathematicians; investing in pioneering large-scale science; developing scalable analysis algorithms, and storage architectures to accelerate discovery; and accelerating the build-out and future development of the DOE open computing facilities. It is clear that we have only just started down the path to extreme scale computing. Plan to attend Thursday's session on the out-briefing and discussion of these meetings. The road to the petascale has been at best rocky. In FY07, the continuing resolution provided 12% less money for Advanced Scientific Computing than either the President, the Senate, or the House. As a consequence, many of you had to absorb a no cost extension for your
NASA Astrophysics Data System (ADS)
Stevens, Rick
2008-07-01
scenes an enormous amount of work is required to make a large conference go smoothly. First I thank Cheryl Zidel for her tireless efforts as organizing committee liaison and posters chair and, in general, handling all of my end of the program and keeping me calm. I also thank Gail Pieper for her work in editing the proceedings, Beth Cerny Patino for her work on the Organizing Committee website and electronic theater, and Ken Raffenetti for his work in keeping that website working. Jon Bashor and John Hules did an excellent job in handling conference communications. I thank Caitlin Youngquist for the striking graphic design; Dan Fay for tutorials arrangements; and Lynn Dory, Suzanne Stevenson, Sarah Pebelske and Sarah Zidel for on-site registration and conference support. We all owe Yeen Mankin an extra-special thanks for choosing the hotel, handling contracts, arranging menus, securing venues, and reassuring the chair that everything was under control. We are pleased to have obtained corporate sponsorship from Cray, IBM, Intel, HP, and SiCortex. I thank all the speakers and panel presenters. I also thank the former conference chairs Tony Metzzacappa, Bill Tang, and David Keyes, who were never far away for advice and encouragement. Finally, I offer my thanks to Michael Strayer, without whose leadership, vision, and persistence the SciDAC program would not have come into being and flourished. I am honored to be part of his program and his friend. Rick Stevens Seattle, Washington July 18, 2008
Ultra-high-speed optical transmission using digital-preprocessed analog-multiplexed DAC
NASA Astrophysics Data System (ADS)
Yamazaki, Hiroshi; Nagatani, Munehiko; Hamaoka, Fukutaro; Horikoshi, Kengo; Nakamura, Masanori; Matsushita, Asuka; Kanazawa, Shigeru; Hashimoto, Toshikazu; Nosaka, Hideyuki; Miyamoto, Yutaka
2018-02-01
In advanced fiber transmission systems with digital signal processors (DSPs), analog bandwidths of digital-to-analog converters (DACs), which interface the DSPs and optics, are the major factors limiting the data rates. We have developed a technology to extend the DACs' bandwidth using a digital preprocessor, two sub-DACs, and an analog multiplexer. This technology enables us to generate baseband signals with bandwidths of up to around 60 GHz, which is almost twice that of signals generated by typical CMOS DACs. In this paper, we describe the principle of the bandwidth extension and review high-speed transmission experiments enabled by this technology.
Ramírez-Puebla, Shamayim T; Ormeño-Orrillo, Ernesto; Vera-Ponce de León, Arturo; Lozano, Luis; Sanchez-Flores, Alejandro; Rosenblueth, Mónica; Martínez-Romero, Esperanza
2016-10-13
Dactylopius species, known as cochineal insects, are the source of the carminic acid dye used worldwide. The presence of two Wolbachia strains in Dactylopius coccus from Mexico was revealed by PCR amplification of wsp and sequencing of 16S rRNA genes. A metagenome analysis recovered the genome sequences of Candidatus Wolbachia bourtzisii wDacA (supergroup A) and Candidatus Wolbachia pipientis wDacB (supergroup B). Genome read coverage, as well as 16S rRNA clone sequencing, revealed that wDacB was more abundant than wDacA. The strains shared similar predicted metabolic capabilities that are common to Wolbachia, including riboflavin, ubiquinone, and heme biosynthesis, but lacked other vitamin and cofactor biosynthesis as well as glycolysis, the oxidative pentose phosphate pathway, and sugar uptake systems. A complete tricarboxylic acid cycle and gluconeogenesis were predicted as well as limited amino acid biosynthesis. Uptake and catabolism of proline were evidenced in Dactylopius Wolbachia strains. Both strains possessed WO-like phage regions and type I and type IV secretion systems. Several efflux systems found suggested the existence of metal toxicity within their host. Besides already described putative virulence factors like ankyrin domain proteins, VlrC homologs, and patatin-like proteins, putative novel virulence factors related to those found in intracellular pathogens like Legionella and Mycobacterium are highlighted for the first time in Wolbachia Candidate genes identified in other Wolbachia that are likely involved in cytoplasmic incompatibility were found in wDacB but not in wDacA. Copyright © 2016 Ramírez-Puebla et al.
On-demand Simulation of Atmospheric Transport Processes on the AlpEnDAC Cloud
NASA Astrophysics Data System (ADS)
Hachinger, S.; Harsch, C.; Meyer-Arnek, J.; Frank, A.; Heller, H.; Giemsa, E.
2016-12-01
The "Alpine Environmental Data Analysis Centre" (AlpEnDAC) develops a data-analysis platform for high-altitude research facilities within the "Virtual Alpine Observatory" project (VAO). This platform, with its web portal, will support use cases going much beyond data management: On user request, the data are augmented with "on-demand" simulation results, such as air-parcel trajectories for tracing down the source of pollutants when they appear in high concentration. The respective back-end mechanism uses the Compute Cloud of the Leibniz Supercomputing Centre (LRZ) to transparently calculate results requested by the user, as far as they have not yet been stored in AlpEnDAC. The queuing-system operation model common in supercomputing is replaced by a model in which Virtual Machines (VMs) on the cloud are automatically created/destroyed, providing the necessary computing power immediately on demand. From a security point of view, this allows to perform simulations in a sandbox defined by the VM configuration, without direct access to a computing cluster. Within few minutes, the user receives conveniently visualized results. The AlpEnDAC infrastructure is distributed among two participating institutes [front-end at German Aerospace Centre (DLR), simulation back-end at LRZ], requiring an efficient mechanism for synchronization of measured and augmented data. We discuss our iRODS-based solution for these data-management tasks as well as the general AlpEnDAC framework. Our cloud-based offerings aim at making scientific computing for our users much more convenient and flexible than it has been, and to allow scientists without a broad background in scientific computing to benefit from complex numerical simulations.
A Dust Aggregation and Concentration System (DACS) for the Microgravity Space Environment
NASA Technical Reports Server (NTRS)
Giovane, F. J.; Blum, J.
1999-01-01
The Dust Aggregation and Concentration System, DACS, Project is an international effort intended to complete the preliminary definition of a system for suspending and concentrating dust particles in a microgravity environment for extended periods of time. The DACS design concept is based on extensive ground, drop tower, and parabolic flight tests. During the present proposed work, the DACS design will be completed, and a Science Requirements Document generated. At the end of the proposed 2 year project, DACS will be positioned to enter the advanced definition phase.
PixonVision real-time Deblurring Anisoplanaticism Corrector (DAC)
NASA Astrophysics Data System (ADS)
Hier, R. G.; Puetter, R. C.
2007-09-01
DigiVision, Inc. and PixonImaging LLC have teamed to develop a real-time Deblurring Anisoplanaticism Corrector (DAC) for the Army. The DAC measures the geometric image warp caused by anisoplanaticism and removes it to rectify and stabilize (dejitter) the incoming image. Each new geometrically corrected image field is combined into a running-average reference image. The image averager employs a higher-order filter that uses temporal bandpass information to help identify true motion of objects and thereby adaptively moderate the contribution of each new pixel to the reference image. This result is then passed to a real-time PixonVision video processor (see paper 6696-04 note, the DAC also first dehazes the incoming video) where additional blur from high-order seeing effects is removed, the image is spatially denoised, and contrast is adjusted in a spatially adaptive manner. We plan to implement the entire algorithm within a few large modern FPGAs on a circuit board for video use. Obvious applications are within the DOD, surveillance and intelligence, security and law enforcement communities. Prototype hardware is scheduled to be available in late 2008. To demonstrate the capabilities of the DAC, we present a software simulation of the algorithm applied to real atmosphere-corrupted video data collected by Sandia Labs.
Disciplinary Action Committee (DAC)
ERIC Educational Resources Information Center
Notar, Charles; Riley, Gena; Thornburg, Roland; Owens, Lynetta; Harper, Cynthia
2009-01-01
The College of Education and Professional Studies (CEPS) provides an environment in which all students can learn. The term "students" encompasses anyone enrolled in a course provided by the College. The DAC was formed to protect the health, safety, and general welfare of students, educators, and those who participate in conjunction with…
Frequency, determinants and consequences of delayed access to care for HIV infection in France.
Lanoy, Emilie; Mary-Krause, Murielle; Tattevin, Pierre; Perbost, Isabelle; Poizot-Martin, Isabelle; Dupont, Caroline; Costagliola, Dominique
2007-01-01
We analysed the frequency and predictors of delayed access to care (DAC) for HIV infection, and its influence on survival. We studied predictors of DAC among 18,721 patients enrolled between 1997 and 2002 in the French Hospital Database on HIV (FHDH), DAC being defined by a CD4* T-cell count below 200 copies/mm3 and/or AIDS at FHDH enrollment. The association of DAC with the initiation of combined antiretroviral therapy (cART) and of DAC with survival were analysed with Cox multivariable models. The overall prevalence of DAC was 35.7%. Compared with patients under 30 years of age, patients over 60 were 3.5 times more likely to have DAC (P < 10(-4)). Compared with non-migrant women, odds ratios (OR) of DAC were higher among migrant women (1.5), non-migrant men (1.6) and migrant men (1.9; all P < 10(-4)). Compared with men who have sex with men, other transmission groups had an estimated OR for DAC of 1.6 (P < 10(-4)). DAC was more frequent among patients with a recent diagnosis of HIV infection [OR = 1.3, 95% confidence intervals (CI) = (1.2;1.4)]. Patients with DAC received cART earlier than other patients [hazard ratio (HR) = 2.2, 95% CI = (2.1;2.3)]. The DAC/mortality HR was 13.9 in the first 6 months after enrollment in the FHDH, and remained significantly higher than 1 during the subsequent 4 years. DAC is common in France and was associated with a higher mortality, despite early initiation of cART. Earlier access to care and specific clinical management of patients with DAC should be considered.
PBP5, PBP6 and DacD play different roles in intrinsic β-lactam resistance of Escherichia coli.
Sarkar, Sujoy Kumar; Dutta, Mouparna; Chowdhury, Chiranjit; Kumar, Akash; Ghosh, Anindya S
2011-09-01
Escherichia coli PBP5, PBP6 and DacD, encoded by dacA, dacC and dacD, respectively, share substantial amino acid identity and together constitute ~50 % of the total penicillin-binding proteins of E. coli. PBP5 helps maintain intrinsic β-lactam resistance within the cell. To test if PBP6 and DacD play simlar roles, we deleted dacC and dacD individually, and dacC in combination with dacA, from E. coli 2443 and compared β-lactam sensitivity of the mutants and the parent strain. β-Lactam resistance was complemented by wild-type, but not dd-carboxypeptidase-deficient PBP5, confirming that enzymic activity of PBP5 is essential for β-lactam resistance. Deletion of dacC and expression of PBP6 during exponential or stationary phase did not alter β-lactam resistance of a dacA mutant. Expression of DacD during mid-exponential phase partially restored β-lactam resistance of the dacA mutant. Therefore, PBP5 dd-carboxypeptidase activity is essential for intrinsic β-lactam resistance of E. coli and DacD can partially compensate for PBP5 in this capacity, whereas PBP6 cannot.
DACS II - A distributed thermal/mechanical loads data acquisition and control system
NASA Technical Reports Server (NTRS)
Zamanzadeh, Behzad; Trover, William F.; Anderson, Karl F.
1987-01-01
A distributed data acquisition and control system has been developed for the NASA Flight Loads Research Facility. The DACS II system is composed of seven computer systems and four array processors configured as a main computer system, three satellite computer systems, and 13 analog input/output systems interconnected through three independent data networks. Up to three independent heating and loading tests can be run concurrently on different test articles or the entire system can be used on a single large test such as a full scale hypersonic aircraft. Thermal tests can include up to 512 independent adaptive closed loop control channels. The control system can apply up to 20 MW of heating to a test specimen while simultaneously applying independent mechanical loads. Each thermal control loop is capable of heating a structure at rates of up to 150 F per second over a temperature range of -300 to +2500 F. Up to 64 independent mechanical load profiles can be commanded along with thermal control. Up to 1280 analog inputs monitor temperature, load, displacement and strain on the test specimens with real time data displayed on up to 15 terminals as color plots and tabular data displays. System setup and operation is accomplished with interactive menu-driver displays with extensive facilities to assist the users in all phases of system operation.
Comparison of DAC and MONACO DSMC Codes with Flat Plate Simulation
NASA Technical Reports Server (NTRS)
Padilla, Jose F.
2010-01-01
Various implementations of the direct simulation Monte Carlo (DSMC) method exist in academia, government and industry. By comparing implementations, deficiencies and merits of each can be discovered. This document reports comparisons between DSMC Analysis Code (DAC) and MONACO. DAC is NASA's standard DSMC production code and MONACO is a research DSMC code developed in academia. These codes have various differences; in particular, they employ distinct computational grid definitions. In this study, DAC and MONACO are compared by having each simulate a blunted flat plate wind tunnel test, using an identical volume mesh. Simulation expense and DSMC metrics are compared. In addition, flow results are compared with available laboratory data. Overall, this study revealed that both codes, excluding grid adaptation, performed similarly. For parallel processing, DAC was generally more efficient. As expected, code accuracy was mainly dependent on physical models employed.
SciDAC-Data, A Project to Enabling Data Driven Modeling of Exascale Computing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mubarak, M.; Ding, P.; Aliaga, L.
The SciDAC-Data project is a DOE funded initiative to analyze and exploit two decades of information and analytics that have been collected by the Fermilab Data Center on the organization, movement, and consumption of High Energy Physics data. The project will analyze the analysis patterns and data organization that have been used by the NOvA, MicroBooNE, MINERvA and other experiments, to develop realistic models of HEP analysis workflows and data processing. The SciDAC-Data project aims to provide both realistic input vectors and corresponding output data that can be used to optimize and validate simulations of HEP analysis. These simulations aremore » designed to address questions of data handling, cache optimization and workflow structures that are the prerequisites for modern HEP analysis chains to be mapped and optimized to run on the next generation of leadership class exascale computing facilities. We will address the use of the SciDAC-Data distributions acquired from Fermilab Data Center’s analysis workflows and corresponding to around 71,000 HEP jobs, as the input to detailed queuing simulations that model the expected data consumption and caching behaviors of the work running in HPC environments. In particular we describe in detail how the Sequential Access via Metadata (SAM) data handling system in combination with the dCache/Enstore based data archive facilities have been analyzed to develop the radically different models of the analysis of HEP data. We present how the simulation may be used to analyze the impact of design choices in archive facilities.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Truitt, R.W.
1997-10-22
This report provides an independent evaluation of information for a Windows based Human Machine Interface (HMI) to replace the existing DOS based Iconics HMI currently used in the Data Acquisition and Control System (DACS) used at Tank 241-SY-101. A fundamental reason for this evaluation is because of the difficulty of maintaining the system with obsolete, unsupported software. The DACS uses a software operator interface (Genesis for DOS HMI) that is no longer supported by its manufacturer, Iconics. In addition to its obsolescence, it is complex and difficult to train additional personnel on. The FY 1997 budget allocated $40K for phasemore » 1 of a software/hardware upgrade that would have allowed the old DOS based system to be replaced by a current Windows based system. Unfortunately, budget constraints during FY 1997 has prompted deferral of the upgrade. The upgrade needs to be performed at the earliest possible time, before other failures render the system useless. Once completed, the upgrade could alleviate other concerns: spare pump software may be able to be incorporated into the same software as the existing pump, thereby eliminating the parallel path dilemma; and the newer, less complex software should expedite training of future personnel, and in the process, require that less technical time be required to maintain the system.« less
OPENING REMARKS: SciDAC: Scientific Discovery through Advanced Computing
NASA Astrophysics Data System (ADS)
Strayer, Michael
2005-01-01
Good morning. Welcome to SciDAC 2005 and San Francisco. SciDAC is all about computational science and scientific discovery. In a large sense, computational science characterizes SciDAC and its intent is change. It transforms both our approach and our understanding of science. It opens new doors and crosses traditional boundaries while seeking discovery. In terms of twentieth century methodologies, computational science may be said to be transformational. There are a number of examples to this point. First are the sciences that encompass climate modeling. The application of computational science has in essence created the field of climate modeling. This community is now international in scope and has provided precision results that are challenging our understanding of our environment. A second example is that of lattice quantum chromodynamics. Lattice QCD, while adding precision and insight to our fundamental understanding of strong interaction dynamics, has transformed our approach to particle and nuclear science. The individual investigator approach has evolved to teams of scientists from different disciplines working side-by-side towards a common goal. SciDAC is also undergoing a transformation. This meeting is a prime example. Last year it was a small programmatic meeting tracking progress in SciDAC. This year, we have a major computational science meeting with a variety of disciplines and enabling technologies represented. SciDAC 2005 should position itself as a new corner stone for Computational Science and its impact on science. As we look to the immediate future, FY2006 will bring a new cycle to SciDAC. Most of the program elements of SciDAC will be re-competed in FY2006. The re-competition will involve new instruments for computational science, new approaches for collaboration, as well as new disciplines. There will be new opportunities for virtual experiments in carbon sequestration, fusion, and nuclear power and nuclear waste, as well as collaborations
NASA Astrophysics Data System (ADS)
Strayer, Michael
2009-07-01
Welcome to San Diego and the 2009 SciDAC conference. Over the next four days, I would like to present an assessment of the SciDAC program. We will look at where we've been, how we got to where we are and where we are going in the future. Our vision is to be first in computational science, to be best in class in modeling and simulation. When Ray Orbach asked me what I would do, in my job interview for the SciDAC Director position, I said we would achieve that vision. And with our collective dedicated efforts, we have managed to achieve this vision. In the last year, we have now the most powerful supercomputer for open science, Jaguar, the Cray XT system at the Oak Ridge Leadership Computing Facility (OLCF). We also have NERSC, probably the best-in-the-world program for productivity in science that the Office of Science so depends on. And the Argonne Leadership Computing Facility offers architectural diversity with its IBM Blue Gene/P system as a counterbalance to Oak Ridge. There is also ESnet, which is often understated—the 40 gigabit per second dual backbone ring that connects all the labs and many DOE sites. In the President's Recovery Act funding, there is exciting news that ESnet is going to build out to a 100 gigabit per second network using new optical technologies. This is very exciting news for simulations and large-scale scientific facilities. But as one noted SciDAC luminary said, it's not all about the computers—it's also about the science—and we are also achieving our vision in this area. Together with having the fastest supercomputer for science, at the SC08 conference, SciDAC researchers won two ACM Gordon Bell Prizes for the outstanding performance of their applications. The DCA++ code, which solves some very interesting problems in materials, achieved a sustained performance of 1.3 petaflops, an astounding result and a mark I suspect will last for some time. The LS3DF application for studying nanomaterials also required the development of a
A 6-bit 4 GS/s pseudo-thermometer segmented CMOS DAC
NASA Astrophysics Data System (ADS)
Yijun, Song; Wenyuan, Li
2014-06-01
A 6-bit 4 GS/s, high-speed and power-efficient DAC for ultra-high-speed transceivers in 60 GHz band millimeter wave technology is presented. A novel pseudo-thermometer architecture is proposed to realize a good compromise between the fast conversion speed and the chip area. Symmetrical and compact floor planning and layout techniques including tree-like routing, cross-quading and common-centroid method are adopted to guarantee the chip is fully functional up to near-Nyquist frequency in a standard 0.18 μm CMOS process. Post simulation results corroborate the feasibility of the designed DAC, which canperform good static and dynamic linearity without calibration. DNL errors and INL errors can be controlled within ±0.28 LSB and ±0.26 LSB, respectively. SFDR at 4 GHz clock frequency for a 1.9 GHz near-Nyquist sinusoidal output signal is 40.83 dB and the power dissipation is less than 37 mW.
Maffei, Giovanni; Santos-Pata, Diogo; Marcos, Encarni; Sánchez-Fibla, Marti; Verschure, Paul F M J
2015-12-01
Animals successfully forage within new environments by learning, simulating and adapting to their surroundings. The functions behind such goal-oriented behavior can be decomposed into 5 top-level objectives: 'how', 'why', 'what', 'where', 'when' (H4W). The paradigms of classical and operant conditioning describe some of the behavioral aspects found in foraging. However, it remains unclear how the organization of their underlying neural principles account for these complex behaviors. We address this problem from the perspective of the Distributed Adaptive Control theory of mind and brain (DAC) that interprets these two paradigms as expressing properties of core functional subsystems of a layered architecture. In particular, we propose DAC-X, a novel cognitive architecture that unifies the theoretical principles of DAC with biologically constrained computational models of several areas of the mammalian brain. DAC-X supports complex foraging strategies through the progressive acquisition, retention and expression of task-dependent information and associated shaping of action, from exploration to goal-oriented deliberation. We benchmark DAC-X using a robot-based hoarding task including the main perceptual and cognitive aspects of animal foraging. We show that efficient goal-oriented behavior results from the interaction of parallel learning mechanisms accounting for motor adaptation, spatial encoding and decision-making. Together, our results suggest that the H4W problem can be solved by DAC-X building on the insights from the study of classical and operant conditioning. Finally, we discuss the advantages and limitations of the proposed biologically constrained and embodied approach towards the study of cognition and the relation of DAC-X to other cognitive architectures. Copyright © 2015 Elsevier Ltd. All rights reserved.
DAC-board based X-band EPR spectrometer with arbitrary waveform control
NASA Astrophysics Data System (ADS)
Kaufmann, Thomas; Keller, Timothy J.; Franck, John M.; Barnes, Ryan P.; Glaser, Steffen J.; Martinis, John M.; Han, Songi
2013-10-01
We present arbitrary control over a homogenous spin system, demonstrated on a simple, home-built, electron paramagnetic resonance (EPR) spectrometer operating at 8-10 GHz (X-band) and controlled by a 1 GHz arbitrary waveform generator (AWG) with 42 dB (i.e. 14-bit) of dynamic range. Such a spectrometer can be relatively easily built from a single DAC (digital to analog converter) board with a modest number of stock components and offers powerful capabilities for automated digital calibration and correction routines that allow it to generate shaped X-band pulses with precise amplitude and phase control. It can precisely tailor the excitation profiles "seen" by the spins in the microwave resonator, based on feedback calibration with experimental input. We demonstrate the capability to generate a variety of pulse shapes, including rectangular, triangular, Gaussian, sinc, and adiabatic rapid passage waveforms. We then show how one can precisely compensate for the distortion and broadening caused by transmission into the microwave cavity in order to optimize corrected waveforms that are distinctly different from the initial, uncorrected waveforms. Specifically, we exploit a narrow EPR signal whose width is finer than the features of any distortions in order to map out the response to a short pulse, which, in turn, yields the precise transfer function of the spectrometer system. This transfer function is found to be consistent for all pulse shapes in the linear response regime. In addition to allowing precise waveform shaping capabilities, the spectrometer presented here offers complete digital control and calibration of the spectrometer that allows one to phase cycle the pulse phase with 0.007° resolution and to specify the inter-pulse delays and pulse durations to ⩽250 ps resolution. The implications and potential applications of these capabilities will be discussed.
NASA Astrophysics Data System (ADS)
Qixing, Chen; Qiyu, Luo
2013-03-01
At present, the architecture of a digital-to-analog converter (DAC) in essence is based on the weight current, and the average value of its D/A signal current increases in geometric series according to its digital signal bits increase, which is 2n-1 times of its least weight current. But for a dual weight resistance chain type DAC, by using the weight voltage manner to D/A conversion, the D/A signal current is fixed to chain current Icha; it is only 1/2n-1 order of magnitude of the average signal current value of the weight current type DAC. Its principle is: n pairs dual weight resistances form a resistance chain, which ensures the constancy of the chain current; if digital signals control the total weight resistance from the output point to the zero potential point, that could directly control the total weight voltage of the output point, so that the digital signals directly turn into a sum of the weight voltage signals; thus the following goals are realized: (1) the total current is less than 200 μA (2) the total power consumption is less than 2 mW; (3) an 18-bit conversion can be realized by adopting a multi-grade structure; (4) the chip area is one order of magnitude smaller than the subsection current-steering type DAC; (5) the error depends only on the error of the unit resistance, so it is smaller than the error of the subsection current-steering type DAC; (6) the conversion time is only one action time of switch on or off, so its speed is not lower than the present DAC.
NASA Astrophysics Data System (ADS)
Evans, William J.; Yoo, Choong-Shik; Lee, Geun Woo; Cynn, Hyunchae; Lipp, Magnus J.; Visbeck, Ken
2007-07-01
We have developed a unique device, a dynamic diamond anvil cell (dDAC), which repetitively applies a time-dependent load/pressure profile to a sample. This capability allows studies of the kinetics of phase transitions and metastable phases at compression (strain) rates of up to 500GPa/s (˜0.16s-1 for a metal). Our approach adapts electromechanical piezoelectric actuators to a conventional diamond anvil cell design, which enables precise specification and control of a time-dependent applied load/pressure. Existing DAC instrumentation and experimental techniques are easily adapted to the dDAC to measure the properties of a sample under the varying load/pressure conditions. This capability addresses the sparsely studied regime of dynamic phenomena between static research (diamond anvil cells and large volume presses) and dynamic shock-driven experiments (gas guns, explosive, and laser shock). We present an overview of a variety of experimental measurements that can be made with this device.
NASA Astrophysics Data System (ADS)
Weng, Yi; Wang, Junyi; He, Xuan; Pan, Zhongqi
2018-02-01
The Nyquist spectral shaping techniques facilitate a promising solution to enhance spectral efficiency (SE) and further reduce the cost-per-bit in high-speed wavelength-division multiplexing (WDM) transmission systems. Hypothetically, any Nyquist WDM signals with arbitrary shapes can be generated by the use of the digital signal processing (DSP) based electrical filters (E-filter). Nonetheless, in actual 100G/ 200G coherent systems, the performance as well as DSP complexity are increasingly restricted by cost and power consumption. Henceforward it is indispensable to optimize DSP to accomplish the preferred performance at the least complexity. In this paper, we systematically investigated the minimum requirements and challenges of Nyquist WDM signal generation, particularly for higher-order modulation formats, including 16 quadrature amplitude modulation (QAM) or 64QAM. A variety of interrelated parameters, such as channel spacing and roll-off factor, have been evaluated to optimize the requirements of the digital-to-analog converter (DAC) resolution and transmitter E-filter bandwidth. The impact of spectral pre-emphasis has been predominantly enhanced via the proposed interleaved DAC architecture by at least 4%, and hence reducing the required optical signal to noise ratio (OSNR) at a bit error rate (BER) of 10-3 by over 0.45 dB at a channel spacing of 1.05 symbol rate and an optimized roll-off factor of 0.1. Furthermore, the requirements of sampling rate for different types of super-Gaussian E-filters are discussed for 64QAM Nyquist WDM transmission systems. Finally, the impact of the non-50% duty cycle error between sub-DACs upon the quality of the generated signals for the interleaved DAC structure has been analyzed.
Performance Engineering Research Institute SciDAC-2 Enabling Technologies Institute Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lucas, Robert
2013-04-20
Enhancing the performance of SciDAC applications on petascale systems had high priority within DOE SC at the start of the second phase of the SciDAC program, SciDAC-2, as it continues to do so today. Achieving expected levels of performance on high-end computing (HEC) systems is growing ever more challenging due to enormous scale, increasing architectural complexity, and increasing application complexity. To address these challenges, the University of Southern California?s Information Sciences Institute organized the Performance Engineering Research Institute (PERI). PERI implemented a unified, tripartite research plan encompassing: (1) performance modeling and prediction; (2) automatic performance tuning; and (3) performance engineeringmore » of high profile applications. Within PERI, USC?s primary research activity was automatic tuning (autotuning) of scientific software. This activity was spurred by the strong user preference for automatic tools and was based on previous successful activities such as ATLAS, which automatically tuned components of the LAPACK linear algebra library, and other recent work on autotuning domain-specific libraries. Our other major component was application engagement, to which we devoted approximately 30% of our effort to work directly with SciDAC-2 applications. This report is a summary of the overall results of the USC PERI effort.« less
Milsom, K M; Jones, C; Kearney-Mitchell, P; Tickle, M
2009-03-14
Dental access centres (DACs) were introduced in England at the turn of the twenty-first century in response to a growing problem of access to NHS dental services. DACs were expected to offer NHS dental care primarily to those patients that were unwilling or unable to attend 'high street' dental practice. At the same time, the new NHS primary care dental contract in England, introduced in April 2006, has been associated in some areas with access difficulties, with routine dental patients having difficulty accessing NHS dental care. In light of these changes, have DACs become an alternative provider of NHS dental services to patients seeking routine dental care? In summer 2007, a cross sectional dental epidemiological study was undertaken in Halton & St Helens PCT and Warrington PCT to compare the dental health and attitudes to dental visiting of adult patients attending DACs and neighbouring 'high street' dental practices. The results of the study showed that DAC patients: were younger and from a more disadvantaged background than patients attending 'high street' practices; had worse oral health than 'high street' dental patients; experienced more frequent episodes of dental pain than 'high street' dental patients and were more likely to be dentally anxious; had different attitudes to dental health than their 'high street' counterparts. The study suggests that the DACs in Halton, St Helens and Warrington are offering treatment to a different population of patients to that seen in neighbouring 'high street' practices and therefore the DACs are fulfilling the function expected of them locally.
Design of integrated all optical digital to analog converter (DAC) using 2D photonic crystals
NASA Astrophysics Data System (ADS)
Moniem, Tamer A.; El-Din, Eman S.
2017-11-01
A novel design of all optical 3 bit digital to analog (DAC) converter will be presented in this paper based on 2 Dimension photonic crystals (PhC). The proposed structure is based on the photonic crystal ring resonators (PCRR) with combining the nonlinear Kerr effect on the PCRR. The total size of the proposed optical 3 bit DAC is equal to 44 μm × 37 μm of 2D square lattice photonic crystals of silicon rods with refractive index equal to 3.4. The finite different time domain (FDTD) and Plane Wave Expansion (PWE) methods are used to back the overall operation of the proposed optical DAC.
Genetic algorithms for GNC settings and DACS design application to an asteroid Kinetic Impactor
NASA Astrophysics Data System (ADS)
Vernis, P.; Oliviero, V.
2018-06-01
This paper deals with an application of Genetic Algorithm (GA) tools in order to perform and optimize the settings phase of the Guidance, Navigation, and Control (GNC) data set for the endgame phase of a Kinetic Impactor (KI) targeting a medium-size Near Earth Object (NEO). A coupled optimization of the GNC settings and of the GC-oriented design of the Divert and Attitude Control System (DACS) is also proposed. The illustration of the developed principles is made considering the NEOShield study frame.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hadlock, D.J.
Historically, the Savannah River Site, like many Department of Energy sites, has used some multiple of the expected Derived Air Concentration (DAC) of a radionuclide as a suspension guide for Radiological Work Permits (RWP) or validation of selected respiratory protection equipment. The term DAC expresses the concentration of a radionuclide in air, typically in mCi/cc. Even though the term DAC is derived from an intake of radioactivity (Annual Limit on Intake) that would result in defined estimated dose to a worker, knowing only the DAC value does not allow a worker's potential dose to be determined. Recently, the Savannah Rivemore » Site has converted to the use of DAC-hours for RWP suspension guides and respiratory equipment validation. The term DAC-hr takes into account not only the concentration of the radionuclide in air (DAC) but also the time the individual was exposed allowing an estimate of a worker's dose to be determined. The conversion to DAC-hrs resulted in four benefits to the radiation protection program without increasing the risk to workers; (1) consistency with the constant air monitor (CAM) alarm setpoint protocol; (2) consistency with Internal Dosimetry terminology; (3) an a priori determination of the potential risk to a worker; and (4) reduced complexity/error in field calculations. This paper outlines the justification for the conversion to DAC-hrs, the protocols used for field and count room calculations, and the implementation process utilized at the Savannah River Site« less
A high performance DAC /DDS daughter module for the RHIC LLRF platform
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hayes, T.; Harvey, M.; Narayan, G.
The RHIC LLRF upgrade is a flexible, modular system. Output signals are generated by a custom designed XMC card with 4 high speed digital to analog (DAC) converters interfaced to a high performance field programmable gate array (FPGA). This paper discusses the hardware details of the XMC DAC board as well as the implementation of a low noise rf synthesizer with digital IQ modulation. This synthesizer also provides injection phase cogging and frequency hop rebucketing capabilities. A new modular RHIC LLRF system was recently designed and commissioned based on custom designed XMC cards. As part of that effort a highmore » speed, four channel DAC board was designed. The board uses Maxim MAX5891 16 bit DACs with a maximum update rate of 600 Msps. Since this module is intended to be used for many different systems throughout the Collider Accelerator complex, it was designed to be as generic as possible. One major application of this DAC card is to implement digital synthesizers to provide drive signals to the various cavities at RHIC. Since RHIC is a storage ring with stores that typically last many hours, extremely low RF noise is a critical requirement. Synchrotron frequencies at RHIC range from a few hertz to several hundred hertz depending on the species and point in the acceleration cycle so close in phase noise is a major concern. The RHIC LLRF system uses the Update Link, a deterministic, high speed data link that broadcasts the revolution frequency and the synchronous phase angle. The digital synthesizers use this data to generate a properly phased analog drive signal. The synthesizers must also provide smooth phase shifts for cogging and support frequency shift rebucketing. One additional feature implemented in the FPGA is a digital waveform generator (WFG) that generates I and Q data pairs based on a user selected amplitude and phase profile as a function of time.« less
Design of the low area monotonic trim DAC in 40 nm CMOS technology for pixel readout chips
NASA Astrophysics Data System (ADS)
Drozd, A.; Szczygiel, R.; Maj, P.; Satlawa, T.; Grybos, P.
2014-12-01
The recent research in hybrid pixel detectors working in single photon counting mode focuses on nanometer or 3D technologies which allow making pixels smaller and implementing more complex solutions in each of the pixels. Usually single pixel in readout electronics for X-ray detection comprises of charge amplifier, shaper and discriminator that allow classification of events occurring at the detector as true or false hits by comparing amplitude of the signal obtained with threshold voltage, which minimizes the influence of noise effects. However, making the pixel size smaller often causes problems with pixel to pixel uniformity and additional effects like charge sharing become more visible. To improve channel-to-channel uniformity or implement an algorithm for charge sharing effect minimization, small area trimming DACs working in each pixel independently are necessary. However, meeting the requirement of small area often results in poor linearity and even non-monotonicity. In this paper we present a novel low-area thermometer coded 6-bit DAC implemented in 40 nm CMOS technology. Monte Carlo simulations were performed on the described design proving that under all conditions designed DAC is inherently monotonic. Presented DAC was implemented in the prototype readout chip with 432 pixels working in single photon counting mode, with two trimming DACs in each pixel. Each DAC occupies the area of 8 μm × 18.5 μm. Measurements and chips' tests were performed to obtain reliable statistical results.
NASA Astrophysics Data System (ADS)
Shi, Yu; Liang, Long; Ge, Hai-Wen; Reitz, Rolf D.
2010-03-01
Acceleration of the chemistry solver for engine combustion is of much interest due to the fact that in practical engine simulations extensive computational time is spent solving the fuel oxidation and emission formation chemistry. A dynamic adaptive chemistry (DAC) scheme based on a directed relation graph error propagation (DRGEP) method has been applied to study homogeneous charge compression ignition (HCCI) engine combustion with detailed chemistry (over 500 species) previously using an R-value-based breadth-first search (RBFS) algorithm, which significantly reduced computational times (by as much as 30-fold). The present paper extends the use of this on-the-fly kinetic mechanism reduction scheme to model combustion in direct-injection (DI) engines. It was found that the DAC scheme becomes less efficient when applied to DI engine simulations using a kinetic mechanism of relatively small size and the accuracy of the original DAC scheme decreases for conventional non-premixed combustion engine. The present study also focuses on determination of search-initiating species, involvement of the NOx chemistry, selection of a proper error tolerance, as well as treatment of the interaction of chemical heat release and the fuel spray. Both the DAC schemes were integrated into the ERC KIVA-3v2 code, and simulations were conducted to compare the two schemes. In general, the present DAC scheme has better efficiency and similar accuracy compared to the previous DAC scheme. The efficiency depends on the size of the chemical kinetics mechanism used and the engine operating conditions. For cases using a small n-heptane kinetic mechanism of 34 species, 30% of the computational time is saved, and 50% for a larger n-heptane kinetic mechanism of 61 species. The paper also demonstrates that by combining the present DAC scheme with an adaptive multi-grid chemistry (AMC) solver, it is feasible to simulate a direct-injection engine using a detailed n-heptane mechanism with 543 species
Disturbance accommodating control design for wind turbines using solvability conditions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wang, Na; Wright, Alan D.; Balas, Mark J.
In this study, solvability conditions for disturbance accommodating control (DAC) have been discussed and applied on wind turbine controller design in above-rated wind speed to regulate rotor speed and to mitigate turbine structural loads. DAC incorporates a predetermined waveform model and uses it as part of the state-space formulation, which is known as the internal model principle to reduce or minimize the wind disturbance effects on the outputs of the wind turbine. An asymptotically stabilizing DAC controller with disturbance impact on the wind turbine being totally canceled out can be found if certain conditions are fulfilled. Designing a rotor speedmore » regulation controller without steady-state error is important for applying linear control methodology such as DAC on wind turbines. Therefore, solvability conditions of DAC without steady-state error are attractive and can be taken as examples when designing a multitask turbine controller. DAC controllers solved via Moore-Penrose Pseudoinverse and the Kronecker product are discussed, and solvability conditions of using them are given. Additionally, a new solvability condition based on inverting the feed-through D term is proposed for the sake of reducing computational burden in the Kronecker product. Applications of designing collective pitch and independent pitch controllers based on DAC are presented. Recommendations of designing a DAC-based wind turbine controller are given. A DAC controller motivated by the proposed solvability condition that utilizes the inverse of feed-through D term is developed to mitigate the blade flapwise once-per-revolution bending moment together with a standard proportional integral controller in the control loop to assist rotor speed regulation. Simulation studies verify the discussed solvability conditions of DAC and show the effectiveness of the proposed DAC control design methodology.« less
Disturbance accommodating control design for wind turbines using solvability conditions
Wang, Na; Wright, Alan D.; Balas, Mark J.
2017-02-07
In this study, solvability conditions for disturbance accommodating control (DAC) have been discussed and applied on wind turbine controller design in above-rated wind speed to regulate rotor speed and to mitigate turbine structural loads. DAC incorporates a predetermined waveform model and uses it as part of the state-space formulation, which is known as the internal model principle to reduce or minimize the wind disturbance effects on the outputs of the wind turbine. An asymptotically stabilizing DAC controller with disturbance impact on the wind turbine being totally canceled out can be found if certain conditions are fulfilled. Designing a rotor speedmore » regulation controller without steady-state error is important for applying linear control methodology such as DAC on wind turbines. Therefore, solvability conditions of DAC without steady-state error are attractive and can be taken as examples when designing a multitask turbine controller. DAC controllers solved via Moore-Penrose Pseudoinverse and the Kronecker product are discussed, and solvability conditions of using them are given. Additionally, a new solvability condition based on inverting the feed-through D term is proposed for the sake of reducing computational burden in the Kronecker product. Applications of designing collective pitch and independent pitch controllers based on DAC are presented. Recommendations of designing a DAC-based wind turbine controller are given. A DAC controller motivated by the proposed solvability condition that utilizes the inverse of feed-through D term is developed to mitigate the blade flapwise once-per-revolution bending moment together with a standard proportional integral controller in the control loop to assist rotor speed regulation. Simulation studies verify the discussed solvability conditions of DAC and show the effectiveness of the proposed DAC control design methodology.« less
Tran, Tam N T; Shelton, Jennifer; Brown, Susan; Durrett, Timothy P
2017-10-01
Euonymus alatus diacylglycerol acetyltransferase (EaDAcT) catalyzes the transfer of an acetyl group from acetyl-CoA to the sn-3 position of diacylglycerol to form 3-acetyl-1,2-diacyl-sn-glycerol (acetyl-TAG). EaDAcT belongs to a small, plant-specific subfamily of the membrane bound O-acyltransferases (MBOAT) that acylate different lipid substrates. Sucrose gradient density centrifugation revealed that EaDAcT colocalizes to the same fractions as an endoplasmic reticulum (ER)-specific marker. By mapping the membrane topology of EaDAcT, we obtained an experimentally determined topology model for a plant MBOAT. The EaDAcT model contains four transmembrane domains (TMDs), with both the N- and C-termini orientated toward the lumen of the ER. In addition, there is a large cytoplasmic loop between the first and second TMDs, with the MBOAT signature region of the protein embedded in the third TMD close to the interface between the membrane and the cytoplasm. During topology mapping, we discovered two cysteine residues (C187 and C293) located on opposite sides of the membrane that are important for enzyme activity. In order to identify additional amino acid residues important for acetyltransferase activity, we isolated and characterized acetyltransferases from other acetyl-TAG-producing plants. Among them, the acetyltransferase from Euonymus fortunei possessed the highest activity in vivo and in vitro. Mutagenesis of conserved amino acids revealed that S253, H257, D258 and V263 are essential for EaDAcT activity. Alteration of residues unique to the acetyltransferases did not alter the unique acyl donor specificity of EaDAcT, suggesting that multiple amino acids are important for substrate recognition. © 2017 The Authors The Plant Journal © 2017 John Wiley & Sons Ltd.
Effect of compression rate on ice VI crystal growth using dDAC
NASA Astrophysics Data System (ADS)
Lee, Yun-Hee; Kim, Yong-Jae; Lee, Sooheyong; Cho, Yong Chan; Lee, Geun Woo; Frontier in Extreme Physics Team
It is well known that static and dynamic pressure give different results in many aspects. Understanding of crystal growth under such different pressure condition is one of the crucial issues for the formation of materials in the earth and planets. To figure out the crystal growth under the different pressure condition, we should control compression rate from static to dynamic pressurization. Here, we use a dynamic diamond anvil cell (dDAC) technique to study the effect of compression rate of ice VI crystal growth. Using dDAC with high speed camera, we monitored growth of a single crystal ice VI. A rounded ice crystal with rough surface was selected in the phase boundary of water and ice VI and then, its repetitive growth and melting has been carried out by dynamic operation of the pressure cell. The roughened crystal showed interesting growth transition with compression rate from three dimensional to two dimensional growth as well as faceting process. We will discuss possible mechanism of the growth change by compression rate with diffusion mechanism of water. This research was supported by the Converging Research Center Program through the Ministry of Science, ICT and Future Planning, Korea (NRF-2014M1A7A1A01030128).
Final Report for DOE Project: Portal Web Services: Support of DOE SciDAC Collaboratories
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mary Thomas, PI; Geoffrey Fox, Co-PI; Gannon, D
2007-10-01
Grid portals provide the scientific community with familiar and simplified interfaces to the Grid and Grid services, and it is important to deploy grid portals onto the SciDAC grids and collaboratories. The goal of this project is the research, development and deployment of interoperable portal and web services that can be used on SciDAC National Collaboratory grids. This project has four primary task areas: development of portal systems; management of data collections; DOE science application integration; and development of web and grid services in support of the above activities.
NASA Astrophysics Data System (ADS)
Meinrenken, Christoph
2015-03-01
Capture of CO2, whether from a flue gas source (PCC) or from distributed sources via ambient air (DAC), is a key enabling technology to provide carbon for sustainable synthetic energy carriers such as solar fuels. Based on thermodynamic minimum considerations, DAC is often expected to require about 3 times more energy (per ton CO2 captured) than PCC because CO2 in ambient air is more dilute. Here, we calculate the energy required for a humidity swing-based DAC installation that uses an anionic exchange resin as sorbent. The calculation uses recently measured equilibrium CO2 loadings of the sorbent as function of partial CO2 pressure, temperature, and humidity. We calculate the installation's electricity consumption to be about 45 kJ per mole of pure CO2 at 1 bar (scenario-dependent). Furthermore, we estimate the amount of heat provided by ambient air and thus provide context of the overall energy and entropy balance and thermodynamic minimum views. The electricity consumption is competitive with typical parasitic loads of PCC-equipped coal-fired power plants (40-50 kJ per mole at same pressure) and significantly lower than predicted for other DAC installations such as Na(OH) sorbent-based systems. Our analyses elucidate why DAC is not always more energy-intensive that PCC, thus alleviating often cited concerns of significant cost impediments. Financial support by ABB for research presented herein is gratefully acknowledged.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wang, Na; Wright, Alan D.; Johnson, Kathryn E.
Two independent pitch controllers (IPCs) based on the disturbance accommodating control (DAC) algorithm are designed for the three-bladed Controls Advanced Research Turbine to regulate rotor speed and to mitigate blade root flapwise bending loads in above-rated wind speed. One of the DAC-based IPCs is designed based on a transformed symmetrical-asymmetrical (TSA) turbine model, with wind disturbances being modeled as a collective horizontal component and an asymmetrical linear shear component. Another DAC-based IPC is designed based on a multiblade coordinate (MBC) transformed turbine model, with a horizontal component and a vertical shear component being modeled as step waveform disturbance. Both ofmore » the DAC-based IPCs are found via a regulation equation solved by Kronecker product. Actuator dynamics are considered in the design processes to compensate for actuator phase delay. The simulation study shows the effectiveness of the proposed DAC-based IPCs compared to a proportional-integral (PI) collective pitch controller (CPC). Improvement on rotor speed regulation and once-per-revolution and twice-per-revolution load reductions has been observed in the proposed IPC designs.« less
AEROSAT Access Control Summary
DOT National Transportation Integrated Search
1976-10-01
The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...
Aerosat Access Control Summary
DOT National Transportation Integrated Search
1976-10-01
The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wang, Na; Wright, Alan D.; Johnson, Kathryn E.
Two independent pitch controllers (IPCs) based on the disturbance accommodating control (DAC) algorithm are designed for the three-bladed Controls Advanced Research Turbine to regulate rotor speed and to mitigate blade root flapwise bending loads in above-rated wind speed. One of the DAC-based IPCs is designed based on a transformed symmetrical-asymmetrical (TSA) turbine model, with wind disturbances being modeled as a collective horizontal component and an asymmetrical linear shear component. Another DAC-based IPC is designed based on a multiblade coordinate (MBC) transformed turbine model, with a horizontal component and a vertical shear component being modeled as step waveform disturbance. Both ofmore » the DAC-based IPCs are found via a regulation equation solved by Kronecker product. Actuator dynamics are considered in the design processes to compensate for actuator phase delay. The simulation study shows the effectiveness of the proposed DAC-based IPCs compared to a proportional-integral (PI) collective pitch controller (CPC). Improvement on rotor speed regulation and once-per-revolution and twice-per-revolution load reductions has been observed in the proposed IPC designs.« less
A cryogenic DAC operating down to 4.2 K
NASA Astrophysics Data System (ADS)
Rahman, M. T.; Lehmann, T.
2016-04-01
This paper presents a 10 bit CMOS current steering digital to analog converter (DAC) that operates from room temperature to as low as 4.2 K. It works as the core part of a cryogenic Silicon quantum computer controller circuit producing rapid control gate voltage pulses for quantum bits (qubits) initialization. An improved analog calibration method with a unique unit current cell design is included in the D/A converter structure to overcome the extended cryogenic nonlinear and mismatch effects. The DAC retains its 10 bit linear monotonic behavior over the wide temperature range and it drives a 50 Ω load to 516 mV with a full scale rise time of 10 ns. The differential non-linearity (DNL) of the converter is 0.35LSB while its average power consumption is 32.18 mW from a 3 V power supply. The complete converter is fabricated using a commercial 0.5 μm 1 poly 3 metal Silicon on Sapphire (SOS) CMOS process. He briefly worked as a Lecturer in the Stamford University Bangladesh prior to starting his Ph.D. in 2012 in the School of Electrical Engineering and Telecommunications, UNSW. His Ph.D. research is focused on cryogenic electronics for Quantum Computer Interface. His main research interests are in designing data converters for ultra-low temperature electronics and biomedical applications. He spent two years as a Research Fellow at the University of Edinburgh, U.K., where he worked with biologically inspired artificial neural systems. From 1997 to 2000, he was an Assistant Professor in electronics at the Technical University of Denmark, working with low-power low-noise low-voltage analog and mixed analog-digital integrated circuits. From 2001 to 2003 he was Principal Engineer with Cochlear Ltd., Australia, where he was involved in the design of the world's first fully implantable cochlear implant. Today he is Associate Professor in microelectronics at the University of New South Wales, Australia. He has authored over 100 journal papers, conference papers, book chapters
Phase relations in the system Fe-Si determined in an internally-resistive heated DAC
NASA Astrophysics Data System (ADS)
Komabayashi, T.; Antonangeli, D.; Morard, G.; Sinmyo, R.; Mezouar, N.
2015-12-01
It is believed that the iron-rich Earth's core contains some amounts of light elements on the basis of the density deficit of 7 % compared to pure iron. The identification of the kinds and amounts of the light elements in the core places constraints on the origin, formation, and evolution of the Earth because dissolution of light elements into an iron-rich core should place important constraints on the thermodynamic conditions (pressure (P), temperature (T), and oxygen fugacity) of the equilibration between liquid silicate and liquid iron during the core formation. Among potential light elements, silicon has been attracting attentions because it is abundant in the mantle, partitioned into both solid and liquid irons, and very sensitive to the oxygen fugacity. An important phase relation in iron alloy is a transition between the face-centred cubic (FCC) structure and hexagonal close-packed (HCP) structure. This boundary is a key to infer the stable structure in the inner core and is used to derive thermodynamic properties of the phases (Komabayashi, 2014). In the Fe-Si system, previous reports were based on experiments in laser-heated diamond anvil cells (DAC), which might have included large termperature uncertainties. We have revisited this boundary in the system Fe-Si using an internally resistive-heated DAC combined with synchrotron X-ray diffraction at the beamline ID27, ESRF. The internally-heated DAC (Komabayashi et al., 2009; 2012) provides much more stable heating than the laser-heated DAC and much higher temperature than externally resistive-heated DAC, which enables us to place tight constraints on the P-T locations of the boundaries. Also because the minimum measurable temperature is as low as 1000 K due to the stable electric heating, the internal heating is able to examine the low temperature phase stability which was not studied by the previous studies. We will report the P-T locations of the boundaries and evaluate the effect of Si on the phase
DOE Office of Scientific and Technical Information (OSTI.GOV)
McLaughlin, David A
Derived air concentration (DAC) values for 175 radionuclides* produced at the Oak Ridge National Laboratory (ORNL) Spallation Neutron Source (SNS), but not listed in Appendix A of 10 CFR 835 (01/01/2009 version), are presented. The proposed DAC values, ranging between 1 E-07 {micro}Ci/mL and 2 E-03 {micro}Ci/mL, were calculated in accordance with the recommendations of the International Commission on Radiological Protection (ICRP), and are intended to support an exemption request seeking regulatory relief from the 10 CFR 835, Appendix A, requirement to apply restrictive DACs of 2E-13 {micro}Ci/mL and 4E-11 {micro}Ci/mL and for non-listed alpha and non-alpha-emitting radionuclides, respectively.
Reflective Database Access Control
ERIC Educational Resources Information Center
Olson, Lars E.
2009-01-01
"Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…
35. View of data and analysis console (DAC), located in ...
35. View of data and analysis console (DAC), located in MWOC facility in transmitter building no. 102, showing clock and missile impact predictor time. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK
Detectability of neural tracts and nuclei in the brainstem utilizing 3DAC-PROPELLER.
Nishikawa, Taro; Okamoto, Kouichirou; Matsuzawa, Hitoshi; Terumitsu, Makoto; Nakada, Tsutomu; Fujii, Yukihiko
2014-01-01
Despite clinical importance of identifying exact anatomical location of neural tracts and nuclei in the brainstem, no neuroimaging studies have validated the detectability of these structures. The aim of this study was to assess the detectability of the structures using three-dimensional anisotropy contrast-periodically rotated overlapping parallel lines with enhanced reconstruction (3DAC-PROPELLER) imaging. Forty healthy volunteers (21 males, 19 females; 19-53 years, average 23.4 years) participated in this study. 3DAC-PROPELLER axial images were obtained with a 3T-MR system at four levels of the brainstem: the lower midbrain, upper and lower pons, and medulla oblongata. Three experts independently judged whether five tracts (corticospinal tract, medial lemniscus, medial longitudinal fasciculus, central tegmental and spinothalamic tracts) and 10 nuclei (oculomotor and trochlear nuclei, spinal trigeminal, abducens, facial, vestibular, hypoglossal, prepositus, and solitary nuclei, locus ceruleus, superior and inferior olives) on each side could be identified. In total, 240 assessments were made. The five tracts and eight nuclei were identified in all the corresponding assessments, whereas the locus ceruleus and superior olive could not be identified in 3 (1.3%) and 16 (6.7%) assessments, respectively. 3DAC-PROPELLER seems extremely valuable imaging method for mapping out surgical strategies for brainstem lesions. Copyright © 2013 by the American Society of Neuroimaging.
The potential of a dielectrophoresis activated cell sorter (DACS) as a next generation cell sorter
NASA Astrophysics Data System (ADS)
Lee, Dongkyu; Hwang, Bohyun; Kim, Byungkyu
2016-12-01
Originally introduced by H. A. Pohl in 1951, dielectrophoretic (DEP) force has been used as a striking tool for biological particle manipulation (or separation) for the last few decades. In particular, dielectrophoresis activated cell sorters (DACSes) have been developed for applications in various biomedical fields. These applications include cell replacement therapy, drug screening and medical diagnostics. Since a DACS does not require a specific bio-marker, it is able to function as a biological particle sorting tool with numerous configurations for various cells [e.g. red blood cells (RBCs), white blood cells (WBCs), circulating tumor cells, leukemia cells, breast cancer cells, bacterial cells, yeast cells and sperm cells]. This article explores current DACS capabilities worldwide, and it also looks at recent developments intended to overcome particular limitations. First, the basic theories are reviewed. Then, representative DACSes based on DEP trapping, traveling wave DEP systems, DEP field-flow fractionation and DEP barriers are introduced, and the strong and weak points of each DACS are discussed. Finally, for the purposes of commercialization, prerequisites regarding throughput, efficiency and recovery rates are discussed in detail through comparisons with commercial cell sorters (e.g. fluorescent activated and magnetic activated cell sorters).
1988-07-28
r R ~l~ F COPV en Data Entered) AT ION PAGE -ErOP RCoMrE-EoNGFOP. A D-A 204 928 1Z. GOVT ACCESSION NO. 3. RECIPIENT’S CATALOG NUMBER 4...PAGE (When Data Entered) Ada Compiler Validation Summary Repor-: Compiler Name: DACS-386/UNIX, Version 4.2 Certificate Number: 880728S1.09141 Host...which have the STORAGE SIZE length clause were changed to comment lines under the direction of the AVF Manager . These modified tests ran to a successful
Bourai, Neema; Jacobs, William R; Narayanan, Sujatha
2012-02-01
Mycobacterium tuberculosis genome encodes several high and low molecular mass penicillin binding proteins. One such low molecular mass protein is DacB2 encoded by open reading frame Rv2911 of M. tuberculosis which is predicted to play a role in peptidoglycan synthesis. In this study we have tried to gain an insight into the role of this accessory cell division protein in mycobacterial physiology by performing overexpression and deletion studies. The overproduction of DacB2 in non-pathogenic, fast growing mycobacterium Mycobacterium smegmatis mc(2)155 resulted in reduced growth, an altered colony morphology, a defect in sliding motility and biofilm formation. A point mutant of DacB2 was made wherein the active site serine residue was mutated to cysteine to abolish the penicillin binding function of protein. The overexpression of mutant protein showed similar results indicating that the effects produced were independent of protein's penicillin binding function. The gene encoding DacB2 was deleted in M. tuberculosis by specialized transduction method. The deletion mutant showed reduced growth in Sauton's medium under acidic and low oxygen availability. The in vitro infection studies with THP-1 cells showed increased intracellular survival of dacB2 mutant compared to parent and complemented strains. The colony morphology and antibiotic sensitivity of mutant and wild-type strains were similar. Copyright © 2011 Elsevier Ltd. All rights reserved.
SciDAC Center for Gyrokinetic Particle Simulation of Turbulent Transport in Burning Plasmas
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lin, Zhihong
2013-12-18
During the first year of the SciDAC gyrokinetic particle simulation (GPS) project, the GPS team (Zhihong Lin, Liu Chen, Yasutaro Nishimura, and Igor Holod) at the University of California, Irvine (UCI) studied the tokamak electron transport driven by electron temperature gradient (ETG) turbulence, and by trapped electron mode (TEM) turbulence and ion temperature gradient (ITG) turbulence with kinetic electron effects, extended our studies of ITG turbulence spreading to core-edge coupling. We have developed and optimized an elliptic solver using finite element method (FEM), which enables the implementation of advanced kinetic electron models (split-weight scheme and hybrid model) in the SciDACmore » GPS production code GTC. The GTC code has been ported and optimized on both scalar and vector parallel computer architectures, and is being transformed into objected-oriented style to facilitate collaborative code development. During this period, the UCI team members presented 11 invited talks at major national and international conferences, published 22 papers in peer-reviewed journals and 10 papers in conference proceedings. The UCI hosted the annual SciDAC Workshop on Plasma Turbulence sponsored by the GPS Center, 2005-2007. The workshop was attended by about fifties US and foreign researchers and financially sponsored several gradual students from MIT, Princeton University, Germany, Switzerland, and Finland. A new SciDAC postdoc, Igor Holod, has arrived at UCI to initiate global particle simulation of magnetohydrodynamics turbulence driven by energetic particle modes. The PI, Z. Lin, has been promoted to the Associate Professor with tenure at UCI.« less
Steiner, Reto; Wentker, Pia; Mahfuz, Farouq; Stahl, Hans-Christian; Amin, Faquir Mohammad; Bogdan, Christian; Stahl, Kurt-Wilhelm
2014-01-01
Background Anthroponotic cutaneous leishmaniasis (CL) due to Leishmania (L.) tropica infection is a chronic, frequently disfiguring skin disease with limited therapeutic options. In endemic countries healing of ulcerative lesions is often delayed by bacterial and/or fungal infections. Here, we studied a novel therapeutic concept to prevent superinfections, accelerate wound closure, and improve the cosmetic outcome of ACL. Methodology/Principal Findings From 2004 to 2008 we performed a two-armed, randomized, double-blinded, phase IIa trial in Kabul, Afghanistan, with patients suffering from L. tropica CL. The skin lesions were treated with bipolar high-frequency electrocauterization (EC) followed by daily moist-wound-treatment (MWT) with polyacrylate hydrogel with (group I) or without (group II) pharmaceutical sodium chlorite (DAC N-055). Patients below age 5, with facial lesions, pregnancy, or serious comorbidities were excluded. The primary, photodocumented outcome was the time needed for complete lesion epithelialization. Biopsies for parasitological and (immuno)histopathological analyses were taken prior to EC (1st), after wound closure (2nd) and after 6 months (3rd). The mean duration for complete wound closure was short and indifferent in group I (59 patients, 43.1 d) and II (54 patients, 42 d; p = 0.83). In patients with Leishmania-positive 2nd biopsies DAC N-055 caused a more rapid wound epithelialization (37.2 d vs. 58.3 d; p = 0.08). Superinfections occurred in both groups at the same rate (8.8%). Except for one patient, reulcerations (10.2% in group I, 18.5% in group II; p = 0.158) were confined to cases with persistent high parasite loads after healing. In vitro, DAC N-055 showed a leishmanicidal effect on pro- and amastigotes. Conclusions/Significance Compared to previous results with intralesional antimony injections, the EC plus MWT protocol led to more rapid wound closure. The tentatively lower rate of relapses and the acceleration of
Improving School Access Control
ERIC Educational Resources Information Center
National Clearinghouse for Educational Facilities, 2008
2008-01-01
Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…
Diamond anvils with a round table designed for high pressure experiments in DAC
NASA Astrophysics Data System (ADS)
Dubrovinsky, Leonid; Koemets, Egor; Bykov, Maxim; Bykova, Elena; Aprilis, Georgios; Pakhomova, Anna; Glazyrin, Konstantin; Laskin, Alexander; Prakapenka, Vitali B.; Greenberg, Eran; Dubrovinskaia, Natalia
2017-10-01
Here, we present new Diamond Anvils with a Round Table (DART-anvils) designed for applications in the diamond anvil cell (DAC) technique. The main features of the new DART-anvil design are a spherical shape of both the crown and the table of a diamond and the position of the centre of the culet exactly in the centre of the sphere. The performance of DART-anvils was tested in a number of high pressure high-temperature experiments at different synchrotron beamlines. These experiments demonstrated a number of advantages, which are unavailable with any of the hitherto known anvil designs. Use of DART-anvils enables to realise in situ single-crystal X-ray diffraction experiments with laser heating using stationary laser-heating setups; eliminating flat-plate design of conventional anvils, DART-anvils make the cell alignment easier; working as solid immersion lenses, they provide additional magnification of the sample in a DAC and improve the image resolution.
Efficient Access Control in Multimedia Social Networks
NASA Astrophysics Data System (ADS)
Sachan, Amit; Emmanuel, Sabu
Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.
NASA Astrophysics Data System (ADS)
Yu, Haijun; Li, Guofu; Duo, Liping; Jin, Yuqi; Wang, Jian; Sang, Fengting; Kang, Yuanfu; Li, Liucheng; Wang, Yuanhu; Tang, Shukai; Yu, Hongliang
2015-02-01
A user-friendly data acquisition and control system (DACS) for a pulsed chemical oxygen -iodine laser (PCOIL) has been developed. It is implemented by an industrial control computer,a PLC, and a distributed input/output (I/O) module, as well as the valve and transmitter. The system is capable of handling 200 analogue/digital channels for performing various operations such as on-line acquisition, display, safety measures and control of various valves. These operations are controlled either by control switches configured on a PC while not running or by a pre-determined sequence or timings during the run. The system is capable of real-time acquisition and on-line estimation of important diagnostic parameters for optimization of a PCOIL. The DACS system has been programmed using software programmable logic controller (PLC). Using this DACS, more than 200 runs were given performed successfully.
Experiments of the Essential Amino Acids at high temperature and high pressure using DAC
NASA Astrophysics Data System (ADS)
Kubo, K.; Okamoto, K.
2017-12-01
Amino acids are organic compounds that form the fundamental part of life. Proteins are formed by peptide binding and polymerization of amino acids. Amino acids are polymerized in the ridge hydrothermal field, formed proteins, and might be evolved into life. Experimental studies on the polymerization of amino acids in hydrothermal environments have been conducted. However, they were hydrothermal experiments and after the experiments. All run products (amid-acids) were observed at ambient condition. Few in-situ observations of amino acids were done in experiments in hydrothermal condition. In order to perform in-situ observation of the polymerization of amino acids, we have conducted the DAC experiments. Amino acids were filled in the DAC, pressures were applied, then heated to high temperature with Raman analysis. In preliminary experiment using glycine, polymerization forming diglycine, were completed. Investigation amino acids polymerization under hydrothermal condition would shed light for new view of early life science.
A service-oriented data access control model
NASA Astrophysics Data System (ADS)
Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali
2017-01-01
The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
10 CFR 36.23 - Access control.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...
DOT National Transportation Integrated Search
1974-06-01
The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...
High-speed ADC and DAC modules with fibre optic interconnections for telecom satellites
NASA Astrophysics Data System (ADS)
Heikkinen, Veli; Juntunen, Eveliina; Karppinen, Mikko; Kautio, Kari; Ollila, Jyrki; Sitomaniemi, Aila; Tanskanen, Antti; Casey, Rory; Scott, Shane; Gachon, Hélène; Sotom, Michel; Venet, Norbert; Toivonen, Jaakko; Tuominen, Taisto; Karafolas, Nikos
2017-11-01
The flexibility required for future telecom payloads calls for the introduction of more and more digital processing capabilities. Aggregate data throughputs of several Tbps will have to be handled onboard, thus creating the need for effective, ADCDSP and DACDSP highspeed links. ADC and DAC modules with optical interconnections is an attractive option as it can solve easily the transmission and routing of the expected huge amount of data. This technique will enable to increase the bandwidth and/or the number of beams/channels to be treated, or to support advanced digital processing architectures including beam forming. We realised electrooptic ADC and DAC modules containing an 8 bit, 2 GSa/s A/D converter and a 12 bit, 2 GSa/s D/A converter. The 4channel parallel fibre optic link employs 850nm VCSELs and GaAs PIN photodiodes coupled to 50/125μm fibre ribbon cable. ADCDSP and DSPDAC links both have an aggregate data rate of 25 Gbps. The paper presents the current status of this development.
Korat, B; Mottl, H; Keck, W
1991-03-01
The penicillin-binding protein 4 (PBP4), from Escherichia coli, a DD-carboxypeptidase/DD-endopeptidase, was purified in an enzymatically active form to homogeneity by affinity chromatography on 6-aminopenicillanic acid/Sepharose and heparin/Sepharose. Polyclonal antibodies raised against the pure protein were used to identify and isolate PBP4 overproducing clones from an E. coli expression library, which was established on the basis of a temperature-inducible runaway replication plasmid. Three positive clones were isolated, one of which carried the intact structural gene dacB that codes for PBP4, on a 1.9kb SmaI-EcoRI fragment, whereas the other two carried truncated forms of this gene. The direction of transcription was determined. The PBP4 overproducing strain, when grown in rich medium, tolerated 160-fold overexpression. After disrupting cells by sonication, the majority (80%) of the overproduced PBP4 was detected in the 100,000 X g supernatant. Southern blotting analysis using the cloned dacB gene as a probe revealed that, in contrast to that described by Takeda et al. (1981), the plasmid pLC18-38 of the Clarke-Carbon collection does not code for PBP4. The overall composition of murein, synthesized in vitro or in vivo by the PBP4 overproducing strain, as determined by high-performance liquid chromatography analysis, suggests that PBP4 is not involved in transpeptidation but exclusively catalyses a DD-carboxypeptidase and DD-endopeptidase reaction.
Access Control in Location-Based Services
NASA Astrophysics Data System (ADS)
Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
47 CFR 95.645 - Control accessibility.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban
2017-01-01
An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This
CAS. Controlled Access Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Martinez, B.; Pomeroy, G.
1989-12-01
The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.
An Attribute Based Access Control Framework for Healthcare System
NASA Astrophysics Data System (ADS)
Afshar, Majid; Samet, Saeed; Hu, Ting
2018-01-01
Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.
Access control for electronic patient records.
Glagola, M J
1998-01-01
The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.
Iowa State University – Final Report for SciDAC3/NUCLEI
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vary, James P
The Iowa State University (ISU) contributions to the NUCLEI project are focused on developing, implementing and running an efficient and scalable configuration interaction code (Many-Fermion Dynamics – nuclear or MFDn) for leadership class supercomputers addressing forefront research problems in low-energy nuclear physics. We investigate nuclear structure and reactions with realistic nucleon-nucleon (NN) and three-nucleon (3N) interactions. We select a few highlights from our work that has produced a total of more than 82 refereed publications and more than 109 invited talks under SciDAC3/NUCLEI.
Barendt, Skye M.; Sham, Lok-To; Winkler, Malcolm E.
2011-01-01
Peptidoglycan (PG) hydrolases play critical roles in the remodeling of bacterial cell walls during division. PG hydrolases have been studied extensively in several bacillus species, such as Escherichia coli and Bacillus subtilis, but remain relatively uncharacterized in ovococcus species, such as Streptococcus pneumoniae (pneumococcus). In this work, we identified genes that encode proteins with putative PG hydrolytic domains in the genome of S. pneumoniae strain D39. Knockout mutations in these genes were constructed, and the resulting mutants were characterized in comparison with the parent strain for growth, cell morphology, PG peptide incorporation, and in some cases, PG peptide composition. In addition, we characterized deletion mutations in nonessential genes of unknown function in the WalRKSpn two-component system regulon, which also contains the essential pcsB cell division gene. Several mutants did not show overt phenotypes, which is perhaps indicative of redundancy. In contrast, two new mutants showed distinct defects in PG biosynthesis. One mutation was in a gene designated dacB (spd_0549), which we showed encodes an l,d-carboxypeptidase involved in PG maturation. Notably, dacB mutants, similar to dacA (d,d-carboxypeptidase) mutants, exhibited defects in cell shape and septation, consistent with the idea that the availability of PG peptide precursors is important for proper PG biosynthesis. Epistasis analysis indicated that DacA functions before DacB in d-Ala removal, and immunofluorescence microscopy showed that DacA and DacB are located over the entire surface of pneumococcal cells. The other mutation was in WalRKSpn regulon gene spd_0703, which encodes a putative membrane protein that may function as a type of conserved streptococcal shape, elongation, division, and sporulation (SEDS) protein. PMID:21378199
45 CFR 1705.3 - Procedures for requests pertaining to individual records in the D/AC File.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 4 2011-10-01 2011-10-01 false Procedures for requests pertaining to individual records in the D/AC File. 1705.3 Section 1705.3 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL COMMISSION ON LIBRARIES AND INFORMATION SCIENCE PRIVACY REGULATIONS § 1705.3 Procedures...
45 CFR 1705.3 - Procedures for requests pertaining to individual records in the D/AC File.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 4 2010-10-01 2010-10-01 false Procedures for requests pertaining to individual records in the D/AC File. 1705.3 Section 1705.3 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL COMMISSION ON LIBRARIES AND INFORMATION SCIENCE PRIVACY REGULATIONS § 1705.3 Procedures...
45 CFR 1705.3 - Procedures for requests pertaining to individual records in the D/AC File.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 4 2012-10-01 2012-10-01 false Procedures for requests pertaining to individual records in the D/AC File. 1705.3 Section 1705.3 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL COMMISSION ON LIBRARIES AND INFORMATION SCIENCE PRIVACY REGULATIONS § 1705.3 Procedures...
45 CFR 1705.3 - Procedures for requests pertaining to individual records in the D/AC File.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 4 2013-10-01 2013-10-01 false Procedures for requests pertaining to individual records in the D/AC File. 1705.3 Section 1705.3 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL COMMISSION ON LIBRARIES AND INFORMATION SCIENCE PRIVACY REGULATIONS § 1705.3 Procedures...
45 CFR 1705.3 - Procedures for requests pertaining to individual records in the D/AC File.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 4 2014-10-01 2014-10-01 false Procedures for requests pertaining to individual records in the D/AC File. 1705.3 Section 1705.3 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL COMMISSION ON LIBRARIES AND INFORMATION SCIENCE PRIVACY REGULATIONS § 1705.3 Procedures...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gottlieb, Steven Arthur; DeTar, Carleton; Tousaint, Doug
This is the closeout report for the Indiana University portion of the National Computational Infrastructure for Lattice Gauge Theory project supported by the United States Department of Energy under the SciDAC program. It includes information about activities at Indian University, the University of Arizona, and the University of Utah, as those three universities coordinated their activities.
Common Badging and Access Control System (CBACS)
NASA Technical Reports Server (NTRS)
Dischinger, Portia
2005-01-01
This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.
Logical Access Control Mechanisms in Computer Systems.
ERIC Educational Resources Information Center
Hsiao, David K.
The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…
Atom-Role-Based Access Control Model
NASA Astrophysics Data System (ADS)
Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong
Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.
Contributions to the NUCLEI SciDAC-3 Project
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bogner, Scott; Nazarewicz, Witek
This is the Final Report for Michigan State University for the NUCLEI SciDAC-3 project. The NUCLEI project, as defined by the scope of work, has developed, implemented and run codes for large-scale computations of many topics in low-energy nuclear physics. Physics studied included the properties of nuclei and nuclear decays, nuclear structure and reactions, and the properties of nuclear matter. The computational techniques used included Configuration Interaction, Coupled Cluster, and Density Functional methods. The research program emphasized areas of high interest to current and possible future DOE nuclear physics facilities, including ATLAS at ANL and FRIB at MSU (nuclear structuremore » and reactions, and nuclear astrophysics), TJNAF (neutron distributions in nuclei, few body systems, and electroweak processes), NIF (thermonuclear reactions), MAJORANA and FNPB (neutrinoless double-beta decay and physics beyond the Standard Model), and LANSCE (fission studies).« less
AAO2: a general purpose CCD controller for the AAT
NASA Astrophysics Data System (ADS)
Waller, Lew; Barton, John; Mayfield, Don; Griesbach, Jason
2004-09-01
The Anglo-Australian Observatory has developed a 2nd generation optical CCD controller to replace an earlier controller used now for almost twenty years. The new AAO2 controller builds on the considerable experience gained with the first controller, the new technologies now available and the techniques developed and successfully implemented in AAO's IRIS2 detector controller. The AAO2 controller has been designed to operate a wide variety of detectors and to achieve as near to detector limited performance as possible. It is capable of reading out CCDs with one, two or four output amplifiers, each output having its own video processor and high speed 16-bit ADC. The video processor is a correlated double sampler that may be switched between low noise dual slope integration or high speed clamp and sample modes. Programmable features include low noise DAC biases, horizontal clocks with DAC controllable levels and slopes and vertical clocks with DAC controllable arbitrary waveshapes. The controller uses two DSPs; one for overall control and the other for clock signal generation, which is highly programmable, with downloadable sequences of waveform patterns. The controller incorporates a precision detector temperature controller and provides accurate exposure time control. Telemetry is provided of all DAC generated voltages, many derived voltages, power supply voltages, detector temperature and detector identification. A high speed, full duplex fibre optic interface connects the controller to a host computer. The modular design uses six to ten circuit boards, plugged in to common backplanes. Two backplanes separate noisy digital signals from low noise analog signals.
Performance Engineering Research Institute SciDAC-2 Enabling Technologies Institute Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Mary
2014-09-19
Enhancing the performance of SciDAC applications on petascale systems has high priority within DOE SC. As we look to the future, achieving expected levels of performance on high-end com-puting (HEC) systems is growing ever more challenging due to enormous scale, increasing archi-tectural complexity, and increasing application complexity. To address these challenges, PERI has implemented a unified, tripartite research plan encompassing: (1) performance modeling and prediction; (2) automatic performance tuning; and (3) performance engineering of high profile applications. The PERI performance modeling and prediction activity is developing and refining performance models, significantly reducing the cost of collecting the data upon whichmore » the models are based, and increasing model fidelity, speed and generality. Our primary research activity is automatic tuning (autotuning) of scientific software. This activity is spurred by the strong user preference for automatic tools and is based on previous successful activities such as ATLAS, which has automatically tuned components of the LAPACK linear algebra library, and other re-cent work on autotuning domain-specific libraries. Our third major component is application en-gagement, to which we are devoting approximately 30% of our effort to work directly with Sci-DAC-2 applications. This last activity not only helps DOE scientists meet their near-term per-formance goals, but also helps keep PERI research focused on the real challenges facing DOE computational scientists as they enter the Petascale Era.« less
Access control mechanism of wireless gateway based on open flow
NASA Astrophysics Data System (ADS)
Peng, Rong; Ding, Lei
2017-08-01
In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.
Access Control Management for SCADA Systems
NASA Astrophysics Data System (ADS)
Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan
The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.
Access Control of Web- and Java-Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.
2013-01-01
Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers
The impact of SciDAC on US climate change research and the IPCCAR4
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wehner, Michael
2005-07-08
SciDAC has invested heavily in climate change research. We offer a candid opinion as to the impact of the DOE laboratories' SciDAC projects on the upcoming Fourth Assessment Report of the Intergovernmental Panel on Climate Change. As a result of the direct importance of climate change to society, climate change research is highly coordinated at the international level. The Intergovernmental Panel on Climate Change (IPCC) is charged with providing regular reports on the state of climate change research to government policymakers. These reports are the product of thousands of scientists efforts. A series of reviews involving both scientists and policymakersmore » make them among the most reviewed documents produced in any scientific field. The high profile of these reports acts a driver to many researchers in the climate sciences. The Fourth Assessment Report (AR4) is scheduled to be released in 2007. SciDAC sponsored research has enabled the United States climate modeling community to make significant contributions to this report. Two large multi-Laboratory SciDAC projects are directly relevant to the activities of the IPCC. The first, entitled ''Collaborative Design and Development of the Community Climate System Model for Terascale Computers'', has made important software contributions to the recently released third version of the Community Climate System Model (CCSM3.0) developed at the National Center for Atmospheric Research. This is a multi-institutional project involving Los Alamos National Laboratory, Oak Ridge National Laboratory, Lawrence Berkeley National Laboratory, Pacific Northwest National Laboratory, Argonne National Laboratory, Lawrence Livermore National Laboratory and the National Center for Atmospheric Research. The original principal investigators were Robert Malone and John B. Drake. The current principal investigators are Phil Jones and John B. Drake. The second project, entitled ''Earth System Grid II: Turning Climate Datasets into
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jenkins, Thomas G.; Kruger, Scott E.
Work carried out by Tech-X Corporation for the DoE SciDAC Center for Simulation of RF Wave Interactions with Magnetohydrodynamics (SWIM; U.S. DoE Office of Science Award Number DE-FC02-06ER54899) is summarized and is shown to fulfil the project objectives. The Tech-X portion of the SWIM work focused on the development of analytic and computational approaches to study neoclassical tearing modes and their interaction with injected electron cyclotron current drive. Using formalism developed by Hegna, Callen, and Ramos [Phys. Plasmas 16, 112501 (2009); Phys. Plasmas 17, 082502 (2010); Phys. Plasmas 18, 102506 (2011)], analytic approximations for the RF interaction were derived andmore » the numerical methods needed to implement these interactions in the NIMROD extended MHD code were developed. Using the SWIM IPS framework, NIMROD has successfully coupled to GENRAY, an RF ray tracing code; additionally, a numerical control system to trigger the RF injection, adjustment, and shutdown in response to tearing mode activity has been developed. We discuss these accomplishments, as well as prospects for ongoing future research that this work has enabled (which continue in a limited fashion under the SciDAC Center for Extended Magnetohydrodynamic Modeling (CEMM) project and under a baseline theory grant). Associated conference presentations, published articles, and publications in progress are also listed.« less
Proceedings of the Distribution Automation and Control Working Group. Volume 2: Proceedings
NASA Technical Reports Server (NTRS)
Caldwell, R.
1979-01-01
The meeting provided a forum in which electric utilities could communicate with each other, with DOE, and with DOE's contractors regarding research, development, and demonstration efforts to apply DAC (Distribution Automation and Control) to the electric power system. In the discussions emphasis was to be placed on identifying the priorities and needs for DAC development.
Role-based access control permissions
Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander
2017-04-25
Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
Chow, C W; Yeh, C H; Sung, J Y; Hsu, C W
2014-12-15
We propose and demonstrate the feasibility of using all-optical orthogonal frequency division multiplexing (AO-OFDM) for the convergent optical wired and wireless access networks. AO-OFDM relies on all-optically generated orthogonal subcarriers; hence, high data rate (> 100 Gb/s) can be easily achieved without hitting the speed limit of electronic digital-to-analog and analog-to-digital converters (DAC/ADC). A proof-of-concept convergent access network using AO-OFDM super-channel (SC) is demonstrated supporting 40 - 100 Gb/s wired and gigabit/s 100 GHz millimeter-wave (MMW) ROF transmissions.
Task Delegation Based Access Control Models for Workflow Systems
NASA Astrophysics Data System (ADS)
Gaaloul, Khaled; Charoy, François
e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.
Review of SDDOT's highway access control process
DOT National Transportation Integrated Search
2000-02-01
This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...
Typing for Conflict Detection in Access Control Policies
NASA Astrophysics Data System (ADS)
Adi, Kamel; Bouzida, Yacine; Hattak, Ikhlass; Logrippo, Luigi; Mankovskii, Serge
In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.
Effects of tetrahydrouridine on pharmacokinetics and pharmacodynamics of oral decitabine
Lavelle, Donald; Vaitkus, Kestis; Ling, Yonghua; Ruiz, Maria A.; Mahfouz, Reda; Ng, Kwok Peng; Negrotto, Soledad; Smith, Nicola; Terse, Pramod; Engelke, Kory J.; Covey, Joseph; Chan, Kenneth K.; DeSimone, Joseph
2012-01-01
The deoxycytidine analog decitabine (DAC) can deplete DNA methyl-transferase 1 (DNMT1) and thereby modify cellular epigenetics, gene expression, and differentiation. However, a barrier to efficacious and accessible DNMT1-targeted therapy is cytidine deaminase, an enzyme highly expressed in the intestine and liver that rapidly metabolizes DAC into inactive uridine counterparts, severely limiting exposure time and oral bioavailability. In the present study, the effects of tetrahydrouridine (THU), a competitive inhibitor of cytidine deaminase, on the pharmacokinetics and pharmacodynamics of oral DAC were evaluated in mice and nonhuman primates. Oral administration of THU before oral DAC extended DAC absorption time and widened the concentration-time profile, increasing the exposure time for S-phase–specific depletion of DNMT1 without the high peak DAC levels that can cause DNA damage and cytotoxicity. THU also decreased interindividual variability in pharmacokinetics seen with DAC alone. One potential clinical application of DNMT1-targeted therapy is to increase fetal hemoglobin and treat hemoglobinopathy. Oral THU-DAC at a dose that would produce peak DAC concentrations of less than 0.2μM administered 2×/wk for 8 weeks to nonhuman primates was not myelotoxic, hypomethylated DNA in the γ-globin gene promoter, and produced large cumulative increases in fetal hemoglobin. Combining oral THU with oral DAC changes DAC pharmacology in a manner that may facilitate accessible noncytotoxic DNMT1-targeted therapy. PMID:22160381
Analysis of Access Control Policies in Operating Systems
ERIC Educational Resources Information Center
Chen, Hong
2009-01-01
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…
Towards an Approach of Semantic Access Control for Cloud Computing
NASA Astrophysics Data System (ADS)
Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai
With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
49 CFR 1542.207 - Access control systems.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...
Context-aware access control for pervasive access to process-based healthcare systems.
Koufi, Vassiliki; Vassilacopoulos, George
2008-01-01
Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.
A data acquisition and control system for high-speed gamma-ray tomography
NASA Astrophysics Data System (ADS)
Hjertaker, B. T.; Maad, R.; Schuster, E.; Almås, O. A.; Johansen, G. A.
2008-09-01
A data acquisition and control system (DACS) for high-speed gamma-ray tomography based on the USB (Universal Serial Bus) and Ethernet communication protocols has been designed and implemented. The high-speed gamma-ray tomograph comprises five 500 mCi 241Am gamma-ray sources, each at a principal energy of 59.5 keV, which corresponds to five detector modules, each consisting of 17 CdZnTe detectors. The DACS design is based on Microchip's PIC18F4550 and PIC18F4620 microcontrollers, which facilitates an USB 2.0 interface protocol and an Ethernet (IEEE 802.3) interface protocol, respectively. By implementing the USB- and Ethernet-based DACS, a sufficiently high data acquisition rate is obtained and no dedicated hardware installation is required for the data acquisition computer, assuming that it is already equipped with a standard USB and/or Ethernet port. The API (Application Programming Interface) for the DACS is founded on the National Instrument's LabVIEW® graphical development tool, which provides a simple and robust foundation for further application software developments for the tomograph. The data acquisition interval, i.e. the integration time, of the high-speed gamma-ray tomograph is user selectable and is a function of the statistical measurement accuracy required for the specific application. The bandwidth of the DACS is 85 kBytes s-1 for the USB communication protocol and 28 kBytes s-1 for the Ethernet protocol. When using the iterative least square technique reconstruction algorithm with a 1 ms integration time, the USB-based DACS provides an online image update rate of 38 Hz, i.e. 38 frames per second, whereas 31 Hz for the Ethernet-based DACS. The off-line image update rate (storage to disk) for the USB-based DACS is 278 Hz using a 1 ms integration time. Initial characterization of the high-speed gamma-ray tomograph using the DACS on polypropylene phantoms is presented in the paper.
Preview Scheduled Model Predictive Control For Horizontal Axis Wind Turbines
NASA Astrophysics Data System (ADS)
Laks, Jason H.
This research investigates the use of model predictive control (MPC) in application to wind turbine operation from start-up to cut-out. The studies conducted are focused on the design of an MPC controller for a 650˜KW, three-bladed horizontal axis turbine that is in operation at the National Renewable Energy Laboratory's National Wind Technology Center outside of Golden, Colorado. This turbine is at the small end of utility scale turbines, but it provides advanced instrumentation and control capabilities, and there is a good probability that the approach developed in simulation for this thesis, will be field tested on the actual turbine. A contribution of this thesis is a method to combine the use of preview measurements with MPC while also providing regulation of turbine speed and cyclic blade loading. A common MPC technique provides integral-like control to achieve offset-free operation. At the same time in wind turbine applications, multiple studies have developed "feed-forward" controls based on applying a gain to an estimate of the wind speed changes obtained from an observer incorporating a disturbance model. These approaches are based on a technique that can be referred to as disturbance accommodating control (DAC). In this thesis, it is shown that offset-free tracking MPC is equivalent to a DAC approach when the disturbance gain is computed to satisfy a regulator equation. Although the MPC literature has recognized that this approach provides "structurally stable" disturbance rejection and tracking, this step is not typically divorced from the MPC computations repeated each sample hit. The DAC formulation is conceptually simpler, and essentially uncouples regulation considerations from MPC related issues. This thesis provides a self contained proof that the DAC formulation (an observer-controller and appropriate disturbance gain) provides structurally stable regulation.
Evaluating the effectiveness of biometric access control systems
NASA Astrophysics Data System (ADS)
Lively, Valerie M.
2005-05-01
This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.
76 FR 82079 - AP1000 Design Certification Amendment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-30
... reference Revision 15 of the design control document (DCD) (ADAMS Accession No. ML053460400), which... to DAC in the areas of piping design (Chapter 3), instrumentation and control (I&C) systems (Chapter... Systems Manual, as described in the AP1000 Design Control Document, Revision 17, meets the criteria of...
A dynamic access control method based on QoS requirement
NASA Astrophysics Data System (ADS)
Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang
2013-03-01
A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.
Distributed clinical data sharing via dynamic access-control policy transformation.
Rezaeibagha, Fatemeh; Mu, Yi
2016-05-01
Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Alpha Control - A new Concept in SPM Control
NASA Astrophysics Data System (ADS)
Spizig, P.; Sanchen, D.; Volswinkler, G.; Ibach, W.; Koenen, J.
2006-03-01
Controlling modern Scanning Probe Microscopes demands highly sophisticated electronics. While flexibility and powerful computing power is of great importance in facilitating the variety of measurement modes, extremely low noise is also a necessity. Accordingly, modern SPM Controller designs are based on digital electronics to overcome the drawbacks of analog designs. While todays SPM controllers are based on DSPs or Microprocessors and often still incorporate analog parts, we are now introducing a completely new approach: Using a Field Programmable Gate Array (FPGA) to implement the digital control tasks allows unrivalled data processing speed by computing all tasks in parallel within a single chip. Time consuming task switching between data acquisition, digital filtering, scanning and the computing of feedback signals can be completely avoided. Together with a star topology to avoid any bus limitations in accessing the variety of ADCs and DACs, this design guarantees for the first time an entirely deterministic timing capability in the nanosecond regime for all tasks. This becomes especially useful for any external experiments which must be synchronized with the scan or for high speed scans that require not only closed loop control of the scanner, but also dynamic correction of the scan movement. Delicate samples additionally benefit from extremely high sample rates, allowing highly resolved signals and low noise levels.
Summary and results of the joint WMD-DAC/Alameda County bioterrorism response plan exercise.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Manley, Dawn Kataoka; Lipkin, Joel; West, Todd H.
2003-11-01
On June 12,2003, the Alameda County Public Health Department and Sandia National Laboratories/CA jointly conducted an exercise that used a Weapons of Mass Destruction-Decision Analysis Center (WMD-DAC) bioterrorism attack simulation to test the effectiveness of the county's emergency response plan. The exercise was driven by an assumed release (in the vicinity of the Berkeley Marina), and subsequent spread, of a small quantity of aerosolized, weapons-grade anthrax spores. The simulation used several key WMD-DAC capabilities, namely: (1) integration with an atmospheric dispersion model to calculate expected dose levels in the affected areas, (2) a individual-tracking capability for both infected and non-infectedmore » persons as they made decisions, sought treatment, and received prophylaxis drugs, and (3) a user interface that allows exercise participants to affect the scenario evolution and outcome. The analysis of the county's response plan included documenting and reviewing the decisions made by participants during the exercise. Twenty-six local and regional officials representing the health care system, emergency medical services and law enforcement were involved in responding to the simulated attack. The results of this joint effort include lessons learned both by the Alameda County officials regarding implementation of their bioterrorism response plan and by the Sandia representatives about conducting exercises of this type. These observations are reviewed in this report, and they form a basis for providing a better understanding of group/individual decision processes and for identifying effective communication options among decision makers.« less
How Drug Control Policy and Practice Undermine Access to Controlled Medicines
Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.
2017-01-01
Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556
How Drug Control Policy and Practice Undermine Access to Controlled Medicines.
Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K
2017-06-01
Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.
Programmable Direct-Memory-Access Controller
NASA Technical Reports Server (NTRS)
Hendry, David F.
1990-01-01
Proposed programmable direct-memory-access controller (DMAC) operates with computer systems of 32000 series, which have 32-bit data buses and use addresses of 24 (or potentially 32) bits. Controller functions with or without help of central processing unit (CPU) and starts itself. Includes such advanced features as ability to compare two blocks of memory for equality and to search block of memory for specific value. Made as single very-large-scale integrated-circuit chip.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sinogeikin, Stanislav V., E-mail: ssinogeikin@carnegiescience.edu; Smith, Jesse S.; Rod, Eric
The ability to remotely control pressure in diamond anvil cells (DACs) in accurate and consistent manner at room temperature, as well as at cryogenic and elevated temperatures, is crucial for effective and reliable operation of a high-pressure synchrotron facility such as High Pressure Collaborative Access Team (HPCAT). Over the last several years, a considerable effort has been made to develop instrumentation for remote and automated pressure control in DACs during synchrotron experiments. We have designed and implemented an array of modular pneumatic (double-diaphragm), mechanical (gearboxes), and piezoelectric devices and their combinations for controlling pressure and compression/decompression rate at various temperaturemore » conditions from 4 K in cryostats to several thousand Kelvin in laser-heated DACs. Because HPCAT is a user facility and diamond cells for user experiments are typically provided by users, our development effort has been focused on creating different loading mechanisms and frames for a variety of existing and commonly used diamond cells rather than designing specialized or dedicated diamond cells with various drives. In this paper, we review the available instrumentation for remote static and dynamic pressure control in DACs and show some examples of their applications to high pressure research.« less
LSST Resources for the Community
NASA Astrophysics Data System (ADS)
Jones, R. Lynne
2011-01-01
LSST will generate 100 petabytes of images and 20 petabytes of catalogs, covering 18,000-20,000 square degrees of area sampled every few days, throughout a total of ten years of time -- all publicly available and exquisitely calibrated. The primary access to this data will be through Data Access Centers (DACs). DACs will provide access to catalogs of sources (single detections from individual images) and objects (associations of sources from multiple images). Simple user interfaces or direct SQL queries at the DAC can return user-specified portions of data from catalogs or images. More complex manipulations of the data, such as calculating multi-point correlation functions or creating alternative photo-z measurements on terabyte-scale data, can be completed with the DAC's own resources. Even more data-intensive computations requiring access to large numbers of image pixels on petabyte-scale could also be conducted at the DAC, using compute resources allocated in a similar manner to a TAC. DAC resources will be available to all individuals in member countries or institutes and LSST science collaborations. DACs will also assist investigators with requests for allocations at national facilities such as the Petascale Computing Facility, TeraGrid, and Open Science Grid. Using data on this scale requires new approaches to accessibility and analysis which are being developed through interactions with the LSST Science Collaborations. We are producing simulated images (as might be acquired by LSST) based on models of the universe and generating catalogs from these images (as well as from the base model) using the LSST data management framework in a series of data challenges. The resulting images and catalogs are being made available to the science collaborations to verify the algorithms and develop user interfaces. All LSST software is open source and available online, including preliminary catalog formats. We encourage feedback from the community.
Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks
2013-09-16
fOR OFFICL’tb HSE OtuN Contents Introduction Objective 1 Background 1 Review of Internal Controls 4 Finding A. NCACS Did Not Effectively...8fHh’ DODIC.-20 13·134 I v FOR OFFICL’tb HSE ONI-X Introduction Objective The objective of the audit was to determine whether the Navy... HSE ONb\\’ authorized a Common Access Card. In order to avoid the appearance of endorsing Rapidgate, Eid Passport’s trademarked product, in May 2011
Experience with ActiveX control for simple channel access
DOE Office of Scientific and Technical Information (OSTI.GOV)
Timossi, C.; Nishimura, H.; McDonald, J.
2003-05-15
Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.
Speed control system for an access gate
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bzorgi, Fariborz M
2012-03-20
An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the outputmore » element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.« less
Accessibility, stabilizability, and feedback control of continuous orbital transfer.
Gurfil, Pini
2004-05-01
This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.
Access Control of Web and Java Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan
2011-01-01
Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.
Mandatory and Location-Aware Access Control for Relational Databases
NASA Astrophysics Data System (ADS)
Decker, Michael
Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.
Open versus Controlled-Access Data | Office of Cancer Genomics
OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data
The Ins and Outs of Access Control.
ERIC Educational Resources Information Center
Longworth, David
1999-01-01
Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…
Access control and confidentiality in radiology
NASA Astrophysics Data System (ADS)
Noumeir, Rita; Chafik, Adil
2005-04-01
A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.
Precision Control of Multiple Quantum Cascade Lasers for Calibration Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Taubman, Matthew S.; Myers, Tanya L.; Pratt, Richard M.
We present a precision, digitally interfaced current controller for quantum cascade lasers, with demonstrated DC and modulated temperature coefficients of 1- 2 ppm/ºC and 15 ppm/ºC respectively. High linearity digital to analog converters (DACs) together with an ultra-precision voltage reference, produce highly stable, precision voltages. These are in turn selected by a low charge-injection multiplexer (MUX) chip, which are then used to set output currents via a linear current regulator. The controller is operated in conjunction with a power multiplexing unit, allowing one of three lasers to be driven by the controller while ensuring protection of controller and all lasersmore » during operation, standby and switching. Simple ASCII commands sent over a USB connection to a microprocessor located in the current controller operate both the controller (via the DACs and MUX chip) and the power multiplexer.« less
Code of Federal Regulations, 2010 CFR
2010-01-01
... Exposure During Immersion in a Cloud of Airborne Radioactive Material C Appendix C to Part 835 Energy... Concentration (DAC) for Workers From External Exposure During Immersion in a Cloud of Airborne Radioactive... identifying the need for posting of airborne radioactivity areas in accordance with § 835.603(d). b. The air...
Extraordinary Tools for Extraordinary Science: The Impact ofSciDAC on Accelerator Science&Technology
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ryne, Robert D.
2006-08-10
Particle accelerators are among the most complex and versatile instruments of scientific exploration. They have enabled remarkable scientific discoveries and important technological advances that span all programs within the DOE Office of Science (DOE/SC). The importance of accelerators to the DOE/SC mission is evident from an examination of the DOE document, ''Facilities for the Future of Science: A Twenty-Year Outlook''. Of the 28 facilities listed, 13 involve accelerators. Thanks to SciDAC, a powerful suite of parallel simulation tools has been developed that represent a paradigm shift in computational accelerator science. Simulations that used to take weeks or more now takemore » hours, and simulations that were once thought impossible are now performed routinely. These codes have been applied to many important projects of DOE/SC including existing facilities (the Tevatron complex, the Relativistic Heavy Ion Collider), facilities under construction (the Large Hadron Collider, the Spallation Neutron Source, the Linac Coherent Light Source), and to future facilities (the International Linear Collider, the Rare Isotope Accelerator). The new codes have also been used to explore innovative approaches to charged particle acceleration. These approaches, based on the extremely intense fields that can be present in lasers and plasmas, may one day provide a path to the outermost reaches of the energy frontier. Furthermore, they could lead to compact, high-gradient accelerators that would have huge consequences for US science and technology, industry, and medicine. In this talk I will describe the new accelerator modeling capabilities developed under SciDAC, the essential role of multi-disciplinary collaboration with applied mathematicians, computer scientists, and other IT experts in developing these capabilities, and provide examples of how the codes have been used to support DOE/SC accelerator projects.« less
Nakada, Tsutomu; Matsuzawa, Hitoshi; Fujii, Yukihiko; Takahashi, Hitoshi; Nishizawa, Masatoyo; Kwee, Ingrid L
2006-07-01
Clinical magnetic resonance imaging (MRI) has recently entered the "high-field" era, and systems equipped with 3.0-4.0T superconductive magnets are becoming the gold standard for diagnostic imaging. While higher signal-to-noise ratio (S/N) is a definite advantage of higher field systems, higher susceptibility effect remains to be a significant trade-off. To take advantage of a higher field system in performing routine clinical images of higher anatomical resolution, we implemented a vector contrast image technique to 3.0T imaging, three-dimensional anisotropy contrast (3DAC), with a PROPELLER (Periodically Rotated Overlapping Parallel Lines with Enhanced Reconstruction) sequence, a method capable of effectively eliminating undesired artifacts on rapid diffusion imaging sequences. One hundred subjects (20 normal volunteers and 80 volunteers with various central nervous system diseases) participated in the study. Anisotropic diffusion-weighted PROPELLER images were obtained on a General Electric (Waukesha, WI, USA) Signa 3.0T for each axis, with b-value of 1100 sec/mm(2). Subsequently, 3DAC images were constructed using in-house software written on MATLAB (MathWorks, Natick, MA, USA). The vector contrast allows for providing exquisite anatomical detail illustrated by clear identification of all major tracts through the entire brain. 3DAC images provide better anatomical resolution for brainstem glioma than higher-resolution T2 reversed images. Degenerative processes of disease-specific tracts were clearly identified as illustrated in cases of multiple system atrophy and Joseph-Machado disease. Anatomical images of significantly higher resolution than the best current standard, T2 reversed images, were successfully obtained. As a technique readily applicable under routine clinical setting, 3DAC PROPELLER on a 3.0T system will be a powerful addition to diagnostic imaging.
Fine-Grained Access Control for Electronic Health Record Systems
NASA Astrophysics Data System (ADS)
Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh
There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.
Access control and privilege management in electronic health record: a systematic literature review.
Jayabalan, Manoj; O'Daniel, Thomas
2016-12-01
This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.
Research on a dynamic workflow access control model
NASA Astrophysics Data System (ADS)
Liu, Yiliang; Deng, Jinxia
2007-12-01
In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.
A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems
Choi, Donghee; Kim, Dohoon; Park, Seog
2015-01-01
Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013
Access control and privacy in large distributed systems
NASA Technical Reports Server (NTRS)
Leiner, B. M.; Bishop, M.
1986-01-01
Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.
Network Access Control List Situation Awareness
ERIC Educational Resources Information Center
Reifers, Andrew
2010-01-01
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
Dynamic access control model for privacy preserving personalized healthcare in cloud environment.
Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon
2015-01-01
When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.
Hormone-dependent control of developmental timing through regulation of chromatin accessibility
Uyehara, Christopher M.; Nystrom, Spencer L.; Niederhuber, Matthew J.; Leatham-Jensen, Mary; Ma, Yiqin; Buttitta, Laura A.
2017-01-01
Specification of tissue identity during development requires precise coordination of gene expression in both space and time. Spatially, master regulatory transcription factors are required to control tissue-specific gene expression programs. However, the mechanisms controlling how tissue-specific gene expression changes over time are less well understood. Here, we show that hormone-induced transcription factors control temporal gene expression by regulating the accessibility of DNA regulatory elements. Using the Drosophila wing, we demonstrate that temporal changes in gene expression are accompanied by genome-wide changes in chromatin accessibility at temporal-specific enhancers. We also uncover a temporal cascade of transcription factors following a pulse of the steroid hormone ecdysone such that different times in wing development can be defined by distinct combinations of hormone-induced transcription factors. Finally, we show that the ecdysone-induced transcription factor E93 controls temporal identity by directly regulating chromatin accessibility across the genome. Notably, we found that E93 controls enhancer activity through three different modalities, including promoting accessibility of late-acting enhancers and decreasing accessibility of early-acting enhancers. Together, this work supports a model in which an extrinsic signal triggers an intrinsic transcription factor cascade that drives development forward in time through regulation of chromatin accessibility. PMID:28536147
Precision control of multiple quantum cascade lasers for calibration systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Taubman, Matthew S., E-mail: Matthew.Taubman@pnnl.gov; Myers, Tanya L.; Pratt, Richard M.
We present a precision, 1-A, digitally interfaced current controller for quantum cascade lasers, with demonstrated temperature coefficients for continuous and 40-kHz full-depth square-wave modulated operation, of 1–2 ppm/ °C and 15 ppm/ °C, respectively. High precision digital to analog converters (DACs) together with an ultra-precision voltage reference produce highly stable, precision voltages, which are selected by a multiplexer (MUX) chip to set output currents via a linear current regulator. The controller is operated in conjunction with a power multiplexing unit, allowing one of three lasers to be driven by the controller, while ensuring protection of controller and all lasers during operation, standby,more » and switching. Simple ASCII commands sent over a USB connection to a microprocessor located in the current controller operate both the controller (via the DACs and MUX chip) and the power multiplexer.« less
SAFE: SPARQL Federation over RDF Data Cubes with Access Control.
Khan, Yasar; Saleem, Muhammad; Mehdi, Muntazir; Hogan, Aidan; Mehmood, Qaiser; Rebholz-Schuhmann, Dietrich; Sahay, Ratnesh
2017-02-01
Several query federation engines have been proposed for accessing public Linked Open Data sources. However, in many domains, resources are sensitive and access to these resources is tightly controlled by stakeholders; consequently, privacy is a major concern when federating queries over such datasets. In the Healthcare and Life Sciences (HCLS) domain real-world datasets contain sensitive statistical information: strict ownership is granted to individuals working in hospitals, research labs, clinical trial organisers, etc. Therefore, the legal and ethical concerns on (i) preserving the anonymity of patients (or clinical subjects); and (ii) respecting data ownership through access control; are key challenges faced by the data analytics community working within the HCLS domain. Likewise statistical data play a key role in the domain, where the RDF Data Cube Vocabulary has been proposed as a standard format to enable the exchange of such data. However, to the best of our knowledge, no existing approach has looked to optimise federated queries over such statistical data. We present SAFE: a query federation engine that enables policy-aware access to sensitive statistical datasets represented as RDF data cubes. SAFE is designed specifically to query statistical RDF data cubes in a distributed setting, where access control is coupled with source selection, user profiles and their access rights. SAFE proposes a join-aware source selection method that avoids wasteful requests to irrelevant and unauthorised data sources. In order to preserve anonymity and enforce stricter access control, SAFE's indexing system does not hold any data instances-it stores only predicates and endpoints. The resulting data summary has a significantly lower index generation time and size compared to existing engines, which allows for faster updates when sources change. We validate the performance of the system with experiments over real-world datasets provided by three clinical organisations as
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
10 CFR 20.1601 - Control of access to high radiation areas.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...
Information-Flow-Based Access Control for Web Browsers
NASA Astrophysics Data System (ADS)
Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu
The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.
Proximity-based access control for context-sensitive information provision in SOA-based systems
NASA Astrophysics Data System (ADS)
Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew
2014-06-01
Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.
75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-26
... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...
Authenticated IGMP for Controlling Access to Multicast Distribution Tree
NASA Astrophysics Data System (ADS)
Park, Chang-Seop; Kang, Hyun-Sun
A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.
Access Control for Mobile Assessment Systems Using ID.
Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma
2015-01-01
The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.
DOD Information Technology Standard Guidance (ITSG) Version 3.1
1997-04-07
from NGSBs later (e.g., OSFs Motif specification became the basis for IEEE 1295 . 1). Most consortia specifications are available now, do not overlap...Illumination) CIM Center for Information Management (DISA) CINC Conumnder in Chief CIS CASE Integration Services CJCS Chairman of the Joint Chiefs of...Compound Text Encoding CUA Common User Access DAC Discretionary Access Controls DAD Draft Addendum (ISO) DAM Draft Amendment (ISO) DAP Document
NASA Astrophysics Data System (ADS)
Ryne, Robert D.
2006-09-01
Particle accelerators are among the most complex and versatile instruments of scientific exploration. They have enabled remarkable scientific discoveries and important technological advances that span all programs within the DOE Office of Science (DOE/SC). The importance of accelerators to the DOE/SC mission is evident from an examination of the DOE document, ''Facilities for the Future of Science: A Twenty-Year Outlook.'' Of the 28 facilities listed, 13 involve accelerators. Thanks to SciDAC, a powerful suite of parallel simulation tools has been developed that represent a paradigm shift in computational accelerator science. Simulations that used to take weeks or more now take hours, and simulations that were once thought impossible are now performed routinely. These codes have been applied to many important projects of DOE/SC including existing facilities (the Tevatron complex, the Relativistic Heavy Ion Collider), facilities under construction (the Large Hadron Collider, the Spallation Neutron Source, the Linac Coherent Light Source), and to future facilities (the International Linear Collider, the Rare Isotope Accelerator). The new codes have also been used to explore innovative approaches to charged particle acceleration. These approaches, based on the extremely intense fields that can be present in lasers and plasmas, may one day provide a path to the outermost reaches of the energy frontier. Furthermore, they could lead to compact, high-gradient accelerators that would have huge consequences for US science and technology, industry, and medicine. In this talk I will describe the new accelerator modeling capabilities developed under SciDAC, the essential role of multi-disciplinary collaboration with applied mathematicians, computer scientists, and other IT experts in developing these capabilities, and provide examples of how the codes have been used to support DOE/SC accelerator projects.
Urban Studies: A Study of Bibliographic Access and Control.
ERIC Educational Resources Information Center
Anderson, Barbara E.
This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…
Open access publishing, article downloads, and citations: randomised controlled trial
Lewenstein, Bruce V; Simon, Daniel H; Booth, James G; Connolly, Mathew J L
2008-01-01
Objective To measure the effect of free access to the scientific literature on article downloads and citations. Design Randomised controlled trial. Setting 11 journals published by the American Physiological Society. Participants 1619 research articles and reviews. Main outcome measures Article readership (measured as downloads of full text, PDFs, and abstracts) and number of unique visitors (internet protocol addresses). Citations to articles were gathered from the Institute for Scientific Information after one year. Interventions Random assignment on online publication of articles published in 11 scientific journals to open access (treatment) or subscription access (control). Results Articles assigned to open access were associated with 89% more full text downloads (95% confidence interval 76% to 103%), 42% more PDF downloads (32% to 52%), and 23% more unique visitors (16% to 30%), but 24% fewer abstract downloads (−29% to −19%) than subscription access articles in the first six months after publication. Open access articles were no more likely to be cited than subscription access articles in the first year after publication. Fifty nine per cent of open access articles (146 of 247) were cited nine to 12 months after publication compared with 63% (859 of 1372) of subscription access articles. Logistic and negative binomial regression analysis of article citation counts confirmed no citation advantage for open access articles. Conclusions Open access publishing may reach more readers than subscription access publishing. No evidence was found of a citation advantage for open access articles in the first year after publication. The citation advantage from open access reported widely in the literature may be an artefact of other causes. PMID:18669565
A federated capability-based access control mechanism for internet of things (IoTs)
NASA Astrophysics Data System (ADS)
Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe
2018-05-01
The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.
Fertility Effects of Abortion and Birth Control Pill Access for Minors
GULDI, MELANIE
2008-01-01
This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor’s legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women’s birthrates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birthrates among whites. PMID:19110899
Fertility effects of abortion and birth control pill access for minors.
Guldi, Melanie
2008-11-01
This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.
External access to ALICE controls conditions data
NASA Astrophysics Data System (ADS)
Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.
2014-06-01
ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.
Evaluation of modified work zone traffic control devices at business accesses
DOT National Transportation Integrated Search
2001-01-01
Modified work zone traffic control devices at business accesses were evaluated on two Oregon Department of Transportation (ODOT) projects in 1999 and 2000. On one section project, blue Temporary Business Access" signs were used at business accesses d...
A slotted access control protocol for metropolitan WDM ring networks
NASA Astrophysics Data System (ADS)
Baziana, P. A.; Pountourakis, I. E.
2009-03-01
In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Livny, Miron; Shank, James; Ernst, Michael
Under this SciDAC-2 grant the project’s goal w a s t o stimulate new discoveries by providing scientists with effective and dependable access to an unprecedented national distributed computational facility: the Open Science Grid (OSG). We proposed to achieve this through the work of the Open Science Grid Consortium: a unique hands-on multi-disciplinary collaboration of scientists, software developers and providers of computing resources. Together the stakeholders in this consortium sustain and use a shared distributed computing environment that transforms simulation and experimental science in the US. The OSG consortium is an open collaboration that actively engages new research communities. Wemore » operate an open facility that brings together a broad spectrum of compute, storage, and networking resources and interfaces to other cyberinfrastructures, including the US XSEDE (previously TeraGrid), the European Grids for ESciencE (EGEE), as well as campus and regional grids. We leverage middleware provided by computer science groups, facility IT support organizations, and computing programs of application communities for the benefit of consortium members and the US national CI.« less
Access Control for Cooperation Systems Based on Group Situation
NASA Astrophysics Data System (ADS)
Kim, Minsoo; Joshi, James B. D.; Kim, Minkoo
Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While individual agent context is important, the overall cooperation behavior is more driven by the group context because of relationships and interactions between agents. Dynamic access control based on group situation is a crucial challenge in such cooperation systems. In this paper we propose a dynamic role based access control model for cooperation systems based on group situation. The model emphasizes capability based agent to role mapping and group situation based permission assignment to allow capturing dynamic access policies that evolve continuously.
[Access control management in electronic health records: a systematic literature review].
Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio
2012-01-01
This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.
Policy reconciliation for access control in dynamic cross-enterprise collaborations
NASA Astrophysics Data System (ADS)
Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.
2018-03-01
In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.
[Public control and equity of access to hospitals under non-State public administration].
Carneiro Junior, Nivaldo; Elias, Paulo Eduardo
2006-10-01
To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.
Toward Privacy-preserving Content Access Control for Information Centric Networking
2014-03-01
REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting
75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...
75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...
An approach to access control in electronic health record.
Sucurovic, Snezana
2010-08-01
OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.
75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...
76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-18
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...
76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-21
... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...
76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-23
... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...
Empowering citizens with access control mechanisms to their personal health resources.
Calvillo, J; Román, I; Roa, L M
2013-01-01
Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms
The Integrated Ocean Observing System Data Assembly Center
NASA Astrophysics Data System (ADS)
Bouchard, R. H.; Henderson, D.; Burnett, W.; Hervey, R. V.; Crout, R.
2008-05-01
The Integrated Ocean Observing System (IOOS) is the U.S. contribution to the Global Ocean Observing System and the Global Earth Observing System of Systems (GEOSS). As the Integrated Ocean Observing System Data Assembly Center (IOOS DAC), the National Oceanic and Atmospheric Administration`s (NOAA) National Data Buoy Center (NDBC) collects data from ocean observing systems and performs quality control on the data. Once the IOOS DAC performs the quality control, it distributes them in real-time: (1) in World Meteorological Organization alphanumeric data formats via the Global Telecommunications System (GTS) that provides instant availability to national and international users (2) in text files via its website (http://www.ndbc.noaa.gov) that provide easy access and use, and (3) in netCDF format via its OPeNDAP/DODS Server (http://dods.ndbc.noaa.gov) that provides higher resolution data than available in WMO alphanumeric or text file formats. The IOOS DAC routinely checks and distributes data from about 200 NDBC stations that include meteorological and oceanographic observations from buoys and coastal stations, water-level estimations from tsunameters (DART), and climate monitoring from buoys (Tropical Atmosphere Ocean array (TAO)). The IOOS DAC operates continuously - 24 hours per day, 7 days per week. In addition to data from NDBC`s platforms, the IOOS DAC applies its scientific expertise and data management and communications capabilities to facilitate partnerships for the exchange and application of data and to coordinate and leverage regional assets and resources from about 350 IOOS Partner stations. The IOOS DAC through its quality control process provides feedback to its partners on the quality of their observation that can lead to improved quality of the observations. The NDBC-IOOS Data Partnerships span the Western Hemisphere with data collection from the Beaufort Sea to the Peru Current, from the International Date Line to the central Atlantic Ocean, and
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
10 CFR 20.1602 - Control of access to very high radiation areas.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...
Studying the location of SACs and DACs regions in the environment of hot emission stars
NASA Astrophysics Data System (ADS)
Antoniou, A.; Danezis, E.; Lyratzi, E.; Popović, L. Č.; Dimitrijević, M. S.; Theodossiou, E.
Hot emission stars (Oe and Be stars) present complex spectral line profiles, which are formed by a number of DACs and/or SACs. In order to explain and reproduce theoretically these complex line profiles we use the GR model (Gauss-Rotation model). This model presupposes that the regions, where the spectral lines are created, consist of a number of independent and successive absorbing or emitting density regions of matter. Here we are testing a new approach of the GR model, which supposes that the independent density regions are not successive. We use this new approach in the spectral lines of some Oe and Be stars and we compare the results of this method with the results deriving from the classical GR model that supposes successive regions.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-04
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-30
... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-15
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...
Automating Access Control Logics in Simple Type Theory with LEO-II
NASA Astrophysics Data System (ADS)
Benzmüller, Christoph
Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory and we have demonstrated that the higher-order theorem prover LEO-II can automate reasoning in and about them. In this paper we combine these results and describe a sound (and complete) embedding of different access control logics in simple type theory. Employing this framework we show that the off the shelf theorem prover LEO-II can be applied to automate reasoning in and about prominent access control logics.
Controlling user access to electronic resources without password
Smith, Fred Hewitt
2015-06-16
Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.
Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.
Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang
2017-04-10
In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.
Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel
2016-12-01
Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.
Formalization of the Access Control on ARM-Android Platform with the B Method
NASA Astrophysics Data System (ADS)
Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing
2018-01-01
ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.
Controlling user access to electronic resources without password
Smith, Fred Hewitt
2017-08-22
Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.
Global Access-controlled Transfer e-frame (GATe)
DOE Office of Scientific and Technical Information (OSTI.GOV)
2012-05-30
Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.
Collaborative Access Control For Critical Infrastructures
NASA Astrophysics Data System (ADS)
Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed
A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.
An improved task-role-based access control model for G-CSCW applications
NASA Astrophysics Data System (ADS)
He, Chaoying; Chen, Jun; Jiang, Jie; Han, Gang
2005-10-01
Access control is an important and popular security mechanism for multi-user applications. GIS-based Computer Supported Cooperative Work (G-CSCW) application is one of such applications. This paper presents an improved Task-Role-Based Access Control (X-TRBAC) model for G-CSCW applications. The new model inherits the basic concepts of the old ones, such as role and task. Moreover, it has introduced two concepts, i.e. object hierarchy and operation hierarchy, and the corresponding rules to improve the efficiency of permission definition in access control models. The experiments show that the method can simplify the definition of permissions, and it is more applicable for G-CSCW applications.
36 CFR 1256.70 - What controls access to national security-classified information?
Code of Federal Regulations, 2010 CFR
2010-07-01
... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...
Type-Based Access Control in Data-Centric Systems
NASA Astrophysics Data System (ADS)
Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio
Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.
A Data Analysis Center for Electromagnetic and Hadronic Interaction. Products of the DAC members
DOE Office of Scientific and Technical Information (OSTI.GOV)
Briscoe, William John; Strakovsky, Igor I.; Workman, Ronald L.
The Data Analysis Center (DAC) of the Center for Nuclear Studies (CNS) at the George Washington University (GW) has made significant progress in its program to enhance and expand the partial-wave (and multipole) analyses of fundamental two- and three-body reactions (such as pion-nucleon, photon-nucleon, and nucleon-nucleon scattering) by maintaining and augmenting the analysis codes and databases associated with these reactions. These efforts provide guidance to experimental groups at the international level, forming an important link between theory and experiment. A renaissance in light hadron spectroscopy is underway as a continuous stream of polarization data issues from existing precision electromagnetic facilitiesmore » and the coming Jefferson Lab 12 GeV Upgrade. Our principal goals have been focused on supporting the national N* resonance physics program. We have also continued to study topics more generally related to the problems associated with partial-wave analysis. On the Experimental side of the CNS DAC. Its primary goal is the enhancement of the body of data necessary for our analyses of fundamental γ - N reactions. We perform experiments that study the dynamics responsible for the internal structure of the nucleon and its excitations. Our principal focus is on the N* programs at JLab and MAMI. At JLab we study spin-polarization observables using polarized photons, protons and neutrons and yielding charged final states. Similarly at MAMI we study neutral meson photoproduction off polarized protons and neutrons. We use the Crystal Ball and TAPS spectrometers (CBT) to detect photons and neutrons to measure the photoproduction of π0, η, 2π0, π0η, and K0 off the neutron. The CBT program complements our program at JLab, which studies reactions resulting in charged final states. We are also involved in a renewed effort to make neutral pion photoproduction measurements close to threshold at Mainz. In addition to the programs underway, we are
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-24
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-12
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
NASA Astrophysics Data System (ADS)
Joshi, Ramesh; Singh, Manoj; Jadav, H. M.; Misra, Kishor; Kulkarni, S. V.; ICRH-RF Group
2010-02-01
Ion Cyclotron Resonance Heating (ICRH) is a promising heating method for a fusion device due to its localized power deposition profile, a direct ion heating at high density, and established technology for high RF power generation and transmission at low cost. Multiple analog pulse with different duty cycle in master of digital pulse for Data acquisition and Control system for steady state RF ICRH System(RF ICRH DAC) to be used for operating of RF Generator in Aditya to produce pre ionization and second analog pulse will produce heating. The control system software is based upon single digital pulse operation for RF source. It is planned to integrate multiple analog pulses with different duty cycle in master of digital pulse for Data acquisition and Control system for RF ICRH System(RF ICRH DAC) to be used for operating of RF Generator in Aditya tokamak. The task of RF ICRH DAC is to control and acquisition of all ICRH system operation with all control loop and acquisition for post analysis of data with java based tool. For pre ionization startup as well as heating experiments using multiple RF Power of different powers and duration. The experiment based upon the idea of using single RF generator to energize antenna inside the tokamak to radiate power twise, out of which first analog pulse will produce pre ionization and second analog pulse will produce heating. The whole system is based on standard client server technology using tcp/ip protocol. DAC Software is based on linux operating system for highly reliable, secure and stable system operation in failsafe manner. Client system is based on tcl/tk like toolkit for user interface with c/c++ like environment which is reliable programming languages widely used on stand alone system operation with server as vxWorks real time operating system like environment. The paper is focused on the Data acquisition and monitoring system software on Aditya RF ICRH System with analog pulses in slave mode with digital pulse in
1994-03-25
declarations requiring more digits than SYSTEM.MAXDIGITS: C24113L..Y (14 tests) C35705L..Y (14 tests) C35706L..Y (14 tests) C35707L..Y (14 tests) 2-1...before the DACS Run-Time System (RMs) libary normally searches for na-4ime routin;, in this way one can replace the standard DACS RTS routines with...SHORTINTEGER is range -128 .. 127; type INTEGER is range -32_768 .. 32_767; type LONGINTEGER is range -2147_483_648 .. 2_147_483_647; type FLOAT is digits 6
An, Jaemin; Lee, Jangwon; Lee, Sang Ho; Park, Jungyul; Kim, Byungkyu
2009-06-01
In this paper, we successfully separated malignant human breast cancer epithelial cells (MCF 7) from healthy breast cells (MCF 10A) and analyzed the main parameters that influence the separation efficiency with an advanced dielectrophoresis (DEP)-activated cell sorter (DACS). Using the efficient DACS, the malignant cancer cells (MCF 7) were isolated successfully by noninvasive methods from normal cells with similar cell size distributions (MCF 10A), depending on differences between their material properties such as conductivity and permittivity, because our system was able to discern the subtle differences in the properties by generating continuously changed electrical field gradients. In order to evaluate the separation performance without considering size variations, the cells collected from each outlet were divided into size-dependent groups and counted statistically. Following that, the quantitative relative ratio of numbers between MCF 7 and MCF 10A cells in each size-dependent group separated by the DEP were compared according to applied frequencies in the range 48, 51, and 53 MHz with an applied amplitude of 8 V(pp). Finally, under the applied voltage of 48 MHz-8 V(pp) and a flow rate of 290 microm/s, MCF 7 and MCF 10A cells were separated with a maximum efficiency of 86.67% and 98.73% respectively. Therefore, our suggested system shows it can be used for detection and separation of cancerous epithelial cells from noncancerous cells in clinical applications.
Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2018-03-20
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.
2018-01-01
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406
Xi Per [O7.5 III(n)((f))]: DACs, NRPs and Now Co-rotating Hot Spots with MOST
NASA Astrophysics Data System (ADS)
Ramiaramanantsoa, Tahina; Moffat, A.; Chene, A.-N.; Desforges, S.; Henrichs, H.; MOST Science Team
2013-06-01
We have used the MOST (Microvariability and Oscillations of Stars) microsatellite to obtain four weeks of contiguous high-precision broadband visual photometry in Nov 2011 along with several simultaneous nights of ground-based medium-resolution high signal-to-noise optical spectroscopic monitoring of the O7.5III star xi Persei. This star is well known from previous work to show prominent DACs (Discrete Absorption Components) on times-scales of about two days from UV spectroscopy and NRP (Non Radial Pulsation) with one (l=3) p-mode oscillation of period 3.5 hours from optical spectroscopy. Our MOST-orbit (101 min) binned photometry fails to reveal any coherent pulsations above the 0.1 mmag 3-sigma noise level for periods of hours, while several prominent Fourier peaks emerge at the 1 mmag level in the two-day period range. These longer-period variations are unlikely due to pulsations; rather we deduce from our simulations based upon a simple spot model that we are seeing the photometric modulation of several co-rotating hot spots on the stellar surface, whose lifetimes vary yet they all rotate at the same (probable) period of 4 days, i.e. the best-estimated stellar rotation period. We are in the process of examining if our new optical spectra at a cadence of ~ 5 minutes and signal-to-noise ~ 150 reveal any periodicities on hour and day timescales. This may be the first reported case of co-rotating hot spots on an O star, with important implications for drivers of the DACs (resulting from CIRs, Corotating Interaction Regions) and possible generation via a subsurface convection zone.
Simple measurement-based admission control for DiffServ access networks
NASA Astrophysics Data System (ADS)
Lakkakorpi, Jani
2002-07-01
In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.
Nurse practitioners and controlled substances prescriptive authority: improving access to care.
Ambrose, Michelle A; Tarlier, Denise S
2013-03-01
In 2007, Health Canada proposed a new framework to regulate prescriptive authority for controlled substances, titled New Classes of Practitioners Regulations (NCPR). The new regulatory framework was passed in November 2012; it gives nurse practitioners (NPs), midwives and podiatrists the authority to prescribe controlled medications under the Controlled Drugs and Substances Act. It is expected that authorizing NPs to write prescriptions for certain controlled substances commonly used in primary care will enhance flexibility and timeliness in primary care service delivery. Studies from the United States have shown positive outcomes in primary care access, decreased healthcare costs and the evolution and advancement of the NP role when prescriptive authority was expanded to include controlled substances. The purpose of this paper is to examine how NPs' prescriptive authority for controlled substances affects access to primary care and NP role development. Three key issues identified from the experience of one group of NPs in the United States (access to care, professional autonomy and prescriber knowledge) offer insight into the practice changes that may be anticipated for NPs in Canada now that they have acquired prescriptive authority for controlled substances. Recommendations are offered to assist nurse leaders and educators to best support NPs as they take on this new and important role responsibility.
Duff, Armin; Fibla, Marti Sanchez; Verschure, Paul F M J
2011-06-30
Intelligence depends on the ability of the brain to acquire and apply rules and representations. At the neuronal level these properties have been shown to critically depend on the prefrontal cortex. Here we present, in the context of the Distributed Adaptive Control architecture (DAC), a biologically based model for flexible control and planning based on key physiological properties of the prefrontal cortex, i.e. reward modulated sustained activity and plasticity of lateral connectivity. We test the model in a series of pertinent tasks, including multiple T-mazes and the Tower of London that are standard experimental tasks to assess flexible control and planning. We show that the model is both able to acquire and express rules that capture the properties of the task and to quickly adapt to changes. Further, we demonstrate that this biomimetic self-contained cognitive architecture generalizes to planning. In addition, we analyze the extended DAC architecture, called DAC 6, as a model that can be applied for the creation of intelligent and psychologically believable synthetic agents. Copyright © 2010 Elsevier Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
WHITE, D.A.
1999-12-29
This Software Configuration Management Plan (SCMP) provides the instructions for change control of the AZ1101 Mixer Pump Demonstration Data Acquisition System (DAS) and the Sludge Mobilization Cart (Gamma Cart) Data Acquisition and Control System (DACS).
An access control model with high security for distributed workflow and real-time application
NASA Astrophysics Data System (ADS)
Han, Ruo-Fei; Wang, Hou-Xiang
2007-11-01
The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.
76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-26
... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...
76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-01
... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...
NASA Astrophysics Data System (ADS)
Wang, Hongbo; Zhao, Laijun
2018-02-01
China's Beijing-Tianjin-Hebei (BTH) region suffers from the country's worst air pollution. The problem has caused widespread concern both at home and abroad. Based on long-term and massive data mining of PM2.5 and PM10 concentration, we found that these pollutants showed similar variations in four seasons, but the most severe pollution was in winter. Through cluster analysis of the winter daily average concentration (DAC) of the two pollutants, we defined regions with similar variations in pollutant concentrations in winter. For the most polluted cities in BTH, the relationship between correlation coefficients for winter DAC and the distance between cities revealed that PM2.5 has regional, large-scale characteristics, with concentrated outbreaks, whereas PM10 has local, small-scale characteristics, with outbreaks at multiple locations. By selecting the key cities with the strongest linear relationship between the pollutant's DAC of each city and the daily individual air quality index values of the BTH region and through cluster analysis on the correlations between the pollutant DACs of the key cities, we defined regional divisions suitable for Joint Prevention and Control of Atmospheric Pollution (JPCAP) program to control PM2.5 and PM10. Comprehensively considering the degree of influence of regional atmospheric pollution control (RAPC) on air quality in BTH, as well as the elasticity and urgency of RAPC, we defined the control grades of the JPCAP regions. We found both the regions and corresponding control grades were consistent for PM2.5 and PM10. The thinking and methods of atmospheric pollution control we proposed will have broad significance for implementation of RAPC in other regions around the world.
Access Control for Home Data Sharing: Attitudes, Needs and Practices
2009-10-01
cameras, mobile phones and portable music players make creating and interacting with this content easy. Home users are increasingly interested in...messages, photos, home videos, journal files and home musical recordings. Many participants considered unauthorized access by strangers, acquaintances...configuration does not allow users to share different subsets of music with different people. Facebook supplies rich, customizable access controls for
14 CFR 420.53 - Control of public access.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Control of public access. 420.53 Section 420.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420...
77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...
The OPL Access Control Policy Language
NASA Astrophysics Data System (ADS)
Alm, Christopher; Wolf, Ruben; Posegga, Joachim
Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.
76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-28
... 224, Airport Security Access Control AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The... (Pub. L. 92-463, 5 U.S.C., App.), notice is hereby given for a Special Committee 224, Airport Security...
NASA Technical Reports Server (NTRS)
Lee, Henry C.; Klopfer, Goetz H.; Onufer, Jeff T.
2011-01-01
Investigation of the non-uniform flow angularity effects on the Ares I DAC-1 in the Langley Unitary Plan Wind Tunnel are explored through simulations by OVERFLOW. Verification of the wind tunnel results are needed to ensure that the standard wind tunnel calibration procedures for large models are valid. The expectation is that the systematic error can be quantified, and thus be used to correct the wind tunnel data. The corrected wind tunnel data can then be used to quantify the CFD uncertainties.
Tag Content Access Control with Identity-based Key Exchange
NASA Astrophysics Data System (ADS)
Yan, Liang; Rong, Chunming
2010-09-01
Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.
A contextual role-based access control authorization model for electronic patient record.
Motta, Gustavo H M B; Furuie, Sergio S
2003-09-01
The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.
50 CFR 648.262 - Effort-control program for red crab limited access vessels.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Effort-control program for red crab... UNITED STATES Management Measures for the Atlantic Deep-Sea Red Crab Fishery § 648.262 Effort-control program for red crab limited access vessels. (a) General. A vessel issued a limited access red crab permit...
Common Badging and Access Control System (CBACS)
NASA Technical Reports Server (NTRS)
Baldridge, Tim
2005-01-01
The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.
Health Information System Role-Based Access Control Current Security Trends and Challenges.
de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo
2018-01-01
This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.
78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-23
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-11
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Jr., R.L.; Fang, Z.; Tohoku)
In this review, diamond anvil type cells (DACs) are reviewed as a method for studying supercritical water systems. The hydrothermal DAC provides easy and safe experimental access to high pressure (30-3000 MPa) and high temperature (400-800 C) regions and the device allows exploration of supercritical systems at high density (400-1200 kg/m{sup 3}), which is usually difficult or costly with batch or flow systems. In the first part of this review, characteristics of DACs regarding anvil type, DAC type, anvil alignment, heating, analytical methods, pressure and temperature determination, gasket, loading, physical size are discussed with emphasis on DACs that can bemore » used to generate conditions of interest for understanding supercritical water systems. In the second part of this review, applications and key findings of studies on supercritical water systems from geology, chemical, biomass, energy, environmental, polymer, and materials related fields are discussed. Some of the key findings determined with DAC are related to the dissolution or existence of phases at conditions of high temperature and high pressure, however, DAC has been used in many quantitative studies to determine fundamental properties such as speeds of sound, phase behavior, solubilities, partition coefficients and viscosities. Future prospects for DAC as a method for exploring supercritical water systems include combination of DAC with transmission electron microscopy (TEM) for studying nanostructures, use of high-speed streak cameras to study high-speed reactions, combustions, and energetic materials, use of time-dependent loads to study kinetics, precipitation and crystallization phenomena, the use of DAC with synchrotron radiation to follow reaction and material processes in situ, and the many modifications that can be made to DAC anvils and rapid heating methods such as lasers and masers used in conjunction with in situ techniques. The DAC is a highly versatile instrument and should find
NASA Astrophysics Data System (ADS)
Jennings, E. S.; Wade, J.; Laurenz, V.; Kearns, S.; Buse, B.; Rubie, D. C.
2017-12-01
The process by which the Earth's core segregated, and its resulting composition, can be inferred from the composition of the bulk silicate Earth if the partitioning of various elements into metal at relevant conditions is known. As such, partitioning experiments between liquid metal and liquid silicate over a wide range of pressures and temperatures are frequently performed to constrain the partitioning behaviour of many elements. The use of diamond anvil cell experiments to access more extreme conditions than those achievable by larger volume presses is becoming increasingly common. With a volume several orders of magnitude smaller than conventional samples, these experiments present unique analytical challenges. Typically, sample preparation is performed by FIB as a 2 mm thick slice, containing a small iron ball surrounded by a layer of silicate melt. This implies that analyses made by EPMA will be made near boundaries where fluoresced X-rays from the neighbouring phase may be significant. By measuring and simulating synthetic samples, we investigate thickness and fluorescence limitations. We find that for typical sample geometries, a thickness of 2 μm contains the entire analytical volume for standard 15kV analyses of metals. Fluoresced X-rays from light elements into the metal are below detection limits if there is no direct electron interaction with the silicate. Continuum fluorescence from higher atomic number elements from the metal into silicate poses significant difficulties [1]. This can cause metal-silicate partition coefficients of siderophile elements to be underestimated. Finally, we examine the origin and analytical consequences of oxide-rich exsolutions that are frequently found in the metal phase of such experiments. These are spherical with diameters of 100 nm and can be sparsely to densely packed. They appear to be carbon-rich and result in low analytical totals by violating the assumption of homogeneity in matrix corrections (e.g. φρz), which
Pace: Privacy-Protection for Access Control Enforcement in P2P Networks
NASA Astrophysics Data System (ADS)
Sánchez-Artigas, Marc; García-López, Pedro
In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.
Session Types for Access and Information Flow Control
NASA Astrophysics Data System (ADS)
Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola; Rezk, Tamara
We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, the type system prevents leaks that could result from an unrestricted use of the control constructs of the calculus, such as session opening, selection, branching and delegation. We illustrate the use of our type system with a number of examples, which reveal an interesting interplay between the constraints used in security type systems and those used in session types to ensure properties like communication safety and session fidelity.
An action-based fine-grained access control mechanism for structured documents and its application.
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.
Sucurovic, Snezana; Milutinovic, Veljko
2008-01-01
The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.
An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651
A Network Access Control Framework for 6LoWPAN Networks
Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime
2013-01-01
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610
Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection
Liu, Changyu; Li, Huiling
2014-01-01
We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840
Secure access control and large scale robust representation for online multimedia event detection.
Liu, Changyu; Lu, Bin; Li, Huiling
2014-01-01
We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
Distributed reservation control protocols for random access broadcasting channels
NASA Technical Reports Server (NTRS)
Greene, E. P.; Ephremides, A.
1981-01-01
Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.
A software controllable modular RF signal generator with multichannel transmission capabilities.
Shaw, Z; Feilner, W; Esser, B; Dickens, J C; Neuber, A A
2017-09-01
A software controllable system which generates and transmits user defined RF signals is discussed. The system is implemented with multiple, modular transmitting channels that allow the user to easily replace parts such as amplifiers or antennas. Each channel is comprised of a data pattern generator (DPG), a digital to analog converter (DAC), a power amplifier, and a transmitting antenna. All channels are controlled through a host PC and synchronized through a master clock signal provided to each DAC by an external clock source. Signals to be transmitted are generated through the DPG control software on the PC or can be created by the user in a numerical computing environment. Three experiments are discussed using a two- and four-channel antenna array incorporating Chebyshev tapered TEM horn antennas. Transmitting distinct sets of nonperiodic bipolar impulses through each of the antennas in the array enabled synthesizing a sinusoidal signal of specific frequency in free space. Opposite to the standard phased array approach, each antenna radiates a distinctly different signal rather than the same signal simply phase shifted. The presented approach may be employed as a physical layer of encryption dependent on the position of the receiving antenna.
NASA Astrophysics Data System (ADS)
Tsaur, Woei-Jiunn; Pai, Haw-Tyng
2008-11-01
The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.
Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.
Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro
2018-02-13
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.
Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors
Huarte, Maider; Romaña, Pedro
2018-01-01
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model. PMID:29438338
Application-Defined Decentralized Access Control
Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett
2014-01-01
DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493
Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley
2010-10-01
Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.
Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Yadav, Rajesh; Varma, Shirshu; Malaviya, N.
2008-05-01
Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.
Trust-based Access Control in Virtual Learning Community
NASA Astrophysics Data System (ADS)
Wang, Shujuan; Liu, Qingtang
The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fujimura, Hiroaki
Mating pheromones, a- and {alpha}-factors, arrest the division of cells of opposite mating types, {alpha} and a cells, respectively. The author has isolated a sterile mutant of Saccharomyces cerevisiae using EMS that is defective in division arrest in response to {alpha}-factor but not defective in morphological changes and agglutinin induction. The mutation was designated dac2 for division arrest control by mating pheromones. The dac2 mutation was closely linked to gal1 and was different from the previously identified cell type nonspecific sterile mutations (ste4, ste5, ste7, ste11, ste12, ste18, and dac1). Although dac2 cells had no phenotype in the absence ofmore » pheromones, they showed morphological alterations and divided continuously in the presence of pheromones. As a result, dac2 cells had a mating defect. The dac2 mutation could suppress the lethality caused by the disruption of the GPA1 gene. These results suggest that the DAC2 product may control the signal for G-protein-mediated cell-cycle arrest and indicate that the synchronization of haploid yeast cell cycles by mating pheromones is essential for cell fusion during conjugation.« less
ERIC Educational Resources Information Center
Antony, Laljith
2016-01-01
Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…
A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms
NASA Astrophysics Data System (ADS)
Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin
With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.
Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses
NASA Astrophysics Data System (ADS)
Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon
This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.
AN AUTOMATED MONITORING SYSTEM FOR FISH PHYSIOLOGY AND TOXICOLOGY
This report describes a data acquisition and control (DAC) system that was constructed to manage selected physiological measurements and sample control for aquatic physiology and toxicology. Automated DAC was accomplished with a microcomputer running menu-driven software develope...
Privacy and Access Control for IHE-Based Systems
NASA Astrophysics Data System (ADS)
Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian
Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.
ERIC Educational Resources Information Center
Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.
One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on switches and environmental controls. The book's three chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by…
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
NASA Astrophysics Data System (ADS)
Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.
Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.
Secure Dynamic access control scheme of PHR in cloud computing.
Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching
2012-12-01
With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access
Access Control Model for Sharing Composite Electronic Health Records
NASA Astrophysics Data System (ADS)
Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen
The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.
Rural providers' access to online resources: a randomized controlled trial
Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.
2016-01-01
Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050
NASA Technical Reports Server (NTRS)
Woods-Vedeler, Jessica A.; Rombado, Gabriel
1997-01-01
The purpose of this paper is to provide final results of a pointing stability analysis for external payload attachment sites (PAS) on the International Space Station (ISS). As a specific example, the pointing stability requirement of the SAGE III atmospheric science instrument was examined in this paper. The instrument requires 10 arcsec stability over 2 second periods. SAGE 3 will be mounted on the ISS starboard side at the lower, outboard FIAS. In this engineering analysis, an open-loop DAC-3 finite element model of ISS was used by the Microgravity Group at Johnson Space Flight Center to generate transient responses at PAS to a limited number of disturbances. The model included dynamics up to 50 Hz. Disturbance models considered included operation of the solar array rotary joints, thermal radiator rotary joints, and control moment gyros. Responses were filtered to model the anticipated vibration attenuation effects of active control systems on the solar and thermal radiator rotary joints. A pointing stability analysis was conducted by double integrating acceleration transient over a 2 second period. Results of the analysis are tabulated for ISS X, Y, and Z Axis rotations. These results indicate that the largest excursions in rotation during pointing occurred due to rapid slewing of the thermal radiator. Even without attenuation at the rotary joints, the resulting pointing error was limited to less than 1.6 arcsec. With vibration control at the joints, to a maximum 0.5 arcsec over a 2 second period. Based on this current level of model definition, it was concluded that between 0 - 50 Hz, the pointing stability requirement for SAGE 3 will not be exceeded by the disturbances evaluated in this study.
Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.
Bögel, K.; Joshi, D. D.
1990-01-01
The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign. PMID:2289296
Cardea: Dynamic Access Control in Distributed Systems
NASA Technical Reports Server (NTRS)
Lepro, Rebekah
2004-01-01
Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.
DOT National Transportation Integrated Search
1974-06-01
The report synthesizes a set of satellite communications systems configurations to provide services to aircraft flying oceanic routes. These configurations are combined with access control methods to form complete systems. These systems are analyzed ...
Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.
Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen
2018-04-28
Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.
The equipment access software for a distributed UNIX-based accelerator control system
NASA Astrophysics Data System (ADS)
Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé
1994-12-01
This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.
DOE`s nation-wide system for access control can solve problems for the federal government
DOE Office of Scientific and Technical Information (OSTI.GOV)
Callahan, S.; Tomes, D.; Davis, G.
1996-07-01
The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less
Yi, Meng; Chen, Qingkui; Xiong, Neal N
2016-11-03
This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.
Yi, Meng; Chen, Qingkui; Xiong, Neal N.
2016-01-01
This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878
The Role of Automatic Indexing in Access Control: A Modular View
ERIC Educational Resources Information Center
Hartson, H. Rex
1974-01-01
A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)
SciDAC GSEP: Gyrokinetic Simulation of Energetic Particle Turbulence and Transport
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lin, Zhihong
Energetic particle (EP) confinement is a key physics issue for burning plasma experiment ITER, the crucial next step in the quest for clean and abundant energy, since ignition relies on self-heating by energetic fusion products (α-particles). Due to the strong coupling of EP with burning thermal plasmas, plasma confinement property in the ignition regime is one of the most uncertain factors when extrapolating from existing fusion devices to the ITER tokamak. EP population in current tokamaks are mostly produced by auxiliary heating such as neutral beam injection (NBI) and radio frequency (RF) heating. Remarkable progress in developing comprehensive EP simulationmore » codes and understanding basic EP physics has been made by two concurrent SciDAC EP projects GSEP funded by the Department of Energy (DOE) Office of Fusion Energy Science (OFES), which have successfully established gyrokinetic turbulence simulation as a necessary paradigm shift for studying the EP confinement in burning plasmas. Verification and validation have rapidly advanced through close collaborations between simulation, theory, and experiment. Furthermore, productive collaborations with computational scientists have enabled EP simulation codes to effectively utilize current petascale computers and emerging exascale computers. We review here key physics progress in the GSEP projects regarding verification and validation of gyrokinetic simulations, nonlinear EP physics, EP coupling with thermal plasmas, and reduced EP transport models. Advances in high performance computing through collaborations with computational scientists that enable these large scale electromagnetic simulations are also highlighted. These results have been widely disseminated in numerous peer-reviewed publications including many Phys. Rev. Lett. papers and many invited presentations at prominent fusion conferences such as the biennial International Atomic Energy Agency (IAEA) Fusion Energy Conference and the annual meeting
An Internet of Things Example: Classrooms Access Control over Near Field Communication
Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías
2014-01-01
The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520
An internet of things example: classrooms access control over near field communication.
Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías
2014-04-21
The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.
ERIC Educational Resources Information Center
Villano, Matt
2008-01-01
Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…
A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.
ERIC Educational Resources Information Center
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin
2003-01-01
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Why build limited access highways?.
DOT National Transportation Integrated Search
1991-01-01
This report first explains what a limited access highway is, then describes the benefits and advantages of limited access highways. As compared with highways with no control of access, limited access highways (especially those with full control) have...
Huang, Qinlong; Yang, Yixian; Shi, Yuxiang
2018-02-24
With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.
Yang, Yixian; Shi, Yuxiang
2018-01-01
With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC. PMID:29495269
The assessment of exploitation process of power for access control system
NASA Astrophysics Data System (ADS)
Wiśnios, Michał; Paś, Jacek
2017-10-01
The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.
[Basic Studies on Locoregional Injection of a Newly Designed Chitin Sol].
Chiba, Takehiro; Sugitachi, Akio; Kume, Kouhei; Segawa, Takenori; Nishinari, Yutaka; Ishida, Kaoru; Noda, Hironobu; Nishizuka, Satoshi; Kimura, Yusuke; Koeda, Keisuke; Sasaki, Akira
2015-11-01
Systemic chemotherapy in advanced cancer cases often provokes serious adverse events. We aimed to examine the fundamental properties and efficacy of a novel chitin sol, an anti-cancer agent with minor side effects designed to avoid the adverse effects of chemotherapy and enhance the QOL and ADL of patients. DAC-70 was used to create the novel agent termed DAC-70 sol. The anti-proliferative activity was assayed by the WST method using different types of cell lines. The anti-cancer efficacy of the novel agent was examined using cancer-bearing mice. DAC-70 sol was easily injectable through a 21-G needle. The sol suppressed proliferation of the cells in vitro. Intra-tumor injection of DAC-70 sol inhibited the rapid growth of solid tumors in the mice. CDDP-loaded DAC-70 sol, CDDP/DAC-70 sol, successfully controlled malignant ascites in the mice (p<0.05). Neither recurrence nor severe complications were encountered in these animals. These basic data strongly suggest that locoregional administration of our newly designed DAC-70 sol and CDDP/DAC-70 sol is clinically useful as novel cancer chemotherapy for advanced cases. This warrants further clinical studies in cancer chemotherapy.
Frequency-selective design of wireless power transfer systems for controlled access applications
NASA Astrophysics Data System (ADS)
Maschino, Tyler Stephen
Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.
Efficient graphite ring heater suitable for diamond-anvil cells to 1300 K
DOE Office of Scientific and Technical Information (OSTI.GOV)
Du Zhixue; Amulele, George; Lee, Kanani K. M.
In order to generate homogeneous high temperatures at high pressures, a ring-shaped graphite heater has been developed to resistively heat diamond-anvil cell (DAC) samples up to 1300 K. By putting the heater in direct contact with the diamond anvils, this graphite heater design features the following advantages: (1) efficient heating: sample can be heated to 1300 K while the DAC body temperature remains less than 800 K, eliminating the requirement of a special alloy for the DAC; (2) compact design: the sample can be analyzed with in situ measurements, e.g., x-ray, optical, and electrical probes are possible. In particular, themore » side access of the heater allows for radial x-ray diffraction (XRD) measurements in addition to traditional axial XRD.« less
21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.
Code of Federal Regulations, 2010 CFR
2010-04-01
... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...
BIOPACK: the ground controlled late access biological research facility.
van Loon, Jack J W A
2004-03-01
Future Space Shuttle flights shall be characterized by activities necessary to further build the International Space Station, ISS. During these missions limited resources are available to conduct biological experiments in space. The Shuttles' Middeck is a very suitable place to conduct science during the ISS assembly missions or dedicated science missions. The BIOPACK, which flew its first mission during the STS-107, provides a versatile Middeck Locker based research tool for gravitational biology studies. The core facility occupies the space of only two Middeck Lockers. Experiment temperatures are controlled for bacteria, plant, invertebrate and mammalian cultures. Gravity levels and profiles can be set ranging from 0 to 2.0 x g on three independent centrifuges. This provides the experimenter with a 1.0 x g on-board reference and intermediate hypogravity and hypergravity data points to investigate e.g. threshold levels in biological responses. Temperature sensitive items can be stored in the facilities' -10 degrees C and +4 degrees C stowage areas. During STS-107 the facility also included a small glovebox (GBX) and passive temperature controlled units (PTCU). The GBX provides the experimenter with two extra levels of containment for safe sample handling. This biological research facility is a late access (L-10 hrs) laboratory, which, when reaching orbit, could automatically be starting up reducing important experiment lag-time and valuable crew time. The system is completely telecommanded when needed. During flight system parameters like temperatures, centrifuge speeds, experiment commanding or sensor readouts can be monitored and changed when needed. Although ISS provides a wide range of research facilities there is still need for an STS-based late access facility such as the BIOPACK providing experimenters with a very versatile research cabinet for biological experiments under microgravity and in-flight control conditions.
Takeda, Toshihiro; Ueda, Kanayo; Manabe, Shiro; Teramoto, Kei; Mihara, Naoki; Matsumura, Yasushi
2013-01-01
Standard Japanese electronic medical record (EMR) systems are associated with major shortcomings. For example, they do not assure lifelong readability of records because each document requires its own viewing software program, a system that is difficult to maintain over long periods of time. It can also be difficult for users to comprehend a patient's clinical history because different classes of documents can only be accessed from their own window. To address these problems, we developed a document-based electronic medical record that aggregates all documents for a patient in a PDF or DocuWorks format. We call this system the Document Archiving and Communication System (DACS). There are two types of viewers in the DACS: the Matrix View, which provides a time line of a patient's history, and the Tree View, which stores the documents in hierarchical document classes. We placed 2,734 document classes into 11 categories. A total of 22,3972 documents were entered per month. The frequency of use of the DACS viewer was 268,644 instances per month. The DACS viewer was used to assess a patient's clinical history.
Final Report. Institute for Ultralscale Visualization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ma, Kwan-Liu; Galli, Giulia; Gygi, Francois
The SciDAC Institute for Ultrascale Visualization brought together leading experts from visualization, high-performance computing, and science application areas to make advanced visualization solutions for SciDAC scientists and the broader community. Over the five-year project, the Institute introduced many new enabling visualization techniques, which have significantly enhanced scientists’ ability to validate their simulations, interpret their data, and communicate with others about their work and findings. This Institute project involved a large number of junior and student researchers, who received the opportunities to work on some of the most challenging science applications and gain access to the most powerful high-performance computing facilitiesmore » in the world. They were readily trained and prepared for facing the greater challenges presented by extreme-scale computing. The Institute’s outreach efforts, through publications, workshops and tutorials, successfully disseminated the new knowledge and technologies to the SciDAC and the broader scientific communities. The scientific findings and experience of the Institute team helped plan the SciDAC3 program.« less
An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments
ERIC Educational Resources Information Center
Zhang, Yue
2010-01-01
Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…
21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.
Code of Federal Regulations, 2011 CFR
2011-04-01
... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The individual...
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang
2017-07-24
With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang
2017-01-01
With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schnack, Dalton D.
Final technical report for research performed by Dr. Thomas G. Jenkins in collaboration with Professor Dalton D. Schnack on SciDAC Cooperative Agreement: Center for Wave Interactions with Magnetohydrodyanics, DE-FC02-06ER54899, for the period of 8/15/06 - 8/14/11. This report centers on the Slow MHD physics campaign work performed by Dr. Jenkins while at UW-Madison and then at Tech-X Corporation. To make progress on the problem of RF induced currents affect magnetic island evolution in toroidal plasmas, a set of research approaches are outlined. Three approaches can be addressed in parallel. These are: (1) Analytically prescribed additional term in Ohm's law tomore » model the effect of localized ECCD current drive; (2) Introduce an additional evolution equation for the Ohm's law source term. Establish a RF source 'box' where information from the RF code couples to the fluid evolution; and (3) Carry out a more rigorous analytic calculation treating the additional RF terms in a closure problem. These approaches rely on the necessity of reinvigorating the computation modeling efforts of resistive and neoclassical tearing modes with present day versions of the numerical tools. For the RF community, the relevant action item is - RF ray tracing codes need to be modified so that general three-dimensional spatial information can be obtained. Further, interface efforts between the two codes require work as well as an assessment as to the numerical stability properties of the procedures to be used.« less
NASA Astrophysics Data System (ADS)
Petronevich, V. V.
2016-10-01
The paper observes the issues related to the increase of efficiency and information content of experimental research in transonic wind tunnels (WT). In particular, questions of optimizing the WT Data Acquisition and Control Systems (DACS) to provide the continuous mode test method are discussed. The problem of Mach number (M number) stabilization in the test section of the large transonic compressor-type wind tunnels at subsonic flow conditions with continuous change of the aircraft model angle of attack is observed on the example of T-128 wind tunnel. To minimize the signals distortion in T-128 DACS measurement channels the optimal MGCplus filter settings of the data acquisition system used in T-128 wind tunnel to measure loads were experimentally determined. As a result of the tests performed a good agreement of the results of balance measurements for pitch/pause and continuous test modes was obtained. Carrying out balance tests for pitch/pause and continuous test methods was provided by the regular data acquisition and control system of T-128 wind tunnel with unified software package POTOK. The architecture and functional abilities of POTOK software package are observed.
NASA Astrophysics Data System (ADS)
Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin
2017-10-01
Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.
Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly
2014-02-01
Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks
Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly
2014-01-01
Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign
Techniques for Microwave Near-Field Quantum Control of Trapped Ions
2013-01-31
counts. Each DDS (Analog Devices AD9858) can generate signals at frequencies to 400 MHz with a frequency resolution of 0.233 Hz and phase resolution...fast, two- channel DAC is used to generate arbitrary waveforms with a 50-MHz update rate, a voltage range from −10 V to 10 V, and a resolution of 0.305...mV. This DAC is programed via USB and triggered by the data acquisition FPGA . We use three DDS modules as sources for three frequency octupling
ERIC Educational Resources Information Center
Foerster, Carl A.
2013-01-01
The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…
Prevention and Control of Dental Disease through Improved Access to Comprehensive Care.
ERIC Educational Resources Information Center
American Dental Association, Chicago, IL.
Prevention of dental disease is the key to improving the nation's oral health. The American Dental Association (ADA) program of prevention and control of dental disease through improved access to comprehensive care concentrates on those who have special difficulties in receiving care: the poor, the elderly, the handicapped, the institutionalized…
Gonzalez, Eleazar U; Sable, Marjorie R; Campbell, James D; Dannerbeck, Anne
2010-08-01
It is commonly assumed that Hispanic immigrants in the United States subscribe to a patriarchal ideology that keeps women subordinated to men, often through violence and exploitative reproductive behaviors. If this assumption is true, we might expect to find that in the Hispanic culture patriarchal males control decision-making about access to and use of birth control. Structured interviews of 100 Hispanic men and 100 Hispanic women who were recent immigrants to a Midwest community were conducted to examine this assumption. Results did not support this assumption among this study population. We found no patriarchal ideology supporting women's subordination to men, violence as a mechanism of control, reproduction as a way of exploitation, or cultural influences discouraging access to and use of birth control in the Hispanic community. Rather, these immigrants revealed adequate knowledge of birth control use and positive perceptions of gender equality. Gaining a better understanding of the limited influence of patriarchal ideology on the use of birth control and family planning services among this Hispanic community may inform the development of family planning services tailored for new Hispanic immigrants.
NASA Astrophysics Data System (ADS)
Burnett, W.; Bouchard, R.; Hervey, R.; Crout, R.; Luke, R.
2008-12-01
As the Integrated Ocean Observing System (IOOS) Data Assembly Center (DAC), NOAA's National Data Buoy Center (NDBC) collects data from many ocean observing systems, quality controls the data, and distributes them nationally and internationally. The DAC capabilities provide instant interoperability of any ocean observatory with the national and international agencies responsible for critical forecasts and warnings and with the national media. This interoperability is an important milestone in an observing system's designation as an operational system. Data collection begins with NDBC's own observing systems - Meteorological and Oceanographic Buoys and Coastal Stations, the Tropical Atmosphere Ocean Array, and the NOAA tsunameter network. Leveraging the data management functions that support NDBC systems, the DAC can support data partners including ocean observations from IOOS Regional Observing Systems, the meteorological observations from the National Water Level Observing Network, meteorological and oceanographic observations from the National Estuarine Research Reserve System, Integrated Coral Observing Network, merchant ship observations from the Voluntary Observing Ship program, and ocean current measurements from oil and gas platforms in the Gulf of Mexico and from Coastal HF Radars. The DAC monitors and quality controls IOOS Partner data alerting the data provider to outages and quality discrepancies. After performing automated and manual quality control procedures, the DAC prepares the observations for distribution. The primary means of data distribution is in standard World Meteorological Organization alphanumeric coded messages distributed via the Global Telecommunications System, NOAAPort, and Family of Services. Observing systems provide their data via ftp to an NDBC server using a simple XML. The DAC also posts data in real-time to the NDBC webpages in columnar text format and data plots that maritime interests (e.g., surfing, fishing, boating) widely
NASA Technical Reports Server (NTRS)
Wallett, Thomas M.
2009-01-01
This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.
Mirshekar, Maryam; Shahcheraghi, Fereshteh; Azizi, Omid; Solgi, Hamid; Badmasti, Farzad
2018-05-01
Acinetobacter baumannii is an important nosocomial pathogen which causes a wide range of infections. In this study, we addressed the role of class 1 integron, ISAba1 and ISAba125 associated with antimicrobial resistance in 72 clinical isolates of A. baumannii collected from clinical settings in Tehran, Iran. Moreover, to study the clonal relatedness of strains, repetitive extragenic palindromic-PCR (rep-PCR) assay was carried out. PCR revealed that bla OXA-51 -like, bla OXA-23 -like, bla OXA-24/40 -like, bla OXA-58 -like, bla NDM , integrase gene (intI1), ISAba1, and ISAba125 were present in 86.11% (62/72), 84.72% (61/72), 30.55% (22/72), 0% (0/72), 0% (0/72), 58.33% (42/72), 97.22% (70/72), and 65.27% (47/72) of the strains, respectively. Sequencing of 39 internal variable regions of class 1 integrons showed seven gene cassette arrays, including aadA4-catB8-aadA1 (2.77%), aadA1-aadA4 (1.38%), aacC4-aadA1 (2.77%), aacC4 (22.22%), aadA1 (13.88%), aadA4 (5.55%), and catB8 (5.55%). We detected ISAba1 in the upstream of bla OXA-23 -like, bla OXA-51 -like, and bla ADC in 54.16% (39/72), 9.72% (7/72), and 56.94% (41/72) of the strains, respectively. Whereas, there was a low frequency of disruptions in carO and dacD genes: 5.55% (4/72) and 4.16% (3/72). Rep-PCR analysis revealed that the isolates were genetically diverse. However, Cl-12 and Cl-15 were the largest clusters and they were recovered from various hospitals. Our analysis showed the high rates of class 1 integrons as a repertoire of aminoglycoside-modifying enzymes. It seems that linkages of ISAba1-bla OXA-23 -like and ISAba1-bla OXA-69 , and disruptions in carO or dacD can develop resistance to carbapenems among clinical isolates of A. baumannii.
Stroboscope Controller for Imaging Helicopter Rotors
NASA Technical Reports Server (NTRS)
Jensen, Scott; Marmie, John; Mai, Nghia
2004-01-01
A versatile electronic timing-and-control unit, denoted a rotorcraft strobe controller, has been developed for use in controlling stroboscopes, lasers, video cameras, and other instruments for capturing still images of rotating machine parts especially helicopter rotors. This unit is designed to be compatible with a variety of sources of input shaftangle or timing signals and to be capable of generating a variety of output signals suitable for triggering instruments characterized by different input-signal specifications. It is also designed to be flexible and reconfigurable in that it can be modified and updated through changes in its control software, without need to change its hardware. Figure 1 is a block diagram of the rotorcraft strobe controller. The control processor is a high-density complementary metal oxide semiconductor, singlechip 8-bit microcontroller. It is connected to a 32K x 8 nonvolatile static random-access memory (RAM) module. Also connected to the control processor is a 32K 8 electrically programmable read-only-memory (EPROM) module, which is used to store the control software. Digital logic support circuitry is implemented in a field-programmable gate array (FPGA). A 240 x 128-dot, 40- character 16-line liquid-crystal display (LCD) module serves as a graphical user interface; the user provides input through a 16-key keypad mounted next to the LCD. A 12-bit digital-to-analog converter (DAC) generates a 0-to-10-V ramp output signal used as part of a rotor-blade monitoring system, while the control processor generates all the appropriate strobing signals. Optocouplers are used to isolate all input and output digital signals, and optoisolators are used to isolate all analog signals. The unit is designed to fit inside a 19-in. (.48-cm) rack-mount enclosure. Electronic components are mounted on a custom printed-circuit board (see Figure 2). Two power-conversion modules on the printedcircuit board convert AC power to +5 VDC and 15 VDC, respectively.
Ver-i-Fus: an integrated access control and information monitoring and management system
NASA Astrophysics Data System (ADS)
Thomopoulos, Stelios C.; Reisman, James G.; Papelis, Yiannis E.
1997-01-01
This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.
A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.
Gope, Prosanta; Amin, Ruhul
2016-11-01
Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.
Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.
Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei
2016-05-01
This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.
Access control violation prevention by low-cost infrared detection
NASA Astrophysics Data System (ADS)
Rimmer, Andrew N.
2004-09-01
A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this
An effective and secure key-management scheme for hierarchical access control in E-medicine system.
Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit
2013-04-01
Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.
Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey
Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees
2017-01-01
New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952
Proximity Displays for Access Control
ERIC Educational Resources Information Center
Vaniea, Kami
2012-01-01
Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…
30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...
30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...
30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...
30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...
30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator shall...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Toussaint, Doug
2014-03-21
The Arizona component of the SciDAC-3 Lattice Gauge Theory program consisted of partial support for a postdoctoral position. In the original budget this covered three fourths of a postdoc, but the University of Arizona changed its ERE rate for postdoctoral positions from 4.3% to 21%, so the support level was closer to two-thirds of a postdoc. The grant covered the work of postdoc Thomas Primer. Dr. Primer's first task was an urgent one, although it was not forseen in our proposed work. It turned out that on the large lattices used in some of our current computations the gauge fixingmore » code was not working as expected, and this revealed itself in inconsistent results in the correlators needed to compute the semileptonic form factors for K and D decays. Dr. Primer participated in the effort to understand this problem and to modify our codes to deal with the large lattices we are now generating (as large as 144 3 x 288). Corrected code was incorporated in our standard codes, and workarounds that allow us to use the correlators already computed with the unexpected gauge fixing were been implemented.« less
Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio
2011-11-01
We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.
Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints
ERIC Educational Resources Information Center
Pervaiz, Zahid
2013-01-01
Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…
30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...
30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...
30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...
30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...
30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall— (1...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal... Confidential Business Information (APR 1996). As prescribed in 1535.007(b), insert the following provision: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform...
NASA Astrophysics Data System (ADS)
Baron, Marzena A.; Lord, Oliver T.; Walter, Michael J.; Trønnes, Reidar G.
2015-04-01
The large low shear-wave velocity provinces (LLSVPs) and ultra-low velocity zones (ULVZs) of the lowermost mantle [1] are likely characterized by distinct chemical compositions, combined with temperature anomalies. The heterogeneities may have originated by fractional crystallization of the magma ocean during the earliest history of the Earth [2,3] and/or the continued accretion at the CMB of subducted basaltic oceanic crust [4,5]. These structures and their properties control the distribution and magnitude of the heat flow at the CMB and therefore the convective dynamics and evolution of the whole Earth. To determine the properties of these structures and thus interpret the seismic results, a good understanding of the melting phase relations of relevant basaltic and peridotitic compositions are required throughout the mantle pressure range. The melting phase relations of lower mantle materials are only crudely known. Recent experiments on various natural peridotitic and basaltic compositions [6-8] have given wide ranges of solidus and liquidus temperatures at lower mantle pressures. The melting relations for MgO, MgSiO3 and compositions along the MgO-SiO2 join from ab initio theory [e.g. 9,10] is broadly consistent with a thermodynamic model for eutectic melt compositions through the lower mantle based on melting experiments in the MgO-SiO2 system at 16-26 GPa [3]. We have performed a systematic study of the melting phase relations of analogues for peridotitic mantle and subducted basaltic crust in simple binary and ternary systems that capture the major mineralogy of Earth's lower mantle, using the laser-heated diamond anvil cell (LH-DAC) technique at 25-100 GPa. We determined the eutectic melting temperatures involving the following liquidus mineral assemblages: 1. bridgmanite (bm) + periclase (pc) and bm + silica in the system MgO-SiO2 (MS), corresponding to model peridotite and basalt compositions 2. bm + pc + Ca-perovskite (cpv) and bm + silica + cpv in the
An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.
Li, Huaming; Tan, Jindong
2005-01-01
In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.
Bedikian, Agop Y; Garbe, Claus; Conry, Robert; Lebbe, Celeste; Grob, Jean J
2014-06-01
In a previous large randomized, open-label study, retrospective subset analysis revealed that the addition of the Bcl-2 antisense oligonucleotide oblimersen to dacarbazine (Dac) significantly improved overall survival, progression-free survival, and the response rate in chemotherapy-naive patients with advanced melanoma and normal baseline serum lactate dehydrogenase (LDH) levels. To confirm and expand on this observation, we conducted a prospective double-blind, placebo-controlled study to determine whether oblimersen augmented the efficacy of Dac in advanced melanoma patients with low-normal baseline LDH levels. A total of 314 chemotherapy-naive patients were randomly assigned to receive Dac (1000 mg/m(2)) preceded by a 5-day continuous intravenous infusion of either oblimersen sodium (7 mg/kg/day) or placebo every 21 days for less than eight cycles. Co-primary efficacy endpoints were overall survival and progression-free survival. Response and progression of the disease were assessed by independent blinded review of computed tomography scan images. No difference in overall nor progression-free survival was observed between the Dac-oblimersen and Dac-placebo groups. Although the overall (17.2 vs. 12.1%) and durable (10.8 vs. 7.6%) response rates numerically favored Dac-oblimersen over Dac-placebo, they did not differ significantly (P=0.19 and 0.32, respectively). The incidence of hematologic adverse events, particularly thrombocytopenia and neutropenia, was higher in the Dac-oblimersen group than in the Dac-placebo group. Withdrawals from the study because of treatment-related adverse events were low (i.e. <2.5%) in both groups. The addition of oblimersen to Dac did not significantly improve overall survival nor progression-free survival in patients with advanced melanoma and low-normal levels of LDH at baseline.
Evaluation of Standards for Access Control Enabling PHR-S Federation.
Mense, Alexander; Urbauer, Philipp; Sauermann, Stefan
2017-01-01
The adoption of the Internet of Things (IoT) and mobile applications in the healthcare may transform the healthcare industry by offering better disease tracking and management as well as patient empowerment. Unfortunately, almost all of these new systems set up their own ecosystem and to be really valuable for the care process they need to be integrated or federated with user managed access control services based on international standards and profiles to enable interoperability. Thus, this work presents the results of an evaluation of available specifications for federated authorization, based on a set of basic requirements.
Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs
NASA Astrophysics Data System (ADS)
Zhu, Yanfeng; Niu, Zhisheng
Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.
An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems
NASA Astrophysics Data System (ADS)
Vashishtha, Jyoti; Sinha, Aakash
2006-05-01
The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.
Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope
2011-01-01
Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a
Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F L; Utzinger, Jürg; Kristensen, Thomas K; Vounatsou, Penelope
2011-12-01
After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and 'grey literature'), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a global NTD database is feasible and should be expanded
Energy-efficient boarder node medium access control protocol for wireless sensor networks.
Razaque, Abdul; Elleithy, Khaled M
2014-03-12
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi
Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks
Razaque, Abdul; Elleithy, Khaled M.
2014-01-01
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi
Access control design on highway interchanges.
DOT National Transportation Integrated Search
2008-01-01
The adequate spacing and design of access to crossroads in the vicinity of freeway ramps are critical to the safety and traffic operations of both the freeway and the crossroad. The research presented in this report develops a methodology to evaluate...
Hassan, Sehar-un-Nisa; Siddiqui, Salma; Mahmood, Ayeshah
2015-01-01
Background and Objective: Fertility control preferences and maternal healthcare have recently become a major concern for developing nations with evidence suggesting that low fertility control rates and poor maternal healthcare are among major obstructions in ensuring health and social status for women. Our objective was toanalyze the factors that influence women’s autonomy, access to maternal healthcare, and fertility control preferences in Pakistan. Methods: Data consisted of 11,761 ever-married women of ages 15-49 years from PDHS, 2012-13. Variables included socio-demographics, women’s autonomy, fertility control preferences and access to maternal healthcare. Results: Findings from multivariate analysis showed that women’s younger age, having less than three number of children and independent or joint decision-making (indicators of high autonomy) remained the most significant predictors for access to better quality maternal healthcare and better fertility control preferences when other variables were controlled. Conclusion: Women’s access to good quality maternal health care and fertility control preferences are directly and indirectly influenced by their demographic characteristics and decision-making patterns in domestic affairs. PMID:26870096
Sforzo, Gary A; Kaye, Miranda P; Calleri, David; Ngai, Nancy
2012-04-01
Examine effects of voluntary participation in employer-sponsored, multipoint wellness education programming on employee wellness. A randomized and controlled design was used to organize 96 participants into an education + access group; an access-only group, and control group. Outcome measures were made at start and end of a 12-week intervention period. Education + access improved wellness knowledge, which, in turn, enhanced life satisfaction, employee morale, and energy, and nearly improved stress level. Those who received facility access without educational programming did not reap health benefits. Employees voluntarily used the fitness facility and healthy meal cards only 1.3 and 1.5 times per week, respectively. Participants made limited and likely inadequate use of wellness opportunities. As a result, physical health benefits (eg, blood pressure, fitness parameters) were not seen in the present study. However, multipoint wellness education resulted in psychosocial health benefits in 12 weeks.
Protecting Files Hosted on Virtual Machines With Out-of-Guest Access Control
2017-12-01
analyzes the design and methodology of the implemented mechanism, while Chapter 4 explains the test methodology, test cases, and performance testing ...SACL, we verify that the user or group accessing the file has sufficient permissions. If that is correct, the callback function returns control to...ferify. In the first section, we validate our design of ferify. Next, we explain the tests we performed to verify that ferify has the results we expected
A Flexible Component based Access Control Architecture for OPeNDAP Services
NASA Astrophysics Data System (ADS)
Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank
2010-05-01
Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC
NASA Astrophysics Data System (ADS)
Danilova, Olga; Semenova, Zinaida
2018-04-01
The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.
NASA Astrophysics Data System (ADS)
Impemba, Ernesto; Inzerilli, Tiziano
2003-07-01
Integration of satellite access networks with the Internet is seen as a strategic goal to achieve in order to provide ubiquitous broadband access to Internet services in Next Generation Networks (NGNs). One of the main interworking aspects which has been most studied is an efficient management of satellite resources, i.e. bandwidth and buffer space, in order to satisfy most demanding application requirements as to delay control and bandwidth assurance. In this context, resource management in DVB-S/DVB-RCS satellite technologies, emerging technologies for broadband satellite access and transport of IP applications, is a research issue largely investigated as a means to provide efficient bi-directional communications across satellites. This is in particular one of the principal goals of the SATIP6 project, sponsored within the 5th EU Research Programme Framework, i.e. IST. In this paper we present a possible approach to efficiently exploit bandwidth, the most critical resource in a broadband satellite access network, while pursuing satisfaction of delay and bandwidth requirements for applications with guaranteed QoS through a traffic control architecture to be implemented in ground terminals. Performance of this approach is assessed in terms of efficient exploitation of the uplink bandwidth and differentiation and minimization of queuing delays for most demanding applications over a time-varying capacity. Opnet simulations is used as analysis tool.
High density, multi-range analog output Versa Module Europa board for control system applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singh, Kundan, E-mail: kundan@iuac.res.in; Das, Ajit Lal
2014-01-15
A new VMEDAC64, 12-bit 64 channel digital-to-analog converter, a Versa Module Europa (VME) module, features 64 analog voltage outputs with user selectable multiple ranges, has been developed for control system applications at Inter University Accelerator Centre. The FPGA (Field Programmable Gate Array) is the module's core, i.e., it implements the DAC control logic and complexity of VMEbus slave interface logic. The VMEbus slave interface and DAC control logic are completely designed and implemented on a single FPGA chip to achieve high density of 64 channels in a single width VME module and will reduce the module count in the controlmore » system applications, and hence will reduce the power consumption and cost of overall system. One of our early design goals was to develop the VME interface such that it can be easily integrated with the peripheral devices and satisfy the timing specifications of VME standard. The modular design of this module reduces the amount of time required to develop other custom modules for control system. The VME slave interface is written as a single component inside FPGA which will be used as a basic building block for any VMEbus interface project. The module offers multiple output voltage ranges depending upon the requirement. The output voltage range can be reduced or expanded by writing range selection bits in the control register. The module has programmable refresh rate and by default hold capacitors in the sample and hold circuit for each channel are charged periodically every 7.040 ms (i.e., update frequency 284 Hz). Each channel has software controlled output switch which disconnects analog output from the field. The modularity in the firmware design on FPGA makes the debugging very easy. On-board DC/DC converters are incorporated for isolated power supply for the analog section of the board.« less
Vierhout, Bastiaan P; Saleem, Ben R; Ott, Alewijn; van Dijl, Jan Maarten; de Kempenaer, Ties D van Andringa; Pierie, Maurice E N; Bottema, Jan T; Zeebregts, Clark J
2015-09-14
Access for endovascular repair of abdominal aortic aneurysms (EVAR) is obtained through surgical cutdown or percutaneously. The only devices suitable for percutaneous closure of the 20 French arteriotomies of the common femoral artery (CFA) are the Prostar(™) and Proglide(™) devices (Abbott Vascular). Positive effects of these devices seem to consist of a lower infection rate, and shorter operation time and hospital stay. This conclusion was published in previous reports comparing techniques in patients in two different groups (cohort or randomized). Access techniques were never compared in one and the same patient; this research simplifies comparison because patient characteristics will be similar in both groups. Percutaneous access of the CFA is compared to surgical cutdown in a single patient; in EVAR surgery, access is necessary in both groins in each patient. Randomization is performed on the introduction site of the larger main device of the endoprosthesis. The contralateral device of the endoprosthesis is smaller. When we use this type of randomization, both groups will contain a similar number of main and contralateral devices. Preoperative nose cultures and perineal cultures are obtained, to compare colonization with postoperative wound cultures (in case of a surgical site infection). Furthermore, patient comfort will be considered, using VAS-scores (Visual analog scale). Punch biopsies of the groin will be harvested to retrospectively compare skin of patients who suffered a surgical site infection (SSI) to patients who did not have an SSI. The PiERO trial is a multicenter randomized controlled clinical trial designed to show the consequences of using percutaneous access in EVAR surgery and focuses on the occurrence of surgical site infections. NTR4257 10 November 2013, NL44578.042.13.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-20
... initiated a rulemaking proceeding in accordance with provisions added by the Digital Millennium Copyright... available in digital copies. Proponent: The Open Book Alliance. 2. Literary works, distributed electronically, that: (1) Contain digital rights management and/or other access controls which either prevent the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-06
... LIBRARY OF CONGRESS Copyright Office 37 CFR Part 201 [Docket No. RM 2008-8] Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final Rule; correction. SUMMARY: The Copyright Office makes a...
Minocha, Mukul; Tran, Jonathan Q; Sheridan, James P; Othman, Ahmed A
2016-01-01
Daclizumab high-yield process (DAC HYP) is a humanized monoclonal antibody that selectively blocks the α-subunit (CD25) of the high-affinity interleukin-2 receptors, and has shown robust efficacy as a treatment for multiple sclerosis (MS). This work quantitatively characterized the relationship between DAC HYP serum concentrations and saturation of CD25 expressed on antigen-rich target T cells in blood. Serial pharmacokinetic and 968 CD25 measurements from three double-blind, randomized, placebo-controlled, phase I studies of DAC HYP (50-300 mg subcutaneous and 200-400 mg intravenous doses or placebo) in healthy volunteers (n = 95) were analyzed using nonlinear mixed-effects modeling. CD25 occupancy was determined using flow cytometry and a fluorescently-labeled DAC HYP-competing antibody. CD25 occupancy was described using a direct inhibitory sigmoidal maximum effect (E max) model (where DAC HYP fully inhibited CD25 labeling with competing antibody). Two IC50 (serum concentration corresponding to 50 % of maximal inhibition) parameters were used to describe rapid CD25 saturation at initiation of dosing and apparently slower desaturation during DAC HYP washout. Parameter estimates (95 % bootstrap confidence intervals) were: baseline CD25 labeling, 47 % (45-48); DAC HYP IC50(saturation), 0.023 µg/mL (0.005-0.073); IC50(desaturation) 0.86 µg/mL (0.74-0.98); Hill coefficient 5.6 (4.3-6.8). Based on the developed model, the 150 mg monthly subcutaneous regimen of DAC HYP in subjects with MS is predicted to saturate CD25 on target effector T cells within a few hours of dosing and maintain CD25 saturation during the entire dosing interval. Free CD25 levels return to baseline within 4-6 months of the last DAC HYP dose.
Access management for Kentucky.
DOT National Transportation Integrated Search
2004-02-01
The Access Management Manual published by the Transportation Research Board in 2003 defines access management as the "systematic control of the location, spacing, design, and operation of driveways, median openings, interchanges, and street connectio...
On the designing of a tamper resistant prescription RFID access control system.
Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid
2012-12-01
Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.
A small molecule screen identifies a novel compound that induces a homeotic transformation in Hydra
Glauber, Kristine M.; Dana, Catherine E.; Park, Steve S.; Colby, David A.; Noro, Yukihiko; Fujisawa, Toshitaka; Chamberlin, A. Richard; Steele, Robert E.
2013-01-01
Developmental processes such as morphogenesis, patterning and differentiation are continuously active in the adult Hydra polyp. We carried out a small molecule screen to identify compounds that affect patterning in Hydra. We identified a novel molecule, DAC-2-25, that causes a homeotic transformation of body column into tentacle zone. This transformation occurs in a progressive and polar fashion, beginning at the oral end of the animal. We have identified several strains that respond to DAC-2-25 and one that does not, and we used chimeras from these strains to identify the ectoderm as the target tissue for DAC-2-25. Using transgenic Hydra that express green fluorescent protein under the control of relevant promoters, we examined how DAC-2-25 affects tentacle patterning. Genes whose expression is associated with the tentacle zone are ectopically expressed upon exposure to DAC-2-25, whereas those associated with body column tissue are turned off as the tentacle zone expands. The expression patterns of the organizer-associated gene HyWnt3 and the hypostome-specific gene HyBra2 are unchanged. Structure-activity relationship studies have identified features of DAC-2-25 that are required for activity and potency. This study shows that small molecule screens in Hydra can be used to dissect patterning processes. PMID:24255098
A small molecule screen identifies a novel compound that induces a homeotic transformation in Hydra.
Glauber, Kristine M; Dana, Catherine E; Park, Steve S; Colby, David A; Noro, Yukihiko; Fujisawa, Toshitaka; Chamberlin, A Richard; Steele, Robert E
2013-12-01
Developmental processes such as morphogenesis, patterning and differentiation are continuously active in the adult Hydra polyp. We carried out a small molecule screen to identify compounds that affect patterning in Hydra. We identified a novel molecule, DAC-2-25, that causes a homeotic transformation of body column into tentacle zone. This transformation occurs in a progressive and polar fashion, beginning at the oral end of the animal. We have identified several strains that respond to DAC-2-25 and one that does not, and we used chimeras from these strains to identify the ectoderm as the target tissue for DAC-2-25. Using transgenic Hydra that express green fluorescent protein under the control of relevant promoters, we examined how DAC-2-25 affects tentacle patterning. Genes whose expression is associated with the tentacle zone are ectopically expressed upon exposure to DAC-2-25, whereas those associated with body column tissue are turned off as the tentacle zone expands. The expression patterns of the organizer-associated gene HyWnt3 and the hypostome-specific gene HyBra2 are unchanged. Structure-activity relationship studies have identified features of DAC-2-25 that are required for activity and potency. This study shows that small molecule screens in Hydra can be used to dissect patterning processes.
DOT National Transportation Integrated Search
1972-12-01
The purpose of the diagrammatic signing research project was to develop warrants and standards for the use of diagrammatic guide signs on controlled access highways. Volume 1 summarizes the entire diagrammatic signing research program objectives spon...
Development of nanostructured lipid carrier for dacarbazine delivery
NASA Astrophysics Data System (ADS)
Almousallam, Musallam; Moia, Claudia; Zhu, Huijun
2015-09-01
Dacarbazine (Dac) is one of the most commonly used chemotherapy drugs for treating various cancers. However, its poor water solubility, short half-life in blood circulation, low response rate and high side effect limit its application. This study aimed to improve the drug solubility and prolong drug release by developing nanostructured lipid carriers (NLCs) for Dac delivery. The NLC and Dac-encapsulated NLC were synthesized with precirol ATO 5 and isopropyl myristate as lipids, tocopheryl polyethylene glycol succinate, soybean lecithin and Kolliphor P 188 as co-surfactants. The NLCs with controlled size were achieved using high shear dispersion following solidification of oil-in-water emulsion. For Dac encapsulation, the smallest NLC with 155 ± 10 nm in size, 0.2 ± 0.01 polydispersion index and -43.4 ± 2 mV zeta potential was selected. The resultant DLC-Dac possessed size, polydispersion index and zeta potential of 190 ± 10, 0.2 ± 0.01, and -43.5 ± 1.2, respectively. The drug encapsulation efficiency and drug loading were 98.5 % and 14 %, respectively. In vitro drug release study showed a biphasic pattern, with 50 % released in the first 2 h, and the remaining released sustainably for up to 30 h. This is the first report on the development of NLC for Dac delivery, implying that NLC could be a new potential candidate as drug carrier to improve the therapeutic profile of Dac.
Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?
ERIC Educational Resources Information Center
De Jesus, Maria; Xiao, Chenyang
2014-01-01
There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…
Analyzing How We Do Analysis and Consume Data, Results from the SciDAC-Data Project
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ding, P.; Aliaga, L.; Mubarak, M.
One of the main goals of the Dept. of Energy funded SciDAC-Data project is to analyze the more than 410,000 high energy physics datasets that have been collected, generated and defined over the past two decades by experiments using the Fermilab storage facilities. These datasets have been used as the input to over 5.6 million recorded analysis projects, for which detailed analytics have been gathered. The analytics and meta information for these datasets and analysis projects are being combined with knowledge of their part of the HEP analysis chains for major experiments to understand how modern computing and data deliverymore » is being used. We present the first results of this project, which examine in detail how the CDF, D0, NOvA, MINERvA and MicroBooNE experiments have organized, classified and consumed petascale datasets to produce their physics results. The results include analysis of the correlations in dataset/file overlap, data usage patterns, data popularity, dataset dependency and temporary dataset consumption. The results provide critical insight into how workflows and data delivery schemes can be combined with different caching strategies to more efficiently perform the work required to mine these large HEP data volumes and to understand the physics analysis requirements for the next generation of HEP computing facilities. In particular we present a detailed analysis of the NOvA data organization and consumption model corresponding to their first and second oscillation results (2014-2016) and the first look at the analysis of the Tevatron Run II experiments. We present statistical distributions for the characterization of these data and data driven models describing their consumption« less
Analyzing how we do Analysis and Consume Data, Results from the SciDAC-Data Project
NASA Astrophysics Data System (ADS)
Ding, P.; Aliaga, L.; Mubarak, M.; Tsaris, A.; Norman, A.; Lyon, A.; Ross, R.
2017-10-01
One of the main goals of the Dept. of Energy funded SciDAC-Data project is to analyze the more than 410,000 high energy physics datasets that have been collected, generated and defined over the past two decades by experiments using the Fermilab storage facilities. These datasets have been used as the input to over 5.6 million recorded analysis projects, for which detailed analytics have been gathered. The analytics and meta information for these datasets and analysis projects are being combined with knowledge of their part of the HEP analysis chains for major experiments to understand how modern computing and data delivery is being used. We present the first results of this project, which examine in detail how the CDF, D0, NOvA, MINERvA and MicroBooNE experiments have organized, classified and consumed petascale datasets to produce their physics results. The results include analysis of the correlations in dataset/file overlap, data usage patterns, data popularity, dataset dependency and temporary dataset consumption. The results provide critical insight into how workflows and data delivery schemes can be combined with different caching strategies to more efficiently perform the work required to mine these large HEP data volumes and to understand the physics analysis requirements for the next generation of HEP computing facilities. In particular we present a detailed analysis of the NOvA data organization and consumption model corresponding to their first and second oscillation results (2014-2016) and the first look at the analysis of the Tevatron Run II experiments. We present statistical distributions for the characterization of these data and data driven models describing their consumption.
17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.
Code of Federal Regulations, 2011 CFR
2011-04-01
... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...
17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.
Code of Federal Regulations, 2012 CFR
2012-04-01
... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...
33 CFR 105.255 - Security measures for access control.
Code of Federal Regulations, 2010 CFR
2010-07-01
... and facilities; (4) Granting access to only those responding to the security incident or threat... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.255 Security...
Computer access security code system
NASA Technical Reports Server (NTRS)
Collins, Earl R., Jr. (Inventor)
1990-01-01
A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.
17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... system provided by a broker-dealer operator of an alternative trading system to a non-broker-dealer. (2...
17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the... system provided by a broker-dealer operator of an alternative trading system to a non-broker-dealer. (2...
Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy
2017-09-26
A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.
Infection control in hemodialysis units: a quick access to essential elements.
Karkar, Ayman; Bouhaha, Betty Mandin; Dammang, Mienalyn Lim
2014-05-01
Infection is the most common cause of hospitalization and the second most common cause of mortality among hemodialysis (HD) patients, after cardiovascular disease. HD patients as well as the dialysis staff are vulnerable to contracting health-care-associated infections (HAIs) due to frequent and prolonged exposure to many possible contaminants in the dialysis environment. The extracorporeal nature of the therapy, the associated common environmental conditions and the immune compromised status of HD patients are major predisposing factors. The evident increased potential for transmission of infections in the HD settings led to the creation and implementation of specific and stricter infection prevention and control measures in addition to the usual standard precautions. Different international organizations have generated guidelines and recommendations on infection prevention and control for implementation in the HD settings. These include the Centers for Disease Control and Prevention (CDC), the Association of Professionals in Infection Control (APIC), the Kidney Disease Outcomes Quality Initiative (K/DOQI), the European Best Practice Guidelines/European Renal Best Practice (EBPG/ERBP) and the Kidney Disease: Improving Global Outcomes (KDIGO). However, these guidelines are extensive and sometimes vary among different guideline-producing bodies. Our aim in this review is to facilitate the access, increase the awareness and encourage implementation among dialysis providers by reviewing, extracting and comparing the essential elements of guidelines and recommendations on infection prevention and control in HD units.
McManus, Donald P.; Raso, Giovanna; Utzinger, Jürg; Xiao, Shui-Yuan; Yu, Dong-Bao; Zhao, Zheng-Yuan; Li, Yue-Sheng
2013-01-01
Background Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China), considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis. Methodology Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care. Principal Findings We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed. Conclusions/Significance There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached. PMID:23936580
First Experiences Using XACML for Access Control in Distributed Systems
NASA Technical Reports Server (NTRS)
Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit
2003-01-01
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.
Biomedical Big Data: New Models of Control Over Access, Use and Governance.
Vayena, Effy; Blasimme, Alessandro
2017-12-01
Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated in informed consent documents or be implicit in the norms of confidentiality that govern the relationships of patients and healthcare professionals. However, with medicine becoming a data-intense enterprise, informed consent and medical confidentiality, as mechanisms of control, are put under pressure. In this paper we explore emerging models of informational control in data-intense healthcare and clinical research, which can compensate for the limitations of currently available instruments. More specifically, we discuss three approaches that hold promise in increasing individual control: the emergence of data portability rights as means to control data access, new mechanisms of informed consent as tools to control data use, and finally, new participatory governance schemes that allow individuals to control their data through direct involvement in data governance. We conclude by suggesting that, despite the impression that biomedical big data diminish individual control, the synergistic effect of new data management models can in fact improve it.
Semantically Enriched Data Access Policies in eHealth.
Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin
2016-11-01
Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.
Thermostatic system of sensor in NIR spectrometer based on PID control
NASA Astrophysics Data System (ADS)
Wang, Zhihong; Qiao, Liwei; Ji, Xufei
2016-11-01
Aiming at the shortcomings of the primary sensor thermostatic control system in the near infrared (NIR) spectrometer, a novel thermostatic control system based on proportional-integral-derivative (PID) control technology was developed to improve the detection precision of the NIR spectrometer. There were five parts including bridge amplifier circuit, analog-digital conversion (ADC) circuit, microcontroller, digital-analog conversion (DAC) circuit and drive circuit in the system. The five parts formed a closed-loop control system based on PID algorithm that was used to control the error between the temperature calculated by the sampling data of ADC and the designed temperature to ensure the stability of the spectrometer's sensor. The experimental results show that, when the operating temperature of sensor is -11°, compared with the original system, the temperature control precision of the new control system is improved from ±0.64° to ±0.04° and the spectrum signal to noise ratio (SNR) is improved from 4891 to 5967.
Lu, Christine Y; Ritchie, Jan; Williams, Ken; Day, Ric
2007-01-01
Background In Australia, government-subsidised access to high-cost medicines is "targeted" to particular sub-sets of patients under the Pharmaceutical Benefits Scheme to achieve cost-effective use. In order to determine how this access system could be improved, the opinions of key stakeholders on access to biological agents for rheumatoid arthritis were explored. Methods Thirty-six semi-structured interviews were conducted with persons from relevant stakeholder groups. These were transcribed verbatim, and analysed thematically. Results Controlled access to expensive medicines was considered to be equitable and practical; however, there was disagreement as to the method of defining the target patient populations. Other concerns included timeliness of access, excessive bureaucracy, and the need for additional resources to facilitate the scheme. Collaboration between stakeholders was deemed important because it allows more equitable distribution of limited resources. The majority considered that stakeholder consultation should have been broader. Most wanted increased transparency of the decision-making process, ongoing and timely review of access criteria, and an increased provision of information for patients. More structured communication between stakeholders was proposed. Conclusion The Pharmaceutical Benefit Scheme is adapting to meet the changing needs of patients. Provision of subsidised access to high-cost medicines in a manner that is affordable for individuals and society, and that is equitable and efficiently managed is challenging. The views of stakeholders on targeted access to anti-rheumatic biological medicines in Australia acknowledged this challenge and provided a number of suggestions for modifications. These could serve as a basis to inform the debate on how to change the processes and policies so as to improve the scheme. PMID:18096055
NASA Astrophysics Data System (ADS)
Meier, Thomas; Khandarkhaeva, Saiana; Petitgirard, Sylvain; Körber, Thomas; Lauerer, Alexander; Rössler, Ernst; Dubrovinsky, Leonid
2018-07-01
The past 15 years have seen an astonishing increase in Nuclear Magnetic Resonance (NMR) sensitivity and accessible pressure range in high-pressure NMR experiments, owing to a series of new developments of NMR spectroscopy applied to the diamond anvil cell (DAC). Recently, with the application of electro-magnetic lenses, so-called Lenz lenses, in toroidal diamond indenter cells, pressures of up to 72 GPa with NMR spin sensitivities of about 1012 spin/Hz1/2 has been achieved. Here, we describe the implementation of a refined NMR resonator structure using a pair of double stage Lenz lenses driven by a Helmholtz coil within a standard DAC, allowing to measure sample volumes as small as 100 pl prior to compression. With this set-up, pressures close to 100 GPa could be realised repeatedly, with enhanced spin sensitivities of about 5 × 1011 spin/Hz1/2. The manufacturing and handling of these new NMR-DACs is relatively easy and straightforward, which will allow for further applications in physics, chemistry, or biochemistry.
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.
2012-01-01
As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are
Verzi, Michael P.; Shin, Hyunjin; San Roman, Adrianna K.
2013-01-01
Tissue-specific gene expression requires modulation of nucleosomes, allowing transcription factors to occupy cis elements that are accessible only in selected tissues. Master transcription factors control cell-specific genes and define cellular identities, but it is unclear if they possess special abilities to regulate cell-specific chromatin and if such abilities might underlie lineage determination and maintenance. One prevailing view is that several transcription factors enable chromatin access in combination. The homeodomain protein CDX2 specifies the embryonic intestinal epithelium, through unknown mechanisms, and partners with transcription factors such as HNF4A in the adult intestine. We examined enhancer chromatin and gene expression following Cdx2 or Hnf4a excision in mouse intestines. HNF4A loss did not affect CDX2 binding or chromatin, whereas CDX2 depletion modified chromatin significantly at CDX2-bound enhancers, disrupted HNF4A occupancy, and abrogated expression of neighboring genes. Thus, CDX2 maintains transcription-permissive chromatin, illustrating a powerful and dominant effect on enhancer configuration in an adult tissue. Similar, hierarchical control of cell-specific chromatin states is probably a general property of master transcription factors. PMID:23129810
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-21
...., 1150 18th Street NW., Suite 910, Washington, DC 20036. FOR FURTHER INFORMATION CONTACT: The RTCA... (202) 833-9434, or Web site at http://www.rtca.org . SUPPLEMENTARY INFORMATION: Pursuant to section 10... Security System Standard for Airport Access Control, RTCA Paper No. 168-13/SC224-048 TOR Review--Status of...
2016-04-01
DEPARTMENT OF THE ARMY SUBJECT: DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military...public tenants who leased DoD privatized housing before granting those tenants unescorted access to military installations. In addition, DoD officials...Military Housing Privatization Initiative (MHPI). Specifically, our objective was to determine whether DoD was effectively screening civilian tenants
Powell, G A; Bonnett, L J; Tudur-Smith, C; Hughes, D A; Williamson, P R; Marson, A G
2017-08-23
In the UK, routinely recorded data may benefit prospective studies including randomised controlled trials (RCTs). In an on-going study, we aim to assess the feasibility of access and agreement of routinely recorded clinical and non-clinical data compared to data collected during a RCT using standard prospective methods. This paper will summarise available UK routinely recorded data sources and discuss our experience with the feasibility of accessing routinely recorded data for participants of a RCT before finally proposing recommendations for improving the access and implementation of routinely recorded data in RCTs. Setting: the case study RCT is the Standard and New Antiepileptic Drugs II (SANAD II) trial, a pragmatic, UK, multicentre, phase IV RCT assessing the clinical and cost-effectiveness of antiepileptic drug treatments for newly diagnosed epilepsy. 98 participants have provided written consent to permit the request of routinely recorded data. Study procedures: routinely recorded clinical and non-clinical data were identified and data requested through formal applications from available data holders for the duration that participants have been recruited into SANAD II. The feasibility of accessing routinely recorded data during a RCT is assessed and recommendations for improving access proposed. Secondary-care clinical and socioeconomic data is recorded on a national basis and can be accessed, although there are limitations in the application process. Primary-care data are recorded by a number of organisations on a de-identified basis but access for specific individuals has not been feasible. Access to data recorded by non-clinical sources, including The Department for Work and Pensions and The Driving and Vehicle Licensing Agency, was not successful. Recommendations discussed include further research to assess the attributes of routinely recorded data, an assessment of public perceptions and the development of strategies to collaboratively improve access to
CD56bright natural killer cells and response to daclizumab HYP in relapsing-remitting MS
Sheridan, J.; Amaravadi, L.; Riester, K.; Selmaj, K.; Bielekova, B.; Parr, E.; Giovannoni, G.
2015-01-01
Objective: To assess the relationship between CD56bright natural killer (NK) cells and multiple sclerosis (MS) disease activity in patients with relapsing-remitting MS treated with daclizumab high-yield process (DAC HYP). Methods: Data were from patients enrolled in a 52-week randomized, double-blind, placebo-controlled study of DAC HYP and its extension study. Assessments included relationships of CD56bright NK cell numbers (identified using fluorescence-activated cell sorting) at weeks 4 and 8 with the numbers of new or newly enlarging T2-hyperintense lesions between weeks 24 and 52 and the annualized relapse rate. Results: In DAC HYP–treated patients but not placebo-treated patients, the numbers of CD56bright NK cells increased over 52 weeks of treatment, and their numbers at weeks 4 and 8 predicted the number of new or newly enlarging T2-hyperintense lesions between weeks 24 and 52 of treatment (p ≤ 0.005 for each comparison). Similar but nonsignificant trends were observed between CD56bright NK cell counts and the annualized relapse rate in DAC HYP–treated patients. DAC HYP–treated patients who showed lower levels of expansion of CD56bright NK cells still developed fewer new or newly enlarging T2-hyperintense lesions than placebo-treated patients during the first year of treatment. Conclusions: CD56bright NK cells appear to mediate some of the treatment-related effects of DAC HYP, but their numbers do not account for the full effect of DAC HYP on MS-related outcomes. PMID:25635261
Modeling and optimal design of CO2 Direct Air Capture systems in large arrays
NASA Astrophysics Data System (ADS)
Sadri Irani, Samaneh; Luzzatto-Fegiz, Paolo
2017-11-01
As noted by the 2014 IPCC report, while the rise in atmospheric CO2 would be slowed by emissions reductions, removing atmospheric CO2 is an important part of possible paths to climate stabilization. Direct Air Capture of CO2 with chemicals (DAC) is one of several proposed carbon capture technologies. There is an ongoing debate on whether DAC is an economically viable approach to alleviate climate change. In addition, like all air capture strategies, DAC is strongly constrained by the net-carbon problem, namely the need to control CO2 emissions associated with the capture process (for example, if DAC not powered by renewables). Research to date has focused on the chemistry and economics of individual DAC devices. However, the fluid mechanics of their large-scale deployment has not been examined in the literature, to the best of our knowledge. In this presentation, we develop a model for flow through an array of DAC devices, varying their lateral extent and their separation. We build on a recent theory of canopy flows, introducing terms for CO2 entrainment into the array boundary layer, and transport into the farm. In addition, we examine the possibility of driving flow passively by wind, thereby reducing energy consumption. The optimal operational design is established considering the total cost, drag force, energy consumption and total CO2 capture.
Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.
ERIC Educational Resources Information Center
Bergart, Jeffrey G.; And Others
This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…
Nijp, Hylco H; Beckers, Debby G J; Kompier, Michiel A J; van den Bossche, Seth N J; Geurts, Sabine A E
2015-07-01
Worktime control (WTC) has been suggested as a tool to reduce employees' work-home interference and fatigue and improve job motivation. The purpose of this study was twofold: (i) to examine the prevalence of employees' need for, access to, and use of WTC, as well as the incongruence between need for and access to WTC (ie, mismatch); and (ii) to examine the associations of this mismatch and the use of WTC with employees' work-home interference (WHI), fatigue and job motivation. Questionnaire data were collected among a large (N=2420) quasi-representative sample of Dutch employees. The prevalence of WTC need, access, use, and mismatch was assessed by means of descriptive statistics. Associations with employees' outcomes were assessed by analyses of covariance. The need for WTC was highly prevalent. For many employees, we observed a negative mismatch between access to and need for WTC (ie, access
Multi-static networked 3D ladar for surveillance and access control
NASA Astrophysics Data System (ADS)
Wang, Y.; Ogirala, S. S. R.; Hu, B.; Le, Han Q.
2007-04-01
A theoretical design and simulation of a 3D ladar system concept for surveillance, intrusion detection, and access control is described. It is a non-conventional system architecture that consists of: i) multi-static configuration with an arbitrarily scalable number of transmitters (Tx's) and receivers (Rx's) that form an optical wireless code-division-multiple-access (CDMA) network, and ii) flexible system architecture with modular plug-and-play components that can be deployed for any facility with arbitrary topology. Affordability is a driving consideration; and a key feature for low cost is an asymmetric use of many inexpensive Rx's in conjunction with fewer Tx's, which are generally more expensive. The Rx's are spatially distributed close to the surveyed area for large coverage, and capable of receiving signals from multiple Tx's with moderate laser power. The system produces sensing information that scales as NxM, where N, M are the number of Tx's and Rx's, as opposed to linear scaling ~N in non-network system. Also, for target positioning, besides laser pointing direction and time-of-flight, the algorithm includes multiple point-of-view image fusion and triangulation for enhanced accuracy, which is not applicable to non-networked monostatic ladars. Simulation and scaled model experiments on some aspects of this concept are discussed.
Wood, Eric; Duran, Adam; Kelly, Kenneth
2016-09-27
In collaboration with the U.S. Environmental Protection Agency and the U.S. Department of Energy, the National Renewable Energy Laboratory has conducted a national analysis of road grade characteristics experienced by U.S. medium- and heavy-duty trucks on controlled access highways. These characteristics have been developed using TomTom's commercially available street map and road grade database. Using the TomTom national road grade database, national statistics on road grade and hill distances were generated for the U.S. network of controlled access highways. These statistical distributions were then weighted using data provided by the U.S. Environmental Protection Agency for activity of medium- and heavy-dutymore » trucks on controlled access highways. Here, the national activity-weighted road grade and hill distance distributions were then used as targets for development of a handful of sample grade profiles potentially to be used in the U.S. Environmental Protection Agency's Greenhouse Gas Emissions Model certification tool as well as in dynamometer testing of medium- and heavy-duty vehicles and their powertrains.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wood, Eric; Duran, Adam; Kelly, Kenneth
In collaboration with the U.S. Environmental Protection Agency and the U.S. Department of Energy, the National Renewable Energy Laboratory has conducted a national analysis of road grade characteristics experienced by U.S. medium- and heavy-duty trucks on controlled access highways. These characteristics have been developed using TomTom's commercially available street map and road grade database. Using the TomTom national road grade database, national statistics on road grade and hill distances were generated for the U.S. network of controlled access highways. These statistical distributions were then weighted using data provided by the U.S. Environmental Protection Agency for activity of medium- and heavy-dutymore » trucks on controlled access highways. Here, the national activity-weighted road grade and hill distance distributions were then used as targets for development of a handful of sample grade profiles potentially to be used in the U.S. Environmental Protection Agency's Greenhouse Gas Emissions Model certification tool as well as in dynamometer testing of medium- and heavy-duty vehicles and their powertrains.« less
Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access
NASA Technical Reports Server (NTRS)
Stephan, Ryan A.
2011-01-01
NASA's Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.
DOT National Transportation Integrated Search
2014-04-01
This report describes the methodology and results of analyses performed to identify and evaluate : alternative methods to control traffic entering a lane closure on a two-lane, two-way road from low-volume : access points. Researchers documented the ...
Tao, Wenhui; Zhao, Dongyang; Sun, Mengchi; Wang, Ziyu; Lin, Bin; Bao, Yu; Li, Yingying; He, Zhonggui; Sun, Yinghua; Sun, Jin
2018-04-25
Decitabine (DAC), a potent DNA methyltransferase (DNMT) inhibitor, has a limited oral bioavailability. Its 5'-amino acid ester prodrugs could improve its oral delivery but the specific absorption mechanism is not yet fully understood. The aim of this present study was to investigate the in vivo absorption and activation mechanism of these prodrugs using in situ intestinal perfusion and pharmacokinetics studies in rats. Although PEPT1 transporter is pH dependent, there appeared to be no proton cotransport in the perfusion experiment with a preferable transport at pH 7.4 rather than pH 6.5. This suggested that the transport was mostly dependent on the dissociated state of the prodrugs and the proton gradient might play only a limited role. In pH 7.4 HEPES buffer, an increase in P eff was observed for L-val-DAC, D-val-DAC, L-phe-DAC and L-trp-DAC (2.89-fold, 1.2-fold, 2.73-fold, and 1.90-fold, respectively), compared with the parent drug. When co-perfusing the prodrug with Glysar, a known substrate of PEPT1, the permeabilities of the prodrugs were significantly inhibited compared with the control. To further investigate the absorption of the prodrugs, L-val-DAC was selected and found to be concentration-dependent and saturable, suggesting a carrier-mediated process (intrinsic K m : 7.80 ± 2.61 mM) along with passive transport. Determination of drug in intestinal homogenate after perfusion further confirmed that the metabolic activation mainly involved an intestinal first-pass effect. In a pharmacokinetic evaluation, the oral bioavailability of L-val-DAC, L-phe-DAC and L-trp-DAC were nearly 1.74-fold, 1.69-fold and 1.49-fold greater than that of DAC. The differences in membrane permeability and oral bioavailability might be due to the different stability in the intestinal lumen and the distinct PEPT1 affinity which is mainly caused by the stereochemistry, hydrophobicity and steric hindrance of the side chains. In summary, the detailed investigation of the
Tierney, William M; Alpert, Sheri A; Byrket, Amy; Caine, Kelly; Leventhal, Jeremy C; Meslin, Eric M; Schwartz, Peter H
2015-01-01
Applying Fair Information Practice principles to electronic health records (EHRs) requires allowing patient control over who views their data. We designed a program that captures patients' preferences for provider access to an urban health system's EHR. Patients could allow or restrict providers' access to all data (diagnoses, medications, test results, reports, etc.) or only highly sensitive data (sexually transmitted infections, HIV/AIDS, drugs/alcohol, mental or reproductive health). Except for information in free-text reports, we redacted EHR data shown to providers according to patients' preferences. Providers could "break the glass" to display redacted information. We prospectively studied this system in one primary care clinic, noting redactions and when users "broke the glass," and surveyed providers about their experiences and opinions. Eight of nine eligible clinic physicians and all 23 clinic staff participated. All 105 patients who enrolled completed the preference program. Providers did not know which of their patients were enrolled, nor their preferences for accessing their EHRs. During the 6-month prospective study, 92 study patients (88 %) returned 261 times, during which providers viewed their EHRs 126 times (48 %). Providers "broke the glass" 102 times, 92 times for patients not in the study and ten times for six returning study patients, all of whom had restricted EHR access. Providers "broke the glass" for six (14 %) of 43 returning study patients with redacted data vs. zero among 49 study patients without redactions (p = 0.01). Although 54 % of providers agreed that patients should have control over who sees their EHR information, 58 % believed restricting EHR access could harm provider-patient relationships and 71 % felt quality of care would suffer. Patients frequently preferred restricting provider access to their EHRs. Providers infrequently overrode patients' preferences to view hidden data. Providers believed that restricting EHR access
Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia
2018-05-17
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.
Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia
2018-01-01
Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840
High-pressure spectroscopic measurement on diffusion with a diamond-anvil cell
NASA Astrophysics Data System (ADS)
Aoki, K.; Katoh, Eriko; Yamawaki, H.; Fujihisa, H.; Sakashita, M.
2003-04-01
We report a diamond-anvil-cell (DAC) technique developed for spectroscopic measurement on the diffusion process in molecular solids at high pressure. The diffusion processes of atoms, molecules, or their ionic species are investigated for a bilayer specimen by measuring the variation of infrared vibrational spectra with time. The experimental procedures for the protonic and molecular diffusion measurements on ice at 400 K and 10.2 GPa are presented as an example study. The in situ spectroscopic technique with a DAC significantly extends the pressure range accessible for diffusion measurement. The diffusion process at a rate of 10-16-10-14 m2/s can currently be observed at temperatures of 300-600 K and pressures up to several tens of gigaPascals.
Security analysis and improvements of authentication and access control in the Internet of Things.
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-08-13
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
ERIC Educational Resources Information Center
Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.
One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on communication aids. The book's six chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…
2015-03-01
a hotel and a hospital. 2. Event handler for emergency policies (item 2 above): this has been implemented in two UG projects, one project developed a...Workshop on Logical and Se- mantic Frameworks, with Applications, Brasilia, Brazil , September 2014. Electronic Notes in Theoretical Computer Science (to...Brasilia, Brazil , September 2014, 2015. [3] S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT 2009, 14th ACM Symposium on
An Autonomous Circuit for the Measurement of Photovoltaic Devices Parameters.
1986-09-01
Comparison Data, Gallium Arsenide ................ 80 A 7 A,. TABLE OF SYMBOLS A Curve Fitting Constant ADC Analog to Digital Converter AMO Air-Mass-Zero...in Radiation Fluence in the Logarithmic Region CMOS Complementary Metal-Oxide Semiconductor DAC Digital to Analog Converter DC Direct Current Dp Hole...characteristics of individual solar cells. A novel circuit is developed that uses a microprocessor controlled Digital to Analog Converter (DAC) to obtain
The research of laser marking control technology
NASA Astrophysics Data System (ADS)
Zhang, Qiue; Zhang, Rong
2009-08-01
In the area of Laser marking, the general control method is insert control card to computer's mother board, it can not support hot swap, it is difficult to assemble or it. Moreover, the one marking system must to equip one computer. In the system marking, the computer can not to do the other things except to transmit marking digital information. Otherwise it can affect marking precision. Based on traditional control methods existed some problems, introduced marking graphic editing and digital processing by the computer finish, high-speed digital signal processor (DSP) control marking the whole process. The laser marking controller is mainly contain DSP2812, digital memorizer, DAC (digital analog converting) transform unit circuit, USB interface control circuit, man-machine interface circuit, and other logic control circuit. Download the marking information which is processed by computer to U disk, DSP read the information by USB interface on time, then processing it, adopt the DSP inter timer control the marking time sequence, output the scanner control signal by D/A parts. Apply the technology can realize marking offline, thereby reduce the product cost, increase the product efficiency. The system have good effect in actual unit markings, the marking speed is more quickly than PCI control card to 20 percent. It has application value in practicality.
Deladoëy, Johnny; Henderson, Mélanie; Geoffroy, Louis
2013-05-01
In health care systems with a user fee, the impact of socioeconomic factors on pediatric insulin-dependent diabetes mellitus (IDDM) control could be due to the cost of accessing care. There is a linear association between household income and the average glycosylated hemoglobin (HbA1c) of children and adolescents with IDDM despite free access to health care. We used a linear regression model to examine the association between normalized average HbA1c of 1766 diabetic children (diagnosed at our institution from 1980 to 2011 before 17 years of age) and the median household income of their neighborhoods (obtained from Statistics Canada, 2006 Census data). We found a negative linear association (P < .001; r = -0.2) between the level of income and metabolic control assessed by HbA1c after controlling for sex, age at diagnosis, duration of diabetes, ethnicity, geographical factors, frequency of visits, current age (as a proxy for change in practice over time), and change of measurement methods of HbA1c across time. For every increase of $15,000 in annual income, HbA1c decreased by 0.1%. We report a linear association of household income with metabolic control of IDDM in childhood. Given that Canada has a system of free universal access to health care, confounding by access to care is unlikely. Considering the impact of poorly controlled IDDM in childhood on the development of long-term complications, our findings suggest that the higher complication rate found in adults of low socioeconomic status might originate from the poor control that they experienced in childhood. Support for the care of IDDM children from low-income neighborhoods should be increased.
In situ Probe Microphone Measurement for Testing the Direct Acoustical Cochlear Stimulator.
Stieger, Christof; Alnufaily, Yasser H; Candreia, Claudia; Caversaccio, Marco D; Arnold, Andreas M
2017-01-01
Hypothesis: Acoustical measurements can be used for functional control of a direct acoustic cochlear stimulator (DACS). Background: The DACS is a recently released active hearing implant that works on the principle of a conventional piston prosthesis driven by the rod of an electromagnetic actuator. An inherent part of the DACS actuator is a thin titanium diaphragm that allows for movement of the stimulation rod while hermetically sealing the housing. In addition to mechanical stimulation, the actuator emits sound into the mastoid cavity because of the motion of the diaphragm. Methods: We investigated the use of the sound emission of a DACS for intra-operative testing. We measured sound emission in the external auditory canal (P EAC ) and velocity of the actuators stimulation rod (V act ) in five implanted ears of whole-head specimens. We tested the influence various positions of the loudspeaker and a probe microphone on P EAC and simulated implant malfunction in one example. Results: Sound emission of the DACS with a signal-to-noise ratio >10 dB was observed between 0.5 and 5 kHz. Simulated implant misplacement or malfunction could be detected by the absence or shift in the characteristic resonance frequency of the actuator. P EAC changed by <6 dB for variations of the microphone and loudspeaker position. Conclusion: Our data support the feasibility of acoustical measurements for in situ testing of the DACS implant in the mastoid cavity as well as for post-operative monitoring of actuator function.
Suppressing access of natural organic matter (NOM) to TiO2 is a key to the successful photocatalytic decomposition of a target contaminant in water. This study first demonstrates simply controlling the porous structure of TiO2 can significantly improve the selective oxidation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nicklaus, Dennis J.
2013-10-13
We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less
NASA Astrophysics Data System (ADS)
Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko
We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.
A Web-Based Remote Access Laboratory Using SCADA
ERIC Educational Resources Information Center
Aydogmus, Z.; Aydogmus, O.
2009-01-01
The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…
Chen, Ye; Liu, Jonathan T C
2013-06-01
Dual-axis confocal (DAC) microscopy has been found to exhibit superior rejection of out-of-focus and multiply scattered background light compared to conventional single-axis confocal microscopy. DAC microscopes rely on the use of separated illumination and collection beam paths that focus and intersect at a single focal volume (voxel) within tissue. While it is generally recognized that the resolution and contrast of a DAC microscope depends on both the crossing angle of the DAC beams, 2θ, and the focusing numerical aperture of the individual beams, α, a detailed study to investigate these dependencies has not been performed. Contrast and resolution are considered as two main criteria to assess the performance of a point-scanned DAC microscope (DAC-PS) and a line-scanned DAC microscope (DAC-LS) as a function of θ and α. The contrast and resolution of these designs are evaluated by Monte-Carlo scattering simulations and diffraction theory calculations, respectively. These results can be used for guiding the optimal designs of DAC-PS and DAC-LS microscopes.
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-01-01
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464
NMR at pressures up to 90 GPa.
Meier, Thomas; Khandarkhaeva, Saiana; Petitgirard, Sylvain; Körber, Thomas; Lauerer, Alexander; Rössler, Ernst; Dubrovinsky, Leonid
2018-05-14
The past 15 years have seen an astonishing increase in Nuclear Magnetic Resonance (NMR) sensitivity and accessible pressure range in high-pressure NMR experiments, owing to a series of new developments of NMR spectroscopy applied to the diamond anvil cell (DAC). Recently, with the application of electro-magnetic lenses, so-called Lenz lenses, in toroidal diamond indenter cells, pressures of up to 72 GPa with NMR spin sensitivities of about 10 12 spin/Hz 1/2 has been achieved. Here, we describe the implementation of a refined NMR resonator structure using a pair of double stage Lenz lenses driven by a Helmholtz coil within a standard DAC, allowing to measure sample volumes as small as 100 pl prior to compression. With this set-up, pressures close to 100 GPa could be realised repeatedly, with enhanced spin sensitivities of about 5 × 10 11 spin/Hz 1/2 . The manufacturing and handling of these new NMR-DACs is relatively easy and straightforward, which will allow for further applications in physics, chemistry, or biochemistry. Copyright © 2018 Elsevier Inc. All rights reserved.
A novel asynchronous access method with binary interfaces
2008-01-01
Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches). Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation. PMID:18959797
Integrated semiconductor-magnetic random access memory system
NASA Technical Reports Server (NTRS)
Katti, Romney R. (Inventor); Blaes, Brent R. (Inventor)
2001-01-01
The present disclosure describes a non-volatile magnetic random access memory (RAM) system having a semiconductor control circuit and a magnetic array element. The integrated magnetic RAM system uses CMOS control circuit to read and write data magnetoresistively. The system provides a fast access, non-volatile, radiation hard, high density RAM for high speed computing.
Privacy aware access controls for medical data disclosure on European healthgrids.
Rahmouni, Hanene Boussi; Solomonides, Tony; Mont, Marco Casassa; Shiu, Simon
2010-01-01
To be processed within a healthgrid environment, medical data goes through a complete lifecycle and several stages until it is finally used for the primary reason it has been collected for. This stage is not always the final occurrence of when the data would have been manipulated. The data could rather continue to be needed for secondary purposes of legitimate or non legitimate nature. Although other privacy issues are related to the processing of patient data while it is residing on a healthgrid environment, the control of data disclosure is our primary interest. When sharing medical data between different Healthcare and biomedical research organizations in Europe, it is important that the different parties involved in the sharing handle the data in the same way indicated by the legislation of the member state where the data was originally collected as the requirements might differ from one state to another. Privacy requirements, such as patient consent, may be subject to conflicting conditions between different national frameworks as well as between different legal and ethical frameworks within a single member state. These circumstances have made the compliance management process in European healthgrid very challenging. In this paper we are presenting an approach to tackle these issues by relying on several technologies contained in the semantic web stack. Our work suggests a direct mapping from high level legislation on privacy and data protection to operational level privacy aware controls. Additionally we suggest an architecture for the enforcement of these controls on access control models adopted by healthgrids security infrastructures.
An Extended Role-Based Access Control Model for Delegating Obligations
NASA Astrophysics Data System (ADS)
Ben-Ghorbel-Talbi, Meriam; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Bouhoula, Adel
The main aim of access control models is to provide means to simplify the management of the security policy, which is a fastidious and error-prone task. Supporting delegation is considered as an important mean to decentralize the administration and therefore to allow security policy to be more flexible and easier to manipulate. Our main contribution is the proposition of a unified model to the administration and delegation of obligations. Managing such delegations implies more requirements than managing traditional privileges delegation. In fact, delegating obligations may include two interpretations: the delegation of the obligation and the delegation of the responsibility related to this obligation. Therefore, it is important to deal with these two notions separately. Moreover, since delegating an obligation involves the delegation of sanctions, then the consent of the user who receives this delegation may be required in some cases. We address in this paper these requirements and we propose a formalism to deal with them.
Temerk, Yassien; Ibrahim, Hossieny
2014-07-01
The binding mode and thermodynamic characteristics of the anticancer drug dacarbazine (Dac) with double and single stranded DNA were investigated in the absence and presence of Cu(II) using cyclic voltammetry, square wave voltammetry and fluorescence spectroscopy. The interaction of Dac and Dac-Cu(II) complex with dsDNA indicated their intercalation into the base stacking domain of dsDNA double helix and the strength of interaction is independent on the ionic strength. The interaction of Dac with dsDNA in the presence of Cu(II) leads to a much stronger intercalation. The interaction mode of Dac molecules with ssDNA is electrostatic attraction via negative phosphate on the exterior of the ssDNA with Dac. The binding constants, stoichiometric coefficients and thermodynamic parameters of Dac and Dac-Cu(II) complex with dsDNA and ssDNA were evaluated. Comparison of the mode interaction of Dac with dsDNA and ssDNA was discussed. The decrease of peak current of Dac was proportional to DNA concentration, which was applied for determination of dsDNA and ssDNA concentration. Copyright © 2014 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Pippinger, Thomas; Miletich, Ronald; Burchard, Michael
2011-09-01
A novel diamond-anvil cell (DAC) design has been constructed and tested for in situ applications at high-pressure (HP) operations and has proved to be suitable even for HP sample environments at non-ambient temperature conditions. The innovative high-precision guiding mechanism, comparable to a dog clutch, consists of perpendicular planar sliding-plane elements and is integrated directly into the base body of the cylindrically shaped DAC. The combination of two force-generating devices, i.e., mechanical screws and an inflatable gas membrane, allows the user to choose independently between, and to apply individually, two different forcing mechanisms for pressure generation. Both mechanisms are basically independent of each other, but can also be operated simultaneously. The modularity of the DAC design allows for an easy exchange of functional core-element groups optimized not only for various analytical in situ methods but also for HP operation with or without high-temperature (HT) application. For HP-HT experiments a liquid cooling circuit inside the specific inner modular groups has been implemented to obtain a controlled and limited heat distribution within the outer DAC body.
1981-08-01
loaded Loading done Time= 1295 msec. SQRT(3) %I + 1 SQRT(3) %I - 1 SQRT(3) %I f 1 (D13) TX = 1---------+-1** x = C-l---+-------, x = - 1, x...thnrl its competitors. As is to be expected, the table makes cJc ;lr the benefits of subincrement ing for nny approximation. For example, usiny the...Acquisition Systems ( DACS ) and a Data Analysis System (DAN), The DACs will be microprocessor-based recording devices with software-control
DOE Office of Scientific and Technical Information (OSTI.GOV)
Williams, Dean N.
2011-04-02
This report summarizes work carried out by the Earth System Grid Center for Enabling Technologies (ESG-CET) from October 1, 2010 through March 31, 2011. It discusses ESG-CET highlights for the reporting period, overall progress, period goals, and collaborations, and lists papers and presentations. To learn more about our project and to find previous reports, please visit the ESG-CET Web sites: http://esg-pcmdi.llnl.gov/ and/or https://wiki.ucar.edu/display/esgcet/Home. This report will be forwarded to managers in the Department of Energy (DOE) Scientific Discovery through Advanced Computing (SciDAC) program and the Office of Biological and Environmental Research (OBER), as well as national and international collaborators andmore » stakeholders (e.g., those involved in the Coupled Model Intercomparison Project, phase 5 (CMIP5) for the Intergovernmental Panel on Climate Change (IPCC) 5th Assessment Report (AR5); the Community Earth System Model (CESM); the Climate Science Computational End Station (CCES); SciDAC II: A Scalable and Extensible Earth System Model for Climate Change Science; the North American Regional Climate Change Assessment Program (NARCCAP); the Atmospheric Radiation Measurement (ARM) program; the National Aeronautics and Space Administration (NASA), the National Oceanic and Atmospheric Administration (NOAA)), and also to researchers working on a variety of other climate model and observation evaluation activities. The ESG-CET executive committee consists of Dean N. Williams, Lawrence Livermore National Laboratory (LLNL); Ian Foster, Argonne National Laboratory (ANL); and Don Middleton, National Center for Atmospheric Research (NCAR). The ESG-CET team is a group of researchers and scientists with diverse domain knowledge, whose home institutions include eight laboratories and two universities: ANL, Los Alamos National Laboratory (LANL), Lawrence Berkeley National Laboratory (LBNL), LLNL, NASA/Jet Propulsion Laboratory (JPL), NCAR, Oak Ridge
Dual-mode ultraflow access networks: a hybrid solution for the access bottleneck
NASA Astrophysics Data System (ADS)
Kazovsky, Leonid G.; Shen, Thomas Shunrong; Dhaini, Ahmad R.; Yin, Shuang; De Leenheer, Marc; Detwiler, Benjamin A.
2013-12-01
Optical Flow Switching (OFS) is a promising solution for large Internet data transfers. In this paper, we introduce UltraFlow Access, a novel optical access network architecture that offers dual-mode service to its end-users: IP and OFS. With UltraFlow Access, we design and implement a new dual-mode control plane and a new dual-mode network stack to ensure efficient connection setup and reliable and optimal data transmission. We study the impact of the UltraFlow system's design on the network throughput. Our experimental results show that with an optimized system design, near optimal (around 10 Gb/s) OFS data throughput can be attained when the line rate is 10Gb/s.
PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices
Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.
2013-01-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332
PANATIKI: a network access control implementation based on PANA for IoT devices.
Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F
2013-11-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.
Dynamic adaptive chemistry for turbulent flame simulations
NASA Astrophysics Data System (ADS)
Yang, Hongtao; Ren, Zhuyin; Lu, Tianfeng; Goldin, Graham M.
2013-02-01
The use of large chemical mechanisms in flame simulations is computationally expensive due to the large number of chemical species and the wide range of chemical time scales involved. This study investigates the use of dynamic adaptive chemistry (DAC) for efficient chemistry calculations in turbulent flame simulations. DAC is achieved through the directed relation graph (DRG) method, which is invoked for each computational fluid dynamics cell/particle to obtain a small skeletal mechanism that is valid for the local thermochemical condition. Consequently, during reaction fractional steps, one needs to solve a smaller set of ordinary differential equations governing chemical kinetics. Test calculations are performed in a partially-stirred reactor (PaSR) involving both methane/air premixed and non-premixed combustion with chemistry described by the 53-species GRI-Mech 3.0 mechanism and the 129-species USC-Mech II mechanism augmented with recently updated NO x pathways, respectively. Results show that, in the DAC approach, the DRG reduction threshold effectively controls the incurred errors in the predicted temperature and species concentrations. The computational saving achieved by DAC increases with the size of chemical kinetic mechanisms. For the PaSR simulations, DAC achieves a speedup factor of up to three for GRI-Mech 3.0 and up to six for USC-Mech II in simulation time, while at the same time maintaining good accuracy in temperature and species concentration predictions.
A new diamond anvil cell for hydrothermal studies to 2.5 GPa and from -190 to 1200 °C
Bassett, William A.; Shen, A.H.; Bucknum, M.; Chou, I.-Ming
1993-01-01
A new style of diamond anvil cell(DAC) has been designed and built for conducting research in fluids at pressures to 2.5 GPa and temperatures from −190 to 1200 °C. The new DAC has been used for optical microscope observations and synchrotron x‐ray diffraction studies. Fringes produced by interference of laser light reflected from top and bottom anvil faces and from top and bottom sample faces provide a very sensitive means of monitoring the volume of sample chamber and for observing volume and refractive index changes in samples that have resulted from transitions and reactions. X‐ray diffraction patterns of samples under hydrothermal conditions have been made by the energy dispersive method using synchrotron radiation. The new DAC has individual heaters and individual thermocouples for the upper and lower anvils that can be controlled and can maintain temperatures with an accuracy of ±0.5 °C. Low temperatures are achieved by introducing liquid nitrogen directly into the DAC. The equation of state of H2O and the α‐β quartz transition are used to determine pressure with an accuracy of ±1% in the aqueous samples. The new DAC has been used to redetermine five isochores of H2O as well as the dehydration curves of brucite, Mg(OH)2, and muscovite, KAl2(Si3Al)O10(OH)2.
ERIC Educational Resources Information Center
International Business Machines Corp., Gaithersburg, MD. Data Processing Div.
The Ohio State University Libraries On-line Remote Catalog Access and Circulation Control System (LCS) began on-line operations with the conversion of one department library in November 1970. By December all 26 libraries had been converted to the automated system and LCS was fully operational one month ahead of schedule. LCS is designed as a…
Parallel Systems Laboratory: Access, Allocation, and Control
1992-06-30
boog Eae...4d READ ISTRUCTIONSREPORT DOCUMENTATIO PAGE BEFOR COMPLETNG FORM I. REPORT NUMNER 2. GOVT ACCESSION NO 3- RECIPINT’S CATALOG NUMR9 . TITLE (an...a summary of the salient results of this research in capsule form which is followed by an extensive list of publications, dissertations and theses...because it provides the asymptotic use of currently wasted cycles. To do so, we examine a distribution of w(u It) in a very simple form and for
Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications
Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan
2016-01-01
In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e. PMID:27490666
33 CFR 104.107 - Employee access area.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., excluding cruise ships, may designate areas within the vessel as employee access areas. (b) An employee... measures for access control, of a ferry or passenger vessel that is open only to employees and not to...
33 CFR 104.107 - Employee access area.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., excluding cruise ships, may designate areas within the vessel as employee access areas. (b) An employee... measures for access control, of a ferry or passenger vessel that is open only to employees and not to...
33 CFR 104.107 - Employee access area.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., excluding cruise ships, may designate areas within the vessel as employee access areas. (b) An employee... measures for access control, of a ferry or passenger vessel that is open only to employees and not to...
33 CFR 104.106 - Passenger access area.
Code of Federal Regulations, 2011 CFR
2011-07-01
... measures for access control, of a ferry, passenger vessel, or cruise ship that is open to passengers. It is..., or cruise ship may designate areas within the vessel as passenger access areas. (b) A passenger...
33 CFR 104.106 - Passenger access area.
Code of Federal Regulations, 2010 CFR
2010-07-01
... measures for access control, of a ferry, passenger vessel, or cruise ship that is open to passengers. It is..., or cruise ship may designate areas within the vessel as passenger access areas. (b) A passenger...
33 CFR 104.107 - Employee access area.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., excluding cruise ships, may designate areas within the vessel as employee access areas. (b) An employee... measures for access control, of a ferry or passenger vessel that is open only to employees and not to...
33 CFR 104.107 - Employee access area.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., excluding cruise ships, may designate areas within the vessel as employee access areas. (b) An employee... measures for access control, of a ferry or passenger vessel that is open only to employees and not to...
33 CFR 104.106 - Passenger access area.
Code of Federal Regulations, 2013 CFR
2013-07-01
... measures for access control, of a ferry, passenger vessel, or cruise ship that is open to passengers. It is..., or cruise ship may designate areas within the vessel as passenger access areas. (b) A passenger...
33 CFR 104.106 - Passenger access area.
Code of Federal Regulations, 2012 CFR
2012-07-01
... measures for access control, of a ferry, passenger vessel, or cruise ship that is open to passengers. It is..., or cruise ship may designate areas within the vessel as passenger access areas. (b) A passenger...
33 CFR 104.106 - Passenger access area.
Code of Federal Regulations, 2014 CFR
2014-07-01
... measures for access control, of a ferry, passenger vessel, or cruise ship that is open to passengers. It is..., or cruise ship may designate areas within the vessel as passenger access areas. (b) A passenger...
GIS and RDBMS Used with Offline FAA Airspace Databases
NASA Technical Reports Server (NTRS)
Clark, J.; Simmons, J.; Scofield, E.; Talbott, B.
1994-01-01
A geographic information system (GIS) and relational database management system (RDBMS) were used in a Macintosh environment to access, manipulate, and display off-line FAA databases of airport and navigational aid locations, airways, and airspace boundaries. This proof-of-concept effort used data available from the Adaptation Controlled Environment System (ACES) and Digital Aeronautical Chart Supplement (DACS) databases to allow FAA cartographers and others to create computer-assisted charts and overlays as reference material for air traffic controllers. These products were created on an engineering model of the future GRASP (GRaphics Adaptation Support Position) workstation that will be used to make graphics and text products for the Advanced Automation System (AAS), which will upgrade and replace the current air traffic control system. Techniques developed during the prototyping effort have shown the viability of using databases to create graphical products without the need for an intervening data entry step.
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2013 CFR
2013-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2012 CFR
2012-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2011 CFR
2011-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2014 CFR
2014-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2010 CFR
2010-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
Deji, Shizuhiko; Ito, Shigeki; Ariga, Eiji; Mori, Kazuyuki; Hirota, Masahiro; Saze, Takuya; Nishizawa, Kunihide
2006-08-01
High frequency electromagnetic fields in the 120 kHz band emitted from card readers for access control systems in radiation control areas cause abnormally high and erroneous indicated dose readings on semiconductor-type electronic personal dosimeters (SEPDs). All SEPDs malfunctioned but recovered their normal performance by resetting after the exposure ceased. The minimum distances required to prevent electromagnetic interference varied from 5.0 to 38.0 cm. The electric and magnetic immunity levels ranged from 35.1 to 267.6 V m(-1) and from 1.0 to 16.6 A m(-1), respectively. Electromagnetic immunity levels of SEPDs should be strengthened from the standpoint of radiation protection.
5 CFR 1320.14 - Public access.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Public access. 1320.14 Section 1320.14 Administrative Personnel OFFICE OF MANAGEMENT AND BUDGET OMB DIRECTIVES CONTROLLING PAPERWORK BURDENS ON THE PUBLIC § 1320.14 Public access. (a) In order to enable the public to participate in and provide comments...
NASA Astrophysics Data System (ADS)
Zheng, Jun; Ansari, Nirwan
2005-06-01
are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis
NASA Astrophysics Data System (ADS)
Zheng, Jun; Ansari, Nirwan; Jersey Inst Ansari, New; Jersey Inst, New
2005-04-01
are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis
NASA Astrophysics Data System (ADS)
Zheng, Jun; Ansari, Nirwan
2005-05-01
are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis
[Stents in dialysis vascular access--do they promise improved high quality prolonged access use].
Klein, Osnat; Plotkin, Eleonora; Gritun, Igal; Verner, Myriam; Lehmann, J M; Rathaus, Mauro; Bernheim, Jacques
2008-02-01
The life expectancy of dialysis patients depends, to a large extent, on blood access which provides uninterrupted and efficient treatment. Dialysis access created by a direct anastomosis between artery and vein usually allows normal dialysis for many years. Blood access by a bridge graft between artery and vein functions for a much shorter time and occludes chiefly because of endothelial hyperplasia at the graft vein anastomosis. This type of fistula is created when the veins of the patient are small. During the last few years the dialysis population is increasingly composed of adult and elderly patients suffering from diabetes mellitus, hypertension, dyslipidemias and atheromatous vascular disease so that a relatively large proportion of dialysis accesses are created using a bridge graft. Since we currently do not have the knowledge of how to arrest or delay the processes which lead to access occlusion, attempts are made to implement prophylactic strategies, find stenoses and dilate them before the access fails. Up to date, controlled trials have not succeeded in proving that this method prolongs access use. These trials did not describe the use of stents following dilatation. Between July 2002 and May 2005, 238 angiographies were performed on blood accesses including 179 angioplasties of stenoses. In sixteen patients a stent was deployed during the angioplasty. In ten patients dialysis was performed using the same access up to the end of the study period, an average of 43 months from the creation of the access. Three patients died with a functioning access and in three the access occluded during the period of followup. This study shows that the use of stents following angioplasty of dialysis access stenoses can improve the duration of use of accesses created through grafts.
A low power medium access control protocol for wireless medical sensor networks.
Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D
2004-01-01
The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.
Nelson, E A S; Bloom, David E; Mahoney, Richard T
2014-01-01
The Global Vaccine Action Plan will require, inter alia, the mobilization of financial resources from donors and national governments - both rich and poor. Vaccine Procurement Assistance (VPA) and Vaccine Procurement Baseline (VPB) are two metrics that could measure government performance and track resources in this arena. VPA is proposed as a new subcategory of Official Development Assistance (ODA) given for the procurement of vaccines and VPB is a previously suggested measure of the share of Gross Domestic Product (GDP) that governments spend on their own vaccine procurement. To determine realistic targets for VPA and VPB. Organization for Economic Co-Operation and Development (OECD) and World Bank data for 2009 were analyzed to determine the proportions of bilateral ODA from the 23 Development Assistance Committee (DAC) countries disbursed (as % of GDP in current US$) for infectious disease control. DAC country contributions to the GAVI Alliance for 2009 were assessed as a measure of multilateral donor support for vaccines and immunization programs. In 2009, total DAC bilateral ODA was 0.16% of global GDP and 0.25% of DAC GDP. As a percentage of GDP, Norway (0.013%) and United Kingdom (0.0085%) disbursed the greatest proportion of bilateral ODA for infectious disease control, and Norway (0.024%) and Canada (0.008%) made the greatest contributions to the GAVI Alliance. In 2009 0.02% of DAC GDP was US$7.61 billion and 0.02% of the GDP of the poorest 117 countries was US$2.88 billion. Adopting 0.02% GDP as minimum targets for both VPA and VPB is based on realistic estimates of what both developed and developing countries should spend, and can afford to spend, to jointly ensure procurement of vaccines recommended by national and global bodies. New OECD purpose codes are needed to specifically track ODA disbursed for a) vaccine procurement; and b) immunization programs.
Bjerkvig, Christopher Kalhagen; Fosse, Theodor Kaurin; Apelseth, Torunn Oveland; Sivertsen, Joar; Braathen, Hanne; Eliassen, Håkon Skogrand; Guttormsen, Anne Berit; Cap, Andrew P; Strandenes, Geir
2018-06-01
Intraosseous (IO) vascular access is increasingly used as an emergency tool for achieving access to the systemic circulation in critically ill patients. The role of IO transfusion of blood in damage control resuscitation is however questionable due to possible inadequate flow rate and hemolysis. Some experts claim that IO transfusion is contraindicated. In this study, we have challenged this statement by looking at flow rates of autologous fresh whole blood reinfusion and hemolysis using two of the commonly used Food and Drug Administration-approved and Conformité Européenne (CE)-marked sternal needles. Additionally, the success rate of sternal access between the two devices is evaluated. Volunteer professional military personnel, were enrolled prospectively in a nonrandomized observational study design. We collected 450 mL of autologous whole blood from each participant. Participants were divided into the following three groups of 10: Tactically Advanced Lifesaving IO Needle (T.A.L.O.N.) IO, FAST1 IO, and intravenous group. The reinfusion was done by gravity only. Blood sampling was performed before blood collection and 30 minutes after reinfusion. Investigation of hemolysis was performed by measurements of haptoglobin and lactate dehydrogenase. Success rate was evaluated by correct aspiration of bone marrow. Median reinfusion rate was 46.2 mL/min in the FAST1 group, 32.4 mL/min in the T.A.L.O.N. group, and 74.1 mL/min in the intravenous group. Blood samples from all participants were within normal ranges. There was no statistically significant difference in haptoglobin and lactate dehydrogenase between the groups. In the FAST1 group, 1 (9%) of 11 procedures failed. In the T.A.L.O.N. group, 4 (29%) of 14 procedures failed. Although preferable, achieving peripheral venous access in the bleeding patient is a major problem. Our findings suggest that fresh whole-blood transfusion through the IO route is safe, reliable, and provide sufficient flow for resuscitation
How Well Does Medicaid Work in Improving Access to Care?
Long, Sharon K; Coughlin, Teresa; King, Jennifer
2005-01-01
Objective To provide an assessment of how well the Medicaid program is working at improving access to and use of health care for low-income mothers. Data Source/Study Setting The 1997 and 1999 National Survey of America's Families, with state and county information drawn from the Area Resource File and other sources. Study Design Estimate the effects of Medicaid on access and use relative to private coverage and being uninsured, using instrumental variables methods to control for selection into insurance status. Data Collection/Extraction Method This study combines data from 1997 and 1999 for mothers in families with incomes below 200 percent of the federal poverty level. Principal Findings We find that Medicaid beneficiaries' access and use are significantly better than those obtained by the uninsured. Analysis that controls for insurance selection shows that the benefits of having Medicaid coverage versus being uninsured are substantially larger than what is estimated when selection is not accounted for. Our results also indicate that Medicaid beneficiaries' access and use are comparable to that of the low-income privately insured. Once insurance selection is controlled for, access and use under Medicaid is not significantly different from access and use under private insurance. Without controls for insurance selection, access and use for Medicaid beneficiaries is found to be significantly worse than for the low-income privately insured. Conclusions Our results show that the Medicaid program improved access to care relative to uninsurance for low-income mothers, achieving access and use levels comparable to those of the privately insured. Our results also indicate that prior research, which generally has not controlled for selection into insurance coverage, has likely understated the gains of Medicaid relative to uninsurance and overstated the gains of private coverage relative to Medicaid. PMID:15663701
Scalable Lunar Surface Networks and Adaptive Orbit Access
NASA Technical Reports Server (NTRS)
Wang, Xudong
2015-01-01
Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.
Method and apparatus for managing access to a memory
DOE Office of Scientific and Technical Information (OSTI.GOV)
DeBenedictis, Erik
A method and apparatus for managing access to a memory of a computing system. A controller transforms a plurality of operations that represent a computing job into an operational memory layout that reduces a size of a selected portion of the memory that needs to be accessed to perform the computing job. The controller stores the operational memory layout in a plurality of memory cells within the selected portion of the memory. The controller controls a sequence by which a processor in the computing system accesses the memory to perform the computing job using the operational memory layout. The operationalmore » memory layout reduces an amount of energy consumed by the processor to perform the computing job.« less
Instrumentation and control system architecture of ECRH SST1
NASA Astrophysics Data System (ADS)
Patel, Harshida; Patel, Jatin; purohit, Dharmesh; Shukla, B. K.; Babu, Rajan; Mistry, Hardik
2017-07-01
The Electron Cyclotron Resonance Heating (ECRH) system is an important heating system for the reliable start-up of tokamak. The 42GHz and 82.6GHz Gyrotron based ECRH systems are used in tokomaks SST-1 and Aditya to carry out ECRH related experiments. The Gyrotrons are high power microwave tubes used as a source for ECRH systems. The Gyrotrons need to be handled with optimum care right from the installation to its Full parameter control operation. The Gyrotrons are associated with the subsystems like: High voltage power supplies (Beam voltage and anode voltage), dedicated crowbar system, magnet, filament and ion pump power supplies and cooling system. The other subsystems are transmission line, launcher and dummy load. A dedicated VME based data acquisition & control (DAC) system is developed to operate and control the Gyrotron and its associated sub system. For the safe operation of Gyrotron, two level interlocks with fail-safe logic are developed. Slow signals that are operated in scale of millisecond range are programmed through software and hardware interlock in scale of microsecond range are designed and developed indigenously. Water-cooling and the associated interlock are monitored and control by data logger with independent human machine interface.
Multiple cone pathways are involved in photic regulation of retinal dopamine.
Qiao, Sheng-Nan; Zhang, Zhijing; Ribelayga, Christophe P; Zhong, Yong-Mei; Zhang, Dao-Qi
2016-06-30
Dopamine is a key neurotransmitter in the retina and plays a central role in the light adaptive processes of the visual system. The sole source of retinal dopamine is dopaminergic amacrine cells (DACs). We and others have previously demonstrated that DACs are activated by rods, cones, and intrinsically photosensitive retinal ganglion cells (ipRGCs) upon illumination. However, it is still not clear how each class of photosensitive cells generates light responses in DACs. We genetically isolated cone function in mice to specifically examine the cone-mediated responses of DACs and their neural pathways. In addition to the reported excitatory input to DACs from light-increment (ON) bipolar cells, we found that cones alternatively signal to DACs via a retrograde signalling pathway from ipRGCs. Cones also produce ON and light-decrement (OFF) inhibitory responses in DACs, which are mediated by other amacrine cells, likely driven by type 1 and type 2/3a OFF bipolar cells, respectively. Dye injections indicated that DACs had similar morphological profiles with or without ON/OFF inhibition. Our data demonstrate that cones utilize specific parallel excitatory and inhibitory circuits to modulate DAC activity and efficiently regulate dopamine release and the light-adaptive state of the retina.
Mansoor, Awais; Ahmed, Wamiq M; Samarapungavan, Ala; Cirillo, John; Schwarte, David; Robinson, J Paul; Duerstock, Bradley S
2010-01-01
A web-based application was developed to remotely view slide specimens and control all functions of a research-level light microscopy workstation, called AccessScope. Students and scientists with upper limb mobility and visual impairments are often unable to use a light microscope by themselves and must depend on others in its operation. Users with upper limb mobility impairments and low vision were recruited to assist in the design process of the AccessScope personal computer (PC) user interface. Participants with these disabilities were evaluated in their ability to use AccessScope to perform microscopical tasks. AccessScope usage was compared with inspecting prescanned slide images by grading participants' identification and understanding of histological features and knowledge of microscope operation. With AccessScope subjects were able to independently perform common light microscopy functions through an Internet browser by employing different PC pointing devices or accessibility software according to individual abilities. Subjects answered more histology and microscope usage questions correctly after first participating in an AccessScope test session. AccessScope allowed users with upper limb or visual impairments to successfully perform light microscopy without assistance. This unprecedented capability is crucial for students and scientists with disabilities to perform laboratory coursework or microscope-based research and pursue science, technology, engineering, and mathematics fields.
Detrusor after-contraction: a new insight.
Valentini, Francoise A; Marti, Brigitte G; Robain, Gilberte; Nelson, Pierre P
2015-01-01
Detrusor after-contractions (DAC) are non-common in adults. Both definition (nothing in ICS reports) and significance (artefact, link with detrusor overactivity (DO) or bladder outlet obstruction (BOO)) remain discussed. Our purpose was to carry out an analysis of the urodynamic parameters during voidings with DAC and, using the VBN model, to simulate pathophysiological conditions able to explain both voiding phase and DAC. From large urodynamic database of patients referred for evaluation of lower urinary tract dysfunction, DAC were observed in 60 patients (5.7%). Criteria for DAC were post-void residual <30mL and increase of detrusor pressure >10cmH(2)O. VBN model was used for analysis of both pressure and flow curves, and simulations of pathophysiological conditions. Onset of DAC (ODAC) occurred when Q=7.3±5.7mL/s and bladder volume=17.9±15.4mL. Urgency-frequency syndrome and urodynamic diagnosis of DO were the more frequent scenarios associated with DAC. ODAC was associated to an inversion of the slope of detrusor pressure curve without any perturbation in flow curve. Among tested pathophysiological hypothesis (great, abnormal, detrusor force, sphincter contraction), none allowed restoring all recorded curves (flow rate, voiding pressure and DAC). No urodynamic characteristic of the first part of voiding is an index of occurrence of DAC. ODAC is a significant phenomenon linked with the bladder collapse. DAC is not associated with BOO but more probably with DO and appears as the result of local conditions in an almost empty bladder (concentration of stresses around a transducer); thus DAC seems of weak clinical significance.
50 CFR 648.92 - Effort-control program for monkfish limited access vessels.
Code of Federal Regulations, 2012 CFR
2012-10-01
.... Limited access NE multispecies and limited access sea scallop permit holders who also possess a limited... letter or fax to the Regional Administrator within 24 hours after tags have been discovered lost... Aids section of the printed volume and at www.fdsys.gov. ...
50 CFR 648.92 - Effort-control program for monkfish limited access vessels.
Code of Federal Regulations, 2013 CFR
2013-10-01
.... Limited access NE multispecies and limited access sea scallop permit holders who also possess a limited... letter or fax to the Regional Administrator within 24 hours after tags have been discovered lost... Aids section of the printed volume and at www.fdsys.gov. ...
NASA Astrophysics Data System (ADS)
Immoor, J.; Marquardt, H.; Miyagi, L. M.; Lin, F.; Speziale, S.; Merkel, S.; Liermann, H. P.
2017-12-01
Seismic anisotropy in Earth's lowermost mantle, resulting from crystallographic preferred orientation (CPO) of elastically anisotropic minerals, is the most promising observable to map mantle flow patterns. The shear wave anisotropy observed in the lowermost mantle might be caused by CPO of (Mg,Fe)O ferropericlase that is characterized by large elastic anisotropy in the deep lower mantle. However, our understanding of the slip system activities of ferropericlase at conditions of the lowermost mantle is still incomplete. Here, we present results of an experimental study designed to determine slip system activities in (Mg,Fe)O at P-T conditions of the lower mantle. In-situ deformation experiments on powders of (Mg0.8Fe0.2)O were conducted in a graphite heated diamond anvil cell (DAC) up to a temperature of 1400K. Synchrotron x-ray diffraction data were fit with the program MAUD (Materials Analysing Using Diffraction) to extract textures and lattice strains. The experimental results were modelled using the Elasto-Viscoplastic Self Consistent (EVPSC) code. Our data indicate a change in slip system activities from dominant {110} to increasing {100} slip at temperatures above 1150 K and pressures corresponding to the mid-lower mantle. Our findings indicate an effect of both pressure and temperature on the plasticity of (Mg,Fe)O and, hence, pave the way to a better understanding of with a potential change of dominant slip system between 40-60 GPa in MgO predicted from numerical models (Amodeo et al., 2012). We use the results to model the possible contribution of ferropericlase CPO to observed seismic anisotropy in the D'' layer in the lowermost mantle. Amodeo et al. (2012) Phil Mag, 92, 1523-1541
Wang, Rui; Luo, Ou; He, Liu; Li, Jia-Xin; Zhang, Ming-Guang
2012-11-01
In Mainland China, heparin saline solution is commonly used for flushing and locking peripheral intravenous access devices in clinical practice for a long time. We conducted a prospective controlled trial to compare the effectiveness and safety of preservative-free 0.9% sodium chloride solution versus heparin saline solution as flushing and locking solution for peripheral intravenous access devices. Patients with gastroenterological or hepatic diseases were enrolled for this study from August 2011 to October 2011. After non-randomized allocation, preservative-free 0.9% sodium chloride was used as flushing and locking solution in the sodium chloride solution group, while hepatic solution (10 U/mL) was given in the heparin saline solution group. The device related complications and its maintenance duration were compared between two groups. One-way ANOVA, Chi(2), or Mantel-Haenszel test were performed using SPSS 13.0 and RevMan 5.0. Totally, 181 and 178 peripheral intravenous access devices in the sodium chloride solution and heparin saline solution groups were included and analyzed. Results indicated than sodium chloride solution did not increase the risks of occlusion (7.7% vs. 7.9%) and other adverse events of peripheral intravenous access devices (P = 0.163). Sodium chloride solution neither shortened the duration of peripheral intravenous access devices maintenance (3.6 ± 1.1 days vs. 3.7 ± 1.2 days, P = 0.651), nor increased the proportion of abnormal withdrawal (29.3% vs. 31.5%, P = 0.654). Sodium chloride solution is as effective and safe as conventional heparin saline solution for flushing and locking peripheral intravenous access devices, which results from our evidence-based study and should be transferred to other nurses in China. © 2012 Wiley Publishing Asia Pty Ltd and Chinese Cochrane Center, West China Hospital of Sichuan University.
33 CFR 104.265 - Security measures for access control.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices...
Koo, Kyo Chul; Yoon, Jun-Ho; Park, No-Cheol; Lee, Hye Sun; Ahn, Hyun Kyu; Lee, Kwang Suk; Kim, Do Kyung; Cho, Kang Su; Chung, Byung Ha; Hong, Chang Hee
2018-06-01
Excessive bulking force during primary access of the ureteral access sheath may induce ureteral injury. We investigated the efficacy of preoperative α-blockade to reduce ureteral access sheath insertion force and determine the upper limit required to avoid ureteral injury. In this randomized controlled trial 135 patients from a single institution who had ureteropelvic junction or renal pelvis stones and were scheduled to undergo retrograde intrarenal surgery were prospectively enrolled from December 2015 to January 2017. Of the patients 41 and 42 were randomly assigned to the control and experimental groups, respectively. The experimental group received α-blockade preoperatively. The 21 patients who were pre-stented were assessed separately. We developed a homemade device to measure maximal ureteral access sheath insertion force. Our ureteral access sheath insertion force measurement device showed excellent reproducibility. Higher insertion velocity resulted in greater maximal sheath insertion force. Maximal insertion force in the α-blockade group was significantly lower than in the control group at the ureterovesical junction (p = 0.008) and the proximal ureter (p = 0.036). Maximal insertion force in the α-blockade group was comparable to that in pre-stented patients. Female patients and patients 70 years old or older showed a lower maximal ureteral access sheath insertion force than their counterparts. The rate of grade 2 or greater ureteral injury was lower in the α-blockade group than in controls (p = 0.038). No injury occurred in any case in which ureteral access sheath insertion force did not exceed 600 G. Preoperative α-blockade and slow sheath placement may reduce maximal ureteral access sheath insertion force. If the force exceeds 600 G, a smaller diameter sheath may be an alternative. Alternatively the procedure can be terminated and followed later by pre-stented retrograde intrarenal surgery. Copyright © 2018 American Urological Association
Secure Remote Access Issues in a Control Center Environment
NASA Technical Reports Server (NTRS)
Pitts, Lee; McNair, Ann R. (Technical Monitor)
2002-01-01
The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.
Global cancer control: responding to the growing burden, rising costs and inequalities in access
Braga, Sofia; Bystricky, Branislav; Qvortrup, Camilla; Criscitiello, Carmen; Esin, Ece; Sonke, Gabe S; Martínez, Guillem Argilés; Frenel, Jean-Sebastian; Karamouzis, Michalis; Strijbos, Michiel; Yazici, Ozan; Bossi, Paolo; Banerjee, Susana; Troiani, Teresa; Eniu, Alexandru; Ciardiello, Fortunato; Tabernero, Josep; Zielinski, Christoph C; Casali, Paolo G; Cardoso, Fatima; Douillard, Jean-Yves; McGregor, Keith; Bricalli, Gracemarie; Vyas, Malvika; Ilbawi, André
2018-01-01
The cancer burden is rising globally, exerting significant strain on populations and health systems at all income levels. In May 2017, world governments made a commitment to further invest in cancer control as a public health priority, passing the World Health Assembly Resolution 70.12 on cancer prevention and control within an integrated approach. In this manuscript, the 2016 European Society for Medical Oncology Leadership Generation Programme participants propose a strategic framework that is in line with the 2017 WHO Cancer Resolution and consistent with the principle of universal health coverage, which ensures access to optimal cancer care for all people because health is a basic human right. The time for action is now to reduce barriers and provide the highest possible quality cancer care to everyone regardless of circumstance, precondition or geographic location. The national actions and the policy recommendations in this paper set forth the vision of its authors for the future of global cancer control at the national level, where the WHO Cancer Resolution must be implemented if we are to reduce the cancer burden, avoid unnecessary suffering and save as many lives as possible. PMID:29464109
Access Control to Information in Pervasive Computing Environments
2005-08-01
for foo’s public key. (Digital signatures are omitted.) indicate a set of location and time intervals. A service will return location information only...stands for foo’s public key. (Digital signatures are omitted.) it describes the resource to which access is granted. Currently, we allow only resources...information relationship. Alice’s location information is bun- dled in her personal information. (The digital signature is omitted.) We use extended
Trends in communicative access solutions for children with cerebral palsy.
Myrden, Andrew; Schudlo, Larissa; Weyand, Sabine; Zeyl, Timothy; Chau, Tom
2014-08-01
Access solutions may facilitate communication in children with limited functional speech and motor control. This study reviews current trends in access solution development for children with cerebral palsy, with particular emphasis on the access technology that harnesses a control signal from the user (eg, movement or physiological change) and the output device (eg, augmentative and alternative communication system) whose behavior is modulated by the user's control signal. Access technologies have advanced from simple mechanical switches to machine vision (eg, eye-gaze trackers), inertial sensing, and emerging physiological interfaces that require minimal physical effort. Similarly, output devices have evolved from bulky, dedicated hardware with limited configurability, to platform-agnostic, highly personalized mobile applications. Emerging case studies encourage the consideration of access technology for all nonverbal children with cerebral palsy with at least nascent contingency awareness. However, establishing robust evidence of the effectiveness of the aforementioned advances will require more expansive studies. © The Author(s) 2014.
Oswald, Tasha M; Winder-Patel, Breanna; Ruder, Steven; Xing, Guibo; Stahmer, Aubyn; Solomon, Marjorie
2018-05-01
The purpose of this pilot randomized controlled trial was to investigate the acceptability and efficacy of the Acquiring Career, Coping, Executive control, Social Skills (ACCESS) Program, a group intervention tailored for young adults with autism spectrum disorder (ASD) to enhance critical skills and beliefs that promote adult functioning, including social and adaptive skills, self-determination skills, and coping self-efficacy. Forty-four adults with ASD (ages 18-38; 13 females) and their caregivers were randomly assigned to treatment or waitlist control. Compared to controls, adults in treatment significantly improved in adaptive and self-determination skills, per caregiver report, and self-reported greater belief in their ability to access social support to cope with stressors. Results provide evidence for the acceptability and efficacy of the ACCESS Program.
50 CFR 648.92 - Effort-control program for monkfish limited access vessels.
Code of Federal Regulations, 2011 CFR
2011-10-01
.... Limited access NE multispecies and limited access sea scallop permit holders who also possess a limited... Regional Administrator within 24 hours after tags have been discovered lost, destroyed, or missing. (iv... § 648.92, see the List of CFR Sections Affected, which appears in the Finding Aids section of the...
Analysis of Effectiveness of Phoenix Entry Reaction Control System
NASA Technical Reports Server (NTRS)
Dyakonov, Artem A.; Glass, Christopher E.; Desai, Prasun, N.; VanNorman, John W.
2008-01-01
Interaction between the external flowfield and the reaction control system (RCS) thruster plumes of the Phoenix capsule during entry has been investigated. The analysis covered rarefied, transitional, hypersonic and supersonic flight regimes. Performance of pitch, yaw and roll control authority channels was evaluated, with specific emphasis on the yaw channel due to its low nominal yaw control authority. Because Phoenix had already been constructed and its RCS could not be modified before flight, an assessment of RCS efficacy along the trajectory was needed to determine possible issues and to make necessary software changes. Effectiveness of the system at various regimes was evaluated using a hybrid DSMC-CFD technique, based on DSMC Analysis Code (DAC) code and General Aerodynamic Simulation Program (GASP), the LAURA (Langley Aerothermal Upwind Relaxation Algorithm) code, and the FUN3D (Fully Unstructured 3D) code. Results of the analysis at hypersonic and supersonic conditions suggest a significant aero-RCS interference which reduced the efficacy of the thrusters and could likely produce control reversal. Very little aero-RCS interference was predicted in rarefied and transitional regimes. A recommendation was made to the project to widen controller system deadbands to minimize (if not eliminate) the use of RCS thrusters through hypersonic and supersonic flight regimes, where their performance would be uncertain.
NASA Astrophysics Data System (ADS)
Abramov, G. V.; Emeljanov, A. E.; Ivashin, A. L.
Theoretical bases for modeling a digital control system with information transfer via the channel of plural access and a regular quantization cycle are submitted. The theory of dynamic systems with random changes of the structure including elements of the Markov random processes theory is used for a mathematical description of a network control system. The characteristics of similar control systems are received. Experimental research of the given control systems is carried out.
Prospective Durability Testing of a Vascular Access Phantom
2010-09-01
ultrasound guidance when obtaining central venous access.19,20 The increasing use of ultrasound guidance for vascular access has created an educational...with difficult intravenous access. Ann Emerg Med. 2005;46:456-61. 7. Gallieni M, Cozzolino M. Uncomplicated central vein catheterization of high risk...al. Randomized, controlled clinical trial of point-of-care limited ultrasonography assistance of central venous cannulation: The third sonography
Takeda, Toshihiro; Ueda, Kanayo; Nakagawa, Akito; Manabe, Shirou; Okada, Katsuki; Mihara, Naoki; Matsumura, Yasushi
2017-01-01
Electronic health record (EHR) systems are necessary for the sharing of medical information between care delivery organizations (CDOs). We developed a document-based EHR system in which all of the PDF documents that are stored in our electronic medical record system can be disclosed to selected target CDOs. An access control list (ACL) file was designed based on the HL7 CDA header to manage the information that is disclosed.
Digital access and national character.
Yang, Bijou; Lester, David
2006-04-01
A digital access index was associated with measures of national character (such as extraversion and individualism) for 18 industrialized nations, but statistical controls for gross domestic product per capita eliminated these associations.
Leventhal, Jeremy C; Cummins, Jonathan A; Schwartz, Peter H; Martin, Douglas K; Tierney, William M
2015-01-01
Electronic health records (EHRs) are proliferating, and financial incentives encourage their use. Applying Fair Information Practice principles to EHRs necessitates balancing patients' rights to control their personal information with providers' data needs to deliver safe, high-quality care. We describe the technical and organizational challenges faced in capturing patients' preferences for patient-controlled EHR access and applying those preferences to an existing EHR. We established an online system for capturing patients' preferences for who could view their EHRs (listing all participating clinic providers individually and categorically-physicians, nurses, other staff) and what data to redact (none, all, or by specific categories of sensitive data or patient age). We then modified existing data-viewing software serving a state-wide health information exchange and a large urban health system and its primary care clinics to allow patients' preferences to guide data displays to providers. Patients could allow or restrict data displays to all clinicians and staff in a demonstration primary care clinic, categories of providers (physicians, nurses, others), or individual providers. They could also restrict access to all EHR data or any or all of five categories of sensitive data (mental and reproductive health, sexually transmitted diseases, HIV/AIDS, and substance abuse) and for specific patient ages. The EHR viewer displayed data via reports, data flowsheets, and coded and free text data displayed by Google-like searches. Unless patients recorded restrictions, by default all requested data were displayed to all providers. Data patients wanted restricted were not displayed, with no indication they were redacted. Technical barriers prevented redacting restricted information in free textnotes. The program allowed providers to hit a "Break the Glass" button to override patients' restrictions, recording the date, time, and next screen viewed. Establishing patient-control
NASA Astrophysics Data System (ADS)
Zheng, Jun; Ansari, Nirwan
2005-01-01
economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks.
First-Order-hold interpolation digital-to-analog converter with application to aircraft simulation
NASA Technical Reports Server (NTRS)
Cleveland, W. B.
1976-01-01
Those who design piloted aircraft simulations must contend with the finite size and speed of the available digital computer and the requirement for simulation reality. With a fixed computational plant, the more complex the model, the more computing cycle time is required. While increasing the cycle time may not degrade the fidelity of the simulated aircraft dynamics, the larger steps in the pilot cue feedback variables (such as the visual scene cues), may be disconcerting to the pilot. The first-order-hold interpolation (FOHI) digital-to-analog converter (DAC) is presented as a device which offers smooth output, regardless of cycle time. The Laplace transforms of these three conversion types are developed and their frequency response characteristics and output smoothness are compared. The FOHI DAC exhibits a pure one-cycle delay. Whenever the FOHI DAC input comes from a second-order (or higher) system, a simple computer software technique can be used to compensate for the DAC phase lag. When so compensated, the FOHI DAC has (1) an output signal that is very smooth, (2) a flat frequency response in frequency ranges of interest, and (3) no phase error. When the input comes from a first-order system, software compensation may cause the FOHI DAC to perform as an FOHE DAC, which, although its output is not as smooth as that of the FOHI DAC, has a smoother output than that of the ZOH DAC.
NASA Astrophysics Data System (ADS)
Mehranfar, Fahimeh; Bordbar, Abdol-Khalegh; Fani, Najme; Keyhanfar, Mehrnaz
2013-11-01
The interaction of diacetylcurcumin (DAC), as a novel synthetic derivative of curcumin, with bovine β-casein (an abundant milk protein that is highly amphiphilic and self assembles into stable micellar nanoparticles in aqueous solution) was investigated using fluorescence quenching experiments, Forster energy transfer measurements and molecular docking calculations. The fluorescence quenching measurements revealed the presence of a single binding site on β-casein for DAC with the binding constant value equals to (4.40 ± 0.03) × 104 M-1. Forster energy transfer measurements suggested that the distance between bound DAC and Trp143 residue is higher than the respective critical distance, hence, the static quenching is more likely responsible for fluorescence quenching other than the mechanism of non-radiative energy transfer. Our results from molecular docking calculations indicated that binding of DAC to β-casein predominantly occurred through hydrophobic contacts in the hydrophobic core of protein. Additionally, in vitro investigation of the cytotoxicity of free DAC and DAC-β-casein complex in human breast cancer cell line MCF7 revealed the higher cytotoxic effect of DAC-β-casein complex.
Barnard, Juliana; Rose, Cecile; Newman, Lee; Canner, Martha; Martyny, John; McCammon, Chuck; Bresnitz, Eddy; Rossman, Milt; Thompson, Bruce; Rybicki, Benjamin; Weinberger, Steven E; Moller, David R; McLennan, Geoffrey; Hunninghake, Gary; DePalo, Louis; Baughman, Robert P; Iannuzzi, Michael C; Judson, Marc A; Knatterud, Genell L; Teirstein, Alvin S; Yeager, Henry; Johns, Carol J; Rabin, David L; Cherniack, Reuben
2005-03-01
To determine whether specific occupations and industries may be associated with sarcoidosis. A Case Control Etiologic Study of Sarcoidosis (ACCESS) obtained occupational and environmental histories on 706 newly diagnosed sarcoidosis cases and matched controls. We used Standard Industrial Classification (SIC) and Standard Occupational Classification (SOC) to assess occupational contributions to sarcoidosis risk. Univariable analysis identified elevated risk of sarcoidosis for workers with industrial organic dust exposures, especially in Caucasian workers. Workers for suppliers of building materials, hardware, and gardening materials were at an increased risk of sarcoidosis as were educators. Work providing childcare was negatively associated with sarcoidosis risk. Jobs with metal dust or metal fume exposures were negatively associated with sarcoidosis risk, especially in Caucasian workers. In this study, we found that exposures in particular occupational settings may contribute to sarcoidosis risk.
Jiang, J; Ma, G M; Luo, D P; Li, C R; Li, Q M; Wang, W
2014-02-01
Damped AC voltages detection system (DAC) is a productive way to detect the faults in power cables. To solve the problems of large volume, complicated structure and electromagnetic interference in existing switches, this paper developed a compact solid state switch based on electromagnetic trigger, which is suitable for DAC test system. Synchronous electromagnetic trigger of 32 Insulated Gate Bipolar Transistors (IGBTs) in series was realized by the topological structure of single line based on pulse width modulation control technology. In this way, external extension was easily achieved. Electromagnetic trigger and resistor-capacitor-diode snubber circuit were optimized to reduce the switch turn-on time and circular layout. Epoxy encapsulating was chosen to enhance the level of partial discharge initial voltage (PDIV). The combination of synchronous trigger and power supply is proposed to reduce the switch volume. Moreover, we have overcome the drawback of the electromagnetic interference and improved the detection sensitivity of DAC by using capacitor storage energy to maintain IGBT gate driving voltage. The experimental results demonstrated that the solid-state switch, with compact size, whose turn-on time was less than 400 ns and PDIV was more than 65 kV, was able to meet the actual demands of 35 kV DAC test system.
Low-Actuation Voltage MEMS Digital-to-Analog Converter with Parylene Spring Structures.
Ma, Cheng-Wen; Lee, Fu-Wei; Liao, Hsin-Hung; Kuo, Wen-Cheng; Yang, Yao-Joe
2015-08-28
We propose an electrostatically-actuated microelectromechanical digital-to-analog converter (M-DAC) device with low actuation voltage. The spring structures of the silicon-based M-DAC device were monolithically fabricated using parylene-C. Because the Young's modulus of parylene-C is considerably lower than that of silicon, the electrostatic microactuators in the proposed device require much lower actuation voltages. The actuation voltage of the proposed M-DAC device is approximately 6 V, which is less than one half of the actuation voltages of a previously reported M-DAC equipped with electrostatic microactuators. The measured total displacement of the proposed three-bit M-DAC is nearly 504 nm, and the motion step is approximately 72 nm. Furthermore, we demonstrated that the M-DAC can be employed as a mirror platform with discrete displacement output for a noncontact surface profiling system.
Low-Actuation Voltage MEMS Digital-to-Analog Converter with Parylene Spring Structures
Ma, Cheng-Wen; Lee, Fu-Wei; Liao, Hsin-Hung; Kuo, Wen-Cheng; Yang, Yao-Joe
2015-01-01
We propose an electrostatically-actuated microelectromechanical digital-to-analog converter (M-DAC) device with low actuation voltage. The spring structures of the silicon-based M-DAC device were monolithically fabricated using parylene-C. Because the Young’s modulus of parylene-C is considerably lower than that of silicon, the electrostatic microactuators in the proposed device require much lower actuation voltages. The actuation voltage of the proposed M-DAC device is approximately 6 V, which is less than one half of the actuation voltages of a previously reported M-DAC equipped with electrostatic microactuators. The measured total displacement of the proposed three-bit M-DAC is nearly 504 nm, and the motion step is approximately 72 nm. Furthermore, we demonstrated that the M-DAC can be employed as a mirror platform with discrete displacement output for a noncontact surface profiling system. PMID:26343682
Access and accounting schemes of wireless broadband
NASA Astrophysics Data System (ADS)
Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing
2004-04-01
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.
Data and Analysis Center for Software
1990-03-01
is available to DACS users. 7.4 Bibliographic Services Bibliographic inquiries to the DACS are received in many forms: by letter, by telephone call, by...of potential users concerning the DACS and its products and services. 9-4 10.0 TASK 9 - SPECIAL STUDIES AND PROJECTS 10.1 Introduction There are many ...problems related to software technology that can be solved through the full service capabilities provided by the DACS. Many of these are sizable
The synergistic effect of ω3 and Vit D3 on glycemia and TNF-α in islet transplantation.
Gurol, A O; Okten-Kursun, A; Kasapoglu, P; Suzergoz, F; Kucuksezer, U C; Cevik, A; Tutuncu, Y; Yentur, S P; Gurol, S D; Kucuk, M; Yilmaz, M T
2016-01-27
The current treatment of type 1 diabetes consists of insulin administration. Transplantation of islets of Langerhans is considered very favorable because the full effect of insulin treatment cannot be obtained in severe cases. Although agents such as omega-3 (ω3) and vitamin D3 (Vit D3) are known to contribute to the success of islet allo-transplantation (ITX), in this study we aimed to experimentally determine their effects on glycemia and TNF-α production. Wistar albino rats, which were used as recipients, were given ω3, Vit D3, and islets by gavage, and intraperitoneal- and intraportal injections, respectively. Daclizumab (DAC) was used for immunosuppression. Glycemia levels decreased in rats treated with ω3 and vit D3. TNF-α increased in all groups due to application of STZ. After ITX (day +1), the weakest increase was observed in the ω3 + Vit D3 group. In the ITX+DAC group, compared with that of ITX only, DAC was shown to decrease levels of TNF- α following ITX, only in control group, however, similar levels of TNF-α were observed in other groups. The values in the treated groups were already lower than those of the controls in the ITX group and also remained almost equal in the ITX+DAC group. We suggest that the use of ω3 and Vit D3 together will improve the pro-inflammatory aspect encountered during and after ITXs, and contribute to the reduction of the dose of immunosuppressants in these procedures.
Blakeman, Tom; Blickem, Christian; Kennedy, Anne; Reeves, David; Bower, Peter; Gaffney, Hannah; Gardner, Caroline; Lee, Victoria; Jariwala, Praksha; Dawson, Shoba; Mossabir, Rahena; Brooks, Helen; Richardson, Gerry; Spackman, Eldon; Vassilev, Ivaylo; Chew-Graham, Carolyn; Rogers, Anne
2014-01-01
Background Implementation of self-management support in traditional primary care settings has proved difficult, encouraging the development of alternative models which actively link to community resources. Chronic kidney disease (CKD) is a common condition usually diagnosed in the presence of other co-morbidities. This trial aimed to determine the effectiveness of an intervention to provide information and telephone-guided access to community support versus usual care for patients with stage 3 CKD. Methods and Findings In a pragmatic, two-arm, patient level randomised controlled trial 436 patients with a diagnosis of stage 3 CKD were recruited from 24 general practices in Greater Manchester. Patients were randomised to intervention (215) or usual care (221). Primary outcome measures were health related quality of life (EQ-5D health questionnaire), blood pressure control, and positive and active engagement in life (heiQ) at 6 months. At 6 months, mean health related quality of life was significantly higher for the intervention group (adjusted mean difference = 0.05; 95% CI = 0.01, 0.08) and blood pressure was controlled for a significantly greater proportion of patients in the intervention group (adjusted odds-ratio = 1.85; 95% CI = 1.25, 2.72). Patients did not differ significantly in positive and active engagement in life. The intervention group reported a reduction in costs compared with control. Conclusions An intervention to provide tailored information and telephone-guided access to community resources was associated with modest but significant improvements in health related quality of life and better maintenance of blood pressure control for patients with stage 3 CKD compared with usual care. However, further research is required to identify the mechanisms of action of the intervention. Trial Registration Controlled-Trials.com ISRCTN45433299 PMID:25330169
Web Accessibility and Accessibility Instruction
ERIC Educational Resources Information Center
Green, Ravonne A.; Huprich, Julia
2009-01-01
Section 508 of the Americans with Disabilities Act (ADA) mandates that programs and services be accessible to people with disabilities. While schools of library and information science (SLIS*) and university libraries should model accessible Web sites, this may not be the case. This article examines previous studies about the Web accessibility of…
42 CFR 431.834 - Access to records: Claims processing assessment systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATION Quality Control Medicaid Quality Control (mqc) Claims Processing Assessment System § 431.834 Access to records: Claims processing assessment systems. The agency, upon written request, must provide HHS staff with access to all records pertaining to its MQC claims processing assessment system reviews...
Meininger, D; Bück, M; Bohlmann, S; Weber, C F; Strouhal, U; Ihlow, K; Zacharowski, K; Byhahn, C
2011-02-01
The goal of the present study was to evaluate the publication rate of abstracts presented during the German Anesthesia Congress (Deutscher Anästhesiecongress, DAC) and the meeting of the European Society of Anesthesiologists (ESA) in the years 2000 and 2005 in Medline listed journals (http://www.ncbi.nlm.nih.gov/pubmed). In addition, the respective impact factors of the journals in which the articles were published were evaluated (http://www.isiknowledge.com). All abstracts of free papers and posters presented at the DAC and ESA from the years 2000 and 2005 were included into the study. The presence of authors and the topics of abstracts in the literature were analyzed by a Medline based inquiry over a time period of 5 years. The search was based on the last name and initials of authors and when these could not be identified in Medline the search was extended by keywords of relevant topics of the abstract. Umlauts "ä/ö/ü" were replaced by "ae/oe/ue" and "ß" was replaced by "ss". Only original papers were included in this analysis. Once an original paper was found the impact factor of the journal in that year was identified. A total of 465 abstracts from the DAC 2000, 378 abstracts from the DAC 2005, 644 abstracts from the ESA 2000 and 720 abstracts from the ESA 2005 were included. Of the abstracts from the DAC 2000, 183 (39%) were published in Medline listed journals, 179 (47%) from DAC 2005, 218 (34%) from ESA 2000 and 233 (32%) from ESA 2005. The ESA abstracts were published in English more often than the DAC abstracts (ESA 2000: 95%; ESA 2005: 95%; DAC 2000: 78%; DAC 2005: 86%). While the publication rate after the ESA remained nearly unchanged between 2000 and 2005, the publication rate after the DAC increased by about 7%. The average impact factors of the publications were 1.777 (DAC 2000), 2.836 (DAC 2005), 1.825 (ESA 2000) and 2.36 (ESA 2005). Independent of the congress (DAC or ESA) where the abstract was presented, most articles were published in the